-
361
Introduction to the Special Issue on Distributed Hybrid Systems
Published 2022-12-01“…The vision and purpose of the DHS workshops was to connect researchers working in real-time systems, hybrid systems, control theory, formal verification, distributed computing, and concurrency theory, in order to advance the subject of distributed hybrid systems. …”
Get full text
Article -
362
Countermeasuring MITM Attacks in Solar-Powered PON-Based FiWi Access Networks
Published 2023-02-01“…Consequently, this paper introduces two novel mechanisms for reducing ONU energy consumption, namely the <i>wake-up</i> and <i>time-out</i> mechanisms, which can be used to mitigate the effectiveness of MITM attacks that may seek to affect the unit’s operation due to battery drain. The formal verification results show that these goals were effectively achieved.…”
Get full text
Article -
363
Mapping Applications Intents to Programmable NDN Data-Planes via Event-B Machines
Published 2022-01-01“…Second, EBM’s formal verification property, referred to as its proof obligation, ensures that the desired properties of the network or its services, as defined by the intent, remain satisfied by the refined EBM representing the final data-plane configurations. …”
Get full text
Article -
364
Exact and Approximate Determinization of Discounted-Sum Automata
Published 2014-02-01“…Unfortunately, determinization of NDAs, which is often essential in formal verification, is, in general, not possible. We provide positive news, showing that every NDA with an integral discount factor is determinizable. …”
Get full text
Article -
365
An IOHMM-Based Framework to Investigate Drift in Effectiveness of IoT-Based Systems
Published 2021-01-01“…IoT-based systems, when interacting with the physical environment through actuators, are complex systems difficult to model. Formal verification techniques carried out at design-time being often ineffective in this context, these systems have to be quantitatively evaluated for effectiveness at run-time, i.e., for the extent to which they behave as expected. …”
Get full text
Article -
366
CoqIOA : a formalization of IO automata in the Coq proof assistant
Published 2017Get full text
Thesis -
367
Sampling-Based Approximation Algorithms for Reachability Analysis with Provable Guarantees
Published 2018“…The successful deployment of many autonomous systems in part hinges on providing rigorous guarantees on their performance and safety through a formal verification method, such as reachability analysis. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
368
-
369
Specification and verification of sequential machines in rule-based hardware languages
Published 2023“…The other technique is to use hardware formal verification, which phrases correctness as custom temporal-logic formulae and checks that a concrete design verifies those properties by solving a large set of corresponding Boolean equations. …”
Get full text
Thesis -
370
Verifying Confidentiality Under Nondeterminism for Storage Systems
Published 2023“…This thesis tackles this problem using formal verification, a technique that involves proving a software system always satisfy certain requirements. …”
Get full text
Thesis -
371
Verifiable compilation of I/O automata without global synchronization
Published 2006Get full text
Thesis -
372
EGHR : efficient group-based handover authentication protocols for mMTC in 5G wireless networks
Published 2020“…The BAN logic and the formal verification tool by using the AVISPA and SPAN show that our proposed protocols are secure against various malicious attacks.…”
Get full text
Journal Article -
373
SafeOSL: ensuring memory safety of C via ownership-based intermediate language
Published 2023“…The unsafe features of C make it a big challenge to ensure memory safety of C programs, and often lead to memory errors that can result in vulnerabilities. Various formal verification techniques for ensuring memory safety of C have been proposed. …”
Get full text
Journal Article -
374
GBAAM : group-based access authentication for MTC in LTE networks
Published 2015“…The experimental results and formal verification by using the TLA+ and TLC show that the proposed scheme is secure against various malicious attacks.…”
Get full text
Get full text
Journal Article -
375
A simple and robust handover authentication between HeNB and eNB in LTE networks
Published 2013“…The experimental results and formal verification by using the AVISPA tool show that the proposed scheme is efficient and secure against various malicious attacks.…”
Get full text
Get full text
Journal Article -
376
Towards robust neural networks: evaluation and construction
Published 2021“…A common approach for assessing the robustness of a neural network is through formal verification, which is often computationally expensive. …”
Thesis -
377
Semantic refactorings
Published 2017“…Our semantics-driven refactorings rely on formal verification algorithms to reason over a program’s behaviour, and we conjecture they are more precise and can handle more complex code scenarios than syntax-driven ones.…”
Thesis -
378
Branch and bound for piecewise linear neural network verification
Published 2020“…The success of Deep Learning and its potential use in many safety-critical applications has motivated research on formal verification of Neural Network (NN) models. In this context, verification involves proving or disproving that an NN model satisfies certain input-output properties. …”
Journal article -
379
Modelling osteomyelitis
Published 2012“…Finally we discuss different diagnostic estimators defined by formal verification techniques, in order to assess different bone pathologies (osteopenia, osteoporosis and osteomyelitis) in an effective way.…”
Journal article -
380
Topics in monitoring and planning for embedded real-time systems
Published 2015“…<p>The verification of real-time systems has gained much interest in the formal verification community during the past two decades. …”
Thesis