Showing 381 - 400 results of 428 for search '"formal verification"', query time: 0.10s Refine Results
  1. 381

    HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs by Khalid, Haqi, Hashim, Shaiful Jahari, Hashim, Fazirulhisyam, Syed Ahamed, Sharifah Mumtazah, Chaudhary, Muhammad Akmal, Altarturi, Hamza H. M., Saadoon, Muntadher

    Published 2023
    “…The protocol's security was proved using the formal verification ROR model and automated security verifier ProVerif tool to validate the protocol resistance against various attacks and provided forward secrecy. …”
    Article
  2. 382

    P3 problem and Magnolia language: Specializing array computations for emerging architectures by Benjamin Chetioui, Marius Kleppe Larnøy, Jaakko Järvi, Magne Haveraaen, Lenore Mullin

    Published 2022-10-01
    “…Axioms can be used to produce tests for concrete implementations of specifications, for formal verification, or to perform semantics-preserving program transformations. …”
    Get full text
    Article
  3. 383

    PROLEAD_SW by Jannik Zeitschner, Nicolai Müller, Amir Moradi

    Published 2023-06-01
    “…These include (1) evaluation of larger designs compared to the state of the art, e.g. a full Advanced Encryption Standard (AES) masked implementation, and (2) formal verification under our new generic leakage model for CPUs. …”
    Get full text
    Article
  4. 384

    Temporal Logic for Programmable Logic Controllers by Natalia Olegovna Garanina, Igor Sergeevich Anureev, Vladimir Evgenyevich Zyubin, Sergey Mikhailovich Staroletov, Tatiana Victorovna Liakh, Andrey Sergeevich Rozov, Sergei Petrovich Gorlatch

    Published 2020-12-01
    “…We address the formal verification of the control software of critical systems, i.e., ensuring the absence of design errors in a system with respect to requirements. …”
    Get full text
    Article
  5. 385

    Operational Semantics of Annotated Reflex Programs by Igor S. Anureev

    Published 2019-12-01
    “…Currently, the main goal of the Reflex language project is to develop formal verification methods for Reflex programs in order to guarantee increased reliability of the software created on its basis. …”
    Get full text
    Article
  6. 386

    Security Analysis of a Digital Twin Framework Using Probabilistic Model Checking by Eman Shaikh, A. R. Al-Ali, Shahabuddin Muhammad, Nazeeruddin Mohammad, F. Aloul

    Published 2023-01-01
    “…This paper presents a framework in which the security of a DT can be analyzed with the help of a formal verification technique. The framework captures the defense of the system at different layers and considers various attacks at each layer. …”
    Get full text
    Article
  7. 387

    BCmECC: A Lightweight Blockchain-Based Authentication and Key Agreement Protocol for Internet of Things by Jan Lansky, Amir Masoud Rahmani, Saqib Ali, Nasour Bagheri, Masoumeh Safkhani, Omed Hassan Ahmed, Mehdi Hosseinzadeh

    Published 2021-12-01
    “…We evaluate the security of the proposed protocol heuristically and validate it formally, which demonstratse the high level of the security. For the formal verification we used the widely accepted formal methods, i.e., BAN logic and the Scyther tool. …”
    Get full text
    Article
  8. 388

    Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency by Barbara Gigerl, Franz Klug, Stefan Mangard, Florian Mendel, Robert Primas

    Published 2023-12-01
    “…We assess the security of our design in the probing model using a formal verification tool. Furthermore, we evaluate the practical side-channel resistance on an FPGA. …”
    Get full text
    Article
  9. 389

    Collision Tests in Human-Robot Collaboration: Experiments on the Influence of Additional Impact Parameters on Safety by Clara Fischer, Michael Neuhold, Martin Steiner, Thomas Haspl, Michael Rathmair, Sebastian Schlund

    Published 2023-01-01
    “…This analysis requires highly elaborate physical crash tests of potential impact scenarios. Formal verification will save considerable amounts of time and effort. …”
    Get full text
    Article
  10. 390

    A Static Analysis for the Minimization of Voters in Fault-Tolerant Circuits by Burlyaev, Dmitry, Fradet, Pascal, Girault, Alain

    Published 2018-05-01
    “…We address scalability issues arising from formal verification with approximations and assess their efficiency and precision.…”
    Get full text
    Article
  11. 391
  12. 392
  13. 393

    Secure and efficient authentication schemes for 5G heterogeneous networks by Ozhelvaci, Alican

    Published 2022
    “…All designed schemes are verified by security verification methods, we used the SPAN-AVISPA tool to simulate and analyze our proposed scheme and to provide a formal verification, and BAN Logic is used for logical correctness. …”
    Get full text
    Thesis-Doctor of Philosophy
  14. 394

    Automated quantitative software verification by Kattenbelt, M

    Published 2010
    “…This can be done with a formal verification technique called <em>model checking</em>, which establishes <em>properties</em> of systems by algorithmically considering all execution scenarios. …”
    Thesis
  15. 395

    Precise abstract interpretation of hardware designs by Mukherjee, R

    Published 2018
    “…We then present the application of native software analyzers based on SAT/SMT-based decision procedures as well as abstraction-based techniques such as abstract interpretation for the formal verification of the software netlist design generated from the hardware RTL. …”
    Thesis
  16. 396

    An architectural approach for reasoning about trust properties by Namiluko, C

    Published 2012
    “…An <em>abstraction model</em> based on formal verification is developed to reason about the impact of the system's construction and configuration on its trustworthiness. …”
    Thesis
  17. 397

    An efficient authentication and key agreement protocol for 4G (LTE) networks by Alezabi, Kamal Ali, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Mohd Ali, Borhanuddin

    Published 2014
    “…The automated validation of internet security protocols and applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed EEPS-AKA is efficient and secure against active and passive attacks.…”
    Get full text
    Conference or Workshop Item
  18. 398

    AKTA NOTARIS SEBAGAI ALAT BUKTI TERTULIS YANG MEMPUNYAI KEKUATAN PEMBUKTIAN YANG SEMPURNA by Rif'ah Roihanah

    Published 2016-02-01
    “…In an authentic deed must satisfy (i) the strength of proof of birth, (ii) Strength Formal Verification and (iii) The power of the Material Evidence. …”
    Get full text
    Article
  19. 399

    Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware by Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu

    Published 2023-12-01
    “…We verify the side-channel security of our implementation using formal verification on the one hand, and practically using Test Vector Leakage Assessment (TVLA) on the other. …”
    Get full text
    Article
  20. 400

    Synthesizing Signaling Pathways from Temporal Phosphoproteomic Data by Köksal, Ali Sinan, Beck, Kirsten, Cronin, Dylan R., Camp, Nathan D., MacGilvray, Matthew E., Bodík, Rastislav, Fisher, Jasmin, McKenna, Aaron, Srivastava, Saurabh, Wolf Yadlin, Alejandro Marcelo, Fraenkel, Ernest, Gitter, Anthony

    Published 2018
    “…The Temporal Pathway Synthesizer (TPS) algorithm uses constraint-solving techniques first developed in the context of formal verification to explore paths in an interaction network. …”
    Get full text
    Get full text
    Get full text
    Article