-
381
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
Published 2023“…The protocol's security was proved using the formal verification ROR model and automated security verifier ProVerif tool to validate the protocol resistance against various attacks and provided forward secrecy. …”
Article -
382
P3 problem and Magnolia language: Specializing array computations for emerging architectures
Published 2022-10-01“…Axioms can be used to produce tests for concrete implementations of specifications, for formal verification, or to perform semantics-preserving program transformations. …”
Get full text
Article -
383
PROLEAD_SW
Published 2023-06-01“…These include (1) evaluation of larger designs compared to the state of the art, e.g. a full Advanced Encryption Standard (AES) masked implementation, and (2) formal verification under our new generic leakage model for CPUs. …”
Get full text
Article -
384
Temporal Logic for Programmable Logic Controllers
Published 2020-12-01“…We address the formal verification of the control software of critical systems, i.e., ensuring the absence of design errors in a system with respect to requirements. …”
Get full text
Article -
385
Operational Semantics of Annotated Reflex Programs
Published 2019-12-01“…Currently, the main goal of the Reflex language project is to develop formal verification methods for Reflex programs in order to guarantee increased reliability of the software created on its basis. …”
Get full text
Article -
386
Security Analysis of a Digital Twin Framework Using Probabilistic Model Checking
Published 2023-01-01“…This paper presents a framework in which the security of a DT can be analyzed with the help of a formal verification technique. The framework captures the defense of the system at different layers and considers various attacks at each layer. …”
Get full text
Article -
387
BCmECC: A Lightweight Blockchain-Based Authentication and Key Agreement Protocol for Internet of Things
Published 2021-12-01“…We evaluate the security of the proposed protocol heuristically and validate it formally, which demonstratse the high level of the security. For the formal verification we used the widely accepted formal methods, i.e., BAN logic and the Scyther tool. …”
Get full text
Article -
388
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency
Published 2023-12-01“…We assess the security of our design in the probing model using a formal verification tool. Furthermore, we evaluate the practical side-channel resistance on an FPGA. …”
Get full text
Article -
389
Collision Tests in Human-Robot Collaboration: Experiments on the Influence of Additional Impact Parameters on Safety
Published 2023-01-01“…This analysis requires highly elaborate physical crash tests of potential impact scenarios. Formal verification will save considerable amounts of time and effort. …”
Get full text
Article -
390
A Static Analysis for the Minimization of Voters in Fault-Tolerant Circuits
Published 2018-05-01“…We address scalability issues arising from formal verification with approximations and assess their efficiency and precision.…”
Get full text
Article -
391
-
392
The analysis of cryptographic APIs using the theorem prover Otter
Published 2005Get full text
Thesis -
393
Secure and efficient authentication schemes for 5G heterogeneous networks
Published 2022“…All designed schemes are verified by security verification methods, we used the SPAN-AVISPA tool to simulate and analyze our proposed scheme and to provide a formal verification, and BAN Logic is used for logical correctness. …”
Get full text
Thesis-Doctor of Philosophy -
394
Automated quantitative software verification
Published 2010“…This can be done with a formal verification technique called <em>model checking</em>, which establishes <em>properties</em> of systems by algorithmically considering all execution scenarios. …”
Thesis -
395
Precise abstract interpretation of hardware designs
Published 2018“…We then present the application of native software analyzers based on SAT/SMT-based decision procedures as well as abstraction-based techniques such as abstract interpretation for the formal verification of the software netlist design generated from the hardware RTL. …”
Thesis -
396
An architectural approach for reasoning about trust properties
Published 2012“…An <em>abstraction model</em> based on formal verification is developed to reason about the impact of the system's construction and configuration on its trustworthiness. …”
Thesis -
397
An efficient authentication and key agreement protocol for 4G (LTE) networks
Published 2014“…The automated validation of internet security protocols and applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed EEPS-AKA is efficient and secure against active and passive attacks.…”
Get full text
Conference or Workshop Item -
398
AKTA NOTARIS SEBAGAI ALAT BUKTI TERTULIS YANG MEMPUNYAI KEKUATAN PEMBUKTIAN YANG SEMPURNA
Published 2016-02-01“…In an authentic deed must satisfy (i) the strength of proof of birth, (ii) Strength Formal Verification and (iii) The power of the Material Evidence. …”
Get full text
Article -
399
Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware
Published 2023-12-01“…We verify the side-channel security of our implementation using formal verification on the one hand, and practically using Test Vector Leakage Assessment (TVLA) on the other. …”
Get full text
Article -
400
Synthesizing Signaling Pathways from Temporal Phosphoproteomic Data
Published 2018“…The Temporal Pathway Synthesizer (TPS) algorithm uses constraint-solving techniques first developed in the context of formal verification to explore paths in an interaction network. …”
Get full text
Get full text
Get full text
Article