-
561
(User-friendly) formal requirements verification in the context of ISO26262
Published 2020-06-01“…This paper proposes an approach for requirements formal verification where formal methods, languages, and tools are only minimally exposed to the user, and are integrated into one of the commonly used system modeling environments based on SysML. …”
Get full text
Article -
562
P3 problem and Magnolia language: Specializing array computations for emerging architectures
Published 2022-10-01“…Axioms can be used to produce tests for concrete implementations of specifications, for formal verification, or to perform semantics-preserving program transformations. …”
Get full text
Article -
563
PROLEAD_SW
Published 2023-06-01“…These include (1) evaluation of larger designs compared to the state of the art, e.g. a full Advanced Encryption Standard (AES) masked implementation, and (2) formal verification under our new generic leakage model for CPUs. …”
Get full text
Article -
564
On Reconfiguration Theory of Discrete-Event Systems: From Initial Specification Until Final Deployment
Published 2019-01-01“…Since the development of distributed RDESs under functional and extra-functional constraints is required by experts, we propose a complete methodology that deals first with their initial design with a new general profile named R-UML extending unified modeling language (UML) or also with new specific technology-oriented profiles, the validation of the related models with a new language R-OCL extending object constraint language (OCL), before their transformation to formal formalisms, such as Petri nets, timed automata, or B method for simulation or also formal verification of different properties. The checked models are transformed into OS reconfigurable tasks in the operational level, before applying a co-design methodology under functional, real-time, memory, and energy constraints for minimizing redundancies in tasks and for optimizing the composition of software and hardware parts together. …”
Get full text
Article -
565
A Systematic Mapping Study on Software Quality Control Techniques for Assessing Privacy in Information Systems
Published 2020-01-01“…The maturity of the techniques varies between the type of technique: Formal verification techniques exhibit the lowest level of maturity while the combination of techniques has demonstrated its successful application in real-world scenarios. …”
Get full text
Article -
566
Temporal Logic for Programmable Logic Controllers
Published 2020-12-01“…We address the formal verification of the control software of critical systems, i.e., ensuring the absence of design errors in a system with respect to requirements. …”
Get full text
Article -
567
Operational Semantics of Annotated Reflex Programs
Published 2019-12-01“…Currently, the main goal of the Reflex language project is to develop formal verification methods for Reflex programs in order to guarantee increased reliability of the software created on its basis. …”
Get full text
Article -
568
Security Analysis of a Digital Twin Framework Using Probabilistic Model Checking
Published 2023-01-01“…This paper presents a framework in which the security of a DT can be analyzed with the help of a formal verification technique. The framework captures the defense of the system at different layers and considers various attacks at each layer. …”
Get full text
Article -
569
BCmECC: A Lightweight Blockchain-Based Authentication and Key Agreement Protocol for Internet of Things
Published 2021-12-01“…We evaluate the security of the proposed protocol heuristically and validate it formally, which demonstratse the high level of the security. For the formal verification we used the widely accepted formal methods, i.e., BAN logic and the Scyther tool. …”
Get full text
Article -
570
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency
Published 2023-12-01“…We assess the security of our design in the probing model using a formal verification tool. Furthermore, we evaluate the practical side-channel resistance on an FPGA. …”
Get full text
Article -
571
Collision Tests in Human-Robot Collaboration: Experiments on the Influence of Additional Impact Parameters on Safety
Published 2023-01-01“…This analysis requires highly elaborate physical crash tests of potential impact scenarios. Formal verification will save considerable amounts of time and effort. …”
Get full text
Article -
572
A Static Analysis for the Minimization of Voters in Fault-Tolerant Circuits
Published 2018-05-01“…We address scalability issues arising from formal verification with approximations and assess their efficiency and precision.…”
Get full text
Article -
573
-
574
The analysis of cryptographic APIs using the theorem prover Otter
Published 2005Get full text
Thesis -
575
Secure and efficient authentication schemes for 5G heterogeneous networks
Published 2022“…All designed schemes are verified by security verification methods, we used the SPAN-AVISPA tool to simulate and analyze our proposed scheme and to provide a formal verification, and BAN Logic is used for logical correctness. …”
Get full text
Thesis-Doctor of Philosophy -
576
Automated quantitative software verification
Published 2010“…This can be done with a formal verification technique called <em>model checking</em>, which establishes <em>properties</em> of systems by algorithmically considering all execution scenarios. …”
Thesis -
577
Precise abstract interpretation of hardware designs
Published 2018“…We then present the application of native software analyzers based on SAT/SMT-based decision procedures as well as abstraction-based techniques such as abstract interpretation for the formal verification of the software netlist design generated from the hardware RTL. …”
Thesis -
578
An architectural approach for reasoning about trust properties
Published 2012“…An <em>abstraction model</em> based on formal verification is developed to reason about the impact of the system's construction and configuration on its trustworthiness. …”
Thesis -
579
An efficient authentication and key agreement protocol for 4G (LTE) networks
Published 2014“…The automated validation of internet security protocols and applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed EEPS-AKA is efficient and secure against active and passive attacks.…”
Get full text
Conference or Workshop Item -
580
Synthesizing Signaling Pathways from Temporal Phosphoproteomic Data
Published 2018-09-01“…The Temporal Pathway Synthesizer (TPS) algorithm uses constraint-solving techniques first developed in the context of formal verification to explore paths in an interaction network. …”
Get full text
Article