3,511 Hits in 3.2 sec

From Code to Coloured Petri Nets: Modelling Guidelines [chapter]

Anna Dedova, Laure Petrucci
2013 Lecture Notes in Computer Science  
The approach is illustrated with an industrial application case study, the NEO protocol.  ...  This paper presents a method for designing a coloured Petri net model of a system starting from its high-level object oriented source code.  ...  Brief Description of the NEO Protocol A more extensive description and analysis of the NEO protocol can be found in [4] and [5] .  ... 
doi:10.1007/978-3-642-40465-8_4 fatcat:zpapcdfq5feunmzmvfw3ri4fpu

Formal Security Analysis on dBFT Protocol of NEO [article]

Qin Wang and Rujia Li and Shiping Chen and Yang Xiang
2022 arXiv   pre-print
First, we evaluate NEO's source code and formally present the procedures of dBFT via the state machine replication (SMR) model. Next, we provide a theoretical analysis with two example attacks.  ...  NEO is one of the top public chains worldwide. We focus on its backbone consensus protocol, called delegated Byzantine Fault Tolerance (dBFT).  ...  A concise version (with the core idea of this work) has been published in Financial Cryptography and Data Security, 2020 (FC'20) [1] .  ... 
arXiv:2105.07459v3 fatcat:pfr6pz6dszfirng65odtmyd7b4

The NEO Protocol for Large-Scale Distributed Database Systems: Modelling and Initial Verification [chapter]

Christine Choppy, Anna Dedova, Sami Evangelista, Silien Hong, Kais Klai, Laure Petrucci
2010 Lecture Notes in Computer Science  
The aim of our work is to formally design and check the safety and the reliability of the NEO protocol. Designing an appropriate specification is a first challenge.  ...  Our model of the key feature of the NEO protocol, the election protocol, is presented in Section 4 in some detail, including the modelling of a crash, and of exception handling.  ...  Section 4 describes the model of the election part of the NEO protocol, including pieces of code and the associated Petri nets (see e.g. Figure 6 ).  ... 
doi:10.1007/978-3-642-13675-7_10 fatcat:a2uixgj34rdu7ecpfhzl52rm2i

Towards Safer Smart Contracts: A Survey of Languages and Verification Methods [article]

Dominik Harz, William Knottenbelt
2018 arXiv   pre-print
Last, we present future research directions including formal semantics, verified compilers, and automated verification.  ...  Accordingly, we introduce their verification approach, level of automation, coverage, and supported languages.  ...  This research is funded by the Outlier Ventures research grant for the Imperial Centre for Cryptocurrency Research and Engineering.  ... 
arXiv:1809.09805v4 fatcat:qgkoagaifvegjivy2vmu4tjfjy

Table of Contents

2021 2021 31st International Telecommunication Networks and Applications Conference (ITNAC)  
A battery-less RFID-based wireless vibration and physical-shock sensing system using edge processing for long-term measurements  ...  (University of Stuttgart, Germany), Andreas Kirstaedter (University of Stuttgart, Germany) 134 Formal Verification of 5G EAP-AKA Protocol Megha Ajit (Amrita Viswa Vidyapeetham, India), Sriram Sankaran  ...  Corporation, Japan), Masashi Kaneko (NTT Corporation, Japan), Akinori Shiraga (NTT Corporation, Japan) 54 Evaluation of an Actor Model-based Consensus Algorithm on Neo Blockchain Widya Nita Suliyanti  ... 
doi:10.1109/itnac53136.2021.9652133 fatcat:tk3xrzuxnvgrba6q6dq7o6gccu

The general universal model of blockchain technology based on an analysis of some implementations

Polina Sazonova
2020 Communication Papers of the 2020 Federated Conference on Computer Science and Information Systems  
In this article we want to propose the general universal model and system of concepts for the blockchain technology irrespective of differenced of some implementations.  ...  After deep analysis we found that approaches for development blockchain technologies is fragmented, there are no common system of concepts and general model of technology.  ...  According to data obtained from open sources, it seems that the NEO blockchain consist of configuration of networks based on UTXO models and account models.  ... 
doi:10.15439/2020f190 dblp:conf/fedcsis/Sazonova20 fatcat:ozpj2gumsfei5i4cep3tqmwjla

The Role of Green IS Governance: Climate Change Risk Identification and Carbon Disclosure Performance

Xue Ning, Jiban Khuntia, Terence Saldanha, Nigel P. Melville
2019 International Conference on Information Systems  
We hypothesize that implementation of green IS and the verification against standards, moderate the effects of climate change risk-intensity perception on the carbon disclosure performance, either positive  ...  We use samples of firms from the United States and Europe to test and validate our hypotheses.  ...  Conceptual Model and Hypotheses We posit a conceptual model with three sets of relationships.  ... 
dblp:conf/icis/NingKSM19 fatcat:ub4ep4d2kvc4pk4y5ptvs3qo2q

Anonymous Blockchain-based System for Consortium [article]

Qin Wang and Shiping Chen and Yang Xiang
2021 arXiv   pre-print
By applying cryptographic primitives to each module, we instantiate our scheme with anonymity and decentralization. Furthermore, we carry out a comprehensive formal analysis of the proposed solution.  ...  To achieve that, we formalize the syntax used by the MAB system and present a general construction based on a modular design.  ...  Qianhong Wu (Beihang University, China) for his ever discussion with me on the idea. Part of the construction has followed my previous solution in [17] .  ... 
arXiv:2107.08279v1 fatcat:mzcjaruq6fa4bacegxihmfjzjm

User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming Authenticators

Kentrell Owens, Olabode Anise, Amanda Krauss, Blase Ur
2021 Symposium On Usable Privacy and Security  
Their critiques of Neo included concerns about phone availability, account recovery/backup, and setup difficulties.  ...  Our results highlight key challenges and opportunities for spurring adoption of smartphones as FIDO2 roaming authenticators.  ...  We would also like to thank multiple people at Duo Security for their support of this project, including Bronwyn Woods, Jeremy Erickson, Nick Mooney, Nick Steele, Rich Smith, Brian Lindauer, and the entire  ... 
dblp:conf/soups/OwensAKU21 fatcat:u73367ogyvezjjwmjimflbnqfy

Some Heterodox Analytic Philosophy

Guillermo E. Rosado Haddock
2013 Principia: An International Journal of Epistemology  
It has surely contributed like no other movement to the elucidation and demarcation of philosophical problems.  ...  Nonetheless, the empiricist and sometimes even nominalist convictions of orthodox analytic philosophers have served them to inadequately render even philosophers they consider their own and to propound  ...  verification of protocol sentences.  ... 
doi:10.5007/1808-1711.2013v17n2p235 fatcat:zesche7yfrbt5gzsahoxgkwl3e

Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA [article]

Antonio González-Burgueño, Damián Aparicio, Santiago Escobar, Catherine Meadows, José Meseguer
2018 arXiv   pre-print
Both are analyzed using the Maude-NPA cryptographic protocol analyzer.  ...  In this work, we have been able to both prove properties of YubiKey and find the known attacks on the YubiHSM, in a completely automated way beyond the capabilities of previous work in the literature.  ...  The authentication protocol of YubiKey involves three roles: (i) the user, (ii) the service, and (iii) the verification server.  ... 
arXiv:1806.07209v1 fatcat:c5f6eodqpfcezcivwc2f5clbhq

A Verification Framework for Certifying Learning-Based Safety-Critical Aviation Systems [article]

Ali Baheri, Hao Ren, Benjamin Johnson, Pouria Razzaghi, Peng Wei
2022 arXiv   pre-print
From the run-time assurance perspective, we propose reachability- and statistics-based online monitoring and safety guards for a learning-based decision-making model to complement the offline verification  ...  assessment of the system product.  ...  III.B, and Sec. III.C. II. Background and Related Work Offline verification. Formal methods have been widely used for the safety verification of safety-critical autonomous systems.  ... 
arXiv:2205.04590v2 fatcat:gq73ubvlajb5dbjpwlrnvur7o4

Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation

Michael Hölzl, Michael Roland, Omid Mir, René Mayrhofer
2019 International Journal of Information Security  
A feasible approach to realize such a privacy-preserving eID is the usage of group signature protocols or pseudonym-based signatures.  ...  Our scheme preserves unlinkability and anonymity of the eID holder even beyond revocation and does not require online connectivity to a trusted party for verification and revocation checks.  ...  Moreover, it has partly been carried out within the scope of the Josef Ressel Center for User-Friendly Secure Mobile Environments (u'smile), funded by Christian Doppler Gesellschaft, A1 Telekom Austria  ... 
doi:10.1007/s10207-019-00458-7 fatcat:g3n5gilzrfd6bedfpbqhggio7e

HieraGen: Automated Generation of Concurrent, Hierarchical Cache Coherence Protocols

Nicolai Oswald, Vijay Nagarajan, Daniel J. Sorin
2020 2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA)  
We have verified all of the generated protocols for safety and deadlock freedom using a model checker.  ...  HieraGen's output is a highly concurrent hierarchical protocol, in the form of the finite state machines for all of the cache and directory controllers.  ...  First, we use the Murφ model checker [13] to formally and completely verify the atomic hierarchical protocol that is produced by Step 1 of HieraGen for a configuration depicted in Figure 1b and Figure  ... 
doi:10.1109/isca45697.2020.00077 dblp:conf/isca/OswaldNS20 fatcat:ghljiagez5a6fe57zh4bsrldxi

Survey of Consensus Algorithms for Proof of Stake in Blockchain

Lina Ge, Jie Wang, Guifen Zhang, Mohammad Ayoub Khan
2022 Security and Communication Networks  
As the core of blockchain technology, the consensus algorithm directly affects the security, stability, and decentralisation of the blockchain and numerous other important characteristics.  ...  scenarios while also helping the evolution of consensus algorithms and the implementation of blockchain applications.  ...  Acknowledgments is work was supported by the National Natural Science Foundation of China (Grant no. 61862007) and the Innovation Project of Guangxi Minzu University Graduate Education (gxun-chxps202081  ... 
doi:10.1155/2022/2812526 fatcat:s7bg6fl3vjdilaaullpzkavt2u
« Previous Showing results 1 — 15 out of 3,511 results