42,293 Hits in 3.5 sec

On Quantitative Analysis of Probabilistic Protocols

Alessandro Aldini, Alessandra Di Pierro
2005 Electronical Notes in Theoretical Computer Science  
We illustrate this approach by presenting the analysis of a probabilistic nonrepudiation protocol which allows us to quantitatively estimate its fairness degree.  ...  We advocate the use of approximate noninterference for the security analysis of probabilistic protocols.  ...  The quantitative analysis is based on a notion of process similarity corresponding to an approximate version of the weak probabilistic bisimulation semantics [5] .  ... 
doi:10.1016/j.entcs.2004.01.019 fatcat:3tas464iwjhonbwdstleap4uiq

MULE-Based Wireless Sensor Networks: Probabilistic Modeling and Quantitative Analysis [chapter]

Fatemeh Kazemeyni, Einar Broch Johnsen, Olaf Owe, Ilangko Balasingham
2012 Lecture Notes in Computer Science  
We perform statistical quantitative analysis based on repeated discrete-event simulations in Maude.  ...  The probabilistic, declarative model is not used to select transition rules, but to stochastically capture the result of applying rules.  ...  Using Maude to simulate the basic behavior of models given as probabilistic rewrite theories, we apply a statistical quantitative analysis method based on discreteevent simulation, in order to obtain numerical  ... 
doi:10.1007/978-3-642-30729-4_11 fatcat:ub5pmwmdwvfnhnrp2u6mhb4ycm

A Quantitative Analysis of Collision Resolution Protocol for Wireless Sensor Network

Reema Patel, Dhiren Patel
2015 Journal of Software Engineering and Applications  
We formalize collision resolution protocol as a Markov Decision Process to express each node behavior and perform quantitative analysis using probabilistic model checker PRISM.  ...  In this paper, we present formal analysis of 2CS-WSN collision resolution protocol for wireless sensor networks using probabilistic model checking.  ...  Quantitative Analysis We now proceed to quantitative analysis of 2CS-WSN protocol.  ... 
doi:10.4236/jsea.2015.88036 fatcat:4xrkobkcxbazjbtlngtec6g4lm

Quantitative model checking of an RSA-based email protocol on mobile devices

Sophia Petridou, Stylianos Basagiannis, Nikolaos Alexiou, Georgios Papadimitriou, Panagiotis Katsaros
2011 2011 IEEE Symposium on Computers and Communications (ISCC)  
The proposed study employs formal analysis techniques, such as probabilistic model checking, and proceeds to a quantitative analysis of the email protocol, taking into account computational parameters  ...  To the best of our knowledge, this is the first time that probabilistic model checking is utilized towards verifying a secure e-mail protocol under hardware constrains.  ...  This fact makes probabilistic model checking a promising approach towards quantitative analysis of protocols [8] , [17] .  ... 
doi:10.1109/iscc.2011.5983911 dblp:conf/iscc/PetridouBAPK11 fatcat:oyqlblag6vftlmpwkrhrxi3s5a

A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats

Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou
2008 2008 32nd Annual IEEE International Computer Software and Applications Conference  
The proposed analysis is based on a probabilistic attacker model implementing simultaneous N zombie participants, which subvert secure authentication features in communication protocols and electronic  ...  The overall analysis takes place in a mature probabilistic model checking toolset called PRISM.  ...  tests, to check on the generated sample if the quantitative property of interest is satisfied.  ... 
doi:10.1109/compsac.2008.48 dblp:conf/compsac/BasagiannisKPA08 fatcat:quxefjhemvgv3cvtullttrrge4

Guest editors' introduction: Special issue on Probabilistic Techniques for the Design and Analysis of Systems

P.R. D'Argenio, J.C.M. Baeten
2003 The Journal of Logic and Algebraic Programming  
In recent years, we have seen much progress in the specification, modeling and analysis of probabilistic behaviour.  ...  But in real-life systems not only functionality but also quantitative aspects of system behaviour are important.  ...  In recent years, we have seen much progress in the specification, modeling and analysis of probabilistic behaviour.  ... 
doi:10.1016/s1567-8326(02)00064-4 fatcat:54tmit7fbjdbjngagab2wulsge

LiQuor: A tool for Qualitative and Quantitative Linear Time analysis of Reactive Systems

Frank Ciesinski, Christel Baier
2006 Third International Conference on the Quantitative Evaluation of Systems - (QEST'06)  
LiQuor provides the facility to perform a qualitative or quantitative analysis for ω-regular linear time properties by means of automata-based model checking algorithms.  ...  LiQuor is a tool for verifying probabilistic reactive systems modelled Probmela programs, which are terms of a probabilistic guarded command language with an operational semantics based on (finite) Markov  ...  The model checking tool LiQuor, short for "Linear time Qualitative/Quantitative analysis of reactive systems", serves to compute minimal or maximal probabilities for ω-regular path-properties of a probabilistic  ... 
doi:10.1109/qest.2006.25 dblp:conf/qest/CiesinskiB06 fatcat:swnlggsb6jekzluvatprodl5ou

PRISM: A Tool for Automatic Verification of Probabilistic Systems [chapter]

Andrew Hinton, Marta Kwiatkowska, Gethin Norman, David Parker
2006 Lecture Notes in Computer Science  
Probabilistic model checking is an automatic formal verification technique for analysing quantitative properties of systems which exhibit stochastic behaviour.  ...  PRISM is a probabilistic model checking tool which has already been successfully deployed in a wide range of application domains, from real-time communication protocols to biological signalling pathways  ...  Overview Probabilistic model checking is an automatic formal verification technique for the analysis of systems which exhibit stochastic behaviour.  ... 
doi:10.1007/11691372_29 fatcat:qksgy2exbnhnfao2vxq75l6j5q

Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol

Musab AlTurki, José Meseguer, Carl A. Gunter
2009 Electronical Notes in Theoretical Computer Science  
Due to the probabilistic nature of the protocol and its underlying attacker model, it is intrinsically difficult to build a faithful model of the protocol with which one may automatically verify its properties  ...  through automated statistical quantitative model checking analysis techniques.  ...  On the other, formal analysis results like those presented here should then be obtained for a variety of underlying protocols of interest.  ... 
doi:10.1016/j.entcs.2009.02.069 fatcat:s4gwkp6dgnfstgoragirdopxwm

Redesign of the LMST Wireless Sensor Protocol through Formal Modeling and Statistical Model Checking [chapter]

Michael Katelman, José Meseguer, Jennifer Hou
2008 Lecture Notes in Computer Science  
On the one hand, it is infeasible to comprehensively evaluate an ad-hoc wireless sensor network protocol based solely on deployment in the field.  ...  This serves as our base specification and provides key infrastructure on which to tackle the important challenge of arriving at a realistic (re-)design of the LMST protocol.  ...  Correctness results, based on quantitative statistical analysis of our new design, are given in Figure 2c .  ... 
doi:10.1007/978-3-540-68863-1_10 fatcat:lrsyxbkwovhj3iasn37mxp5bs4

Quantitative analysis for authentication of low-cost RFID tags

Ioannis Paparrizos, Stylianos Basagiannis, Sophia Petridou
2011 2011 IEEE 36th Conference on Local Computer Networks  
In this work, we launch a quantitative verification analysis for the low- cost Radio Frequency Identification (RFID) protocol proposed by Song and Mitchell.  ...  Formal analysis techniques are widely used today in order to verify and analyze communication protocols.  ...  To the best of our knowledge, this is the first research effort that performs a quantitative analysis of an RFID protocol using probabilistic model checking. II.  ... 
doi:10.1109/lcn.2011.6115307 dblp:conf/lcn/PaparrizosBP11 fatcat:xlikii76c5emndafyay2vayalm

Advances in Quantitative Verification for Ubiquitous Computing [chapter]

Marta Kwiatkowska
2013 Lecture Notes in Computer Science  
− need to consider sensor noise, hence motion primitives may have probabilistic outcomes − assume simplified setting of perfect information (achievable with RFID tags) • Quantitative analysis  ...  PRISM Automatic verification (aka model checking) of quantitative properties of probabilistic system models Why quantitative verification?  ... 
doi:10.1007/978-3-642-39718-9_3 fatcat:emkb7jqcurg37nhkdyeel6icma

Quantitative Aspects of Programming Languages and Systems over the past 2^4 years and beyond

Alessandro Aldini
2020 Electronic Proceedings in Theoretical Computer Science  
In the same period, they represented the central theme of the series of workshops entitled Quantitative Aspects of Programming Languages and Systems (QAPL) and born in 2001.  ...  Quantitative aspects of computation are related to the use of both physical and mathematical quantities, including time, performance metrics, probability, and measures for reliability and security.  ...  of Quantum Protocols using MCMAS.  ... 
doi:10.4204/eptcs.312.1 fatcat:4fjvygbppjbq3k5ury2kvue3nq

Advances and challenges of probabilistic model checking

Marta Kwiatkowska, Gethin Norman, David Parker
2010 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton)  
Probabilistic model checking is a powerful technique for formally verifying quantitative properties of systems that exhibit stochastic behaviour.  ...  distributed protocols.  ...  PROBABILISTIC MODEL CHECKING & PRISM Probabilistic model checking is based on the construction and analysis of a probabilistic model.  ... 
doi:10.1109/allerton.2010.5707120 fatcat:bauounyehvelpe4dwjrobeugfe

Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking [chapter]

Indranil Saha, Debapriyay Mukhopadhyay
2009 Lecture Notes in Computer Science  
This probability indicates the degree of fairness of the protocol and is referred as -fairness. In this paper, we analyze the protocol quantitatively through probabilistic model checking.  ...  the reverse question, given the degree of fairness , how should one choose the protocol parameters to ensure fairness.  ...  Modeling and Analysis of Probabilistic Non-Repudiation Protocol We carry out our analysis of the non-repudiation protocol by probabilistic model checker PRISM [3] .  ... 
doi:10.1007/978-3-642-10772-6_22 fatcat:z5sfdf4oazao5i6s3e42h2ogci
« Previous Showing results 1 — 15 out of 42,293 results