Filters








81,799 Hits in 4.4 sec

Page 5750 of Mathematical Reviews Vol. , Issue 2000h [page]

2000 Mathematical Reviews  
Mitchell, Finite-state analysis of security protocols (71-76); Dominique Bolignano, Integrating proof-based and model-checking techniques for the formal verification of cryp- tographic protocols (77-87  ...  Henzinger, Orna Kupferman and Shaz Qadeer, From pre-historic to post- modern symbolic model checking (195-206). Frank Wallner, Model checking LTL using net unfoldings (207- 218); Y. Xu [Ying Xu], E.  ... 

A scalable and accurate hybrid vulnerability analysis framework

Julian Thome
2015 2015 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)  
We use program analysis to identify potential vulnerable execution branches within the source code for the purpose of guiding the symbolic execution along the potentially vulnerable execution paths.  ...  We also propose scalable constraint solving techniques for vulnerability analysis.  ...  Dynamic taint analysis [5] , model checking [6] , symbolic [7] and concolic [3] testing techniques reason about various paths in the program that lead to sensitive sinks.  ... 
doi:10.1109/issrew.2015.7392042 dblp:conf/issre/Thome15 fatcat:jvnxqibgcbdhphhonuus2vwkqm

Parfait

Cristina Cifuentes, Bernhard Scholz
2008 Proceedings of the 2008 workshop on Static analysis - SAW '08  
We present the design of Parfait, a static layered program analysis framework for bug checking, designed for scalability and precision by improving false positive rates and scale to millions of lines of  ...  In this paper we provide an example of several layers of analyses for buffer overflow, summarize our initial implementation for C, and provide preliminary results.  ...  Acknowledgments We would like to thank Nathan Keynes and Erica Mealy for comments to improve the presentation of this paper.  ... 
doi:10.1145/1394504.1394505 fatcat:yswfcd3v55h4docpmax3gh55ou

Анализ российских протоколов выработки общего ключа с использованием средств автоматической верификации криптографических протоколов

А М Семенов, A M Semenov
2017 Mathematical Aspects of Cryptography  
We study several Russian key-agreement cryptographic protocols for compliance with specified security properties in view of possible adoption of these protocols as standardized solutions intended to be  ...  In the table below symbol "+" means that security property is fulfilled, symbol "+/-"means that security property is partially fulfilled.  ...  In the analysis of protocols Scyther uses symbolic analysis combined with a bi-directional search, based on partially ordered patterns [8] .  ... 
doi:10.4213/mvk229 fatcat:mk6gpd25nva7dabmlz3cszalhq

Program analysis for bug detection using parfait

Cristina Cifuentes, Nathan Keynes, Lian Li, Bernhard Scholz
2008 Proceedings of the 2009 ACM SIGPLAN workshop on Partial evaluation and program manipulation - PEPM '09  
Parfait also aims to identify security bugs, i.e., bugs that may be exploited by a malicious user.  ...  Chen for suggesting bug-checking as an interesting area to work in, and Douglas Walls for historical information on bug checking at Sun.  ...  Thanks also to Scott Rotondo for providing requirements for a bug-checking tool for the Solaris OS, Sharon Liu and Chok Poh for providing requirements for the native part of the JDK TM software, Liang  ... 
doi:10.1145/1480945.1480947 dblp:conf/pepm/CifuentesKLS09 fatcat:67cmmte4lnaupchoqmm5ucwiaq

The TAMARIN Prover for the Symbolic Analysis of Security Protocols [chapter]

Simon Meier, Benedikt Schmidt, Cas Cremers, David Basin
2013 Lecture Notes in Computer Science  
The Tamarin prover supports the automated, unbounded, symbolic analysis of security protocols.  ...  It features expressive languages for specifying protocols, adversary models, and properties, and support for efficient deduction and equational reasoning.  ...  Related Tools There are many tools for the symbolic analysis of security protocols.  ... 
doi:10.1007/978-3-642-39799-8_48 fatcat:w5ye3n6i4jfo3d7oga5vf6er7m

Combining Model Checking and Testing [chapter]

Patrice Godefroid, Koushik Sen
2018 Handbook of Model Checking  
Model checking and testing have a lot in common.  ...  This chapter presents an overview of this strand of software model checking.  ...  Classical Model Checking Traditional model checking checks properties of a system modeled in some modeling language, typically some kind of notation for communicating finite-state machines.  ... 
doi:10.1007/978-3-319-10575-8_19 fatcat:o7z7rus4ebesdlatlvgockypjy

An Approach for the Specification, Verification and Synthesis of Secure Systems

Fabio Martinelli, Ilaria Matteucci
2007 Electronical Notes in Theoretical Computer Science  
In this paper we describe an approach based on open system analysis for the specification, verification and synthesis of secure systems.  ...  In particular, by using our framework, we are able to model a system with a possible intruder and verify whether the whole system is secure, i.e. whether the system satisfies a given temporal logic formula  ...  Partial Model Checking Partial model checking is a technique that relies upon compositional methods for proving properties of concurrent systems [1, 2] .  ... 
doi:10.1016/j.entcs.2006.12.003 fatcat:ydlm6zly6jcadcai3j5ikahrp4

Abstract model counting

Quoc-Sang Phan, Pasquale Malacaria
2014 Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14  
Based on these ideas, we build two QIF analysis tools: the first one employs CBMC, a bounded model checker for ANSI C, and the second one is built on top of Symbolic PathFinder, a Symbolic Executor for  ...  We present a novel method for Quantitative Information Flow analysis.  ...  (Φ) SymCount(Φ, Ψ, ϕP , N, pc, i) return Ψ , log 2 (N ) end function Symbolic QIF analysis Figure 4 : 4 Symbolic counting for QIF Figure 5 : 5 Partial exploration path of SQIF for the data sanitisation  ... 
doi:10.1145/2590296.2590328 dblp:conf/ccs/PhanM14 fatcat:ou3xde2fifffndkufsh7zrwboa

Model Counting Modulo Theories [article]

Quoc-Sang Phan
2015 arXiv   pre-print
Second, we propose an alternative approach for Bounded Model Checking using classical Symbolic Execution, which can be parallelised to leverage modern multi-core and distributed architecture.  ...  For quantitative security, our contribution is twofold.  ...  , based on Symbolic Execution, for Concurrent Bounded Model Checking.  ... 
arXiv:1504.02796v1 fatcat:vf5khgpgkfdqvhhdsivlmb4f5y

On the use of automatic tools for the formal analysis of IEEE 802.11 key-exchange protocols

M. Cheminod, I.C. Bertolotti, L. Durante, R. Sisto, A. Valenzano
2006 2006 IEEE International Workshop on Factory Communication Systems  
The aim of our work is twofold: first we intend to offer a contribution in understanding whether or not the current prototype tools can be considered mature enough for helping the designer with the analysis  ...  The importance of using formal techniques for verifying the design correctness is even more evident when aspects such as security and safety are considered and a class of protocols, known as "cryptographic  ...  STA STA (Symbolic Trace Analyser) [13, 14] is a model checker for cryptographic protocols relying on symbolic techniques.  ... 
doi:10.1109/wfcs.2006.1704167 fatcat:gpldtkguoje7lmedftnbuhqzky

An intruder model with message inspection for model checking security protocols

Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis
2010 Computers & security  
for model checking problems that involve liveness.  ...  Thus, model checking focuses only on attack actions that may disclose a security violation.  ...  Acknowledgments We acknowledge the anonymous referees for their helpful comments, which contributed to improving the quality of the article.  ... 
doi:10.1016/j.cose.2009.08.003 fatcat:ckkf6r6erbez7m3delkouk5hpi

Efficient symbolic automated analysis of administrative attribute-based RBAC-policies

Francesco Alberti, Alessandro Armando, Silvio Ranise
2011 Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11  
In this paper, we describe an automated symbolic security analysis technique for administrative attribute-based RBAC policies.  ...  Automated techniques for the security analysis of Role-Based Access Control (RBAC) access control policies are crucial for their design and maintenance.  ...  SYMBOLIC MODEL CHECKING We review a symbolic model checking procedure for solving the reachability problem for a system S and a set G of goal states, i.e. the problem of checking if there exists a sequence  ... 
doi:10.1145/1966913.1966935 dblp:conf/ccs/AlbertiAR11 fatcat:srjq6nrmjre7xdgulkhbqc3kqy

HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security

Moritz Eckert, Antonio Bianchi, Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna
2018 USENIX Security Symposium  
to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX.  ...  Acknowledgments We would like to thank our shepherd, Brendan Dolan-Gavitt, for his help and comments.  ...  Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. The views and  ... 
dblp:conf/uss/EckertB0SKV18 fatcat:ok74aezv6fgr5h56g72aziwcre

Tests from Proofs [chapter]

Patrice Godefroid
2011 Lecture Notes in Computer Science  
This is the "model checking thesis" -"Model Checking" = exhaustive testing (state-space exploration) -Two main approaches to software model checking: SLAM, Bandera, FeaVer, BLAST,…)Concurrency: VeriSoft  ...  ) for checking the feasibility of program paths generated statically using a SLAM-like tool -Vigilante (MSR) for generating worm filters -BitScope (CMU/Berkeley) for malware analysis -CatchConv (Berkeley  ... 
doi:10.1007/978-3-642-21768-5_2 fatcat:uo2esjfqmvepdg4elu5hzdf5f4
« Previous Showing results 1 — 15 out of 81,799 results