Cyber & formal methods publications
-
Deductive Synthesis of the Unification Algorithm: The Automation of Introspection
We are working to create the first automatic deductive synthesis of a unification algorithm. The program is extracted from a proof of the existence of an output substitution that satisfies…
-
Semantic Instrumentation of Virtual Environments for Training
We discuss an approach in which the virtual environment is semantically instrumented in order to allow for the tracking of and reasoning about open-ended learner activity therein.
-
Diagnosis cloud: Sharing knowledge across cellular networks
This paper presents a novel diagnosis cloud framework that enables the extraction and transfer of knowledge from one network to another. It also presents use cases and requirements. We present…
-
Keys Under Doormats
In this report, a group of computer scientists and security experts, many of whom participated in a 1997 study of these same topics, has convened to explore the likely effects…
-
Machine Learning Models and Pathway Genome Data Base for Trypanosoma cruzi Drug Discovery
We have demonstrated how combining chemoinformatics and bioinformatics for T. cruzi drug discovery can bring interesting in vivo active molecules to light that may have been overlooked.
-
Weakness in Depth: A Voting Machine’s Demise
Virginia's government recently examined the AVS WinVote and learned that the vulnerabilities are more serious than any other voting system, allowing complete exploitation over a Wi-Fi network.
-
Discrete Vs. Dense Times in the Analysis of Cyber-Physical Security Protocols
This paper investigates the foundational differences and the impacts on the analysis when using models with discrete time and models with dense time.
-
The SRI AVEC-2014 Evaluation System
We explore a diverse set of features based only on spoken audio to understand which features correlate with self-reported depression scores according to the Beck depression rating scale.
-
Safety Envelope for Security
We present an approach for detecting sensor spoofing attacks on a cyber-physical system. Our approach consists of two steps. In the first step, we construct a safety envelope of the system. In…
-
Large-Scale Analogical Reasoning
In this paper, relying on a well-curated biology KB, we present a specific implementation of comparison questions inspired by a general model of analogical reasoning.
-
A Distributed Logic for Networked Cyber-Physical Systems
We describe a distributed logical framework designed to serve as a declarative semantic foundation for Networked Cyber-Physical Systems.
-
Simplex with Sum of Infeasibilities for SMT