Cyber & formal methods publications
-
An Intrusion Detection System for Wireless Process Control Systems
In this paper, we design a model-based intrusion detection system (IDS) for sensor networks used for PCS.
-
The MILS Component Integration Approach to Secure Information Sharing
-
Verified Software: Theories, Tools, Experiments
This volume contains the proceedings of the second working conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2008, held in Toronto, Canada, in October 2008.
-
Trust and Automation in Verification Tools
We argue that trust need not be achieved at the expense of automation, and outline a lightweight approach where the results of untrusted verifiers are checked by a trusted offline…
-
CALO Workflow Recognition and Proactive Assistance
This short video offers glimpses of how SRI's CALO agent helps users manage their tasks and time using advanced activity recognition algorithms based on logical probabilistic models.
-
Early Indicators of Exposure to Biological Threat Agents Using Host Gene Profiles in Peripheral Blood Mononuclear Cells
To detect exposures to the various pathogens more rapidly, especially during these early stages, we evaluated a suite of host responses to biological threat agents using global gene expression profiling…
-
A Formal Framework for Interactive Agents
This paper proposes a formal framework and architecture for specification and analysis of interactive agents. The framework can be used to explore the design space, study features of different points…
-
Modeling and Verification of Time-Triggered Communication Protocols
We present the basis of the modeling method and discuss two related verification approaches for analyzing complex, real-time distributed systems.
-
Comparing Three Coordination Models: Reo, ARC, and RRD
Three models of coordination—Reo, Actors-Roles-Coordinators (ARC), and Reflective Russian Dolls (RRD)—are compared and contrasted according to a set of coordination features.
-
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
We construct such a scheme for predicates corresponding to the evaluation of inner products over (for some large integer N).
-
Effective Monitoring of a Survivable Distributed Networked Information System
This report describes the monitoring, intrusion detection, and reporting infrastructure of the resulting system highlighting the design principles and lessons learned that are generally applicable to survivable information systems.
-
Airlift Mission Monitoring and Dynamic Rescheduling
We describe the Flight Manager Assistant, a prototype system, designed to support real-time management of airlift operations at the USAF Air Mobility Command.