Cyber & formal methods publications
-
Airlift Mission Monitoring and Dynamic Rescheduling
We describe the Flight Manager Assistant, a prototype system, designed to support real-time management of airlift operations at the USAF Air Mobility Command.
-
Abstractions for Hybrid Systems
We present a procedure for constructing sound finite-state discrete abstractions of hybrid systems. This procedure uses ideas from predicate abstraction to abstract the discrete dynamics and qualitative reasoning to abstract…
-
Risking Communications Security: Potential Hazards of the Protect America Act
A new US law allows warrantless wiretapping whenever one end of the communication is believed to be outside national borders. This creates serious security risks: danger of exploitation of the…
-
Delegating Capabilities in Predicate Encryption Systems
We formally define delegation in predicate encryption systems, propose a new security definition for delegation, and give an efficient construction supporting conjunctive queries.
-
Eureka: a Framework for Enabling Static Malware Analysis
We introduce Eureka, a framework for enabling static analysis on Internet malware binaries. Eureka incorporates a novel binary unpacking strategy based on statistical bigram analysis and coarse-grained execution tracing.
-
Analyzing a Discrete Model of Aplysia Central Pattern Generator
We present a discrete formal model of the central pattern generator (CPG) located in the buccal ganglia of Aplysia that is responsible for mediating the rhythmic movements of its foregut…
-
Reflections on Computer-Related Risks
Tracing the history of exposing and elucidating the wide variety of system problems and associated social implications of uses and misuses of computing technology.
-
Constraint-Based Approach for Analysis of Hybrid Systems
This paper presents a constraint-based technique for discovering a rich class of inductive invariants (boolean combinations of polynomial inequalities of bounded degree) for verification of hybrid systems.
-
Key Management and Secure Software Updates in Wireless Process Control Environments
To reduce the risk of successful cryptanalysis, new keys must be established (rekeying). We have designed a rekeying scheme that provides both backward and forward secrecy.
-
A Multi-Sensor Model to Improve Automated Attack Detection
In this paper we investigate how to use the alerts from several audit sources to improve the accuracy of the intrusion detection system (IDS). Concentrating on web server attacks, we…
-
Large-Scale Many-Class Learning
We present novel online index learning algorithms. When compared to other approaches, including one-versus-rest and top-down learning and classification using support vector machines, we find that indexing is highly advantageous…
-
Pathway Logic
This tutorial describes the use of PL to model signal transduction processes. It begins with a general discussion of Symbolic Systems Biology, followed by some background on rewriting logic and…