Cyber & formal methods publications
-
Reflections on Computer-Related Risks
Tracing the history of exposing and elucidating the wide variety of system problems and associated social implications of uses and misuses of computing technology.
-
Constraint-Based Approach for Analysis of Hybrid Systems
This paper presents a constraint-based technique for discovering a rich class of inductive invariants (boolean combinations of polynomial inequalities of bounded degree) for verification of hybrid systems.
-
Key Management and Secure Software Updates in Wireless Process Control Environments
To reduce the risk of successful cryptanalysis, new keys must be established (rekeying). We have designed a rekeying scheme that provides both backward and forward secrecy.
-
A Multi-Sensor Model to Improve Automated Attack Detection
In this paper we investigate how to use the alerts from several audit sources to improve the accuracy of the intrusion detection system (IDS). Concentrating on web server attacks, we…
-
Sampling Stable Properties of Massive Track Datasets
In this paper, we explore ways in which stable properties of sensor observations can be extracted and visualized using a statistical sampling of features from a very large track dataset,…
-
Compositionality for Tightly Coupled Systems: a New Application of the Propositions-As-Types Interpretation
Although compositional techniques are being successfully employed in practice, the use of such techniques is often rather informal and intuitive, and typically a justification for correct behaviour of the composed…
-
Conflict Negotiation Among Personal Calendar Agents
We will demonstrate distributed conflict resolution in the context of personalized meeting scheduling. The demonstration will show how distributed constraint optimization can be used to facilitate interaction between cognitive agents…
-
Event Recognition in Airborne Motion Imagery
A system is described that detects high-level events of interest in airborne motion imagery.
-
Generation of fast interpreters for Huffman compressed bytecode
Our approach uses canonical Huffman codes to generate compact opcodes with custom-sized operand fields and with a virtual machine that directly executes this compact code. In effect, this automatically creates…
-
Report on the 2004 DARPA Workshop on Self-Aware Computer Systems
This report captures some of the salient points discussed during the DARPA workshop on Self-Aware Computer Systems held on April 27-28, 2004 in Washington D.C.
-
Rewrite Systems for Symbolic Evaluation of C-like Preprocessing
We present convergent rewrite systems over conditional values that can interact with macro expansion and evaluation and transform them into Boolean expressions.
-
RegReg: a Lightweight Generator of Robust Parsers for Irregular Languages
We present a lightweight tool, called RegReg, based on a hierarchy of lexers described by tagged regular expressions. By using tags, the automatically generated parse tree can be easily manipulated.