Cyber & formal methods publications
-
Using Large-Scale Databases in Evaluation: Advances, Opportunities, and Challenges
The authors illustrate both the opportunities provided by higher quality, interoperable data systems and the challenges encountered when using databases to identify issues of concern, test the plausibility of a…
-
Automating the ILP Setup Task: Converting User Advice About Specific Examples Into General Background Knowledge
We introduce two techniques to automate the use of ILP for a non-ILP expert including automatic generation of background knowledge from user-supplied information in the form of a simple relevance…
-
Ensuring Security and Availability Through Model-Based Cross-Layer Adaptation
This paper argues for an integrated treatment of security across multiple layers of abstraction (application, middleware, operating system including network stack, and hardware).
-
Identifying the Provenance of Correlated Anomalies
We present an architecture that allows fine-grained auditing on individual hosts, space-efficient representation of anomalous activity that can be centrally correlated, and tracing anomalies back to individual files and processes…
-
Analyzing BGP Instances in Maude
We propose to automate the analysis of BGP instances by using Maude, a tool based on rewriting logic.
-
Internet Voting, Security, and Privacy
In this article, I describe different types of Internet voting, the advantages and disadvantages from a security and privacy perspective, and provide perspective on the history and evolution of the…
-
Comparing Three Coordination Models: Reo, ARC, and PBRD
Three models of coordination–Reo, Actors-Roles-Coordinators (ARC), and Policy-based Russian Dolls (PBRD)–are compared and contrasted according to a set of coordination features.
-
Automated Formal Verification of the TTEthernet Synchronization Quality
In this paper, we present an automated proof of the TTEthernet clock-synchronization algorithm that is based on the SAL model checker.
-
An Application Framework for Loosely Coupled Networked Cyber-Physical Systems
We describe a new paradigm for programming an NCPS that enables users to specify their needs and nodes to contribute capabilities and resources.
-
Tracking and Sketching Distributed Data Provenance
We describe a system for capturing data provenance in distributed applications, and the use of provenance sketches to optimize subsequent data provenance queries.
-
Fine-Grained Tracking of Grid Infections
We describe three optimizations that together allow fine-grained tracking of the sources of anomalous activity in a Grid, thereby facilitating precise responses.
-
Detection, Correlation, and Visualization of Attacks Against Critical Infrastructure Systems
We present some results of the Detection and Analysis of Threats to the Energy Sector project, wherein we adapted and developed several intrusion detection technologies for control systems.