Cyber & formal methods publications
-
Rewriting, Inference, and Proof
We discuss a range of issues at the intersection of rewriting and inference. How can other inference procedures be combined with rewriting? Can rewriting be used to describe inference procedures?
-
Bayesian Minimax Estimation of the Normal Model with Incomplete Prior Covariance Matrix Specification
This work addresses the issue of Bayesian robustness in the multivariate normal model when the prior covariance matrix is not completely specified, but rather is described in terms of positive…
-
Middleware for Managing Provenance Metadata
We describe middleware for managing distributed provenance metadata, where each host maintains an authoritative local repository of the provenance metadata gathered on it.
-
Discovery of Numerous Specific Topics Via Term Co-Occurrence Analysis
We describe efficient techniques for construction of large term co-occurrence graphs, and investigate an application to the discovery of numerous fine-grained (specific) topics.
-
Theory of Reals for Verification and Synthesis of Hybrid Dynamical Systems
Formal verification and synthesis are both indispensable components of any methodology for designing and efficiently developing safe cyber-physical systems.
-
Ontologies and Tools for Analyzing and Synthesizing LVC Confederations
We describe a complementary approach that uses Web Ontology Language (OWL) and Semantic Web Rule Language (SWRL) to capture information about the roles and capabilities required to complete a task,…
-
A Graphical User Interface for Maude-NPA
This paper presents a graphical user interface (GUI) for the Maude-NPA, a crypto protocol analysis tool that takes into account algebraic properties of cryptosystems not supported by other tools, such…
-
A Survey of Vendor Software Assurance Practices
In this paper, we examine what real vendors do to ensure that their products are reasonably secure. Our conclusion is that software vendors put significant energy into software security, but…
-
Computer-Related Risk Futures
This paper reflects on many risks in the development and use of computer-related systems. It considers past and future alternatives, suggests some remedial approaches, and offers a few broad conclusions.
-
Software Verification and System Assurance
We review this idea and show how it provides a bridge between correctness, which is the goal of software verification (and especially formal verification), and the probabilistic properties such as…
-
Automated Deduction for Verification
We introduce some of the basic deduction techniques used in software and hardware verification and outline the theoretical and engineering issues in building deductive verification tools.
-
The Verified Software Initiative: a Manifesto
We propose an ambitious and long-term research program toward the construction of error-free software systems.