Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- demonstrationOctober 2020
MPI-SV: a symbolic verifier for MPI programs
ICSE '20: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering: Companion ProceedingsJune 2020, Pages 93–96https://doi.org/10.1145/3377812.3382144Message passing is the primary programming paradigm in high-performance computing. However, developing message passing programs is challenging due to the non-determinism caused by parallel execution and complex programming features such as non-...
Symbolic verification of message passing interface programs
ICSE '20: Proceedings of the ACM/IEEE 42nd International Conference on Software EngineeringJune 2020, Pages 1248–1260https://doi.org/10.1145/3377811.3380419Message passing is the standard paradigm of programming in high-performance computing. However, verifying Message Passing Interface (MPI) programs is challenging, due to the complex program features (such as non-determinism and non-blocking operations). ...
- research-articleOctober 2018
A Formal Analysis of 5G Authentication
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2018, Pages 1383–1396https://doi.org/10.1145/3243734.3243846Mobile communication networks connect much of the world's population. The security of users' calls, SMSs, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used. For the next-generation network (5G), the 3GPP ...
- research-articleOctober 2018
Voting: You Can't Have Privacy without Individual Verifiability
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2018, Pages 53–66https://doi.org/10.1145/3243734.3243762Electronic voting typically aims at two main security goals: vote privacy and verifiability. These two goals are often seen as antagonistic and some national agencies even impose a hierarchy between them: first privacy, and then verifiability as an ...
- research-articleOctober 2017
A Comprehensive Symbolic Analysis of TLS 1.3
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2017, Pages 1773–1788https://doi.org/10.1145/3133956.3134063The TLS protocol is intended to enable secure end-to-end communication over insecure networks, including the Internet. Unfortunately, this goal has been thwarted a number of times throughout the protocol's tumultuous lifetime, resulting in the need for a ...
- research-articleNovember 2014
A Computationally Complete Symbolic Attacker for Equivalence Properties
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityNovember 2014, Pages 609–620https://doi.org/10.1145/2660267.2660276We consider the problem of computational indistinguishability of protocols. We design a symbolic model, amenable to automated deduction, such that a successful inconsistency proof implies computational indistinguishability. Conversely, symbolic models ...
- ArticleAugust 2014
Symbolic Analysis of an Electric Vehicle Charging Protocol
ICECCS '14: Proceedings of the 2014 19th International Conference on Engineering of Complex Computer SystemsAugust 2014, Pages 11–18https://doi.org/10.1109/ICECCS.2014.11In this paper, we describe our analysis of a recently proposed electric vehicle charing protocol. The protocol builds on complicated cryptographic primitives such as commitment, zero-knowledge proofs, BBS+ signature and etc. Moreover, interesting ...
- research-articleSeptember 2010
Context-Aware Adaptive Applications: Fault Patterns and Their Automated Identification
IEEE Transactions on Software Engineering (ISOF), Volume 36, Issue 5September 2010, Pages 644–661https://doi.org/10.1109/TSE.2010.35Applications running on mobile devices are intensely context-aware and adaptive. Streams of context values continuously drive these applications, making them very powerful but, at the same time, susceptible to undesired configurations. Such ...
- articleJanuary 2009
A New Approach to Model Checking of UML State Machines
Fundamenta Informaticae (FUNI), Volume 93, Issue 1-3January 2009, Pages 289–303The paper presents a new approach to model checking of systems specified in UML. All the executions of an UML system (unfolded to a given depth) are encoded directly into a boolean propositional formula, satisfiability of which is checked using a SAT-...
- articleJanuary 2009
A New Approach to Model Checking of UML State Machines
Fundamenta Informaticae (FUNI), Volume 93, Issue 1-3January 2009, Pages 289–303The paper presents a new approach to model checking of systems specified in UML. All the executions of an UML system (unfolded to a given depth) are encoded directly into a boolean propositional formula, satisfiability of which is checked using a SAT-...
- ArticleJuly 2008
Tree data decision diagrams
VECoS'08: Proceedings of the Second international conference on Verification and Evaluation of Computer and Communication SystemsJuly 2008, Pages 27–37In this paper, we present Tree Data Decision Diagrams, a compact data structure of symbolic verification based on term rewriting systems. By this way, we can benefit termination researches in term rewriting systems to improve the model-checking quality. ...
- articleMay 1999
Symbolic Protocol Verification with Queue BDDs
Formal Methods in System Design (FMSD), Volume 14, Issue 3May 1999, Pages 257–271https://doi.org/10.1023/A:1008771008310Symbolic verification based on Binary Decision Diagrams (BDDs) has proven to be a powerful technique for ensuring the correctness of digital hardware. In contrast, BDDs have not caught on as widely for software verification, partly because the data types ...
- articleMay 1999
Symbolic Verification of Communication Protocols with Infinite StateSpaces using QDDs
Formal Methods in System Design (FMSD), Volume 14, Issue 3May 1999, Pages 237–255https://doi.org/10.1023/A:1008719024240We study the verification of properties of communication protocols modeled by a finite set of finite-state machines that communicate by exchanging messages via unbounded FIFO queues. It is well-known that most interesting verification problems, such as ...