Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2023
Formal verification of software-only mechanisms for live migration of SGX enclaves
International Journal of Information and Computer Security (IJICS), Volume 22, Issue 2Pages 230–261https://doi.org/10.1504/ijics.2023.134965Live migration is not supported by current Intel® SGX implementations. So, software emulation is unavoidable to enable deployed hypervisors migrating live virtual machines running SGX enclaves in the cloud. However, copying the running state of an enclave ...
- research-articleDecember 2022
Autotuning Parallel Programs by Model Checking
Automatic Control and Computer Sciences (ACCS), Volume 56, Issue 7Pages 634–648https://doi.org/10.3103/S0146411622070045AbstractThis paper presents a new approach to autotuning data-parallel programs. Autotuning is a search for optimal program settings, which maximize its performance. The novelty of the approach lies in the use of the model checking method to find the ...
- ArticleSeptember 2022
Model Checking Meets Auto-Tuning of High-Performance Programs
Logic-Based Program Synthesis and TransformationPages 63–82https://doi.org/10.1007/978-3-031-16767-6_4AbstractThe paper aims at combining two research areas that traditionally have been disjoint: 1) model checking as used in formal verification, and 2) auto-tuning as used in high-performance computing. Our auto-tuning is an important use case of the ...
- research-articleSeptember 2022
Deep Dive into ZGC: A Modern Garbage Collector in OpenJDK
ACM Transactions on Programming Languages and Systems (TOPLAS), Volume 44, Issue 4Article No.: 22, Pages 1–34https://doi.org/10.1145/3538532ZGC is a modern, non-generational, region-based, mostly concurrent, parallel, mark-evacuate collector recently added to OpenJDK. It aims at having GC pauses that do not grow as the heap size increases, offering low latency even with large heap sizes. The ...
- research-articleMarch 2022
Security Analysis of Embedded SIM Remote Provisioning Protocol Using SPIN
ICCNS '21: Proceedings of the 2021 11th International Conference on Communication and Network SecurityPages 43–48https://doi.org/10.1145/3507509.3507515Abstract: With the advent of the 5G era, embedded SIM (eSIM) technology has been created to meet the needs of M2M technology. In earlier years, the GSMA provided a detailed description of the architecture and configuration protocol of the eSIM over-the-...
-
- research-articleDecember 2021
Formal Analysis and Verification of Embedded SIM Session Key Agreement Protocol
EITCE '21: Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer EngineeringPages 882–888https://doi.org/10.1145/3501409.3501568Embedded SIM enables SIM provisioning to be performed after end users taken their equipments, and the security of the remote SIM provisioning protocol is of great significance to the security of whole mobile networks. This paper conducts formal analysis ...
- ArticleSeptember 2021
Modeling and Verification of Contactless Mobile Banking System in E-Banking Using SPIN
Computational Science and Its Applications – ICCSA 2021Pages 581–597https://doi.org/10.1007/978-3-030-86979-3_41AbstractDuring this prevailing generation of the digital world, mobile users are multiplying globally by leaps and bounds. A mobile banking system is an electronic channel for Electronic Banking (E-Banking) all over the world. The utility of mobile ...
- review-articleMarch 2020
Comprehensive analysis of rule formalisms to represent clinical guidelines: Selection criteria and case study on antibiotic clinical guidelines
Artificial Intelligence in Medicine (AIIM), Volume 103, Issue Chttps://doi.org/10.1016/j.artmed.2019.101741Highlights- Help CDSS designers to determine the most suitable rule-based technology for modelling knowledge from CGs.
The over-use of antibiotics in clinical domains is causing an alarming increase in bacterial resistance, thus endangering their effectiveness as regards the treatment of highly recurring severe infectious ...
- research-articleJuly 2019
Limiting state space explosion of model checking using discrete event simulation: combining DEVS and PROMELA
SummerSim '19: Proceedings of the 2019 Summer Simulation ConferenceArticle No.: 9, Pages 1–12In this paper we propose an approach combining discrete event simulation and model checking. Indeed, methods like model checking suffer from the state space explosion when the modeled system is complex. Consequently, we propose an approach that allows ...
- ArticleJuly 2019
Applying Model Checking Approach with Floating Point Arithmetic for Verification of Air Collision Avoidance Maneuver Hybrid Model
AbstractA term Cyber-Physical System (CPS) refers to a mathematically described (specified) real-world process, that combines discrete changes of pre-defined control states (a cyber part) and changes of controllable continuous-time states (a physical part)...
- research-articleOctober 2018
An SDL to Discrete-Time PROMELA Transformation of Home Area Network model
SITA'18: Proceedings of the 12th International Conference on Intelligent Systems: Theories and ApplicationsArticle No.: 14, Pages 1–5https://doi.org/10.1145/3289402.3289514In this paper we present an approach to transform Home Area Network (HAN) model, described in SDL (Specification and Description Language), into DTPromela (Discrete-Time Promela) model. The aim is to prepare the DTPromela model in order to verify and ...
- research-articleOctober 2018
Semantic data integration on the web of things
IOT '18: Proceedings of the 8th International Conference on the Internet of ThingsArticle No.: 3, Pages 1–8https://doi.org/10.1145/3277593.3277609This paper presents a method for the integration of data originating from sensors and actuators that follow different formalisms, although they semantically interlap. We tested our approach one three Web of Things standards published respectively by the ...
- research-articleFebruary 2018
Formal Modeling and Verification of Smart Contracts
ICSCA '18: Proceedings of the 2018 7th International Conference on Software and Computer ApplicationsPages 322–326https://doi.org/10.1145/3185089.3185138Smart contracts can automatically perform the contract terms according to the received information, and it is one of the most important research fields in digital society. The core of smart contracts is algorithm contract, that is, the parties reach an ...
- articleOctober 2017
Model checking multi-level and recursive nets
Software and Systems Modeling (SoSyM) (SPSSM), Volume 16, Issue 4Pages 1117–1144https://doi.org/10.1007/s10270-015-0509-6With the increasing complexity of the problems and systems arising nowadays, the use of multi-level models is becoming more frequent in practice. However, there are still few reports in the literature concerning methods for analyzing such models without ...
- articleMarch 2017
Software model checking for resources race
Cluster Computing (KLU-CLUS), Volume 20, Issue 1Pages 179–193https://doi.org/10.1007/s10586-017-0757-zThe difficulty of finding resources race is well known. Such errors are hard to be detected, because they often happen irregularly and reproduce difficultly. Especially, the kind race conflicts exist among processes, threads, and interrupts. This paper ...
- articleJuly 2016
An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems
Security and Communication Networks (SACN), Volume 9, Issue 10Pages 1146–1157https://doi.org/10.1002/sec.1407The Internet has made the world smaller while there is still a gap between the cyber world and our physical world. In the future cyber-physical system CPS, all objects in cyber world and physical world would be connected, and the concepts of cyber world ...
- research-articleMay 2016
Using DEv-PROMELA for Modelling and Verification of Software
SIGSIM-PADS '16: Proceedings of the 2016 ACM SIGSIM Conference on Principles of Advanced Discrete SimulationPages 245–253https://doi.org/10.1145/2901378.2901388Efficient modelling and verification of models need an accurate representation of systems. Especially, PROMELA cannot represent time as quantitative properties. That means some properties depending on time cannot be checked with SPIN model-checker. ...
- research-articleNovember 2015
Comparing model checkers for timed UML activity diagrams
Science of Computer Programming (SCPR), Volume 111, Issue P2Pages 277–299https://doi.org/10.1016/j.scico.2015.05.008This paper describes the results of an experimental study on the use of model checkers to verify properties of UML activity diagrams. The motivation for the study derives from the desirability of checking properties of systems early in the development ...
- articleNovember 2015
An Efficient Hybrid Cryptographic Algorithm, Consuming Less Time for Exchanging Information in Wireless Sensor Networks
Wireless Personal Communications: An International Journal (WPCO), Volume 85, Issue 2Pages 449–462https://doi.org/10.1007/s11277-015-2748-9Set of autonomous nodes attached together and to a base station, working in a particular system is called wireless sensor network. Due to its wireless and dynamic nature, wireless sensor networks (WSNs) are easily attacked in comparison to wired ...
- research-articleNovember 2015
Model checking the observational determinism security property using PROMELA and SPIN
Formal Aspects of Computing (FAC), Volume 27, Issue 5-6Pages 789–804https://doi.org/10.1007/s00165-014-0331-xAbstractObservational determinism is a property that ensures the confidentiality in concurrent programs. It conveys that public variables are independent of private variables during the execution of programs, and the scheduling policy of threads. ...