Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2016
Private and verifiable interdomain routing decisions
IEEE/ACM Transactions on Networking (TON), Volume 24, Issue 2Pages 1011–1024https://doi.org/10.1109/TNET.2015.2409233Existing secure interdomain routing protocols can verify validity properties about individual routes, such as whether they correspond to a real network path. It is often useful to verify more complex properties relating to the route decision procedure --...
- research-articleNovember 2014
Collaborative Verification of Information Flow for a High-Assurance App Store
- Michael D. Ernst,
- René Just,
- Suzanne Millstein,
- Werner Dietl,
- Stuart Pernsteiner,
- Franziska Roesner,
- Karl Koscher,
- Paulo Barros Barros,
- Ravi Bhoraskar,
- Seungyeop Han,
- Paul Vines,
- Edward X. Wu
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityPages 1092–1104https://doi.org/10.1145/2660267.2660343Current app stores distribute some malware to unsuspecting users, even though the app approval process may be costly and time-consuming. High-integrity app stores must provide stronger guarantees that their apps are not malicious. We propose a ...
- articleDecember 2006
A novel collaborative scheme of simulation and model checking for system properties verification
Computers in Industry (CIIN), Volume 57, Issue 8Pages 752–757https://doi.org/10.1016/j.compind.2006.04.006The conventional methods cannot easily handle the verification task of increasingly complex hardware designs. This research proposes a novel collaborative scheme for verifying functional properties of a design. The classified properties are designed for ...