The complete guide to scion

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022‏ - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

A formal framework for end-to-end dns resolution

S Liu, H Duan, L Heimes, M Bearzi, J Vieli… - Proceedings of the …, 2023‏ - dl.acm.org
Despite the central importance of DNS, numerous attacks and vulnerabilities are regularly
discovered. The root of the problem is the ambiguity and tremendous complexity of DNS …

Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models

F Luo, H Lin, Z Li, X Luo, R Luo, Z He, S Song… - Proceedings of the …, 2024‏ - dl.acm.org
nial-of-Service (DoS) attacks at the execution layer represent one of the most severe threats
to blockchain systems, compromising availability by depleting the resources of victims. To …

Bounded model checking of PLC ST programs using rewriting modulo SMT

J Lee, S Kim, K Bae - Proceedings of the 8th ACM SIGPLAN …, 2022‏ - dl.acm.org
A programmable logic controller (PLC) is widely used in industrial control systems, and
Structured text (ST) is an imperative language to develop PLC programs. Because of its …

Bridging the semantic gap between qualitative and quantitative models of distributed systems

S Liu, J Meseguer, PC Ölveczky, M Zhang… - Proceedings of the ACM …, 2022‏ - dl.acm.org
Today's distributed systems must satisfy both qualitative and quantitative properties. These
properties are analyzed using very different formal frameworks: expressive untimed and non …

On the complexity of verification of time-sensitive distributed systems

M Kanovich, TB Kirigin, V Nigam, A Scedrov… - Protocols, Strands, and …, 2021‏ - Springer
This paper develops a Multiset Rewriting language with explicit time for the specification and
analysis of Time-Sensitive Distributed Systems (TSDS). Goals are often specified using …

Resource and timing aspects of security protocols

A Aires Urquiza, MA Alturki… - Journal of computer …, 2021‏ - journals.sagepub.com
Protocol security verification is one of the best success stories of formal methods. However,
some aspects important to protocol security, such as time and resources, are not covered by …

A flexible framework for integrating Maude and SMT solvers using Python

G Yu, K Bae - International Workshop on Rewriting Logic and its …, 2024‏ - Springer
This paper presents a new implementation of Maude-SE that provides a flexible yet efficient
framework for connecting Maude to SMT solvers. There exist previous implementations to …

Automated construction of security integrity wrappers for industry 4.0 applications

V Nigam, C Talcott - Journal of Logical and Algebraic Methods in …, 2022‏ - Elsevier
Abstract Industry 4.0 (I4. 0) refers to the trend towards automation and data exchange in
manufacturing technologies and processes which include cyber-physical systems, where …