A survey on the security of stateful SDN data planes

T Dargahi, A Caponi, M Ambrosin… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Software-defined networking (SDN) emerged as an attempt to introduce network innovations
faster, and to radically simplify and automate the management of large networks. SDN …

Logical modeling and dynamical analysis of cellular networks

W Abou-Jaoudé, P Traynard, PT Monteiro… - Frontiers in …, 2016 - frontiersin.org
The logical (or logic) formalism is increasingly used to model regulatory and signaling
networks. Complementing these applications, several groups contributed various methods …

Key reinstallation attacks: Forcing nonce reuse in WPA2

M Vanhoef, F Piessens - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
We introduce the key reinstallation attack. This attack abuses design or implementation
flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key's …

[CARTE][B] Formal methods for discrete-time dynamical systems

C Belta, B Yordanov, EA Gol - 2017 - Springer
In control theory, complex models of physical processes, such as systems of differential or
difference equations, are usually checked against simple specifications, such as stability …

Soteria: Automated {IoT} safety and security analysis

ZB Celik, P McDaniel, G Tan - 2018 USENIX annual technical …, 2018 - usenix.org
Broadly defined as the Internet of Things (IoT), the growth of commodity devices that
integrate physical processes with digital systems have changed the way we live, play and …

The nuXmv Symbolic Model Checker

R Cavada, A Cimatti, M Dorigatti, A Griggio… - … 2014, Held as Part of the …, 2014 - Springer
This paper describes the nuXmv symbolic model checker for finite-and infinite-state
synchronous transition systems. nuXmv is the evolution of the nuXmv open source model …

The mCRL2 toolset for analysing concurrent systems: improvements in expressivity and usability

O Bunte, JF Groote, JJA Keiren, M Laveaux… - … 2019, Held as Part of the …, 2019 - Springer
Abstract Reasoning about the correctness of parallel and distributed systems requires
automated tools. By now, the mCRL2 toolset and language have been developed over a …

Abstractions for network update

M Reitblatt, N Foster, J Rexford, C Schlesinger… - ACM SIGCOMM …, 2012 - dl.acm.org
Configuration changes are a common source of instability in networks, leading to outages,
performance disruptions, and security vulnerabilities. Even when the initial and final …

{VRASED}: A verified {Hardware/Software}{Co-Design} for remote attestation

IDO Nunes, K Eldefrawy, N Rattanavipanon… - 28th USENIX Security …, 2019 - usenix.org
Remote Attestation (RA) is a distinct security service that allows a trusted verifier (Vrf) to
measure the software state of an untrusted remote prover (Prv). If correctly implemented, RA …

Bounded model checking

A Biere - Handbook of satisfiability, 2021 - ebooks.iospress.nl
One of the most important industrial applications of SAT is currently Bounded Model
Checking (BMC). This technique is typically used for formal hardware verification in the …