[PDF][PDF] Maude manual (version 3.1)

M Clavel, F Durán, S Eker, S Escobar… - … University of Illinois …, 2020 - maude.cs.illinois.edu
This introduction tries to give the big picture on the goals, design philosophy, logical
foundations, applications, and overall structure of Maude. It is written in an impressionistic …

A formal approach to physics-based attacks in cyber-physical systems

R Lanotte, M Merro, A Munteanu, L Viganò - ACM Transactions on …, 2020 - dl.acm.org
We apply formal methods to lay and streamline theoretical foundations to reason about
Cyber-Physical Systems (CPSs) and physics-based attacks, ie, attacks targeting physical …

A formal approach to cyber-physical attacks

R Lanotte, M Merro, R Muradore… - 2017 IEEE 30th …, 2017 - ieeexplore.ieee.org
We apply formal methods to lay and streamline theoretical foundations to reason about
Cyber-Physical Systems (CPSs) and cyber-physical attacks. We focus on integrity and DoS …

[PDF][PDF] Translating concurrent programs into delay-insensitive circuits.

E Brunvand, RF Sproull - ICCAD, 1989 - core.ac.uk
Programs written in a subset of occam are automatically translated into delay-insensitive
circuits using syntax-directed techniques. The resulting circuits are improved using …

Practical EMV relay protection

AI Radu, T Chothia, CJP Newton… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Relay attackers can forward messages between a contactless EMV bank card and a shop
reader, making it possible to wirelessly pickpocket money. To protect against this, Apple Pay …

[PDF][PDF] Maude manual (version 3.0)

M Clavel, F Durán, S Eker, S Escobar… - SRI …, 2020 - maude.cs.illinois.edu
This introduction tries to give the big picture on the goals, design philosophy, logical
foundations, applications, and overall structure of Maude. It is written in an impressionistic …

Modelling and analysis of a hierarchy of distance bounding attacks

T Chothia, J De Ruiter, B Smyth - 27th USENIX Security Symposium …, 2018 - usenix.org
We present an extension of the applied pi-calculus that can be used to model distance
bounding protocols. A range of different security properties have been sug-gested for …

Quantitative robustness analysis of sensor attacks on cyber-physical systems

S Chong, R Lanotte, M Merro, S Tini… - Proceedings of the 26th …, 2023 - dl.acm.org
This paper contributes a formal framework for quantitative analysis of bounded sensor
attacks on cyber-physical systems, using the formalism of differential dynamic logic. Given a …

A framework for analyzing adaptive autonomous aerial vehicles

IA Mason, V Nigam, C Talcott, A Brito - … , Trento, Italy, September 4-5, 2017 …, 2018 - Springer
Unmanned aerial vehicles (UAVs), aka drones, are becoming increasingly popular due to
great advancements in their control mechanisms and price reduction. UAVs are being used …

Towards a formal notion of impact metric for cyber-physical attacks

R Lanotte, M Merro, S Tini - … , IFM 2018, Maynooth, Ireland, September 5-7 …, 2018 - Springer
Industrial facilities and critical infrastructures are transforming into “smart” environments that
dynamically adapt to external events. The result is an ecosystem of heterogeneous physical …