[PDF][PDF] Maude manual (version 3.1)
This introduction tries to give the big picture on the goals, design philosophy, logical
foundations, applications, and overall structure of Maude. It is written in an impressionistic …
foundations, applications, and overall structure of Maude. It is written in an impressionistic …
A formal approach to physics-based attacks in cyber-physical systems
We apply formal methods to lay and streamline theoretical foundations to reason about
Cyber-Physical Systems (CPSs) and physics-based attacks, ie, attacks targeting physical …
Cyber-Physical Systems (CPSs) and physics-based attacks, ie, attacks targeting physical …
A formal approach to cyber-physical attacks
We apply formal methods to lay and streamline theoretical foundations to reason about
Cyber-Physical Systems (CPSs) and cyber-physical attacks. We focus on integrity and DoS …
Cyber-Physical Systems (CPSs) and cyber-physical attacks. We focus on integrity and DoS …
[PDF][PDF] Translating concurrent programs into delay-insensitive circuits.
Programs written in a subset of occam are automatically translated into delay-insensitive
circuits using syntax-directed techniques. The resulting circuits are improved using …
circuits using syntax-directed techniques. The resulting circuits are improved using …
Practical EMV relay protection
Relay attackers can forward messages between a contactless EMV bank card and a shop
reader, making it possible to wirelessly pickpocket money. To protect against this, Apple Pay …
reader, making it possible to wirelessly pickpocket money. To protect against this, Apple Pay …
[PDF][PDF] Maude manual (version 3.0)
This introduction tries to give the big picture on the goals, design philosophy, logical
foundations, applications, and overall structure of Maude. It is written in an impressionistic …
foundations, applications, and overall structure of Maude. It is written in an impressionistic …
Modelling and analysis of a hierarchy of distance bounding attacks
We present an extension of the applied pi-calculus that can be used to model distance
bounding protocols. A range of different security properties have been sug-gested for …
bounding protocols. A range of different security properties have been sug-gested for …
Quantitative robustness analysis of sensor attacks on cyber-physical systems
This paper contributes a formal framework for quantitative analysis of bounded sensor
attacks on cyber-physical systems, using the formalism of differential dynamic logic. Given a …
attacks on cyber-physical systems, using the formalism of differential dynamic logic. Given a …
A framework for analyzing adaptive autonomous aerial vehicles
Unmanned aerial vehicles (UAVs), aka drones, are becoming increasingly popular due to
great advancements in their control mechanisms and price reduction. UAVs are being used …
great advancements in their control mechanisms and price reduction. UAVs are being used …
Towards a formal notion of impact metric for cyber-physical attacks
Industrial facilities and critical infrastructures are transforming into “smart” environments that
dynamically adapt to external events. The result is an ecosystem of heterogeneous physical …
dynamically adapt to external events. The result is an ecosystem of heterogeneous physical …