A formal model and analysis of an IoT protocol

B Aziz - Ad Hoc Networks, 2016 - Elsevier
We present a formal model of the MQ Telemetry Transport version 3.1 protocol based on a
timed message-passing process algebra. We explain the modelling choices that we made …

Detecting man-in-the-middle attacks by precise timing

B Aziz, G Hamilton - 2009 Third International Conference on …, 2009 - ieeexplore.ieee.org
Man-in-the-middle attacks are one of the most popular and fundamental attacks on
distributed systems that have evolved with advances in distributed computing technologies …

A formal model and analysis of the MQ telemetry transport protocol

B Aziz - 2014 Ninth International Conference on Availability …, 2014 - ieeexplore.ieee.org
We present a formal model of the MQ Telemetry Transport version 3.1 protocol based on a
timed message-passing process algebra. We explain the modeling choices that we made …

A logical encoding of the π-calculus: model checking mobile processes using tabled resolution

P Yang, CR Ramakrishnan, SA Smolka - International journal on software …, 2004 - Springer
We present MMC, a model checker for mobile systems specified in the style of the π-
calculus. MMC's development builds on that of XMC, a model checker for an expressive …

Modeling and analyzing an industry 4.0 communication protocol

B Aziz - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The increasing complexity and criticality of industrial automation systems, embodied by the
concept of Industry 4.0, which brings together concepts, such as cyber-physical systems, the …

A process algebraic mutation framework with application to a vehicle charging protocol

B Aziz - Vehicular Communications, 2021 - Elsevier
Modern day renewable and smart energy systems are increasingly playing an important role
in our societies. Electric vehicle charging services infrastructures are becoming ever more …

Formal privacy analysis of communication protocols for identity management

M Veeningen, B de Weger, N Zannone - International Conference on …, 2011 - Springer
Over the years, formal methods have been developed for the analysis of security and privacy
aspects of communication in IT systems. However, existing methods are insufficient to deal …

A static analysis framework for security properties in mobile and cryptographic systems

BYY Aziz - 2003 - doras.dcu.ie
We introduce a static analysis framework for detecting instances of security breaches in
infinite mobile and cryptographic systems specified using the languages of the 7r-calculus …

From Bloch model to the rate equations II: the case of almost degenerate energy levels

B Bidégaray-Fesquet, F Castella, E Dumas… - … Models and Methods …, 2004 - World Scientific
Bloch equations give a quantum description of the coupling between atoms and a driving
electric force. It is commonly used in optics to describe the interaction of a laser beam with a …

A static analysis of cryptographic processes: The denotational approach

B Aziz, G Hamilton, D Gray - The Journal of Logic and Algebraic …, 2005 - Elsevier
This paper presents a non-uniform static analysis for detecting the term-substitution property
in infinite cryptographic processes specified by the language of the spi calculus. The …