A formal model and analysis of an IoT protocol
B Aziz - Ad Hoc Networks, 2016 - Elsevier
We present a formal model of the MQ Telemetry Transport version 3.1 protocol based on a
timed message-passing process algebra. We explain the modelling choices that we made …
timed message-passing process algebra. We explain the modelling choices that we made …
Detecting man-in-the-middle attacks by precise timing
Man-in-the-middle attacks are one of the most popular and fundamental attacks on
distributed systems that have evolved with advances in distributed computing technologies …
distributed systems that have evolved with advances in distributed computing technologies …
A formal model and analysis of the MQ telemetry transport protocol
B Aziz - 2014 Ninth International Conference on Availability …, 2014 - ieeexplore.ieee.org
We present a formal model of the MQ Telemetry Transport version 3.1 protocol based on a
timed message-passing process algebra. We explain the modeling choices that we made …
timed message-passing process algebra. We explain the modeling choices that we made …
A logical encoding of the π-calculus: model checking mobile processes using tabled resolution
We present MMC, a model checker for mobile systems specified in the style of the π-
calculus. MMC's development builds on that of XMC, a model checker for an expressive …
calculus. MMC's development builds on that of XMC, a model checker for an expressive …
Modeling and analyzing an industry 4.0 communication protocol
B Aziz - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The increasing complexity and criticality of industrial automation systems, embodied by the
concept of Industry 4.0, which brings together concepts, such as cyber-physical systems, the …
concept of Industry 4.0, which brings together concepts, such as cyber-physical systems, the …
A process algebraic mutation framework with application to a vehicle charging protocol
B Aziz - Vehicular Communications, 2021 - Elsevier
Modern day renewable and smart energy systems are increasingly playing an important role
in our societies. Electric vehicle charging services infrastructures are becoming ever more …
in our societies. Electric vehicle charging services infrastructures are becoming ever more …
Formal privacy analysis of communication protocols for identity management
Over the years, formal methods have been developed for the analysis of security and privacy
aspects of communication in IT systems. However, existing methods are insufficient to deal …
aspects of communication in IT systems. However, existing methods are insufficient to deal …
A static analysis framework for security properties in mobile and cryptographic systems
BYY Aziz - 2003 - doras.dcu.ie
We introduce a static analysis framework for detecting instances of security breaches in
infinite mobile and cryptographic systems specified using the languages of the 7r-calculus …
infinite mobile and cryptographic systems specified using the languages of the 7r-calculus …
From Bloch model to the rate equations II: the case of almost degenerate energy levels
B Bidégaray-Fesquet, F Castella, E Dumas… - … Models and Methods …, 2004 - World Scientific
Bloch equations give a quantum description of the coupling between atoms and a driving
electric force. It is commonly used in optics to describe the interaction of a laser beam with a …
electric force. It is commonly used in optics to describe the interaction of a laser beam with a …
A static analysis of cryptographic processes: The denotational approach
This paper presents a non-uniform static analysis for detecting the term-substitution property
in infinite cryptographic processes specified by the language of the spi calculus. The …
in infinite cryptographic processes specified by the language of the spi calculus. The …