Charting the attack surface of trigger-action IoT platforms
Internet of Things (IoT) deployments are becoming increasingly automated and vastly more
complex. Facilitated by programming abstractions such as trigger-action rules, end-users …
complex. Facilitated by programming abstractions such as trigger-action rules, end-users …
The Complete Guide to SCION
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
Plume: Efficient and complete black-box checking of weak isolation levels
Modern databases embrace weak isolation levels to cater for highly available transactions.
However, weak isolation bugs have recently manifested in many production databases. This …
However, weak isolation bugs have recently manifested in many production databases. This …
Bridging the semantic gap between qualitative and quantitative models of distributed systems
Today's distributed systems must satisfy both qualitative and quantitative properties. These
properties are analyzed using very different formal frameworks: expressive untimed and non …
properties are analyzed using very different formal frameworks: expressive untimed and non …
Automatic analysis of consistency properties of distributed transaction systems in Maude
Many transaction systems distribute, partition, and replicate their data for scalability,
availability, and fault tolerance. However, observing and maintaining strong consistency of …
availability, and fault tolerance. However, observing and maintaining strong consistency of …
All in one: Design, verification, and implementation of SNOW-optimal read atomic transactions
S Liu - ACM Transactions on Software Engineering and …, 2022 - dl.acm.org
Distributed read atomic transactions are important building blocks of modern cloud
databases that magnificently bridge the gap between data availability and strong data …
databases that magnificently bridge the gap between data availability and strong data …
Generating correct-by-construction distributed implementations from formal Maude designs
Develo** a reliable distributed system meeting desired performance requirements is a
hard and labor-intensive task. Formal specification and analysis of a system design can …
hard and labor-intensive task. Formal specification and analysis of a system design can …
N-Tube: Formally verified secure bandwidth reservation in path-aware internet architectures
We present N-Tube, a novel, provably secure, inter-domain bandwidth reservation algorithm
that runs on a network architecture supporting path-based forwarding. N-Tube reserves …
that runs on a network architecture supporting path-based forwarding. N-Tube reserves …
Narrowing and heuristic search for symbolic reachability analysis of concurrent object-oriented systems
A concurrent system specified as a rewrite theory can be analyzed symbolically using
narrowing-based reachability analysis. Narrowing-based approaches have been applied to …
narrowing-based reachability analysis. Narrowing-based approaches have been applied to …
Pushing the Limit: Verified Performance-Optimal Causally-Consistent Database Transactions
Modern web services crucially rely on high-performance distributed databases, where
concurrent transactions are isolated from each other using concurrency control protocols …
concurrent transactions are isolated from each other using concurrency control protocols …