Charting the attack surface of trigger-action IoT platforms

Q Wang, P Datta, W Yang, S Liu, A Bates… - Proceedings of the 2019 …, 2019 - dl.acm.org
Internet of Things (IoT) deployments are becoming increasingly automated and vastly more
complex. Facilitated by programming abstractions such as trigger-action rules, end-users …

The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

Plume: Efficient and complete black-box checking of weak isolation levels

S Liu, L Gu, H Wei, D Basin - Proceedings of the ACM on Programming …, 2024 - dl.acm.org
Modern databases embrace weak isolation levels to cater for highly available transactions.
However, weak isolation bugs have recently manifested in many production databases. This …

Bridging the semantic gap between qualitative and quantitative models of distributed systems

S Liu, J Meseguer, PC Ölveczky, M Zhang… - Proceedings of the ACM …, 2022 - dl.acm.org
Today's distributed systems must satisfy both qualitative and quantitative properties. These
properties are analyzed using very different formal frameworks: expressive untimed and non …

Automatic analysis of consistency properties of distributed transaction systems in Maude

S Liu, PC Ölveczky, M Zhang, Q Wang… - … 2019, Held as Part of the …, 2019 - Springer
Many transaction systems distribute, partition, and replicate their data for scalability,
availability, and fault tolerance. However, observing and maintaining strong consistency of …

All in one: Design, verification, and implementation of SNOW-optimal read atomic transactions

S Liu - ACM Transactions on Software Engineering and …, 2022 - dl.acm.org
Distributed read atomic transactions are important building blocks of modern cloud
databases that magnificently bridge the gap between data availability and strong data …

Generating correct-by-construction distributed implementations from formal Maude designs

S Liu, A Sandur, J Meseguer, PC Ölveczky… - NASA Formal Methods …, 2020 - Springer
Develo** a reliable distributed system meeting desired performance requirements is a
hard and labor-intensive task. Formal specification and analysis of a system design can …

N-Tube: Formally verified secure bandwidth reservation in path-aware internet architectures

T Weghorn, S Liu, C Sprenger… - 2022 IEEE 35th …, 2022 - ieeexplore.ieee.org
We present N-Tube, a novel, provably secure, inter-domain bandwidth reservation algorithm
that runs on a network architecture supporting path-based forwarding. N-Tube reserves …

Narrowing and heuristic search for symbolic reachability analysis of concurrent object-oriented systems

B Kang, K Bae - Science of Computer Programming, 2024 - Elsevier
A concurrent system specified as a rewrite theory can be analyzed symbolically using
narrowing-based reachability analysis. Narrowing-based approaches have been applied to …

Pushing the Limit: Verified Performance-Optimal Causally-Consistent Database Transactions

S Ghasemirad, C Sprenger, S Liu, L Multazzu… - arxiv preprint arxiv …, 2024 - arxiv.org
Modern web services crucially rely on high-performance distributed databases, where
concurrent transactions are isolated from each other using concurrency control protocols …