Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2024
Partially-Observable Security Games for Attack-Defence Analysis in Software Systems
Software Engineering and Formal MethodsPages 144–161https://doi.org/10.1007/978-3-031-77382-2_9AbstractGiven the presence of residual vulnerabilities in software systems, it is critical to apply suitable countermeasures in order to minimize the likelihood of an attack. In this paper we propose a formal approach, based on stochastic games, to threat ...
- ArticleNovember 2024
Validating Traces of Distributed Programs Against TLA+ Specifications
Software Engineering and Formal MethodsPages 126–143https://doi.org/10.1007/978-3-031-77382-2_8AbstractTLA+ is a formal language for specifying systems, including distributed algorithms, that is supported by powerful verification tools. In this work we present a framework for checking if traces of distributed programs are compatible with high-level ...
- ArticleNovember 2024
Symbolic Execution for Precise Information Flow Analysis of Timed Concurrent Systems
Software Engineering and Formal MethodsPages 107–125https://doi.org/10.1007/978-3-031-77382-2_7AbstractInformation flow analysis (IFA) is a powerful technique for verifying confidentiality and integrity. This is highly desirable for embedded systems, where security violations can lead to significant economic damages or even loss of human life. ...
- ArticleNovember 2024
Exploiting Assumptions for Effective Monitoring of Real-Time Properties Under Partial Observability
Software Engineering and Formal MethodsPages 70–88https://doi.org/10.1007/978-3-031-77382-2_5AbstractRuntime verification of temporal properties over timed sequences of observations is crucial in various applications within cyber-physical systems ranging from autonomous vehicles over smart grids to medical devices. In this paper, we are ...
- ArticleNovember 2024
User-Guided Verification of Security Protocols via Sound Animation
Software Engineering and Formal MethodsPages 33–51https://doi.org/10.1007/978-3-031-77382-2_3AbstractCurrent formal verification of security protocols relies on specialized researchers and complex tools, inaccessible to protocol designers who informally evaluate their work with emulators. This paper addresses this gap by embedding symbolic ...
- ArticleNovember 2024
Leveraging Contracts for Failure Monitoring and Identification in Automated Driving Systems
Software Engineering and Formal MethodsPages 441–460https://doi.org/10.1007/978-3-031-77382-2_25AbstractAs the deployment of AI agents in Automated Driving Systems (ADS) becomes increasingly prevalent, ensuring their safety and reliability is of paramount importance. This paper presents a novel approach to enhance the safety assurance of automated ...
- ArticleNovember 2024
Formal Analysis of Multi-Factor Authentication Schemes in Digital Identity Cards
Software Engineering and Formal MethodsPages 423–440https://doi.org/10.1007/978-3-031-77382-2_24AbstractWe present a methodology for formally modelling and verifying multi-factor authentication (MFA) schemes employed in eIDAS digital identity cards. This methodology adopts an interface-based threat model to comprehensively analyse potential ...
- ArticleNovember 2024
Automated Invariant Generation for Efficient Deductive Reasoning About Embedded Systems
Software Engineering and Formal MethodsPages 404–422https://doi.org/10.1007/978-3-031-77382-2_23AbstractDeductive verification is often more efficient than alternative techniques like model checking at reasoning about functional properties of programs. This is especially true when the program under verification contains very large or unbounded data ...
- ArticleNovember 2024
Unlocking the Power of Environment Assumptions for Unit Proofs
Software Engineering and Formal MethodsPages 366–384https://doi.org/10.1007/978-3-031-77382-2_21AbstractClearly articulating the assumptions of the execution environment is crucial for the successful application of code-level formal verification. The process of specifying a model for the environment can be both laborious and error-prone, often ...
- ArticleNovember 2024
Verified Configuration and Deployment of Layered Attestation Managers
Software Engineering and Formal MethodsPages 290–308https://doi.org/10.1007/978-3-031-77382-2_17AbstractEffective layered attestation systems require a trusted mechanism for their implementation, configuration, and deployment. Core to these systems are a distributed collection of Attestation Manager (AM) components that orchestrate primitive ...
- ArticleNovember 2024
GrammarForge: Learning Program Input Grammars for Fuzz Testing
Software Engineering and Formal MethodsPages 272–289https://doi.org/10.1007/978-3-031-77382-2_16AbstractProviding good methods for testing properties of software is critical. Such methods often depend on a formal description of the program input language, in particular, when they are based on grammar-based fuzzing. Unfortunately, it cannot be ...
- ArticleNovember 2024
Minuska: Towards a Formally Verified Programming Language Framework
Software Engineering and Formal MethodsPages 200–214https://doi.org/10.1007/978-3-031-77382-2_12AbstractProgramming language frameworks allow us to generate language tools (e.g., interpreters) just from a formal description of the syntax and semantics of a programming language. As these frameworks tend to be quite complex, an issue arises whether we ...
- ArticleNovember 2024
Deductive Verification of SYCL in VerCors
Software Engineering and Formal MethodsPages 182–199https://doi.org/10.1007/978-3-031-77382-2_11AbstractSYCL is a C++ programming model for the development of heterogeneous programs. It uses the concept of kernels, where multiple instances of a computation are executed concurrently on a computing unit. This concurrency entails that the set of ...
- ArticleNovember 2024
Secure Smart Contracts with Isabelle/Solidity
Software Engineering and Formal MethodsPages 162–181https://doi.org/10.1007/978-3-031-77382-2_10AbstractSmart contracts are programs stored on the blockchain, often developed in a high-level programming language, the most popular of which is Solidity. Smart contracts are used to automate financial transactions and thus bugs can lead to large ...
- ArticleNovember 2024
Formal Verification of Cyber-Physical Systems Using Domain-Specific Abstractions
Software Engineering and Formal MethodsPages 3–21https://doi.org/10.1007/978-3-031-77382-2_1AbstractCyber-physical systems have become ubiquitous in our daily lives, and their complexity continually evolves to unprecedented levels. In addition to their heterogeneity and interaction with a physical environment, we see a tremendous increase in the ...