Results 31 to 40 of about 3,649,820 (385)

Formal Verification, Engineering and Business Value [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2012
How to apply automated verification technology such as model checking and static program analysis to millions of lines of embedded C/C++ code? How to package this technology in a way that it can be used by software developers and engineers, who might ...
Ralf Huuck
doaj   +1 more source

SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses [PDF]

open access: yesEuropean Symposium on Security and Privacy, 2020
Programmable Logic Controllers (PLCs) play a critical role in the industrial control systems. Vulnerabilities in PLC programs might lead to attacks causing devastating consequences to the critical infrastructure, as shown in Stuxnet and similar attacks ...
Ruimin Sun   +3 more
semanticscholar   +1 more source

Formal Verification of Fault-Tolerant Hardware Designs

open access: yesIEEE Access, 2023
Digital circuits for space applications can suffer from operation failures due to radiation effects. Error detection and mitigation techniques are widely accepted solutions to improve dependability of digital circuits under Single Event Upsets (SEUs) and
Luis Entrena   +6 more
doaj   +1 more source

Formal verification for a PMQTT protocol

open access: yesEgyptian Informatics Journal, 2020
The future of Internet of Things (IoT) foresees a world of interconnected people with every physical object in a seamless manner. The security related aspects for the IoT world are still an open field of discussion and research.
Eman Elemam   +3 more
doaj   +1 more source

Formal Verification of a Programmable Hypersurface [PDF]

open access: yes, 2018
A metasurface is a surface that consists of artificial material, called metamaterial, with configurable electromagnetic properties. This paper presents work in progress on the design and formal verification of a programmable metasurface, the Hypersurface, as part of the requirements of the VISORSURF research program (HORIZON 2020 FET-OPEN).
Kouvaros, Panagiotis   +11 more
openaire   +4 more sources

FIVER – Robust Verification of Countermeasures against Fault Injections

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Fault Injection Analysis is seen as a powerful attack against implementations of cryptographic algorithms. Over the last two decades, researchers proposed a plethora of countermeasures to secure such implementations.
Jan Richter-Brockmann   +4 more
doaj   +1 more source

A Survey of Smart Contract Formal Specification and Verification [PDF]

open access: yesACM Computing Surveys, 2020
A smart contract is a computer program that allows users to automate their actions on the blockchain platform. Given the significance of smart contracts in supporting important activities across industry sectors including supply chain, finance, legal ...
Palina Tolmach   +4 more
semanticscholar   +1 more source

Formal Verification of a Hybrid IoT Operating System Model

open access: yesIEEE Access, 2021
The Internet of Things (IoT) is becoming an increasingly common paradigm. As IoT usage scenarios have increased, many challenges in IoT operating systems’ safety and adaptability have remained.
Yuqian Guan, Jian Guo, Qin Li
doaj   +1 more source

Context-aware approach for formal verification

open access: yesEAI Endorsed Transactions on Context-aware Systems and Applications, 2016
The Context-aware approach has proven to be an effective technique for software model-checking verification. It focuses on the explicit modelling of environment as one or more contexts.
Amel Benabbou   +2 more
doaj   +1 more source

Formal Verification of Netlog Protocols [PDF]

open access: yes2012 Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012
Des languages orientés données basés sur des règles récursives ont été proposés pour programmer les applications distribuées sur des réseaux. Ils simplifient grandement le codage tout en admettant une exécution efficace. Ils offrent également une approche prometteuse pour les problèmes de verification qui sont délicats en distribué \cite{discotec11 ...
Chen, Meixian, Monin, Jean-François
openaire   +3 more sources

Home - About - Disclaimer - Privacy