A survey of practical formal methods for security

T Kulik, B Dongol, PG Larsen, HD Macedo… - Formal aspects of …, 2022 - dl.acm.org
In today's world, critical infrastructure is often controlled by computing systems. This
introduces new risks for cyber attacks, which can compromise the security and disrupt the …

On the (in) security of secure ros2

G Deng, G Xu, Y Zhou, T Zhang, Y Liu - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Robot Operating System (ROS) has been the mainstream platform for research and
development of robotic applications. This platform is well-known for lacking security features …

Formal analysis of composable DeFi protocols

P Tolmach, Y Li, SW Lin, Y Liu - … Cryptography and Data Security. FC 2021 …, 2021 - Springer
Decentralized finance (DeFi) has become one of the most successful applications of
blockchain and smart contracts. The DeFi ecosystem enables a wide range of crypto …

Formal analysis of a proof-of-stake blockchain

WYMM Thin, N Dong, G Bai… - 2018 23rd International …, 2018 - ieeexplore.ieee.org
Blockchain technology relies on consensus algorithms to resolve conflicts in Byzantine
environments. New blockchain algorithms are rapidly designed and implemented without a …

An investigation into the problematic use of Facebook

ZWY Lee, CMK Cheung… - 2012 45th Hawaii …, 2012 - ieeexplore.ieee.org
Social networking sites (SNSs) have become new phenomena in social communication and
interaction patterns which have profound impact in the way people communicate and …

Pat 3: An extensible architecture for building multi-domain model checkers

Y Liu, J Sun, JS Dong - 2011 IEEE 22nd international …, 2011 - ieeexplore.ieee.org
Model checking is emerging as an effective software verification method. Although it is
desirable to have a dedicated model checker for each application domain, implementing …

Proof-of-monitoring (pom): A novel consensus mechanism for blockchain-based secure service level agreement management

N Weerasinghe, R Mishra, P Porambage… - … on Network and …, 2023 - ieeexplore.ieee.org
In the current 5th Generation (5G) networking paradigm, the enforcement of Service Level
Agreements (SLAs) is a non-trivial measure to ensure the scope and the quality of services …

Test generation from state based use case models

S Nogueira, A Sampaio, A Mota - Formal Aspects of Computing, 2014 - Springer
We present a strategy for the automatic generation of test cases from parametrised use case
templates that capture control flow, state, input and output. Our approach allows test …

Model checking linearizability via refinement

Y Liu, W Chen, YA Liu, J Sun - FM 2009: Formal Methods: Second World …, 2009 - Springer
Linearizability is an important correctness criterion for implementations of concurrent
objects. Automatic checking of linearizability is challenging because it requires checking that …

A reliable vaccine tracking and monitoring system for health clinics using blockchain

K Biswas, V Muthukkumarasamy, G Bai… - Scientific Reports, 2023 - nature.com
Vaccines are delicate biological substances that gradually become inactive over time and
must be kept under a recommended temperature range of 2–8° C for both short and long …