End-to-end availability policies and noninterference

L Zheng, AC Myers - 18th IEEE Computer Security Foundations …, 2005 - ieeexplore.ieee.org
This paper introduces the use of static information flow analysis for the specification and
enforcement of end-to-end availability policies in programs. We generalize the decentralized …

Game-based analysis of denial-of-service prevention protocols

A Mahimkar, V Shmatikov - 18th IEEE Computer Security …, 2005 - ieeexplore.ieee.org
Availability is a critical issue in modern distributed systems. While many techniques and
protocols for preventing denial of service (DoS) attacks have been proposed and deployed …

The modeling and comparison of wireless network denial of service attacks

M Eian, SF Mjølsnes - Proceedings of the 3rd ACM SOSP workshop on …, 2011 - dl.acm.org
Mobile handhelds with wireless access are used in numerous safety critical applications.
The wireless network protocols in use are vulnerable to a wide array of denial of service …

Quantitative security analysis for service-oriented software architectures

YM Liu - 2008 - dspace.library.uvic.ca
Due to the dramatic increase in intrusion activities, the definition and evaluation of software
security requirements have become important aspects of the development of software …

Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols

C Meadows - Science of Computer Programming, 2004 - Elsevier
The application of formal methods to cryptographic protocol analysis has been a growth
area recently. Most of the attention has been paid to the design of languages for the …

[PDF][PDF] 协议抗拒绝服务攻击性自动化证明

孟博, 黄伟, 王德军, 邵飞 - 通信学报, 2012 - infocomm-journal.com
首先从攻击者上下文与进程表达式2 个方面对标准应用PI 演算进行扩展,
然后从协议状态的角度, 应用扩展后的应用PI 演算对协议抗拒绝服务攻击性进行建模 …

A generic cost model for concurrent and data-parallel meta-computing

A Merlin, G Hains - Electronic Notes in Theoretical Computer Science, 2005 - Elsevier
The CCS (Calculus of Communicating System) process algebra is a well-known formal
model of synchronization and communication, useful for the analysis of safety and liveness …

A bulk-synchronous parallel process algebra

A Merlin, G Hains - Computer Languages, Systems & Structures, 2007 - Elsevier
The calculus of communicating systems (CCS) process algebra is a well-known formal
model of synchronization and communication. It is used for the analysis of safety and …

[PDF][PDF] Automated Proof of Resistance of Denial of Service Attacks Using Event with Theorem Prover.

B Meng, W Huang, Z Li - J. Comput., 2013 - jcomputers.us
The huge damage of denial of service attacks in security protocols attracts researchers'
attention and effort to analysis, verification and prevention of denial of service attacks. In …

[PDF][PDF] Verification of Resistance of Denial of Service Attacks in Extended Applied Pi Calculus with ProVerif.

B Meng, W Wang, W Chen - J. Comput., 2012 - jcomputers.us
Owning to the damage of denial of service attacks in security protocols, resistance of denial
of service attacks plays an important role in remote voting protocols. Recently Meng et al …