Sciweavers

108 search results - page 2 / 22
» Failure Analysis of an E-Commerce Protocol Using Model Check...
Sort
View
USS
2010
13 years 5 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
FM
2003
Springer
115views Formal Methods» more  FM 2003»
14 years 1 months ago
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis
Alessandro Armando, Luca Compagna, Pierre Ganty
MOVEP
2000
167views Hardware» more  MOVEP 2000»
13 years 11 months ago
Model Checking: A Tutorial Overview
We survey principles of model checking techniques for the automatic analysis of reactive systems. The use of model checking is exemplified by an analysis of the Needham-Schroeder p...
Stephan Merz
DALT
2004
Springer
14 years 1 months ago
Model Checking Agent Dialogues
In this paper we address the challenges associated with the verification of correctness of communication between agents in MultiAgent Systems. Our approach applies model-checking ...
Christopher D. Walton
FMICS
2007
Springer
14 years 1 months ago
An Action/State-Based Model-Checking Approach for the Analysis of Communication Protocols for Service-Oriented Applications
Abstract. In this paper we present an action/state-based logical framework for the analysis and verification of complex systems, which relies on the definition of doubly labelled...
Maurice H. ter Beek, Alessandro Fantechi, Stefania...