Fabio Massacci Ida Siahaan
|
|
|
- Lesley Gaines
- 10 years ago
- Views:
Transcription
1 Inline-Reference Monitor Optimization using Automata Modulo Theory (AMT) Fabio Massacci Ida Siahaan STM09 - UNITN - Siahaan 1
2 Inlined Reference Monitors Security Policy Original Application IRM Rewriter Secured Application Policy Enforcement Toolkit (PoET) Implementing IRMs for Java Virtual Machine Language (JVML) applications Primary concern: trusted computing base (TCB) 17,500 loc Java source code U. Erlingsson, F. B. Schneider, IRM Enforcement of Java Stack Inspection, IEEE Symposium on Security and Privacy STM09 - UNITN - Siahaan 2
3 Optimizing Security Policy or Rewriter Insert Security Automata Evaluate transitions Simplify Automata Compile Automata push r1 push r1 push r1 if state==q0 then state:=q1 else ABORT push r1 Security Automata SFI Implementation (SASI) Implementing IRMs for x86 and JVML Minimizing TCB by working at the level of object code Ulfar Erlingsson, Fred B. Schneider, SASI Enfocement of Security Policies: A Retrospective, New Security Paradigm Workshop STM09 - UNITN - Siahaan 3
4 Optimizing Security Policy or Rewriter Trade off between moving more processes out of trusted part and the complexity of the whole process K. Hamlen, Security policy enforcement by automated programrewriting, Ph.D. thesis, Cornell University, Efficient IRM Enforcement a constrained representation of history-based access control policies exploit the structure of this policy representation extended into a distributed optimization protocol F. Yan, P.W.L. Fong, Efficient IRM Enforcement of History-Based Access Control Policies., ASIACCS STM09 - UNITN - Siahaan 4
5 Security by Contract (SxC) SxC device view N. Bielova, N. Dragoni, F. Massacci, K. Naliuka, and I. Siahaan, Matching in security-by-contract for mobile code, J. of Logic and Algebraic Programming STM09 - UNITN - Siahaan 5
6 IRM Optimization Given an (un)trusted code and a policy that a platform specifies to be inlined, how can we obtain an optimized IRM? STM09 - UNITN - Siahaan 6
7 Components of IRM Optimization Contract Extractor extract security relevant behaviors from code STM09 - UNITN - Siahaan 7
8 Components of IRM Optimization Claim Checker verify that the claimed contract complies to the code digitally signed by a trusted code provider STM09 - UNITN - Siahaan 8
9 Components of IRM Optimization Simulation Checker check a policy simulates a contract STM09 - UNITN - Siahaan 9
10 Components of IRM Optimization Optimizer discharge behaviors which are already enforced by code STM09 - UNITN - Siahaan 10
11 Components of IRM Optimization Rewriter inject policy to the code STM09 - UNITN - Siahaan 11
12 IRM Optimization Models STM09 - UNITN - Siahaan 12
13 Rewriter on Trusted part Model1: Contract Extractor on Trusted part STM09 - UNITN - Siahaan 13
14 Model6: Contract Extractor on Untrusted part Optimizer and Rewriter on Untrusted part STM09 - UNITN - Siahaan 14
15 Automata Modulo Theory (AMT) STM09 - UNITN - Siahaan 15
16 Security Automata A class of Büchi automata that accept safety properties (recognizers) a countable set Q of automaton states, a countable set Q 0 Q of initial automaton states, a countable set I of input symbols, and a transition function δ : (Q x Q ) 2 Q F. Schneider, Enforceable Security Policies, ACM Transactions on Information and System Security, Vol. 3, No. 1, February STM09 - UNITN - Siahaan 16
17 Edit Automata Truncation automaton (recognizer) terminate application Suppression automaton (transducer) truncation automaton + suppress undesired or dangerous actions without necessarily terminating the program Insertion automaton (transducer) truncation automaton + insert additional actions into the event stream Edit automata = Suppression automaton + Insertion automaton Jay Ligatti, Lujo Bauer, David Walker, Enforcement Mechanisms for Run-time Security Policies?, Int J Inf Secur (2005) STM09 - UNITN - Siahaan 17
18 Automata Modulo Theory (AMT) AMT = Büchi automata + Satisability Modulo Theories (SMT) a set E of formulae in the language of the theory T as input symbols a finite set Q of automaton states, an initial state q 0 Q, a set F Q of accepting states, and a labeled transition function δ : (Q x E ) 2 Q F. Massacci, I. Siahaan, Matching midlet s security claims with a platform security policy using automata modulo theory., NordSec STM09 - UNITN - Siahaan 18
19 Satisability Modulo Theories (SMT) The problem of deciding the satisability of a first-order formula with respect to some decidable first-order theory T (SMT(T)) A Σ-theory is a set of first-order sentences with signature Σ Examples of theories of interest: Equality and Uninterpreted Functions (EUF), Linear Arithmetic (LA): both over the reals (LA(Q)) and the integers (LA(Z)) Examples of SMT tools: Z3 MathSAT Primary interest for SMT(T) when T is a combination of two or more theories T 1,...,T n. Example of an atom: f(x + 4y) = g(2x - y) R.Sebastiani, Lazy Satisability Modulo Theories, Journal on Satisability, Boolean Modeling and Computation 3 (2007) STM09 - UNITN - Siahaan 19
20 Example of AMT STM09 - UNITN - Siahaan 20
21 IRM Optimization using AMT STM09 - UNITN - Siahaan 21
22 Searching an Optimized Policy Given two automata C and P representing resp. the formal specification of a contract and of a policy, we have an efficient IRM OptP derived from P with respect to C when: every APIs invoked by the intersection of OptP and C can also be invoked by P [sound] OptP is smaller than P with respect to C [optimal] STM09 - UNITN - Siahaan 22
23 Contract-Policy Example Contract Policy STM09 - UNITN - Siahaan 23
24 Removes non existing actions Contract Policy Optimize 1 Policy STM09 - UNITN - Siahaan 24
25 Removes already promised actions Contract Optimize 1 Policy Optimize 2 Policy STM09 - UNITN - Siahaan 25
26 Future Work Implementation and study of IRM with or without optimization c pre cost c c opt t pre t dep time t use c.t use >> c pre.(t pre + t dep ) + c opt.(t use (t pre + t dep )) Assumption: t use >> t pre t us >> t dep STM09 - UNITN - Siahaan 26
27 Future Work Effect of changes both in frequency (how often a code modified) and size (how much a code modified). c pre cost c c opt t pre t dep t use t pre t dep t use time c.t use?? c pre.(t pre + t dep ) + c opt.(t use (t pre + t dep )) STM09 - UNITN - Siahaan 27
28 Thank you STM09 - UNITN - Siahaan 28
A Security Architecture for Web 2.0 Applications
Towards the Future Internet G. Tselentis et al. (Eds.) IOS Press, 2009 2009 The authors and IOS Press. All rights reserved. doi:10.3233/978-1-60750-007-0-35 35 A Security Architecture for Web 2.0 Applications
How Program Monitors Enforce Non-Safety
Enforcing Non-safety Security Policies with Program Monitors Jay Ligatti 1,LujoBauer 2,andDavidWalker 1 1 Department of Computer Science, Princeton University 2 CyLab, Carnegie Mellon University Abstract.
A Runtime Monitoring Environment for Mobile Java
A Runtime Monitoring Environment for Mobile Java Fabio Martinelli Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche Pisa, Italy [email protected] Thomas Quillinan Vrije
Enforcing Security Policies. Rahul Gera
Enforcing Security Policies Rahul Gera Brief overview Security policies and Execution Monitoring. Policies that can be enforced using EM. An automata based formalism for specifying those security policies.
Software Engineering using Formal Methods
Software Engineering using Formal Methods Model Checking with Temporal Logic Wolfgang Ahrendt 24th September 2013 SEFM: Model Checking with Temporal Logic /GU 130924 1 / 33 Model Checking with Spin model
Run-Time Monitors and Security Policy
Enforcing More with Less: Formalizing Target-aware Run-time Monitors Yannis Mallios 1, Lujo Bauer 1, Dilsun Kaynar 1, and Jay Ligatti 2 1 Carnegie Mellon University, Pittsburgh, USA {mallios,lbauer,dilsunk}@cmu.edu
Provably Correct Inline Monitoring for. Multithreaded Java-like Programs
Provably Correct Inline Monitoring for Multithreaded Java-like Programs Mads Dam ACCESS Linnaeus Centre Royal Institute of Technology (KTH), Sweden [email protected] +46 8 790 6229 Bart Jacobs Katholieke Universiteit
The Model Checker SPIN
The Model Checker SPIN Author: Gerard J. Holzmann Presented By: Maulik Patel Outline Introduction Structure Foundation Algorithms Memory management Example/Demo SPIN-Introduction Introduction SPIN (Simple(
Computability Classes for Enforcement Mechanisms*
Computability Classes for Enforcement Mechanisms* KEVIN W. HAMLEN Cornell University GREG MORRISETT Harvard University and FRED B. SCHNEIDER Cornell University A precise characterization of those security
Fundamentals of Software Engineering
Fundamentals of Software Engineering Model Checking with Temporal Logic Ina Schaefer Institute for Software Systems Engineering TU Braunschweig, Germany Slides by Wolfgang Ahrendt, Richard Bubel, Reiner
The Advantages of Using an Inliner
Under consideration for publication in Math. Struct. in Comp. Science Security Monitor Inlining and Certification for Multithreaded Java M A D S D A M 1, B A R T J A C O B S 2, A N D R E A S L U N D B
History-based Access Control with Local Policies
Fossacs 05 p.1 History-based Access Control with Local Policies Massimo Bartoletti Pierpaolo Degano Gian-Luigi Ferrari Dipartimento di Informatica, Università di Pisa Fossacs 05 p.2 Mobile code security
Habanero Extreme Scale Software Research Project
Habanero Extreme Scale Software Research Project Comp215: Java Method Dispatch Zoran Budimlić (Rice University) Always remember that you are absolutely unique. Just like everyone else. - Margaret Mead
Formal Verification by Model Checking
Formal Verification by Model Checking Natasha Sharygina Carnegie Mellon University Guest Lectures at the Analysis of Software Artifacts Class, Spring 2005 1 Outline Lecture 1: Overview of Model Checking
ARIZONA CTE CAREER PREPARATION STANDARDS & MEASUREMENT CRITERIA SOFTWARE DEVELOPMENT, 15.1200.40
SOFTWARE DEVELOPMENT, 15.1200.40 1.0 APPLY PROBLEM-SOLVING AND CRITICAL THINKING SKILLS TO INFORMATION TECHNOLOGY 1.1 Describe methods and considerations for prioritizing and scheduling software development
Formal Verification of Software
Formal Verification of Software Sabine Broda Department of Computer Science/FCUP 12 de Novembro de 2014 Sabine Broda (DCC-FCUP) Formal Verification of Software 12 de Novembro de 2014 1 / 26 Formal Verification
Driving force. What future software needs. Potential research topics
Improving Software Robustness and Efficiency Driving force Processor core clock speed reach practical limit ~4GHz (power issue) Percentage of sustainable # of active transistors decrease; Increase in #
TPCalc : a throughput calculator for computer architecture studies
TPCalc : a throughput calculator for computer architecture studies Pierre Michaud Stijn Eyerman Wouter Rogiest IRISA/INRIA Ghent University Ghent University [email protected] [email protected]
Algorithmic Software Verification
Algorithmic Software Verification (LTL Model Checking) Azadeh Farzan What is Verification Anyway? Proving (in a formal way) that program satisfies a specification written in a logical language. Formal
Today s Agenda. Automata and Logic. Quiz 4 Temporal Logic. Introduction Buchi Automata Linear Time Logic Summary
Today s Agenda Quiz 4 Temporal Logic Formal Methods in Software Engineering 1 Automata and Logic Introduction Buchi Automata Linear Time Logic Summary Formal Methods in Software Engineering 2 1 Buchi Automata
Jieh Hsiang Department of Computer Science State University of New York Stony brook, NY 11794
ASSOCIATIVE-COMMUTATIVE REWRITING* Nachum Dershowitz University of Illinois Urbana, IL 61801 N. Alan Josephson University of Illinois Urbana, IL 01801 Jieh Hsiang State University of New York Stony brook,
Software Model Checking: Theory and Practice
Software Model Checking: Theory and Practice Lecture: Specification Checking - LTL Model Checking Copyright 2004, Matt Dwyer, John Hatcliff, and Robby. The syllabus and all lectures for this course are
An Exception Monitoring System for Java
An Exception Monitoring System for Java Heejung Ohe and Byeong-Mo Chang Department of Computer Science, Sookmyung Women s University, Seoul 140-742, Korea {lutino, [email protected] Abstract. Exception
T-79.186 Reactive Systems: Introduction and Finite State Automata
T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software
CORRELATED TO THE SOUTH CAROLINA COLLEGE AND CAREER-READY FOUNDATIONS IN ALGEBRA
We Can Early Learning Curriculum PreK Grades 8 12 INSIDE ALGEBRA, GRADES 8 12 CORRELATED TO THE SOUTH CAROLINA COLLEGE AND CAREER-READY FOUNDATIONS IN ALGEBRA April 2016 www.voyagersopris.com Mathematical
Regression Verification: Status Report
Regression Verification: Status Report Presentation by Dennis Felsing within the Projektgruppe Formale Methoden der Softwareentwicklung 2013-12-11 1/22 Introduction How to prevent regressions in software
A Service-oriented Approach to Mobile Code Security
Procedia Computer Science 00 (2011) 000 000 Procedia Computer Science The 8 th International Conference on Mobile Web Information Systems (MobiWIS) A Service-oriented Approach to Mobile Code Security Micah
GameTime: A Toolkit for Timing Analysis of Software
GameTime: A Toolkit for Timing Analysis of Software Sanjit A. Seshia and Jonathan Kotker EECS Department, UC Berkeley {sseshia,jamhoot}@eecs.berkeley.edu Abstract. Timing analysis is a key step in the
Using Patterns and Composite Propositions to Automate the Generation of Complex LTL
University of Texas at El Paso DigitalCommons@UTEP Departmental Technical Reports (CS) Department of Computer Science 8-1-2007 Using Patterns and Composite Propositions to Automate the Generation of Complex
A Thread Monitoring System for Multithreaded Java Programs
A Thread Monitoring System for Multithreaded Java Programs Sewon Moon and Byeong-Mo Chang Department of Computer Science Sookmyung Women s University, Seoul 140-742, Korea [email protected], [email protected]
A Classification of Model Checking-based Verification Approaches for Software Models
A Classification of Model Checking-based Verification Approaches for Software Models Petra Brosch, Sebastian Gabmeyer, Martina Seidl Sebastian Gabmeyer Business Informatics Group Institute of Software
South Carolina College- and Career-Ready (SCCCR) Algebra 1
South Carolina College- and Career-Ready (SCCCR) Algebra 1 South Carolina College- and Career-Ready Mathematical Process Standards The South Carolina College- and Career-Ready (SCCCR) Mathematical Process
Runtime Verification for Real-Time Automotive Embedded Software
Runtime Verification for Real-Time Automotive Embedded Software S. Cotard, S. Faucou, J.-L. Béchennec, A. Queudet, Y. Trinquet 10th school of Modelling and Verifying Parallel processes (MOVEP) Runtime
Fabio Patrizi DIS Sapienza - University of Rome
Fabio Patrizi DIS Sapienza - University of Rome Overview Introduction to Services The Composition Problem Two frameworks for composition: Non data-aware services Data-aware services Conclusion & Research
Objects for lexical analysis
Rochester Institute of Technology RIT Scholar Works Articles 2002 Objects for lexical analysis Bernd Kuhl Axel-Tobias Schreiner Follow this and additional works at: http://scholarworks.rit.edu/article
Unified Static and Runtime Verification of Object-Oriented Software
Unified Static and Runtime Verification of Object-Oriented Software Wolfgang Ahrendt 1, Mauricio Chimento 1, Gerardo Schneider 2, Gordon J. Pace 3 1 Chalmers University of Technology, Gothenburg, Sweden
INF5140: Specification and Verification of Parallel Systems
INF5140: Specification and Verification of Parallel Systems Lecture 7 LTL into Automata and Introduction to Promela Gerardo Schneider Department of Informatics University of Oslo INF5140, Spring 2007 Gerardo
AP Computer Science AB Syllabus 1
AP Computer Science AB Syllabus 1 Course Resources Java Software Solutions for AP Computer Science, J. Lewis, W. Loftus, and C. Cocking, First Edition, 2004, Prentice Hall. Video: Sorting Out Sorting,
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
Reconfigurable Architecture Requirements for Co-Designed Virtual Machines
Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Kenneth B. Kent University of New Brunswick Faculty of Computer Science Fredericton, New Brunswick, Canada [email protected] Micaela Serra
Security Monitor Inlining for Multithreaded Java
Security Monitor Inlining for Multithreaded Java Mads Dam 1, Bart Jacobs 2, Andreas Lundblad 1, and Frank Piessens 2 1 KTH, Sweden {mfd,landreas}@kth.se 2 K.U.Leuven, Belgium {bartj,frank}@cs.kuleuven.be
Formal Verification Toolkit for Requirements and Early Design Stages
Formal Verification Toolkit for Requirements and Early Design Stages Julia M. Badger 1 and Sheena Judson Miller 2 1 NASA Johnson Space Center, Houston, TX 77058, USA 2 Barrios Technology, Houston, TX 77058,
Virtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
Towards Software Configuration Management for Test-Driven Development
Towards Software Configuration Management for Test-Driven Development Tammo Freese OFFIS, Escherweg 2, 26121 Oldenburg, Germany [email protected] Abstract. Test-Driven Development is a technique where
Chapter 2 Addendum (More on Virtualization)
Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)
Cassandra. References:
Cassandra References: Becker, Moritz; Sewell, Peter. Cassandra: Flexible Trust Management, Applied to Electronic Health Records. 2004. Li, Ninghui; Mitchell, John. Datalog with Constraints: A Foundation
Pushing the Envelope of Optimization Modulo Theories with Linear-Arithmetic Cost Functions
Pushing the Envelope of Optimization Modulo Theories with Linear-Arithmetic Cost Functions Roberto Sebastiani and Patrick Trentin DISI, University of Trento, Italy Abstract. In the last decade we have
StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java
StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java Jesús Mauricio Chimento 1, Wolfgang Ahrendt 1, Gordon J. Pace 2, and Gerardo Schneider 3 1 Chalmers University of Technology, Sweden.
Monitoring Metric First-order Temporal Properties
Monitoring Metric First-order Temporal Properties DAVID BASIN, FELIX KLAEDTKE, SAMUEL MÜLLER, and EUGEN ZĂLINESCU, ETH Zurich Runtime monitoring is a general approach to verifying system properties at
Algebra Unpacked Content For the new Common Core standards that will be effective in all North Carolina schools in the 2012-13 school year.
This document is designed to help North Carolina educators teach the Common Core (Standard Course of Study). NCDPI staff are continually updating and improving these tools to better serve teachers. Algebra
Automated Program Behavior Analysis
Automated Program Behavior Analysis Stacy Prowell [email protected] March 2005 SQRL / SEI Motivation: Semantics Development: Most engineering designs are subjected to extensive analysis; software is
Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries
First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as
ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises
ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises Daniel Baudisch, Manuel Gesell and Klaus Schneider Embedded Systems Group, University of Kaiserslautern,
A System for Interactive Authorization for Business Processes for Web Services
A System for Interactive Authorization for Business Processes for Web Services Hristo Koshutanski and Fabio Massacci Dip. di Informatica e Telecomunicazioni - Univ. di Trento via Sommarive 14-38050 Povo
Trustworthy Software Systems
Trustworthy Software Systems Greg Morrisett Cutting Professor of Computer Science School of Engineering & Applied Sciences Harvard University Little about me Research & Teaching Compilers, Languages, Formal
This unit will lay the groundwork for later units where the students will extend this knowledge to quadratic and exponential functions.
Algebra I Overview View unit yearlong overview here Many of the concepts presented in Algebra I are progressions of concepts that were introduced in grades 6 through 8. The content presented in this course
Integrating Formal Models into the Programming Languages Course
Integrating Formal Models into the Programming Languages Course Allen B. Tucker Robert E. Noonan Computer Science Department Computer Science Department Bowdoin College College of William and Mary Brunswick,
Automata Theory. Şubat 2006 Tuğrul Yılmaz Ankara Üniversitesi
Automata Theory Automata theory is the study of abstract computing devices. A. M. Turing studied an abstract machine that had all the capabilities of today s computers. Turing s goal was to describe the
Third Party Data Session Control in the Evolved Packet System
Third Party Data Session Control in the Evolved Packet System EVELINA PENCHEVA Faculty of Telecommunications Technical University of Sofia 8 Kliment Ohridski blvd., 1000 Sofia BULGARIA [email protected]
TATJA: A Test Automation Tool for Java Applets
TATJA: A Test Automation Tool for Java Applets Matthew Xuereb 19, Sanctuary Street, San Ġwann [email protected] Abstract Although there are some very good tools to test Web Applications, such tools neglect
A Theory of Secure Control Flow
A Theory of Secure Control Flow Martín Abadi 1, Mihai Budiu 2, Úlfar Erlingsson2, and Jay Ligatti 3 1 Computer Science Department, University of California, Santa Cruz 2 Microsoft Research, Silicon Valley
Software Verification: Infinite-State Model Checking and Static Program
Software Verification: Infinite-State Model Checking and Static Program Analysis Dagstuhl Seminar 06081 February 19 24, 2006 Parosh Abdulla 1, Ahmed Bouajjani 2, and Markus Müller-Olm 3 1 Uppsala Universitet,
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people
6.080/6.089 GITCS Feb 12, 2008. Lecture 3
6.8/6.89 GITCS Feb 2, 28 Lecturer: Scott Aaronson Lecture 3 Scribe: Adam Rogal Administrivia. Scribe notes The purpose of scribe notes is to transcribe our lectures. Although I have formal notes of my
Automated Formal Analysis of Internet Routing Systems
Automated Formal Analysis of Internet Routing Systems Boon Thau Loo University of Pennsylvania [Joint work with Anduo Wang (Penn -> UIUC), Wenchao Zhou (Georgetown), Andre Scedrov (Penn), Limin Jia (CMU),
Model checking test models. Author: Kevin de Berk Supervisors: Prof. dr. Wan Fokkink, dr. ir. Machiel van der Bijl
Model checking test models Author: Kevin de Berk Supervisors: Prof. dr. Wan Fokkink, dr. ir. Machiel van der Bijl February 14, 2014 Abstract This thesis is about model checking testing models. These testing
Model Checking based Software Verification
Model Checking based Software Verification 18.5-2006 Keijo Heljanko [email protected] Department of Computer Science and Engineering Helsinki University of Technology http://www.tcs.tkk.fi/~kepa/ 1/24
Winter 2016 Course Timetable. Legend: TIME: M = Monday T = Tuesday W = Wednesday R = Thursday F = Friday BREATH: M = Methodology: RA = Research Area
Winter 2016 Course Timetable Legend: TIME: M = Monday T = Tuesday W = Wednesday R = Thursday F = Friday BREATH: M = Methodology: RA = Research Area Please note: Times listed in parentheses refer to the
CSC4510 AUTOMATA 2.1 Finite Automata: Examples and D efinitions Definitions
CSC45 AUTOMATA 2. Finite Automata: Examples and Definitions Finite Automata: Examples and Definitions A finite automaton is a simple type of computer. Itsoutputislimitedto yes to or no. It has very primitive
Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection
Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection Martin Leucker Technische Universität München (joint work with Andreas Bauer, Christian Schallhart et. al) FLACOS
Thomas Jefferson High School for Science and Technology Program of Studies Foundations of Computer Science. Unit of Study / Textbook Correlation
Thomas Jefferson High School for Science and Technology Program of Studies Foundations of Computer Science updated 03/08/2012 Unit 1: JKarel 8 weeks http://www.fcps.edu/is/pos/documents/hs/compsci.htm
DNA Data and Program Representation. Alexandre David 1.2.05 [email protected]
DNA Data and Program Representation Alexandre David 1.2.05 [email protected] Introduction Very important to understand how data is represented. operations limits precision Digital logic built on 2-valued
Attack graph analysis using parallel algorithm
Attack graph analysis using parallel algorithm Dr. Jamali Mohammad ([email protected]) Ashraf Vahid, MA student of computer software, Shabestar Azad University ([email protected]) Ashraf Vida, MA
Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
End-to-end Web Application Security
End-to-end Web Application Security Úlfar Erlingsson Benjamin Livshits Microsoft Research Yinglian Xie Abstract Web applications are important, ubiquitous distributed systems whose current security relies
Automating Mimicry Attacks Using Static Binary Analysis
Automating Mimicry Attacks Using Static Binary Analysis Christopher Kruegel and Engin Kirda Technical University Vienna [email protected], [email protected] Darren Mutz, William Robertson,
Datavetenskapligt Program (kandidat) Computer Science Programme (master)
Datavetenskapligt Program (kandidat) Computer Science Programme (master) Wolfgang Ahrendt Director Datavetenskap (BSc), Computer Science (MSc) D&IT Göteborg University, 30/01/2009 Part I D&IT: Computer
Rigorous Software Development CSCI-GA 3033-009
Rigorous Software Development CSCI-GA 3033-009 Instructor: Thomas Wies Spring 2013 Lecture 5 Disclaimer. These notes are derived from notes originally developed by Joseph Kiniry, Gary Leavens, Erik Poll,
µz An Efficient Engine for Fixed points with Constraints
µz An Efficient Engine for Fixed points with Constraints Kryštof Hoder, Nikolaj Bjørner, and Leonardo de Moura Manchester University and Microsoft Research Abstract. The µz tool is a scalable, efficient
