Cyber-physical systems are processing large amounts of sensitive information, but are increasingly often becoming the target of cyber attacks. Thus, it is essential to verify the absence of unauthorized information flow at design time before the systems get deployed. Our paper addresses this problem by proposing a novel approach to model-check the information flow security of cyber-physical systems represented by timed automata. We describe the transformation into so-called test automata, reducing the verification to a reachability test that is carried out using the off-the-shelf model checker Uppaal. Opposed to related work, we analyze the real-time behavior of systems, allowing software engineers to precisely identify timing channels that...
Model-based anomaly detection approaches by now have established themselves in the field of engineer...
Guaranteeing timing properties is an important issue as we develop safety-critical real-time systems...
With the recent advances in communication and computation technologies, integration of software into...
Cyber-physical systems (CPS) are systems that are tight integration of computer programs as controll...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
As cyber-physical systems become more and more complex, human debugging is not sufficient anymore to...
Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human act...
Abstract. A new approach to verification of timed security protocols is given. The idea consists in ...
The behavior of practical safety critical systems often combines real-time behavior with structured ...
This work-in-progress paper proposes a design methodology that addresses the complexity and heteroge...
Since real-time systems often operate in safety-critical environments it is extremely important that...
The formal verification of a real-time system requires either a proof theoretic or model theoretic ...
Model checking is a technique to automatically analyse systems that have been modeled in a formal la...
. Model checking is emerging as a practical tool for automated debugging of complex reactive systems...
ABSTRACT: Defects in safety-critical software systems can cause large eco-nomical and other losses. ...
Model-based anomaly detection approaches by now have established themselves in the field of engineer...
Guaranteeing timing properties is an important issue as we develop safety-critical real-time systems...
With the recent advances in communication and computation technologies, integration of software into...
Cyber-physical systems (CPS) are systems that are tight integration of computer programs as controll...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
As cyber-physical systems become more and more complex, human debugging is not sufficient anymore to...
Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human act...
Abstract. A new approach to verification of timed security protocols is given. The idea consists in ...
The behavior of practical safety critical systems often combines real-time behavior with structured ...
This work-in-progress paper proposes a design methodology that addresses the complexity and heteroge...
Since real-time systems often operate in safety-critical environments it is extremely important that...
The formal verification of a real-time system requires either a proof theoretic or model theoretic ...
Model checking is a technique to automatically analyse systems that have been modeled in a formal la...
. Model checking is emerging as a practical tool for automated debugging of complex reactive systems...
ABSTRACT: Defects in safety-critical software systems can cause large eco-nomical and other losses. ...
Model-based anomaly detection approaches by now have established themselves in the field of engineer...
Guaranteeing timing properties is an important issue as we develop safety-critical real-time systems...
With the recent advances in communication and computation technologies, integration of software into...