Log auditing is a basic intrusion detection mechanism, whereby attacks are detected by uncovering matches of sequences of events against signatures. We argue that this is naturally expressed as a modelchecking problem against linear Kripke models. A variant of the classic linear time temporal logic of Manna and Pnueli with first-order variables is first investigated in this framework. But this logic is in dire need of refinement, as far as expressiveness and efficiency are concerned. We therefore propose a second, less standard logic consisting of flat, Wolper-style linear-time formulae. We describe an efficient on-line algorithm, making the approach attractive for complex log auditing tasks. We also present a few optimizations that the use...
Abstract. Over the past decade, malware costs more than $10 billion every year and the cost is still...
Abstract. This thesis is about the application of auto-mated reasoning techniques to the formal anal...
Abstract. While logging events is becoming increasingly common in computing, in communication and in...
Forensic examination of logs plays a big role in modern computer security. Due to the sheer amount o...
Fragments of first-order temporal logic are useful for representing many practical privacy and secu-...
Abstract. Fragments of first-order temporal logic are useful for repre-senting many practical privac...
Model checking is a powerful method widely explored in formal verification. Given a model of a syste...
<p>Fragments of first-order temporal logic are useful for representing many practical privacy and se...
Model checking is a powerful method widely explored in formal verification. Given a model of a syste...
Model checking allows one to automatically verify a specification of the expected properties of a sy...
Log files provide essential information regarding the actions of processes in critical computer sys...
Temporal logic model checking techniques are applied, in a natural way, to the analysis of the set o...
Model checking is a powerful method widely explored in formal verification to check the (state-trans...
Model checking is one of the most powerful and widespread tools for system verification with applica...
Abstract. Over the past decade, malware costs more than $10 billion every year and the cost is still...
Abstract. This thesis is about the application of auto-mated reasoning techniques to the formal anal...
Abstract. While logging events is becoming increasingly common in computing, in communication and in...
Forensic examination of logs plays a big role in modern computer security. Due to the sheer amount o...
Fragments of first-order temporal logic are useful for representing many practical privacy and secu-...
Abstract. Fragments of first-order temporal logic are useful for repre-senting many practical privac...
Model checking is a powerful method widely explored in formal verification. Given a model of a syste...
<p>Fragments of first-order temporal logic are useful for representing many practical privacy and se...
Model checking is a powerful method widely explored in formal verification. Given a model of a syste...
Model checking allows one to automatically verify a specification of the expected properties of a sy...
Log files provide essential information regarding the actions of processes in critical computer sys...
Temporal logic model checking techniques are applied, in a natural way, to the analysis of the set o...
Model checking is a powerful method widely explored in formal verification to check the (state-trans...
Model checking is one of the most powerful and widespread tools for system verification with applica...
Abstract. Over the past decade, malware costs more than $10 billion every year and the cost is still...
Abstract. This thesis is about the application of auto-mated reasoning techniques to the formal anal...
Abstract. While logging events is becoming increasingly common in computing, in communication and in...