Systematic classification of attackers via bounded model checking
In this work, we study the problem of verification of systems in the presence of attackers using bounded model checking. Given a system and a set of security requirements, we present a methodology to generate and classify attackers, mapping them to the set of requirements that they can break. A naiv...
Saved in:
Main Authors: | ROTHSTEIN-MORRIS, Eric, SUN, Jun, CHATTOPADYAY, Sudipta |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2020
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4634 https://ink.library.smu.edu.sg/context/sis_research/article/5637/viewcontent/1911.05808.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Mitigating membership inference attacks via weighted smoothing
by: TAN, Minghan, et al.
Published: (2023) -
Verifying neural networks against backdoor attacks
by: PHAM, Long Hong, et al.
Published: (2022) -
A generalised bound for the Wiener attack on RSA
by: SUSILO, Willy, et al.
Published: (2020) -
Identifying phases of a multistage attack via clustering
by: Gomez, Miguel Alberto N.
Published: (2011) -
Bounded model checking of compositional processes
by: SUN, Jun, et al.
Published: (2008)