Systematic classification of attackers via bounded model checking

In this work, we study the problem of verification of systems in the presence of attackers using bounded model checking. Given a system and a set of security requirements, we present a methodology to generate and classify attackers, mapping them to the set of requirements that they can break. A naiv...

全面介紹

Saved in:
書目詳細資料
Main Authors: ROTHSTEIN-MORRIS, Eric, SUN, Jun, CHATTOPADYAY, Sudipta
格式: text
語言:English
出版: Institutional Knowledge at Singapore Management University 2020
主題:
在線閱讀:https://ink.library.smu.edu.sg/sis_research/4634
https://ink.library.smu.edu.sg/context/sis_research/article/5637/viewcontent/1911.05808.pdf
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!