Load time security verification

O Gadyatskaya, E Lostal, F Massacci - … on Information Systems Security, 2011 - Springer
… This initiative requires an embedded verification … The Security-by-Contract approach for
loading time verification consists of two phases. During the first phase the loaded code is verified

Load Time Security Verification: The Claim Checker

O Gadyatskaya, E Lostal, F Massacci - 2011 - iris.unitn.it
… The Security-by-Contract approach for loading time verification consists of two phases. During
the first phase the loaded code is verified to … with the smart card security policy. The report …

Analysis and run-time verification of dynamic security policies

H Janicke, F Siewe, K Jones, A Cau… - International Workshop on …, 2005 - Springer
… a security model that allows to express dynamic access control policies that can change on
time or … how existing tool-support can be used for the analysis and verification of policies. …

DLSeF: A dynamic key-length-based efficient real-time security verification model for big data stream

D Puthal, S Nepal, R Ranjan, J Chen - ACM Transactions on Embedded …, 2016 - dl.acm.org
… the online security verification by ensuring end-to-end security (eg, … a new solution for real-time
security verification (ie, confi… reducing the security computation time and buffer utilization. …

Towards Efficient Verification of Constant-Time Cryptographic Implementations

L Cai, F Song, T Chen - Proceedings of the ACM on Software …, 2024 - dl.acm.org
… of constant-time security and formalize our verification approach. … 2.2 Constant-time
Security In practice, execution time … ) accessed in load and store instructions, (4) time-variant …

Verification of authenticated firmware load

SK Muduli, P Subramanyan, S Ray - Cryptology ePrint Archive, 2019 - eprint.iacr.org
security of authenticated load. • We introduce a hyperproperty that captures security of
authenticated load … decomposition of the security hyperproperty into two simpler-to-verify 2-safety …

Nonintrusive load-shed verification

D Bergman, D Jin, J Juen, N Tanaka… - IEEE Pervasive …, 2010 - ieeexplore.ieee.org
… Micro Devices, where he works on design verification of x86 processors. His research
interests include large-scale simulation and power-grid security. Bergman has an MS in electrical …

Developing an SDN security model (EnsureS) based on lightweight service path validation with batch hashing and tag verification

S Pradeep, YK Sharma, UK Lilhore, S Simaiya… - Scientific Reports, 2023 - nature.com
… We identify security weaknesses and rectify the reported security risks to develop a secure
service path for SDN with the least resource consumption. In the proposed model, every NF …

Secure authentication and load balancing of distributed edge datacenters

D Puthal, R Ranjan, A Nanda, P Nanda… - Journal of Parallel and …, 2019 - Elsevier
… Section 3 describes the proposed solution for the secure and sustainable load balancing
of the EDCs. Section 4 presents the formal security analysis and verification of our model. …

Compositional verification for secure loading of smart card applets

C Sprenger, D Gurov, M Huisman - Proceedings. Second ACM …, 2004 - ieeexplore.ieee.org
… on the verification of security properties for an electronic purse, We refer the interested
reader to [ 121 for more details, including a more detailed motivation of why this kind of security