Load time security verification
O Gadyatskaya, E Lostal, F Massacci - … on Information Systems Security, 2011 - Springer
… This initiative requires an embedded verification … The Security-by-Contract approach for
loading time verification consists of two phases. During the first phase the loaded code is verified …
loading time verification consists of two phases. During the first phase the loaded code is verified …
Load Time Security Verification: The Claim Checker
O Gadyatskaya, E Lostal, F Massacci - 2011 - iris.unitn.it
… The Security-by-Contract approach for loading time verification consists of two phases. During
the first phase the loaded code is verified to … with the smart card security policy. The report …
the first phase the loaded code is verified to … with the smart card security policy. The report …
Analysis and run-time verification of dynamic security policies
… a security model that allows to express dynamic access control policies that can change on
time or … how existing tool-support can be used for the analysis and verification of policies. …
time or … how existing tool-support can be used for the analysis and verification of policies. …
DLSeF: A dynamic key-length-based efficient real-time security verification model for big data stream
… the online security verification by ensuring end-to-end security (eg, … a new solution for real-time
security verification (ie, confi… reducing the security computation time and buffer utilization. …
security verification (ie, confi… reducing the security computation time and buffer utilization. …
Towards Efficient Verification of Constant-Time Cryptographic Implementations
… of constant-time security and formalize our verification approach. … 2.2 Constant-time
Security In practice, execution time … ) accessed in load and store instructions, (4) time-variant …
Security In practice, execution time … ) accessed in load and store instructions, (4) time-variant …
Verification of authenticated firmware load
SK Muduli, P Subramanyan, S Ray - Cryptology ePrint Archive, 2019 - eprint.iacr.org
… security of authenticated load. • We introduce a hyperproperty that captures security of
authenticated load … decomposition of the security hyperproperty into two simpler-to-verify 2-safety …
authenticated load … decomposition of the security hyperproperty into two simpler-to-verify 2-safety …
Nonintrusive load-shed verification
… Micro Devices, where he works on design verification of x86 processors. His research
interests include large-scale simulation and power-grid security. Bergman has an MS in electrical …
interests include large-scale simulation and power-grid security. Bergman has an MS in electrical …
Developing an SDN security model (EnsureS) based on lightweight service path validation with batch hashing and tag verification
… We identify security weaknesses and rectify the reported security risks to develop a secure
service path for SDN with the least resource consumption. In the proposed model, every NF …
service path for SDN with the least resource consumption. In the proposed model, every NF …
Secure authentication and load balancing of distributed edge datacenters
… Section 3 describes the proposed solution for the secure and sustainable load balancing
of the EDCs. Section 4 presents the formal security analysis and verification of our model. …
of the EDCs. Section 4 presents the formal security analysis and verification of our model. …
Compositional verification for secure loading of smart card applets
… on the verification of security properties for an electronic purse, We refer the interested
reader to [ 121 for more details, including a more detailed motivation of why this kind of security …
reader to [ 121 for more details, including a more detailed motivation of why this kind of security …