From Lambda Calculus to Cybersecurity Through Program Analysis

From Lambda Calculus to Cybersecurity Through Program Analysis
Author: Alessandra Di Pierro
Publisher: Springer Nature
Total Pages: 300
Release: 2020-02-14
Genre: Mathematics
ISBN: 3030411036

This Festschrift is in honor of Chris Hankin, Professor at the Imperial College in London, UK, on the Occasion of His 65th Birthday. Chris Hankin is a Fellow of the Institute for Security Science and Technology and a Professor of Computing Science. His research is in cyber security, data analytics and semantics-based program analysis. He leads multidisciplinary projects focused on developing advanced visual analytics and providing better decision support to defend against cyber attacks. This Festschrift is a collection of scientific contributions related to the topics that have marked the research career of Professor Chris Hankin. The contributions have been written to honour Chris' career and on the occasion of his retirement.

From Lambda Calculus to Cybersecurity Through Program Analysis

From Lambda Calculus to Cybersecurity Through Program Analysis
Author:
Publisher:
Total Pages: 293
Release: 2020
Genre: Computer security
ISBN: 9783030411046

This Festschrift celebrates Chris Hankin's career and was written on the occasion of his retirement. The volume collects contributions from colleagues, collaborators, and friends on various research themes that have marked Chris career, namely Logic and Type Theory for Programming Languages; Program Analysis and Abstract Interpretation ; and Security, Privacy, and Cybersecurity. All these are areas in which Chris Hankin has made several important contributions including advances in semantics-based program analysis, probabilistic abstract interpretation, and cybersecurity for industrial control systems. Chris is also well known for co-authoring the book "Principles of Program Analysis", which is a popular reference for researchers and practitioners on static analysis techniques. He has led the Research Institute in Trustworthy Industrial Control Systems (RITICS) and the Institute for Security Science and Technology at Imperial College and contributed to several government initiatives

Software Engineering and Formal Methods

Software Engineering and Formal Methods
Author: Frank de Boer
Publisher: Springer Nature
Total Pages: 339
Release: 2020-09-11
Genre: Computers
ISBN: 3030587681

This book constitutes the refereed proceedings of the 18th International Conference on Software Engineering and Formal Methods, SEFM 2020, held in Amsterdam, The Netherlands, in September 2020. The 16 full papers presented together with 1 keynote talk and an abstract of a keynote talk were carefully reviewed and selected from 58 submissions. The papers cover a large variety of topics, including testing, formal verification, program analysis, runtime verification, meta-programming and software development and evolution. The papers address a wide range of systems, such as IoT systems, human-robot interaction in healthcare scenarios, navigation of maritime autonomous systems, and operating systems. The Chapters "Multi-Purpose Syntax Definition with SDF3", “FRed: Conditional Model Checking via Reducers and Folders" and "Difference Verification with Conditions” are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Trust, Privacy and Security in Digital Business

Trust, Privacy and Security in Digital Business
Author: Stefanos Gritzalis
Publisher: Springer Nature
Total Pages: 233
Release: 2020-09-13
Genre: Computers
ISBN: 3030589862

This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2020, held in Bratislava, Slovakia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 11 full and 4 short papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: blockchain, cloud security/hardware; economics/privacy; human aspects; privacy; privacy and machine learning; trust.

Challenges of Software Verification

Challenges of Software Verification
Author: Vincenzo Arceri
Publisher: Springer Nature
Total Pages: 275
Release: 2023-09-04
Genre: Technology & Engineering
ISBN: 9811996016

This book provides an overview about the open challenges in software verification. Software verification is a branch of software engineering aiming at guaranteeing that software applications satisfy some requirements of interest. Over the years, the software verification community has proposed and considered several techniques: abstract interpretation, data-flow analysis, type systems, model checking are just a few examples. The theoretical advances have been always motivated by practical challenges that have led to an equal evolution of both these sides of software verification. Indeed, several verification tools have been proposed by the research community and any software application, in order to guarantee that certain software requirements are met, needs to integrate a verification phase in its life cycle, independently of the context of application or software size. This book is aimed at collecting contributions discussing recent advances in facing open challenges in software verification, relying on a broad spectrum of verification techniques. This book collects contributions ranging from theoretical to practical arguments, and it is aimed at both researchers in software verification and their practitioners.

Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles

Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles
Author: Tiziana Margaria
Publisher: Springer Nature
Total Pages: 556
Release: 2020-10-26
Genre: Computers
ISBN: 3030614700

The three-volume set LNCS 12476 - 12478 constitutes the refereed proceedings of the 9th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2020, which was planned to take place during October 20–30, 2020, on Rhodes, Greece. The event itself was postponed to 2021 due to the COVID-19 pandemic. The papers presented were carefully reviewed and selected for inclusion in the proceedings. Each volume focusses on an individual topic with topical section headings within the volume: Part I, Verification Principles: Modularity and (De-)Composition in Verification; X-by-Construction: Correctness meets Probability; 30 Years of Statistical Model Checking; Verification and Validation of Concurrent and Distributed Systems. Part II, Engineering Principles: Automating Software Re-Engineering; Rigorous Engineering of Collective Adaptive Systems. Part III, Applications: Reliable Smart Contracts: State-of-the-art, Applications, Challenges and Future Directions; Automated Verification of Embedded Control Software; Formal methods for DIStributed COmputing in future RAILway systems.

Integrated Formal Methods

Integrated Formal Methods
Author: Maurice H. ter Beek
Publisher: Springer Nature
Total Pages: 372
Release: 2022-06-01
Genre: Computers
ISBN: 303107727X

This book constitutes the refereed proceedings of the 17th International Conference on Integrated Formal Methods, IFM 2022, held in Lugano, Switzerland, in June 2022. The 14 full papers and 2 short papers were carefully reviewed and selected from 46 submissions. The papers are categorized into the following topical sub-headings: Invited Papers; Cooperative and Relational Verification; B Method; Time; Probability; learning and Synthesis; Security; Stats Analysis and Testing; PhD Symposium Presentations.

Protocols, Strands, and Logic

Protocols, Strands, and Logic
Author: Daniel Dougherty
Publisher: Springer Nature
Total Pages: 435
Release: 2021-11-18
Genre: Computers
ISBN: 3030916316

This Festschrift was published in honor of Joshua Guttman on the occasion of his 66.66 birthday. The impact of his work is reflected in the 23 contributions enclosed in this volume. Joshua’s most influential and enduring contribution to the field has been the development of the strand space formalism for analyzing cryptographic protocols. It is one of several “symbolic approaches” to security protocol analysis in which the underlying details of cryptographic primitives are abstracted away, allowing a focus on potential flaws in the communication patterns between participants. His attention to the underlying logic of strand spaces has also allowed him to merge domain-specific reasoning about protocols with general purpose, first-order logical theories. The identification of clear principles in a domain paves the way to automated reasoning, and Joshua has been a leader in the development and distribution of several tools for security analysis.

Static Analysis

Static Analysis
Author: Gagandeep Singh
Publisher: Springer Nature
Total Pages: 482
Release: 2022-12-01
Genre: Computers
ISBN: 303122308X

This book constitutes the refereed proceedings of the 29th International Symposium on Static Analysis, SAS 2022, held in Auckland, New Zealand, in December 2022. The 18 full papers included in this book were carefully reviewed and selected from 43 submissions. Static analysis is widely recognized as a fundamental tool for program verification, bug detection, compiler optimization, program understanding, and software maintenance. The papers deal with theoretical, practical and application advances in the area.

Introduction to Embedded Systems, Second Edition

Introduction to Embedded Systems, Second Edition
Author: Edward Ashford Lee
Publisher: MIT Press
Total Pages: 562
Release: 2017-01-06
Genre: Computers
ISBN: 0262340526

An introduction to the engineering principles of embedded systems, with a focus on modeling, design, and analysis of cyber-physical systems. The most visible use of computers and software is processing information for human consumption. The vast majority of computers in use, however, are much less visible. They run the engine, brakes, seatbelts, airbag, and audio system in your car. They digitally encode your voice and construct a radio signal to send it from your cell phone to a base station. They command robots on a factory floor, power generation in a power plant, processes in a chemical plant, and traffic lights in a city. These less visible computers are called embedded systems, and the software they run is called embedded software. The principal challenges in designing and analyzing embedded systems stem from their interaction with physical processes. This book takes a cyber-physical approach to embedded systems, introducing the engineering concepts underlying embedded systems as a technology and as a subject of study. The focus is on modeling, design, and analysis of cyber-physical systems, which integrate computation, networking, and physical processes. The second edition offers two new chapters, several new exercises, and other improvements. The book can be used as a textbook at the advanced undergraduate or introductory graduate level and as a professional reference for practicing engineers and computer scientists. Readers should have some familiarity with machine structures, computer programming, basic discrete mathematics and algorithms, and signals and systems.