• Publications
  • Influence
Algorithmic specifications in linear logic with subexponentials
TLDR
This work shows that focused proof search can be precisely linked to a simple algorithmic specification language that contains while-loops, conditionals, and insertion into and deletion from multisets and proposes a new logical connective that allows for the creation of new subexponentials, thereby further augmenting the algorithmic expressiveness of logic.
Slow TCAM Exhaustion DDoS Attack
TLDR
This paper argues that existing defenses for saturation and TCAM exhaustion attacks are not able to mitigate Slow-TCAM due to its relatively low traffic rate, and proposes a novel defense called SIFT based on selective strategies demonstrating its effectiveness against the Slow- TCAM attack.
A Selective Defense for Application Layer DDoS Attacks
TLDR
This paper proposes a novel defense for Application Layer DDoS attacks (ADDoS) based on the Adaptive Selective Verification (ASV) defense used for mitigating Network LayerDDoS attacks and formalizes the defense mechanism in the computational system Maude and demonstrates that it can be used to prevent ADDoS.
A Framework for Proof Systems
TLDR
It is shown that by providing different polarizations within a focused proof system for linear logic, one can account for natural deduction, sequent proofs, and tableaux proofs.
Maintaining distributed logic programs incrementally
TLDR
This paper proposes an efficient asynchronous algorithm to compute incrementally the changes to the states in response to insertions and deletions of base facts, and presents the first formal proof of correctness for such an algorithm.
A General Proof System for Modalities in Concurrent Constraint Programming
TLDR
It is shown how a proper structure of the subexponential signature in SELL$^\Cap$ allows for the specification of concurrent systems with timed, spatial, and epistemic modalities, thus providing a proof-theoretic foundations for those calculi.
Abstract effects and proof-relevant logical relations
We give a denotational semantics for a region-based effect system that supports type abstraction in the sense that only externally visible effects need to be tracked: non-observable internal
A Framework for the Analysis of UAV Strategies Using Co-simulation
TLDR
A simulation environment that can execute flight plans in order to evaluate different strategies in uncertain scenarios is presented and it is possible to obtain results closer to reality, thus more efficient flight strategies can be developed and evaluate.
Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders
TLDR
This paper shows it is enough to use the same number of Timed Intruders as the number of participants, and reports on some preliminary experimental results in discovering attacks in CPSP.
A Framework for Analyzing Adaptive Autonomous Aerial Vehicles
TLDR
A formal framework where engineers can raise the confidence in their UAV specification by using symbolic, simulation and statistical and model checking methods and statistical model checking algorithms are used for the analysis of system behaviors.
...
...