Found 184 results
"Shadow: Running Tor in a Box for Accurate and Efficient Experimentation", Symposium on Network and Distributed System Security (NDSS), 2012.
"Strong, Scalable Anonymity in Dissent", Tenth USENIX Symposium on Operating Systems Design and Implementation (OSDI '12), 2012.
"Throttling Tor Bandwidth Parasites", USENIX Security Symposium, 2012.
"Truth-based Anonymous Communication: Adversary Models and Routing Algorithms", Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), 2011.
"Preventing Active Timing Attacks in Low-Latency Anonymous Communication (Extended Abstract)", 10th Privacy Enhancing Technologies Symposium (PETS 2010), 2010.
"A Formal Method for Developing Provably Correct Fault-Tolerant Systems Using Partial Refinement and Composition", Formal Methods, Second World Congress (FM 2009), Eindhoven, The Netherlands, pp. 173-189, 2009.
"More Anonymous Onion Routing Through Trust", 22nd IEEE Computer Security Foundations Symposium (CSF 2009), 2009.
"On the Role of Formal Methods in Software Certification: An Experience Report", Electronic Notes in Theoretical Computer Science , vol. 238, issue 4, pp. 3-9, 2009.
"Analysis and Reduction of Embedding Error for a Semi-Reversible Image Authentication Watermark", IASTED Telehealth/AT 2008, Baltimore, Maryland, ACTA Press, 2008.
"Applying Formal Methods to a Certifiably Secure Software System", IEEE Transactions on Software Engineering, vol. 34, issue 1, pp. 82-98, 2008.
"Applying Infinite State Model Checking and Other Analysis Techniques to Tabular Requirements Specifications of Safety-Critical Systems", Design Automation for Embedded Systems, vol. 12, issue 1-2, pp. 97-137, 2008.
"Applying a Formal Requirements Method to Three NASA Systems: Lessons Learned", 2007 IEEE Aerospace Conference, Big Sky, Montana, 2007.
"Deploying Low-Latency Anonymity: Design Challenges and Social Factors", IEEE Security & Privacy, vol. 5, issue 5, pp. 83-87, 2007.
"Formal Methods for Specifying, Validating, and Verifying Requirements", Journal of Computer Science, vol. 13, issue 5, pp. 607-618, 2007.
"Improving Efficiency and Simplicity of Tor circuit establishment and hidden services", 2007 Privacy Enhancing Technologies Symposium, vol. LNCS 4776, 2007.
"A Model of Onion Routing with Provable Anonymity", Financial Cryptography and Data Security, 11th International Conference, FC 2007, 2007.
"Probabilistic Analysis of Onion Routing in a Black-box Model [Extended Abstract]", WPES'07: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society: ACM Press, pp. 1-10, 2007.
"RE Theory Meets Software Practice: Lessons from the Software Development Trenches", 15th IEEE International Requirements Engineering Conference, New Delhi, India, pp. 265-268, 2007.
A Unified Specification of Behavior for Requirements and Design, , no. NRL/MR/5540--007-9094, Washington, D.C., Naval Research Laboratory, 2007.
"Analyzing Tabular Requirements Specifications Using Infinite State Model Checking", Fourth ACM-IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE'06), Napa, California, 2006.
"Establishing High Confidence in Code Implementations of Algorithms using Formal Verification of Pseudocode", Proceedings of VERIFY'06, The Third International Verification Workshop, Seattle, Washington, 2006.
"Formal specification and verification of data separation in a separation kernel for an embedded system", 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, Virginia, pp. 346-355, 2006.
"Generating Optimized Code from SCR Specifications", ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES 2006), Ottawa, Canada, 2006.
"Locating Hidden Servers", IEEE Symposium on Security and Privacy, Oakland, California, IEEE Computer Society Press, 2006.
"Model-Driven Agile Development of Reactive Multi-Agent Systems", 30th Annual International Computer Software and Applications Conference (COMPSAC 2006), Chicago, Illinois, 2006.