Skip to main content

Showing 1–2 of 2 results for author: Whitefield, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:1704.07216  [pdf, other

    cs.CR

    Formal Analysis of V2X Revocation Protocols

    Authors: Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve Schneider, Helen Treharne, Stephan Wesemeyer

    Abstract: Research on vehicular networking (V2X) security has produced a range of security mechanisms and protocols tailored for this domain, addressing both security and privacy. Typically, the security analysis of these proposals has largely been informal. However, formal analysis can be used to expose flaws and ultimately provide a higher level of assurance in the protocols. This paper focusses on the… ▽ More

    Submitted 6 August, 2017; v1 submitted 24 April, 2017; originally announced April 2017.

    Comments: 16 pages, 4 figures

    ACM Class: D.2.4; D.4.6

  2. arXiv:1603.04401  [pdf, other

    cs.SE

    Symbolic Reachability Analysis of B through ProB and LTSmin

    Authors: Jens Bendisposto, Philipp Koerner, Michael Leuschel, Jeroen Meijer, Jaco van de Pol, Helen Treharne, Jorden Whitefield

    Abstract: We present a symbolic reachability analysis approach for B that can provide a significant speedup over traditional explicit state model checking. The symbolic analysis is implemented by linking ProB to LTSmin, a high-performance language independent model checker. The link is achieved via LTSmin's PINS interface, allowing ProB to benefit from LTSmin's analysis algorithms, while only writing a few… ▽ More

    Submitted 14 March, 2016; originally announced March 2016.