Cyber & formal methods publications
-
Deductive Synthesis of the Unification Algorithm: The Automation of Introspection
We are working to create the first automatic deductive synthesis of a unification algorithm. The program is extracted from a proof of the existence of an output substitution that satisfies a given logical specification.
-
Semantic Instrumentation of Virtual Environments for Training
We discuss an approach in which the virtual environment is semantically instrumented in order to allow for the tracking of and reasoning about open-ended learner activity therein.
-
Diagnosis cloud: Sharing knowledge across cellular networks
This paper presents a novel diagnosis cloud framework that enables the extraction and transfer of knowledge from one network to another. It also presents use cases and requirements. We present the implementation details of the diagnosis cloud framework for two specific types of models: topic models and Markov Logic Networks (MLNs).
-
Keys Under Doormats
In this report, a group of computer scientists and security experts, many of whom participated in a 1997 study of these same topics, has convened to explore the likely effects of imposing extraordinary access mandates.
-
Machine Learning Models and Pathway Genome Data Base for Trypanosoma cruzi Drug Discovery
We have demonstrated how combining chemoinformatics and bioinformatics for T. cruzi drug discovery can bring interesting in vivo active molecules to light that may have been overlooked.
-
Weakness in Depth: A Voting Machine’s Demise
Virginia’s government recently examined the AVS WinVote and learned that the vulnerabilities are more serious than any other voting system, allowing complete exploitation over a Wi-Fi network.
-
Discrete Vs. Dense Times in the Analysis of Cyber-Physical Security Protocols
This paper investigates the foundational differences and the impacts on the analysis when using models with discrete time and models with dense time.
-
The SRI AVEC-2014 Evaluation System
We explore a diverse set of features based only on spoken audio to understand which features correlate with self-reported depression scores according to the Beck depression rating scale.
-
Safety Envelope for Security
We present an approach for detecting sensor spoofing attacks on a cyber-physical system. Our approach consists of two steps. In the first step, we construct a safety envelope of the system. In the second step, we build an attack detector: a monitor that executes synchronously with the system and raises an alarm whenever the system state falls outside…
-
Large-Scale Analogical Reasoning
In this paper, relying on a well-curated biology KB, we present a specific implementation of comparison questions inspired by a general model of analogical reasoning.
-
A Distributed Logic for Networked Cyber-Physical Systems
We describe a distributed logical framework designed to serve as a declarative semantic foundation for Networked Cyber-Physical Systems.
-
Non-Linear Rewrite Closure and Weak Normalization
In this paper, we construct a rewrite closure for term rewrite systems that satisfy two properties: the right-hand side term in each rewrite rule contains no repeated variable (right-linear) and contains no variable at depth greater than one (right-shallow).