Applying the Isabelle Insider Framework to Airplane Security

[1]  Florian Kammuller,et al.  A Formal Development Cycle for Security Engineering in Isabelle , 2020, ArXiv.

[2]  Cesare Tinelli,et al.  Extending SMT Solvers to Higher-Order Logic , 2019, CADE.

[3]  D. Peled,et al.  Model Checking , 2018, Handbook of Finite State Based Models and Applications.

[4]  Florian Kammüller,et al.  Human Centric Security and Privacy for the IoT Using Formal Techniques , 2017, AHFE.

[5]  Florian Kammüller,et al.  Modeling and Verification of Insider Threats Using Logical Analysis , 2017, IEEE Systems Journal.

[6]  Florian Kammueller,et al.  Towards Formal Analysis of Insider Threats for Auctions , 2016, MIST@CCS.

[7]  Florian Kammüller,et al.  Towards Formal Analysis of Insider Threats for Auctions , 2016, MIST@CCS.

[8]  Florian Kammüller,et al.  Isabelle Modelchecking for Insider Threats , 2016, DPM/QASA@ESORICS.

[9]  Florian Kammüller,et al.  Attack Tree Analysis for Insider Threats on the IoT Using Isabelle , 2016, HCI.

[10]  Florian Kammüller,et al.  Investigating Airplane Safety and Security Against Insider Threats Using Logical Modeling , 2016, 2016 IEEE Security and Privacy Workshops (SPW).

[11]  Michael Fisher,et al.  Formal verification of autonomous vehicle platooning , 2016, Sci. Comput. Program..

[12]  Marieta Georgieva Transforming Graphical System Models to Graphical Attack Models , 2015, GraMSec@CSF.

[13]  Giuseppe Primiero,et al.  Modeling Human Behaviour with Higher Order Logic: Insider Threats , 2014, 2014 Workshop on Socio-Technical Aspects in Security and Trust.

[14]  Florian Kammüller,et al.  Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis , 2014, 2014 IEEE Security and Privacy Workshops.

[15]  Sadie Creese,et al.  Understanding Insider Threat: A Framework for Characterising Attacks , 2014, 2014 IEEE Security and Privacy Workshops.

[16]  Sholom Cohen,et al.  Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits , 2014, 2014 IEEE Security and Privacy Workshops.

[17]  George S. Avrunin,et al.  Insider Threat Identification by Process Analysis , 2014, 2014 IEEE Security and Privacy Workshops.

[18]  C. O'Halloran Automated verification of code automatically generated from Simulink® , 2013, Automated Software Engineering.

[19]  Joshua Glasser,et al.  Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data , 2013, 2013 IEEE Security and Privacy Workshops.

[20]  Florian Kammüller,et al.  Invalidating Policies using Structural Information , 2013, 2013 IEEE Security and Privacy Workshops.

[21]  Oliver Brdiczka,et al.  A Bayesian Network Model for Predicting Insider Threats , 2013, 2013 IEEE Security and Privacy Workshops.

[22]  Yannick Moy,et al.  Testing or Formal Verification: DO-178C Alternatives and Industrial Experience , 2013, IEEE Software.

[23]  Michael Sievers,et al.  Model-Based Verification and Validation of Spacecraft Avionics , 2012, Infotech@Aerospace.

[24]  Dawn M. Cappelli,et al.  The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .

[25]  Gilles Dowek,et al.  Modeling and verification of an air traffic concept of operations , 2004, ISSTA '04.

[26]  Florian Kammüller,et al.  Modular Reasoning in Isabelle , 2000, CADE.

[27]  Florian Kammüller,et al.  Locales - A Sectioning Concept for Isabelle , 1999, TPHOLs.

[28]  Lawrence C. Paulson,et al.  Proving properties of security protocols by induction , 1997, Proceedings 10th Computer Security Foundations Workshop.

[29]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[30]  David K. Hsiao,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[31]  Jason W. Clark Introduction to Inside the Insider Threat Minitrack , 2018 .

[32]  Victor Carreño,et al.  Formal Analysis of the Operational Concept for the Small Aircraft Transportation System , 2006, RODIN Book.

[33]  Victor Carreño,et al.  Analyzing Mode Confusion via Model Checking , 1999, SPIN.