Skip to main content

Showing 1–3 of 3 results for author: Kulik, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.12009  [pdf, other

    cs.DC cs.SE

    Cilium and VDM -- Towards Formal Analysis of Cilium Policies

    Authors: Tomas Kulik, Jalil Boudjadar

    Abstract: Industrial control systems are becoming more distributed and interconnected to allow for interaction with modern computing infrastructures. Furthermore, the amount of data generated by these systems is increasing due to integration of more sensors and the need to increase the reliability of the system based on predictive data models. One challenge in accommodating this data and interconnectivity i… ▽ More

    Submitted 15 October, 2024; originally announced October 2024.

    Report number: OVT22/2024/04

  2. arXiv:2308.15191  [pdf, ps, other

    cs.CR

    State of the Art Report: Verified Computation

    Authors: Jim Woodcock, Mikkel Schmidt Andersen, Diego F. Aranha, Stefan Hallerstede, Simon Thrane Hansen, Nikolaj Kuhne Jakobsen, Tomas Kulik, Peter Gorm Larsen, Hugo Daniel Macedo, Carlos Ignacio Isasa Martin, Victor Alexander Mtsimbe Norrild

    Abstract: This report describes the state of the art in verifiable computation. The problem being solved is the following: The Verifiable Computation Problem (Verifiable Computing Problem) Suppose we have two computing agents. The first agent is the verifier, and the second agent is the prover. The verifier wants the prover to perform a computation. The verifier sends a description of the computation to t… ▽ More

    Submitted 16 February, 2024; v1 submitted 29 August, 2023; originally announced August 2023.

    Comments: 54 pages

  3. arXiv:2109.01362  [pdf, other

    cs.FL cs.CR

    A Survey of Practical Formal Methods for Security

    Authors: Tomas Kulik, Brijesh Dongol, Peter Gorm Larsen, Hugo Daniel Macedo, Steve Schneider, Peter Würtz Vinther Tran-Jørgensen, Jim Woodcock

    Abstract: In today's world, critical infrastructure is often controlled by computing systems. This introduces new risks for cyber attacks, which can compromise the security and disrupt the functionality of these systems. It is therefore necessary to build such systems with strong guarantees of resiliency against cyber attacks. One way to achieve this level of assurance is using formal verification, which pr… ▽ More

    Submitted 3 September, 2021; originally announced September 2021.

    Comments: Technical Report, Long survey version