Academic literature on the topic 'End-to-end verification'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'End-to-end verification.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "End-to-end verification"
Roy, Pushpita, Ansuman Banerjee, and Bhargab B. Bhattacharya. "A framework for end-to-end verification for digital microfluidics." Innovations in Systems and Software Engineering 17, no. 3 (May 5, 2021): 231–45. http://dx.doi.org/10.1007/s11334-021-00398-3.
Full textJUNG, Eun-Sung, Si LIU, Rajkumar KETTIMUTHU, and Sungwook CHUNG. "High-Performance End-to-End Integrity Verification on Big Data Transfer." IEICE Transactions on Information and Systems E102.D, no. 8 (August 1, 2019): 1478–88. http://dx.doi.org/10.1587/transinf.2018edp7297.
Full textMalik, Jameel, Ahmed Elhayek, Suparna Guha, Sheraz Ahmed, Amna Gillani, and Didier Stricker. "DeepAirSig: End-to-End Deep Learning Based in-Air Signature Verification." IEEE Access 8 (2020): 195832–43. http://dx.doi.org/10.1109/access.2020.3033848.
Full textChen, Juan, Ravi Chugh, and Nikhil Swamy. "Type-preserving compilation of end-to-end verification of security enforcement." ACM SIGPLAN Notices 45, no. 6 (June 12, 2010): 412–23. http://dx.doi.org/10.1145/1809028.1806643.
Full textChen, Di, Chunyan Xu, Jian Yang, Jianjun Qian, Yuhui Zheng, and Linlin Shen. "Joint Bayesian guided metric learning for end-to-end face verification." Neurocomputing 275 (January 2018): 560–67. http://dx.doi.org/10.1016/j.neucom.2017.09.009.
Full textCarbonneaux, Quentin, Jan Hoffmann, Tahina Ramananandro, and Zhong Shao. "End-to-end verification of stack-space bounds for C programs." ACM SIGPLAN Notices 49, no. 6 (June 5, 2014): 270–81. http://dx.doi.org/10.1145/2666356.2594301.
Full textLeung, C. M., and J. A. Schormans. "Measurement-based end to end latency performance prediction for SLA verification." Journal of Systems and Software 74, no. 3 (February 2005): 243–54. http://dx.doi.org/10.1016/j.jss.2003.12.031.
Full textGuo, Jiang Hong, Jian Qiang Wu, and Xi Hong Wu. "Data Aggregation with End-to-End Security for Wireless Sensor Networks." Advanced Materials Research 490-495 (March 2012): 383–86. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.383.
Full textBai, Zhongxin, Jianyu Wang, Xiao-Lei Zhang, and Jingdong Chen. "End-to-End Speaker Verification via Curriculum Bipartite Ranking Weighted Binary Cross-Entropy." IEEE/ACM Transactions on Audio, Speech, and Language Processing 30 (2022): 1330–44. http://dx.doi.org/10.1109/taslp.2022.3161155.
Full textCostanzo, David, Zhong Shao, and Ronghui Gu. "End-to-end verification of information-flow security for C and assembly programs." ACM SIGPLAN Notices 51, no. 6 (August 2016): 648–64. http://dx.doi.org/10.1145/2980983.2908100.
Full textDissertations / Theses on the topic "End-to-end verification"
Nemati, Hamed. "Secure System Virtualization : End-to-End Verification of Memory Isolation." Doctoral thesis, KTH, Teoretisk datalogi, TCS, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213030.
Full textQC 20170831
PROSPER
HASPOC
Costanzo, David. "Formal End-to-End Verification of Information-Flow Security for Complex Systems." Thesis, Yale University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10584941.
Full textProtecting the confidentiality of information manipulated by a computing system is one of the most important challenges facing today's cybersecurity community. Many complex systems, such as operating systems, hypervisors, web browsers, and distributed systems, require a user to trust that private information is properly isolated from other users. Real-world systems are full of bugs, however, so this assumption of trust is not reasonable.
The goal of this dissertation is to apply formal methods to complex security-sensitive systems, in such a way that we can guarantee to users that these systems really are trustworthy. Unfortunately, there are numerous prohibitive challenges standing in the way of achieving this goal.
One challenge is how to specify the desired security policy of a complex system. In the real world, pure noninterference 'is too strong to be useful. It is crucial to support more lenient security policies that allow for certain well-specified information flows between users, such as explicit declassifications. Furthermore, the specified policy must be comprehensible to users at a high level of abstraction, but also must apply to the low-level system implementation.
A second challenge is that real-world systems are usually written in low-level languages like C and assembly, but these languages are traditionally difficult to reason about. Additionally, even if we successfully verify individual C and assembly functions, how do we go about linking them together? The obvious answer is to do the linking after the C code gets compiled into assembly, but this requires trusting that the compiler did not accidentally or maliciously introduce security bugs. This is a very difficult problem, especially considering that a compiler may fail to preserve security even when it correctly preserves functional behavior.
A third challenge is how to actually go about conducting a security proof over low-level code. Traditional security type systems do not work well since they require a strongly-typed language, so how can a security violation be detected in untyped C or assembly code? In fact, it is actually common for code to temporarily violate a security policy, perhaps for performance reasons, but then to not actually perform any observable behavior influenced by the violation; how can we reason that this kind of code is acceptably secure? Finally, how do we conduct the proof in a unified way that allows us to link everything together into a system-wide guarantee?
In this dissertation, we make two major contributions that achieve our goal by overcoming all of these challenges. The first contribution is the development of a novel methodology allowing us to formally specify, prove, and propagate information-flow security policies using a single unifying mechanism, called the "observation function" . A policy is specified in terms of an expressive generalization of classical noninterference, proved using a general method that subsumes both security-label proofs and information-hiding proofs, and propagated across layers of abstraction using a special kind of simulation that is guaranteed to preserve security.
To demonstrate the effectiveness of our new methodology, our second major contribution is an actual end-to-end security proof, fully formalized and machine-checked in the Coq proof assistant, of a nontrivial operating system kernel. Our artifact is the first ever guaranteed-secure kernel involving both C and assembly code, including compilation from the C code into assembly. Our final result guarantees the following notion of isolation: as long as direct inter-process communication is not used, user processes executing over the kernel cannot influence each others' executions in any way. During the verification effort, we successfully discovered and fixed some interesting security holes in the kernel, such as one that exploits child process IDs as a side channel for communication.
We also demonstrate the generality and extensibility of our methodology by extending the kernel with a virtualized time feature allowing user processes to time their own executions. With a relatively minor amount of effort, we successfully prove that this new feature obeys our isolation policy, guaranteeing that user processes cannot exploit virtualized time as an information channel.
D'Esposito, Rosario. "Electro-thermal characterization, TCAD simulations and compact modeling of advanced SiGe HBTs at device and circuit level." Thesis, Bordeaux, 2016. http://www.theses.fr/2016BORD0147/document.
Full textThis work is focused on the characterization of electro-thermal effects in advanced SiGe hetero-junction bipolar transistors (HBTs); two state of the art BiCMOS processes have been analyzed: the B11HFC from Infineon Technologies (130nm) and the B55 from STMicroelectronics (55nm).Special test structures have been designed, in order to evaluate the overall electro-thermal impact of the back end of line (BEOL) in single finger and multi-finger components. A complete DC and RF electrical characterization at small and large signal, as well as the extraction of the device static and dynamic thermal parameters are performed on the proposed test structures, showing a sensible improvement of the DC and RF figures of merit when metal dummies are added upon the transistor. The thermal impact of the BEOL has been modeled and experimentally verified in the time and frequency domain and by means of 3D TCAD simulations, in which the effect of the doping profile on the thermal conductivity is analyzed and taken into account.Innovative multi-finger transistor topologies are designed, which allow an improvement of the SOA specifications, thanks to a careful design of the drawn emitter area and of the deep trench isolation (DTI) enclosed area.A compact thermal model is proposed for taking into account the mutual thermal coupling between the emitter stripes of multi-finger HBTs in dynamic operation and is validated upon dedicated pulsed measurements and TCAD simulations.Specially designed circuit blocks have been realized and measured, in order to verify the accuracy of device compact models in electrical circuit simulators; moreover the impact on the circuit performances of mutual thermal coupling among neighboring transistors and the presence of BEOL metal dummies is evaluated and modeled
Essex, Aleksander. "Cryptographic End-to-end Verification for Real-world Elections." Thesis, 2012. http://hdl.handle.net/10012/6817.
Full textBooks on the topic "End-to-end verification"
Chan, Wendy, Donald Hung, Melvin Lim, John Vien, and Ming Fung Yee. Hands-On Introduction to Soc: Front-End Hardware Design and Functional Verification. Pearson Education, Limited, 2025.
Find full textSchlieter, Jens. Experiences of Dying and Death. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190888848.003.0002.
Full textBook chapters on the topic "End-to-end verification"
Reid, Alastair, Rick Chen, Anastasios Deligiannis, David Gilday, David Hoyes, Will Keen, Ashan Pathirane, Owen Shepherd, Peter Vrabel, and Ali Zaidi. "End-to-End Verification of "Equation missing" Processors with ISA-Formal." In Computer Aided Verification, 42–58. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41540-6_3.
Full textPark, Daejun, Yi Zhang, and Grigore Rosu. "End-to-End Formal Verification of Ethereum 2.0 Deposit Smart Contract." In Computer Aided Verification, 151–64. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53288-8_8.
Full textSánchez, Rafael, Manuel Martínez, Salvador Hierrezuelo, Juan Guerrero, and Juan Torreblanca. "Service Performance Verification and Benchmarking." In End-to-End Quality of Service over Cellular Networks, 186–242. Chichester, UK: John Wiley & Sons, Ltd, 2006. http://dx.doi.org/10.1002/047001587x.ch6.
Full textRanjana, S., J. Priya, P. S. Reenu Rita, and B. Bharathi. "End-to-End Speaker Verification for Short Utterances." In Advances in Intelligent Systems and Computing, 305–13. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7088-6_27.
Full textYuan, Shenghao, Frédéric Besson, Jean-Pierre Talpin, Samuel Hym, Koen Zandberg, and Emmanuel Baccelli. "End-to-End Mechanized Proof of an eBPF Virtual Machine for Micro-controllers." In Computer Aided Verification, 293–316. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_15.
Full textGiorgi, Giacomo, Andrea Saracino, and Fabio Martinelli. "End to End Autorship Email Verification Framework for a Secure Communication." In Communications in Computer and Information Science, 73–96. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94900-6_4.
Full textNandivada, V. Krishna, Fernando Magno Quintão Pereira, and Jens Palsberg. "A Framework for End-to-End Verification and Evaluation of Register Allocators." In Static Analysis, 153–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74061-2_10.
Full textCoria, Juan M., Hervé Bredin, Sahar Ghannay, and Sophie Rosset. "A Comparison of Metric Learning Loss Functions for End-To-End Speaker Verification." In Statistical Language and Speech Processing, 137–48. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59430-5_11.
Full textHumphrey, Laura R., James Hamil, and Joffrey Huguet. "End-to-End Verification of Initial and Transition Properties of GR(1) Designs in SPARK." In Software Engineering and Formal Methods, 60–76. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58768-0_4.
Full textStrömberg, Jan-Erik, Simin Nadjm-Tehrani, and Jan L. Top. "Switched bond graphs as front-end to formal verification of hybrid systems." In Hybrid Systems III, 282–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/bfb0020953.
Full textConference papers on the topic "End-to-end verification"
Heigold, Georg, Ignacio Moreno, Samy Bengio, and Noam Shazeer. "End-to-end text-dependent speaker verification." In 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2016. http://dx.doi.org/10.1109/icassp.2016.7472652.
Full textEl-Atawy, A., and T. Samak. "End-to-end verification of QoS policies." In 2012 IEEE/IFIP Network Operations and Management Symposium (NOMS 2012). IEEE, 2012. http://dx.doi.org/10.1109/noms.2012.6211927.
Full textYin, Yalin, and Xiangdong Zhou. "End-to-end online handwriting signature verification." In Tenth International Conference on Graphics and Image Processing (ICGIP 2018), edited by Hui Yu, Yifei Pu, Chunming Li, and Zhigeng Pan. SPIE, 2019. http://dx.doi.org/10.1117/12.2524447.
Full textZhu, Yingke, and Brian Mak. "Orthogonality Regularizations for End-to-End Speaker Verification." In Odyssey 2020 The Speaker and Language Recognition Workshop. ISCA: ISCA, 2020. http://dx.doi.org/10.21437/odyssey.2020-3.
Full textHan, Yan, Gautam Krishna, Co Tran, Mason Carnahan, and Ahmed H. Tewfik. "Robust End-to-End Speaker Verification Using EEG." In 2020 28th European Signal Processing Conference (EUSIPCO). IEEE, 2021. http://dx.doi.org/10.23919/eusipco47968.2020.9287323.
Full textWan, Li, Quan Wang, Alan Papir, and Ignacio Lopez Moreno. "Generalized End-to-End Loss for Speaker Verification." In ICASSP 2018 - 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2018. http://dx.doi.org/10.1109/icassp.2018.8462665.
Full textDing, Jizheng, Xiaoran Zhu, Jian Guo, Xin Li, and Rongkun Yan. "End-to-End Automated Verification for OS Kernels." In 2018 25th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2018. http://dx.doi.org/10.1109/apsec.2018.00028.
Full textWang, Qing, Pengcheng Guo, Sining Sun, Lei Xie, and John H. L. Hansen. "Adversarial Regularization for End-to-End Robust Speaker Verification." In Interspeech 2019. ISCA: ISCA, 2019. http://dx.doi.org/10.21437/interspeech.2019-2983.
Full textLin, Weiwei, Man-Wai Mak, and Jen-Tzung Chien. "Strategies for End-to-End Text-Independent Speaker Verification." In Interspeech 2020. ISCA: ISCA, 2020. http://dx.doi.org/10.21437/interspeech.2020-2092.
Full textRamoji, Shreyas, Prashant Krishnan, and Sriram Ganapathy. "Neural PLDA Modeling for End-to-End Speaker Verification." In Interspeech 2020. ISCA: ISCA, 2020. http://dx.doi.org/10.21437/interspeech.2020-2699.
Full textReports on the topic "End-to-end verification"
Marchand, Gary. End-to End Test Verification and Validation Plan. Fort Belvoir, VA: Defense Technical Information Center, November 1996. http://dx.doi.org/10.21236/ada381123.
Full textHan, Fei, Monica Prezzi, Rodrigo Salgado, Mehdi Marashi, Timothy Wells, and Mir Zaheer. Verification of Bridge Foundation Design Assumptions and Calculations. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317084.
Full textTarasenko, Andrii O., Yuriy V. Yakimov, and Vladimir N. Soloviev. Convolutional neural networks for image classification. [б. в.], February 2020. http://dx.doi.org/10.31812/123456789/3682.
Full textAdhikari, Kamal, Bharat Adhikari, Sue Cavill, Santosh Mehrotra, Vijeta Rao Bejjanki, and Matteus Van Der Velden. Monitoring Sanitation Campaigns: Targets, Reporting and Realism. Institute of Development Studies (IDS), June 2021. http://dx.doi.org/10.19088/slh.2021.009.
Full textAdhikari, Kamal, Bharat Adhikari, Sue Cavill, Santosh Mehrotra, Vijeta Rao Bejjanki, and Matteus Van Der Velden. Monitoring Sanitation Campaigns: Targets, Reporting and Realism. Institute of Development Studies (IDS), June 2021. http://dx.doi.org/10.19088/slh.2021.023.
Full textGates, Allison, Michelle Gates, Shannon Sim, Sarah A. Elliott, Jennifer Pillay, and Lisa Hartling. Creating Efficiencies in the Extraction of Data From Randomized Trials: A Prospective Evaluation of a Machine Learning and Text Mining Tool. Agency for Healthcare Research and Quality (AHRQ), August 2021. http://dx.doi.org/10.23970/ahrqepcmethodscreatingefficiencies.
Full text