Добірка наукової літератури з теми "End-to-end verification"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "End-to-end verification".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "End-to-end verification"
Roy, Pushpita, Ansuman Banerjee, and Bhargab B. Bhattacharya. "A framework for end-to-end verification for digital microfluidics." Innovations in Systems and Software Engineering 17, no. 3 (May 5, 2021): 231–45. http://dx.doi.org/10.1007/s11334-021-00398-3.
Повний текст джерелаJUNG, Eun-Sung, Si LIU, Rajkumar KETTIMUTHU, and Sungwook CHUNG. "High-Performance End-to-End Integrity Verification on Big Data Transfer." IEICE Transactions on Information and Systems E102.D, no. 8 (August 1, 2019): 1478–88. http://dx.doi.org/10.1587/transinf.2018edp7297.
Повний текст джерелаMalik, Jameel, Ahmed Elhayek, Suparna Guha, Sheraz Ahmed, Amna Gillani, and Didier Stricker. "DeepAirSig: End-to-End Deep Learning Based in-Air Signature Verification." IEEE Access 8 (2020): 195832–43. http://dx.doi.org/10.1109/access.2020.3033848.
Повний текст джерелаChen, Juan, Ravi Chugh, and Nikhil Swamy. "Type-preserving compilation of end-to-end verification of security enforcement." ACM SIGPLAN Notices 45, no. 6 (June 12, 2010): 412–23. http://dx.doi.org/10.1145/1809028.1806643.
Повний текст джерелаChen, Di, Chunyan Xu, Jian Yang, Jianjun Qian, Yuhui Zheng, and Linlin Shen. "Joint Bayesian guided metric learning for end-to-end face verification." Neurocomputing 275 (January 2018): 560–67. http://dx.doi.org/10.1016/j.neucom.2017.09.009.
Повний текст джерелаCarbonneaux, Quentin, Jan Hoffmann, Tahina Ramananandro, and Zhong Shao. "End-to-end verification of stack-space bounds for C programs." ACM SIGPLAN Notices 49, no. 6 (June 5, 2014): 270–81. http://dx.doi.org/10.1145/2666356.2594301.
Повний текст джерелаLeung, C. M., and J. A. Schormans. "Measurement-based end to end latency performance prediction for SLA verification." Journal of Systems and Software 74, no. 3 (February 2005): 243–54. http://dx.doi.org/10.1016/j.jss.2003.12.031.
Повний текст джерелаGuo, Jiang Hong, Jian Qiang Wu, and Xi Hong Wu. "Data Aggregation with End-to-End Security for Wireless Sensor Networks." Advanced Materials Research 490-495 (March 2012): 383–86. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.383.
Повний текст джерелаBai, Zhongxin, Jianyu Wang, Xiao-Lei Zhang, and Jingdong Chen. "End-to-End Speaker Verification via Curriculum Bipartite Ranking Weighted Binary Cross-Entropy." IEEE/ACM Transactions on Audio, Speech, and Language Processing 30 (2022): 1330–44. http://dx.doi.org/10.1109/taslp.2022.3161155.
Повний текст джерелаCostanzo, David, Zhong Shao, and Ronghui Gu. "End-to-end verification of information-flow security for C and assembly programs." ACM SIGPLAN Notices 51, no. 6 (August 2016): 648–64. http://dx.doi.org/10.1145/2980983.2908100.
Повний текст джерелаДисертації з теми "End-to-end verification"
Nemati, Hamed. "Secure System Virtualization : End-to-End Verification of Memory Isolation." Doctoral thesis, KTH, Teoretisk datalogi, TCS, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213030.
Повний текст джерелаQC 20170831
PROSPER
HASPOC
Costanzo, David. "Formal End-to-End Verification of Information-Flow Security for Complex Systems." Thesis, Yale University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10584941.
Повний текст джерелаProtecting the confidentiality of information manipulated by a computing system is one of the most important challenges facing today's cybersecurity community. Many complex systems, such as operating systems, hypervisors, web browsers, and distributed systems, require a user to trust that private information is properly isolated from other users. Real-world systems are full of bugs, however, so this assumption of trust is not reasonable.
The goal of this dissertation is to apply formal methods to complex security-sensitive systems, in such a way that we can guarantee to users that these systems really are trustworthy. Unfortunately, there are numerous prohibitive challenges standing in the way of achieving this goal.
One challenge is how to specify the desired security policy of a complex system. In the real world, pure noninterference 'is too strong to be useful. It is crucial to support more lenient security policies that allow for certain well-specified information flows between users, such as explicit declassifications. Furthermore, the specified policy must be comprehensible to users at a high level of abstraction, but also must apply to the low-level system implementation.
A second challenge is that real-world systems are usually written in low-level languages like C and assembly, but these languages are traditionally difficult to reason about. Additionally, even if we successfully verify individual C and assembly functions, how do we go about linking them together? The obvious answer is to do the linking after the C code gets compiled into assembly, but this requires trusting that the compiler did not accidentally or maliciously introduce security bugs. This is a very difficult problem, especially considering that a compiler may fail to preserve security even when it correctly preserves functional behavior.
A third challenge is how to actually go about conducting a security proof over low-level code. Traditional security type systems do not work well since they require a strongly-typed language, so how can a security violation be detected in untyped C or assembly code? In fact, it is actually common for code to temporarily violate a security policy, perhaps for performance reasons, but then to not actually perform any observable behavior influenced by the violation; how can we reason that this kind of code is acceptably secure? Finally, how do we conduct the proof in a unified way that allows us to link everything together into a system-wide guarantee?
In this dissertation, we make two major contributions that achieve our goal by overcoming all of these challenges. The first contribution is the development of a novel methodology allowing us to formally specify, prove, and propagate information-flow security policies using a single unifying mechanism, called the "observation function" . A policy is specified in terms of an expressive generalization of classical noninterference, proved using a general method that subsumes both security-label proofs and information-hiding proofs, and propagated across layers of abstraction using a special kind of simulation that is guaranteed to preserve security.
To demonstrate the effectiveness of our new methodology, our second major contribution is an actual end-to-end security proof, fully formalized and machine-checked in the Coq proof assistant, of a nontrivial operating system kernel. Our artifact is the first ever guaranteed-secure kernel involving both C and assembly code, including compilation from the C code into assembly. Our final result guarantees the following notion of isolation: as long as direct inter-process communication is not used, user processes executing over the kernel cannot influence each others' executions in any way. During the verification effort, we successfully discovered and fixed some interesting security holes in the kernel, such as one that exploits child process IDs as a side channel for communication.
We also demonstrate the generality and extensibility of our methodology by extending the kernel with a virtualized time feature allowing user processes to time their own executions. With a relatively minor amount of effort, we successfully prove that this new feature obeys our isolation policy, guaranteeing that user processes cannot exploit virtualized time as an information channel.
D'Esposito, Rosario. "Electro-thermal characterization, TCAD simulations and compact modeling of advanced SiGe HBTs at device and circuit level." Thesis, Bordeaux, 2016. http://www.theses.fr/2016BORD0147/document.
Повний текст джерелаThis work is focused on the characterization of electro-thermal effects in advanced SiGe hetero-junction bipolar transistors (HBTs); two state of the art BiCMOS processes have been analyzed: the B11HFC from Infineon Technologies (130nm) and the B55 from STMicroelectronics (55nm).Special test structures have been designed, in order to evaluate the overall electro-thermal impact of the back end of line (BEOL) in single finger and multi-finger components. A complete DC and RF electrical characterization at small and large signal, as well as the extraction of the device static and dynamic thermal parameters are performed on the proposed test structures, showing a sensible improvement of the DC and RF figures of merit when metal dummies are added upon the transistor. The thermal impact of the BEOL has been modeled and experimentally verified in the time and frequency domain and by means of 3D TCAD simulations, in which the effect of the doping profile on the thermal conductivity is analyzed and taken into account.Innovative multi-finger transistor topologies are designed, which allow an improvement of the SOA specifications, thanks to a careful design of the drawn emitter area and of the deep trench isolation (DTI) enclosed area.A compact thermal model is proposed for taking into account the mutual thermal coupling between the emitter stripes of multi-finger HBTs in dynamic operation and is validated upon dedicated pulsed measurements and TCAD simulations.Specially designed circuit blocks have been realized and measured, in order to verify the accuracy of device compact models in electrical circuit simulators; moreover the impact on the circuit performances of mutual thermal coupling among neighboring transistors and the presence of BEOL metal dummies is evaluated and modeled
Essex, Aleksander. "Cryptographic End-to-end Verification for Real-world Elections." Thesis, 2012. http://hdl.handle.net/10012/6817.
Повний текст джерелаКниги з теми "End-to-end verification"
Chan, Wendy, Donald Hung, Melvin Lim, John Vien, and Ming Fung Yee. Hands-On Introduction to Soc: Front-End Hardware Design and Functional Verification. Pearson Education, Limited, 2025.
Знайти повний текст джерелаSchlieter, Jens. Experiences of Dying and Death. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190888848.003.0002.
Повний текст джерелаЧастини книг з теми "End-to-end verification"
Reid, Alastair, Rick Chen, Anastasios Deligiannis, David Gilday, David Hoyes, Will Keen, Ashan Pathirane, Owen Shepherd, Peter Vrabel, and Ali Zaidi. "End-to-End Verification of "Equation missing" Processors with ISA-Formal." In Computer Aided Verification, 42–58. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41540-6_3.
Повний текст джерелаPark, Daejun, Yi Zhang, and Grigore Rosu. "End-to-End Formal Verification of Ethereum 2.0 Deposit Smart Contract." In Computer Aided Verification, 151–64. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53288-8_8.
Повний текст джерелаSánchez, Rafael, Manuel Martínez, Salvador Hierrezuelo, Juan Guerrero, and Juan Torreblanca. "Service Performance Verification and Benchmarking." In End-to-End Quality of Service over Cellular Networks, 186–242. Chichester, UK: John Wiley & Sons, Ltd, 2006. http://dx.doi.org/10.1002/047001587x.ch6.
Повний текст джерелаRanjana, S., J. Priya, P. S. Reenu Rita, and B. Bharathi. "End-to-End Speaker Verification for Short Utterances." In Advances in Intelligent Systems and Computing, 305–13. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7088-6_27.
Повний текст джерелаYuan, Shenghao, Frédéric Besson, Jean-Pierre Talpin, Samuel Hym, Koen Zandberg, and Emmanuel Baccelli. "End-to-End Mechanized Proof of an eBPF Virtual Machine for Micro-controllers." In Computer Aided Verification, 293–316. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_15.
Повний текст джерелаGiorgi, Giacomo, Andrea Saracino, and Fabio Martinelli. "End to End Autorship Email Verification Framework for a Secure Communication." In Communications in Computer and Information Science, 73–96. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94900-6_4.
Повний текст джерелаNandivada, V. Krishna, Fernando Magno Quintão Pereira, and Jens Palsberg. "A Framework for End-to-End Verification and Evaluation of Register Allocators." In Static Analysis, 153–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74061-2_10.
Повний текст джерелаCoria, Juan M., Hervé Bredin, Sahar Ghannay, and Sophie Rosset. "A Comparison of Metric Learning Loss Functions for End-To-End Speaker Verification." In Statistical Language and Speech Processing, 137–48. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59430-5_11.
Повний текст джерелаHumphrey, Laura R., James Hamil, and Joffrey Huguet. "End-to-End Verification of Initial and Transition Properties of GR(1) Designs in SPARK." In Software Engineering and Formal Methods, 60–76. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58768-0_4.
Повний текст джерелаStrömberg, Jan-Erik, Simin Nadjm-Tehrani, and Jan L. Top. "Switched bond graphs as front-end to formal verification of hybrid systems." In Hybrid Systems III, 282–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/bfb0020953.
Повний текст джерелаТези доповідей конференцій з теми "End-to-end verification"
Heigold, Georg, Ignacio Moreno, Samy Bengio, and Noam Shazeer. "End-to-end text-dependent speaker verification." In 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2016. http://dx.doi.org/10.1109/icassp.2016.7472652.
Повний текст джерелаEl-Atawy, A., and T. Samak. "End-to-end verification of QoS policies." In 2012 IEEE/IFIP Network Operations and Management Symposium (NOMS 2012). IEEE, 2012. http://dx.doi.org/10.1109/noms.2012.6211927.
Повний текст джерелаYin, Yalin, and Xiangdong Zhou. "End-to-end online handwriting signature verification." In Tenth International Conference on Graphics and Image Processing (ICGIP 2018), edited by Hui Yu, Yifei Pu, Chunming Li, and Zhigeng Pan. SPIE, 2019. http://dx.doi.org/10.1117/12.2524447.
Повний текст джерелаZhu, Yingke, and Brian Mak. "Orthogonality Regularizations for End-to-End Speaker Verification." In Odyssey 2020 The Speaker and Language Recognition Workshop. ISCA: ISCA, 2020. http://dx.doi.org/10.21437/odyssey.2020-3.
Повний текст джерелаHan, Yan, Gautam Krishna, Co Tran, Mason Carnahan, and Ahmed H. Tewfik. "Robust End-to-End Speaker Verification Using EEG." In 2020 28th European Signal Processing Conference (EUSIPCO). IEEE, 2021. http://dx.doi.org/10.23919/eusipco47968.2020.9287323.
Повний текст джерелаWan, Li, Quan Wang, Alan Papir, and Ignacio Lopez Moreno. "Generalized End-to-End Loss for Speaker Verification." In ICASSP 2018 - 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2018. http://dx.doi.org/10.1109/icassp.2018.8462665.
Повний текст джерелаDing, Jizheng, Xiaoran Zhu, Jian Guo, Xin Li, and Rongkun Yan. "End-to-End Automated Verification for OS Kernels." In 2018 25th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2018. http://dx.doi.org/10.1109/apsec.2018.00028.
Повний текст джерелаWang, Qing, Pengcheng Guo, Sining Sun, Lei Xie, and John H. L. Hansen. "Adversarial Regularization for End-to-End Robust Speaker Verification." In Interspeech 2019. ISCA: ISCA, 2019. http://dx.doi.org/10.21437/interspeech.2019-2983.
Повний текст джерелаLin, Weiwei, Man-Wai Mak, and Jen-Tzung Chien. "Strategies for End-to-End Text-Independent Speaker Verification." In Interspeech 2020. ISCA: ISCA, 2020. http://dx.doi.org/10.21437/interspeech.2020-2092.
Повний текст джерелаRamoji, Shreyas, Prashant Krishnan, and Sriram Ganapathy. "Neural PLDA Modeling for End-to-End Speaker Verification." In Interspeech 2020. ISCA: ISCA, 2020. http://dx.doi.org/10.21437/interspeech.2020-2699.
Повний текст джерелаЗвіти організацій з теми "End-to-end verification"
Marchand, Gary. End-to End Test Verification and Validation Plan. Fort Belvoir, VA: Defense Technical Information Center, November 1996. http://dx.doi.org/10.21236/ada381123.
Повний текст джерелаHan, Fei, Monica Prezzi, Rodrigo Salgado, Mehdi Marashi, Timothy Wells, and Mir Zaheer. Verification of Bridge Foundation Design Assumptions and Calculations. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317084.
Повний текст джерелаTarasenko, Andrii O., Yuriy V. Yakimov, and Vladimir N. Soloviev. Convolutional neural networks for image classification. [б. в.], February 2020. http://dx.doi.org/10.31812/123456789/3682.
Повний текст джерелаAdhikari, Kamal, Bharat Adhikari, Sue Cavill, Santosh Mehrotra, Vijeta Rao Bejjanki, and Matteus Van Der Velden. Monitoring Sanitation Campaigns: Targets, Reporting and Realism. Institute of Development Studies (IDS), June 2021. http://dx.doi.org/10.19088/slh.2021.009.
Повний текст джерелаAdhikari, Kamal, Bharat Adhikari, Sue Cavill, Santosh Mehrotra, Vijeta Rao Bejjanki, and Matteus Van Der Velden. Monitoring Sanitation Campaigns: Targets, Reporting and Realism. Institute of Development Studies (IDS), June 2021. http://dx.doi.org/10.19088/slh.2021.023.
Повний текст джерелаGates, Allison, Michelle Gates, Shannon Sim, Sarah A. Elliott, Jennifer Pillay, and Lisa Hartling. Creating Efficiencies in the Extraction of Data From Randomized Trials: A Prospective Evaluation of a Machine Learning and Text Mining Tool. Agency for Healthcare Research and Quality (AHRQ), August 2021. http://dx.doi.org/10.23970/ahrqepcmethodscreatingefficiencies.
Повний текст джерела