Skip to content

Publications

Paul Meng edited this page Apr 30, 2024 · 13 revisions
  1. Siu, Kit, Abha Moitra, Meng Li, Michael Durling, Heber Herencia-Zapana, John Interrante, Baoluo Meng et al. "Architectural and behavioral analysis for cyber security." In 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), pp. 1-10. IEEE, 2019.

  2. K. Siu, H. Herencia-Zapana, D. Prince and A. Moitra, "A Model-Based Framework for Analyzing the Security of System Architectures," 2020 Annual Reliability and Maintainability Symposium (RAMS), 2020, pp. 1-6, doi: 10.1109/RAMS48030.2020.9153607.

  3. "DARPA Project Producing Tool to Help Anticipate Military and Industrial Systems’ Cyber Threats”, NextGov.com, April 2020.

  4. Moitra, A., Prince, D., Siu, K., Durling, M. et al., “Threat Identification and Defense Control Selection for Embedded Systems,” SAE Int. J. Transp. Cyber. & Privacy 3(2):2020, doi:10.4271/11-03-02-0005.

  5. Meng, Baoluo, Abha Moitra, Andrew W. Crapo, Saswata Paul, Kit Siu, Michael Durling, Daniel Prince, and Heber Herencia-Zapana. "Towards developing formalized assurance cases." In 2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC), pp. 1-9. IEEE, 2020.

  6. Moosa Yahyazadeh, Proyash Podder, Endadul Hoque, and Omar Chowdhury. 2019. Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT '19). Association for Computing Machinery, New York, NY, USA, 61–72. DOI:https://doi.org/10.1145/3322431.3325107

  7. Yahyazadeh M., Hussain S.R., Hoque E., Chowdhury O. (2020) PatrIoT: Policy Assisted Resilient Programmable IoT System. In: Deshmukh J., Ničković D. (eds) Runtime Verification. RV 2020. Lecture Notes in Computer Science, vol 12399. Springer, Cham. https://doi.org/10.1007/978-3-030-60508-7_8.

  8. Meng, B.; Larraz, D.; Siu, K.; Moitra, A.; Interrante, J.; Smith,W.; Paul, S.; Prince, D.; Herencia-Zapana, H.; Arif, M.F.; et al. VERDICT: A Language and Framework for Engineering Cyber Resilient and Safe System. Systems 2021, 9, 18. https://doi.org/10.3390/systems9010018.

  9. Meng, B., Smith, W., and Durling, M., “Security Threat Modeling and Automated Analysis for System Design,” SAE Int. J. Transp. Cyber. & Privacy 4(1):2021, doi:10.4271/11-04-01-0001.

  10. Meng, Baoluo, Saswata Paul, Abha Moitra, Kit Siu, and Michael Durling. "Automating the Assembly of Security Assurance Case Fragments." In International Conference on Computer Safety, Reliability, and Security, pp. 101-114. Springer, Cham, 2021.

  11. Barzeele, Jennifer, Kit Siu, Mike Robinson, Liana Suantak, John Merems, Michael Durling, Abha Moitra, Baoluo Meng, Patrice Williams, and Daniel Prince. "Experience in designing for cyber resiliency in embedded DOD systems." In INCOSE International Symposium, vol. 31, no. 1, pp. 80-94. 2021.

  12. D. Larraz, M. Laurent, and C. Tinelli. "Merit and Blame Assignment with Kind 2". In 26th International Conference on Formal Methods for Industrial Critical Systems (FMICS'21).

  13. Meng, Baoluo, Arjun Viswanathan, William Smith, Abha Moitra, Kit Siu, and Michael Durling. "Synthesis of Optimal Defenses for System Architecture Design Model in MaxSMT." In NASA Formal Methods Symposium, pp. 752-770. Springer, Cham, 2022.

  14. D. Larraz, and C. Tinelli. "Finding Locally Smallest Cut Sets using Max-SMT". Ada Lett. 42, 2 (December 2022), 32–39. https://doi.org/10.1145/3591335.3591337

  15. Meng, Baoluo, Arjun Viswanathan, Saswata Paul, William Smith, Abha Moitra, Kit Siu, and Michael Durling. "Attack–defense tree-based analysis and optimal defense synthesis for system design." Innovations in Systems and Software Engineering (2024): 1-17.