Design and Formal Verification of Control and Data Acquisition Protocols. This research will develop new specification and verification techniques for remote control protocols, used among interconnected sites in supply utilities such as electricity grids, based on a proven formal methods technology. These protocols are used in the monitoring of data from remote sites, and the transmission of control commands to such sites from a central location. Benefits to the industrial partner include increa ....Design and Formal Verification of Control and Data Acquisition Protocols. This research will develop new specification and verification techniques for remote control protocols, used among interconnected sites in supply utilities such as electricity grids, based on a proven formal methods technology. These protocols are used in the monitoring of data from remote sites, and the transmission of control commands to such sites from a central location. Benefits to the industrial partner include increased assurance that their control technology does correctly realise the adopted protocols. Assurance of correctness is significant in that incorrect protocol implementation may cause errant operation of equipment, and lead to economic and environmental damage.Read moreRead less
An extensible framework for analysis of Java language-based security conformance. Java is a programming language and platform running on 3 billion devices. While Java provides a sandbox-based security architecture within the Java Class Library to protect systems from untrusted code downloaded from Internet, it cannot defend against implementation bugs that occur in the Java Class Library. The goal of this project is to provide a formal model of the Java security architecture, which can be used b ....An extensible framework for analysis of Java language-based security conformance. Java is a programming language and platform running on 3 billion devices. While Java provides a sandbox-based security architecture within the Java Class Library to protect systems from untrusted code downloaded from Internet, it cannot defend against implementation bugs that occur in the Java Class Library. The goal of this project is to provide a formal model of the Java security architecture, which can be used by program analysers to identify faulty or insufficient security checks in the Java Class Library that may lead to the sandbox being bypassed.Read moreRead less