Conclusions
Identify Invariants for Q
Identify behaviors attribute to I-Q
Map to the source code and express I-Q in ASL
Experiments on three types of attack models1. Buffer over flow2. Denial of Service3. Changing states (or authorizations)
Previous slide
Back to first slide
View graphic version