» Our paper Safety-Aware Deployment Synthesis and Trade-Off Analysis of Apollo Autonomous Driving Platform has been accepted to WASA 2023;
» Our paper Automating Vehicle SOA Threat Analysis Using a Model-Based Methodology has been accepted to ICISSP 2023;
» Our paper A Formal Security Assessment Framework for Cooperative Adaptive Cruise Control has been accepted to VNC 2020;
» Our paper Less Manual Work for Safety Engineers: Towards an Automated Safety Reasoning with Safety Patterns has been accepted to ICLP 2020;
» Our paper Towards Automating Safety and Security Co-Analysis with Patterns (Position Paper) has been accepted to Safecomp 2020;
» Our paper Automated Construction of Security Integrity Wrappers for Industry 4.0 Applications has been accepted to WRLA 2020;
» Our paper Soft Subexponentials and Multiplexing has been accepted to IJCAR 2020;
» Our paper Slow denial-of-service attacks on software defined networks has been accepted to Computer Networks;
» Our paper TSNsched: Automated Schedule Generation for Time Sensitive Networking has been accepted to FMCAD;
» Our paper Formal Security Verification of Industry 4.0 Applications has been accepted to ETFA;
» Our paper Resource-Bounded Intruders in Denial of Service Attacks has been accepted to CSF;
» Our paper A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols has been accepted to Catherine Meadows Festschrift;
» Our paper Symbolic Timed Trace Equivalence has been accepted to Catherine Meadows Festschrift;
» Our paper Towards Computer-Aided Software Requirements Process has been accepted to Workshops of the Software Engineering Conference;
» New white-paper Model-Based Safety and Security Engineering;
» Our paper A Logical Framework with Commutative and Non-Commutative Subexponentials has been accepted to IJCAR, 2018;
» Our paper Formal Analysis of Sneak-Peek: A Data Centre Attack and its Mitigations has been accepted to IFIP-SEC, 2018;
» Our paper On the accuracy of formal verification of selective defenses for TDoS attacks has been accepted to Journal of Logical and Algebraic Methods in Programming;
» Our paper Time, Computational Complexity, and Probability in the Analysis of Distance-Bounding Protocols has been accepted to Journal of Computer Security;
» Our paper On subexponentials, focusing and modalities in concurrent systems has been accepted to Theoretical Computer Science;
» Our paper Slow TCAM Exhaustion DDoS Attack has been accepted to IFIP-SEC; * » Moving to Fortiss from February 2017;
» The Master Thesis of my student Yuri Gil Dantas, now at TU-Darmstadt, is among the finalists of the best master thesis in security in Brazil organized by SBSeg 2016;
» Our paper A Framework for the Analysis of UAV Strategies using Co-simulation has been accepted to SBESC 2016).
» Short visit to Heiko Mantel’s group in TU-Darmstadt;
» Two month visit at Martin Hofmann’s group at LMU funded by AvH foundation;
» Our paper Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders has been accepted to the 21st European Symposium on Research in Computer Security (ESORICS16).
» Our paper Time-Sensitive Distributed Systems has been accepted to the 14th International Conference on Formal Modelling and Analysis of Timed Systems ([FORMATS16][formats16]).
» Our paper Effect-Dependent Transformations for Concurrent Programs has been accepted to the 18th International Symposium on Principles and Practice of Declarative Programming (PPDP16).
» Two papers accepted to the 34th Brazilian Symposium on Telecommunications and Signal Processing (SBRT16).
» Our paper Can we mitigate the attacks on Distance-Bounding Protocols by using challenge-response rounds repeatedly? has been accepted to Workshop on Foundations of Computer Security 2016 (FCS16).
» Our paper A Selective Defense for Mitigating Coordinated Call Attacks has been accepted to the 34th Brazilian Symposium on Computer Networks and Distributed Systems (SBRC).
» Tutorial at the 16th edition in the series of Schools on Formal Methods in Bertinoro (Italy) given by Carolyn Talcott.
» Our paper Formal Specification and Verification of a Selective Defense for TDoS Attacks has been accepted to WRLA 2016
» Renewal of my CNPq Scholarship for High-Productivity Researchers (2016-2019)
» Successful participation at the Summer Workshop of Mathematics organized by University of Brasilia.
» Our paper on Counting Successes: Effects and Transformations for Non-Deterministic Programs was accepted to the Phil Wadler’s Festschrift.
» Our paper on Automated Generation of Focused Proof Systems was accepted to the Workshop on Focusing.
» Successful participation at the DDoS Mitigation in the NREN Environment Workshop.
» Successful participation and organization of the Shonan meeting on Logic and Verification Methods in Security and Privacy.
» Invited talk at LFMTP’15.
» Our paper Inferring Executable Models from Formalized Experimental Evidence has been accepted to CMSB’15.
» Our paper Multi-focused Proofs with Different Polarity Assignments has been accepted to LSFA’15.
» Successful participation in the Network Security Panel which was part of the Workshop of the RNP. You can find photos here.
» Our teams of our Marathon Programming Club obtained the first and second places of the regional tournament organized at EXPOTEC. Here is the news (in Portuguese).
» Journal submission accepted to Mathematical Structures in Computer Science: A Rewriting Framework and Logic for Activities Subject to Regulations. This extends our RTA’12 paper.