This is a small collection of papers, presentations, and resources I have consumed and enjoyed or intend to read/reference/whatever down the line. Some items have unorganized sub-lists of related links and references below them, which provide additional context or information for further exploration.
-
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences.
#cps
,#fuzzing
,#security
. Already read. -
Jumping the Air-Gap.
#cps
,#FM
,#security
. Already read. -
List of Industrial Control System Security Tools.
#cps
,#ics
,#security
. To reference. -
Evil Bubbles.
#cps
,#security
. Already read.
-
A Decade of Lattice Cryptography
#lattice
,#cryptography
. Going to read. -
On Ideal Lattices and Learning with Errors Over Rings.
#lattice
,#cryptography
. Going to read.
-
High-resolution non-destructive three-dimensional imaging of integrated circuits
#hardware
,#verification
,#re
. Already read. -
A 3-D Split Manufacturing Approach to Trustworthy System Development.
#hardware
,#manufacturing
,#trust
. Going to read.
-
Neural Guided Constraint Logic Programming for Program Synthesis.
#synthesis
,#FM
,#neuralNets
,#machineLearning
. Going to read. -
Excellent resource for synthesis and FM tools.
#synthesis
,#verification
,#FM
. I reference this list frequently. -
Automata-based symbolic string analysis for vulnerability detection.
#automata
,#vulnerability
,#FM
. Not really a synthesis paper, but adjascent enough to attack synthesis or attacker synthesis that I think it is not unreasonable to include here. Going to read.
- The Quantitative Zoo: List of Quantitative Modeling Tools.
#verification
,#FM
. Potentially a useful list.