Layering Protocol Verification

Layering protocols are modeled using layering structures that mirror the protocol layers. There are significant challenges in modelling verification components for layering protocols such as (1) reuse, (2) scalability, (3) controllability, and (4)observability. Furthermore, there may be requirements for complex test scenarios where a great deal of interaction is required between test sequence e... » read more

White Hat Hacking

At first glance, the words “reverse engineering” (RE) might conjure up a couple of nefarious individuals with table full of tools, meters, and the like, in some basement trying to figure out how to disassemble some sort of electronic device. The image is wrong, however. More likely, today’s RE work will be found in a clandestine, well-funded uber-laboratory in an up-and-coming third-wo... » read more