Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Michael Mcdougall is active.

Publication


Featured researches published by Michael Mcdougall.


computer aided verification | 2002

Exploiting Behavioral Hierarchy for Efficient Model Checking

Rajeev Alur; Michael Mcdougall; Zijiang Yang

Inspired by the success of model checking in hardware and protocol verification, model checking techniques for software have been the focus of a lot of research in the last few years [5,3,2,6]. Model checking can be applied only to relatively small models due to its inherently high computational requirements, and there are two complementary trends to address scalability. The model extraction approach, exemplified by projects such as Bandera [6] and SLAM [3], involves constructing inputs to model checkers by abstracting programs written in languages such as C and Java. The model-based design approach, exemplified by modeling notations such as Statecharts [7], promotes design using high-level models that are compiled into code. Our research agenda is to develop model checking techniques for model-based design of software.


embedded software | 2004

A model-based approach to integrating security policies for embedded devices

Michael Mcdougall; Rajeev Alur; Carl A. Gunter

Embedded devices like smartcards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In this paper we show how a framework based on a concise formal model lets us securely customize a payment card equipped with a programmable chip. We present policy automata, a formal model of computations that grant or deny access to a resource. This model combines defeasible logic with state machines, representing complex policies as combinations of simpler modular policies. We use the model in a framework for specifying, merging and analyzing modular policies. This framework is implemented as Polaris, a tool which analyzes policy automata to reveal potential conflicts or redundancies, and compiles automata into Java Card applets.


computer aided verification | 2000

Efficient Reachability Analysis of Hierarchical Reactive Machines

Rajeev Alur; Radu Grosu; Michael Mcdougall

Hierarchical state machines is a popular visual formalism for software specifications. To apply automated analysis to such specifications, the traditional approach is to compile them to existing model checkers. Aimed at exploiting the modular structure more effectively, our approach is to develop algorithms that work directly on the hierarchical structure. First, we report on an implementation of a visual hierarchical language with modular features such as nested modes, variable scoping, mode reuse, exceptions, group transitions, and history. Then, we identify a variety of heuristics to exploit these modular features during reachability analysis. We report on an enumerative as well as a symbolic checker, and case studies.


compilers, architecture, and synthesis for embedded systems | 2002

Predictable programs in barcodes

Alwyn Goodloe; Michael Mcdougall; Carl A. Gunter; Rajeev Alur

We explore the challenges for making the programming interfaces for embedded devices open and safe, and present a prototype architecture for delivering verified programs using barcodes. In particular, we consider programs for microwave ovens, which provide a basic open API for controlling cooking times. In our architecture, recipes are written in Java, and their safety properties are formally verified using the model checker Spin. We use off-the-shelf utilities for compressing the byte code, and use two-dimensional barcodes for program delivery. We report on experiments that demonstrate the feasibility of the proposed architecture for predictability and delivery.


Lecture Notes in Computer Science | 2000

Certificate Distribution with Local Autonomy

Pankaj Kakkar; Michael Mcdougall; Carl A. Gunter; Trevor Jim

Any security architecture for a wide area network system spanning multiple administrative domains will require support for policy delegation and certificate distribution across the network. Practical solutions will support local autonomy requirements of participating domains by allowing local policies to vary but imposing restrictions to ensure overall coherence of the system. This paper describes the design of a such a system to control access to experiments on the ABone active network testbed. This is done through a special-purpose language extending the Query Certificate Manager (QCM) system to include protocols for secure mirroring. Our approach allows significant local autonomy while ensuring global security of the system by integrating verification with retrieval. This enables transparent support for a variety of certificate distribution protocols. We analyze requirements of the ABONE application, describe the design of a security infrastructure for it, and discuss steps toward implementation, testing and deployment of the system.


Archive | 2003

Method and system for providing secure access to applications

Robert George Levas; Carl A. Gunter; Michael Goldstein; Hong Xiang Gao; Benjamin Paul Hollin; Ron Reuven Lin; Michael Mcdougall; David J. Ruggieri; Vincent Louis; Michael C. Berry


Lecture Notes in Computer Science | 2000

Efficient reachability analysis of hierarchical reactive machines

Rajeev Alur; Radu Grosu; Michael Mcdougall


Archive | 2004

System and method for using open apis to provide integrated security policies for flexible management and customization of payment instruments

Carl A. Gunter; Rajeev Alur; Alwyn Goodloe; Michael Mcdougall


Archive | 1999

Credential Distribution with Local Autonomy

Kakkar Pankaj; Michael Mcdougall; Gunter Ca; Trevor Jim


Archive | 2005

Modeling and analyzing integrated policies

Michael Mcdougall; Carl A. Gunter; Rajeev Alur

Collaboration


Dive into the Michael Mcdougall's collaboration.

Top Co-Authors

Avatar

Rajeev Alur

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Alwyn Goodloe

National Institute of Aerospace

View shared research outputs
Top Co-Authors

Avatar

Zijiang Yang

Western Michigan University

View shared research outputs
Top Co-Authors

Avatar

Radu Grosu

Vienna University of Technology

View shared research outputs
Top Co-Authors

Avatar

Pankaj Kakkar

University of Pennsylvania

View shared research outputs
Researchain Logo
Decentralizing Knowledge