蜜桃直播

Dr Antonio Cau

Job: Senior Research Fellow

Faculty: Computing, Engineering and Media

School/department: School of Computer Science and Informatics

Research group(s): Software Technology Research Laboratory

Address: 蜜桃直播, The Gateway, Leicester, LE1 9BH, United Kingdom

T: +44 (0)116 257 7937

E: cau@dmu.ac.uk

W:

 

Personal profile

Dr. Antonio Cau gained his MSc in Computer Science from Eindhoven University of Technology (The Netherlands). He then joined Christian Albrechts University of Kiel (Germany) as a junior lecturer where he was awarded his PhD. He subsequently worked as a Research Associate on the EPSRC project `A Compositional Approach to the Specification of Systems using ITL and Tempura'. Dr. A. Cau is currently a University Senior Research Fellow at the Software Technology Research Laboratory, 蜜桃直播.

Dr. Cau's main interests are the compositional verification and specification of critical systems using formal methods. He has developed several tools (AnaTempura, FLCheck) that can be used to accomplish this task.

Research group affiliations

Software Technology Research Laboratory (STRL)

Publications and outputs


  • dc.title: Runtime-Monitoring for Industrial Control Systems dc.contributor.author: Janicke, Helge; Nicholson, Andrew; Webber, S.; Cau, A. (Antonio)

  • dc.title: A Novel Approach to Worm Detection Systems dc.contributor.author: Al-Saawy, Yazed B.; Siewe, Francois; Cau, A. (Antonio) dc.description.abstract: Computer worms are a type of malicious malware that prey on networked machines. A number of different detection mechanisms have been presented in the literature to detect worms. However, a common drawback of these mechanisms is that any failure to detect the worms results in damaging the real machines. This study proposes a new approach to detection that goes beyond the currently available signature and behavior-based approaches. In contrast to the traditional worm detection system (饾憡饾惙饾憜) that use signature and behavior-based approaches, our proposed approach is based on detection by the damage caused by worms on dummy machines rather than the real machines. The proposed 饾憡饾惙饾憜 adds additional security as compared to the currently used systems by allowing worms to conduct their normal behavior in a dummy host, thus protecting the rest of the network from damage. The proposed 饾憡饾惙饾憜 was designed within a network setting and was capable of sending and receiving files and messages between hosts as part of the overall detection mechanism.

  • dc.title: Verification and enforcement of access control policies dc.contributor.author: Cau, A. (Antonio); Janicke, Helge; Moszkowski, B. C.

  • dc.title: A framework for the detection and prevention of SQL injection attacks dc.contributor.author: Shafie, E.; Cau, A. (Antonio)

  • dc.title: Formalising of transactional memory using interval temporal logic (ITL) dc.contributor.author: El-kustaban, Amin Mohammed Ahmed; Moszkowski, B. C.; Cau, A. (Antonio)

  • dc.title: Behavioural API based Virus Analysis and Detection dc.contributor.author: Al Amro, S.; Cau, A. (Antonio) dc.description.abstract: The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. To address the limitation of traditional AVs, we proposed a virus detection system based on extracting Application Program Interface (API) calls from virus behaviours. The proposed research uses a temporal logic and behaviour-based detection mechanism to detect viruses at both user and kernel level. Interval Temporal Logic (ITL) will be used for virus specifications, properties and formulae based on the analysis of API calls representing the behaviour of computer viruses.

  • dc.title: Specification analysis of transactional memory using ITL and AnaTempura dc.contributor.author: El-kustaban, Amin Mohammed Ahmed; Moszkowski, B. C.; Cau, A. (Antonio)

  • dc.title: Dynamic Access Control Policies - Specification and Verification dc.contributor.author: Janicke, Helge; Cau, A. (Antonio); Siewe, Francois; Zedan, Hussein dc.description.abstract: Security requirements deal with the protection of assets against unauthorized access (disclosure or modification) and their availability to authorized users. Temporal constraints of history-based access control policies are difficult to express naturally in traditional policy languages. We propose a compositional formal framework for the specification and verification of temporal access control policies for security critical systems in which history-based policies and other temporal constraints can be expressed. In particular, our framework allows for the specification of policies that can change dynamically in response to time or events enabling dynamic reconfiguration of the access control mechanisms. The framework utilizes a single well-defined formalism, interval temporal logic, for defining the semantics of these policies and to reason about them.We illustrate our approach with a detailed case study of an electronic paper submission system showing the compositional verification of their safety, liveness and information flow properties.

  • dc.title: Behaviour-based virus detection system using interval temporal logic. dc.contributor.author: Al Amro, S.; Cau, A. (Antonio)

  • dc.title: Towards a multilingual semantic folksonomy. dc.contributor.author: Magableh, Murad; Cau, A. (Antonio); Zedan, Hussein; Ward, Martin

Research interests/expertise

Verification and specification of critical systems using maths and logic

Areas of teaching

Software Engineering

Qualifications

PhD, (Kiel, Germany)

MSc, (Eindhoven, The Netherlands)

蜜桃直播 taught

Rigorous Systems

Formal Methods Engineering

Membership of professional associations and societies

IEEE

ACM

KIVI

Current research students

First supervisor for:

Sami Alsarhani
Yazed Alsaawy
Emad Shafie
Bader Alouffi
David Smallwood
Sulaiman Al Amro

 

Second supervisor for:

Laila Alhimale
Salem Almarri
Adeeb Ali Alnajjar
Khaled Alodadi
Fahad Alqahtani
Ali Mousa G Alzahrani
Abdullah Dabil

Externally funded research grants information

Project Title: Trust Management in Collaborative Systems (aToMICS)
Funded By: Defence Technology Centre in Data and Information Fusion DIF-DTC (MoD, QinetiQ)
Start Date: 1st October 2006
End Date: 31st March 2009
Role: Project manager
Collaborators: Members of the DIF-DTC consortium: BT, QinetiQ, General Dynamics, Imperial College and the Universities of Bristol, Cardiff, Cambridge, Southampton, De Montfort, Surrey and Cranfield.

Professional esteem indicators

Journal reviews:

2012, Transactions on Computational Logic
2012, Journal of Logic and Algebraic Programming
2011, Journal of Computer Science and Technology
2011, Control Engineering Practice
2010, Software and System Modeling (SoSyM) journal
2010, Formal Methods in System Design
2009, Fundamenta Informaticae
2008, Formal Aspects of Computing
2008, Journal of Systems and Software
2008, Journal of Zhejiang University-SCIENCE A
2008, Control Engineering Practice

Conference reviews:

TIME 12, 12-14 September, PC member, Organizing committee member and reviewer
SANES 2012, 24 - 26 February, 2012: PC member and reviewer
AEECT 2011, 6-8 December: PC member and reviewer
Casemans 2011, 17-21 September: PC member and reviewer
TIME11, 12-14 September: PC member and reviewer
Informatics 2011, 20 - 22 July: PC member and reviewer
LATA2011, 26-31 May: reviewer
Casemans 2010, 26-29 September: PC member and reviewer
CSL 2010, 23 - 27 August: reviewer
Informatics 2010, 26 - 28 July: PC member and reviewer
Informatics 2009, 17 - 19 June: PC member and reviewer
YRSOC 2008, 12- 13 June: PC member and reviewer
SEFM-08, 10 - 14 November: reviewer