ACVIP Training Class Syllabus
ACVIP Overview
How ACVIP Solves Common MBSE Project Issues
Introduction to the ACVIP Workflow
ACVIP Resources and Solutions
Structuring Models for Delivery and Virtual Integration
Key Principles of ACVIP Modeling
Exercises: Introduction to Modeling in OSATE
Analysis Tools for Low Fidelity Model Analysis
Introduction to ACVIP Security and Separation Analysis
Exercises: Low Fidelity Model Analysis
Analysis Tools for High Fidelity Model Analysis
Introduction to ACVIP Utilization Analysis
Introduction to ACVIP Timing Analysis
Exercises: High Fidelity Model Analysis
Multi-Organization Model Based Development
Collaborative Development using ACVIP
Exercise: Distributed Model Development and Analysis
Multi-Organization Model Based Integration
Collaborative Integration using ACVIP
Exercise: Virtual Integration
SysML to AADL
SysML / AADL Profile
SysML / AADL Bridge Tool
Exercise: Generate AADL from a SysML model
ACVIP in a Larger Context
Working with Model from Other Sources
ACVIP Report Card
Exercise: Course Survey
Most Recent Tech Talk
Title CVE-2022-37454: A Buffer Overflow Vulnerability Affecting Implementations Of SHA-3
Date Thursday, May 16, 2024
Time 9:30 am
Speaker Nicky Mouha
Location Arlington, VA
About Abstract: For over a decade, a buffer overflow vulnerability in the "official" SHA-3 implementation by its designers remained unnoticed. This vulnerability was assigned CVE-2022-37454 and impacted several projects such as Python and PHP that relied on this implementation. We provide a proof of concept for arbitrary code execution and explain how we found the vulnerability using the KLEE symbolic execution tool. In light of the upcoming NIST Workshop on Formal Methods within Certification Programs (FMCP 2024), we give an overview of various approaches to mitigate these types of bugs in cryptographic implementations and discuss both their cost and effectiveness.
Bio: Dr. Nicky Mouha is a researcher in cryptography with more than 15 years of experience. Besides his research, he is involved in various standardization activities, mainly at NIST and ISO, including the organization of the upcoming NIST Workshop on Formal Methods within Certification Programs (FMCP 2024). He invented the MILP- and SAT-based techniques for differential and linear cryptanalysis and designed the lightweight Chaskey algorithm (standardized in ISO/IEC 29192-6) which is now widely deployed in the automotive industry. He also discovered vulnerabilities in billions of devices, such as a buffer overflow in the "official" SHA-3 implementation (CVE-2022-37454).
Portland, OR
421 SW 6th Avenue, Suite 300
Portland, Oregon 97204
Arlington, VA
901 N Stuart Street, Suite 501
Arlington, Virginia 22203
Minneapolis, MN
111 Third Avenue South, Suite 350
Minneapolis, MN 55401
Dayton, OH
444 E 2nd Street
Dayton, Ohio 45402
contact@galois.com