2022
DOI: 10.1145/3522582
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Practical Formal Methods for Security

Abstract: In today’s world, critical infrastructure is often controlled by computing systems. This introduces new risks for cyber attacks, which can compromise the security and disrupt the functionality of these systems. It is therefore necessary to build such systems with strong guarantees of resiliency against cyber attacks. One way to achieve this level of assurance is using formal verification, which provides proofs of system compliance with desired cyber security properties. The use of Formal Methods (FM) in aspect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(17 citation statements)
references
References 242 publications
(243 reference statements)
0
17
0
Order By: Relevance
“…Formal methods and models are used in a variety of different fields and applications including security protocols, hardware and software development, financial computing, and industrial processes [10].…”
Section: A Applications Of Formal Methods and Modelsmentioning
confidence: 99%
“…Formal methods and models are used in a variety of different fields and applications including security protocols, hardware and software development, financial computing, and industrial processes [10].…”
Section: A Applications Of Formal Methods and Modelsmentioning
confidence: 99%
“…The init state represents the initial condition, and all successive steps must adhere to the rules described by the next-state relation . A state explosion [ 46 ] is a phenomenon that occurs when the number of possible states in a formal model becomes too large to be manageable. It can be a major challenge when it comes to analyzing and understanding complex systems.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Security and privacy considerations for the domain of ubiquitous computing are given in [ 29 ]. In general, the application of formal models and model checking in cyber security is reviewed in [ 30 ]. Additionally, broader cybersecurity issues on the organisational and management level with regard to standards in cloud computing are given in [ 31 ].…”
Section: Related Workmentioning
confidence: 99%