Abstract:
Security played a significant role in the development of formal methods in the 70s and early 80s. Have the tables turned? Are formal methods now ready to play a significa...Show MoreMetadata
Abstract:
Security played a significant role in the development of formal methods in the 70s and early 80s. Have the tables turned? Are formal methods now ready to play a significant role in the development of more secure systems? While not a panacea, the answer is yes, formal methods can and should play such a role. In this paper we first review the limits of formal methods. Then after a brief historical excursion, we summarize some recent results on how model checking and theorem proving tools revealed new and known flaws in authentication protocols. Looking to the future we discuss the challenges and opportunities for formal methods in analyzing the security of systems, above and beyond the protocol level.
Published in: Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358)
Date of Conference: 07-09 July 1998
Date Added to IEEE Xplore: 06 August 2002
Print ISBN:0-7695-0337-3
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Formal Methods ,
- Cybersecurity ,
- National Science Foundation ,
- Model Checking ,
- Authentication Protocol ,
- Model Formulation ,
- Essential Step ,
- Properties Of Systems ,
- Computer System ,
- Environmental Systems ,
- Protocol Design ,
- Specific Language ,
- Correction Algorithm ,
- State Machine ,
- Logic Model ,
- Formation Of Communities ,
- Public Key ,
- Security Protocols ,
- High-level Design ,
- Security Community ,
- File Access ,
- Coprocessor ,
- File Transfer Protocol ,
- Degree Of Security
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Formal Methods ,
- Cybersecurity ,
- National Science Foundation ,
- Model Checking ,
- Authentication Protocol ,
- Model Formulation ,
- Essential Step ,
- Properties Of Systems ,
- Computer System ,
- Environmental Systems ,
- Protocol Design ,
- Specific Language ,
- Correction Algorithm ,
- State Machine ,
- Logic Model ,
- Formation Of Communities ,
- Public Key ,
- Security Protocols ,
- High-level Design ,
- Security Community ,
- File Access ,
- Coprocessor ,
- File Transfer Protocol ,
- Degree Of Security