Formal methods have been largely thought of in the context of safety-critical systems, where they have achieved major acceptance. Tens of millions of people trust their lives every day to such systems, based on formal proofs rather than "we haven’t found a bug" (yet!); but why is "we haven’t found a bug" an acceptable basis for systems trusted with hundreds of millions of people’s personal data?This paper looks at some of these issues in cybersecurity, and the extent to which formal methods, ranging from "fully verified" to better tool support, could help. More importantly, recent policy reports and curricula initiatives appear to recommended formal methods in the limited context of "safety critical applications"; we suggest this is too lim...
This research examines how software specifications could be used to build more-secure software. For ...
As soon as major protocol flaws were discovered empirically — a good luck that is not older than the...
A troubling development in the cyber realm is society’s acceptance of the expectation that all softw...
In today's world, critical infrastructure is often controlled by computing systems. This introduces ...
AbstractThis paper describes how formal methods were used to produce evidence in a certification, ba...
Abstract • " Security played a significant role in the development of formal methods in the...
Security of software systems is a critical issue in a world where Information Technology is becoming...
Security of software systems is a critical issue in a world where Information Technology is becoming...
Abstract: As soon as major protocol flaws were discovered empirically -a good luck that is not older...
Security of software systems is a critical issue in a world where Information Technology is becoming...
Security and trust are two properties of modern computing systems that are the focus of much recent ...
peer-reviewedIn one aspect of our life or another, today we all live with AI. For example, the mech...
AbstractWe argue that formal analysis tools for security protocols are not achieving their full pote...
We present an approach to improving the security of complex, composed systems based on formal langua...
Despite thirty years of study by the academic community, industry has not embraced the systematic us...
This research examines how software specifications could be used to build more-secure software. For ...
As soon as major protocol flaws were discovered empirically — a good luck that is not older than the...
A troubling development in the cyber realm is society’s acceptance of the expectation that all softw...
In today's world, critical infrastructure is often controlled by computing systems. This introduces ...
AbstractThis paper describes how formal methods were used to produce evidence in a certification, ba...
Abstract • " Security played a significant role in the development of formal methods in the...
Security of software systems is a critical issue in a world where Information Technology is becoming...
Security of software systems is a critical issue in a world where Information Technology is becoming...
Abstract: As soon as major protocol flaws were discovered empirically -a good luck that is not older...
Security of software systems is a critical issue in a world where Information Technology is becoming...
Security and trust are two properties of modern computing systems that are the focus of much recent ...
peer-reviewedIn one aspect of our life or another, today we all live with AI. For example, the mech...
AbstractWe argue that formal analysis tools for security protocols are not achieving their full pote...
We present an approach to improving the security of complex, composed systems based on formal langua...
Despite thirty years of study by the academic community, industry has not embraced the systematic us...
This research examines how software specifications could be used to build more-secure software. For ...
As soon as major protocol flaws were discovered empirically — a good luck that is not older than the...
A troubling development in the cyber realm is society’s acceptance of the expectation that all softw...