In this paper, we show a security engineering process based on a formal notion of refinement fully formalized in the proof assistant Isabelle. This Refinement-Risk Cycle focuses on attack analysis and security refinement supported by interactive theorem proving. Since we use a fully formalized model of infrastructures with actors and policies we can support a novel way of formal security refinement for system specifications. This formal process is built practically as an extension to the Isabelle Infrastructure framework with attack trees. We define a formal notion of refinement on infrastructure models. Thanks to the formal foundation of Kripke structures and branching time temporal logic in the Isabelle Infrastructure framework, these ste...
We embed an untyped security protocol model in the interactive theorem prover Isabelle/HOL and deriv...
The Isabelle Insider framework formalises the technique of social explanation for modeling and analy...
We embed an untyped security protocol model in the interactive the-orem prover Isabelle/HOL and deri...
In this paper, we introduce a process of formal system development supported by interactive theorem ...
In this article, we present a proof theory for Attack Trees. Attack Trees are a well established and...
Attack trees are an important modeling formalism to identify and quantify attacks on security and pr...
In this paper, we show how to derive formal spec- ifications of secure IoT systems by a process that...
In this paper, we present a proof theory for attack trees. Attack trees are a well established and u...
Inthispaper,weproposetheuseofinteractivetheoremprov- ing for explainable machine learning. After inf...
Security modeling is the foundation to formal verification which is a core requirement for high ass...
In this paper, we integrate previously developed formal methods to model infrastructure, actors, and...
Avionics is one of the fields in which verification methods have been pioneered and brought a new le...
We propose a development method for security protocols based on stepwise refinement. Our refinement ...
We propose a development method for security protocols based on stepwise re-finement. Our refinement...
We propose a general approach based on abstraction and refinement for constructing and analysing sec...
We embed an untyped security protocol model in the interactive theorem prover Isabelle/HOL and deriv...
The Isabelle Insider framework formalises the technique of social explanation for modeling and analy...
We embed an untyped security protocol model in the interactive the-orem prover Isabelle/HOL and deri...
In this paper, we introduce a process of formal system development supported by interactive theorem ...
In this article, we present a proof theory for Attack Trees. Attack Trees are a well established and...
Attack trees are an important modeling formalism to identify and quantify attacks on security and pr...
In this paper, we show how to derive formal spec- ifications of secure IoT systems by a process that...
In this paper, we present a proof theory for attack trees. Attack trees are a well established and u...
Inthispaper,weproposetheuseofinteractivetheoremprov- ing for explainable machine learning. After inf...
Security modeling is the foundation to formal verification which is a core requirement for high ass...
In this paper, we integrate previously developed formal methods to model infrastructure, actors, and...
Avionics is one of the fields in which verification methods have been pioneered and brought a new le...
We propose a development method for security protocols based on stepwise refinement. Our refinement ...
We propose a development method for security protocols based on stepwise re-finement. Our refinement...
We propose a general approach based on abstraction and refinement for constructing and analysing sec...
We embed an untyped security protocol model in the interactive theorem prover Isabelle/HOL and deriv...
The Isabelle Insider framework formalises the technique of social explanation for modeling and analy...
We embed an untyped security protocol model in the interactive the-orem prover Isabelle/HOL and deri...