Teaching Formal Methods in Application Domains A Case Study in Computer and Network Security

被引:0
|
作者
Brucker, Achim D. [1 ]
Marmsoler, Diego [1 ]
机构
[1] Univ Exeter, Dept Comp Sci, Exeter, Devon, England
来源
关键词
Formal Methods and Security; Protocol Verification; OFMC; Research-led Teaching; AUTHENTICATION;
D O I
10.1007/978-3-031-71379-8_8
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we report on our experience of teaching formal methods as part of an introductory computer and network security module. This module is part of an applied undergraduate computer science degree. As a consequence, we neither can rely on strong theoretical or mathematical foundations of the students, nor can we focus the whole term on applying formal methods in security. We address these challenges by integrating formal methods into a three-week-long section on security protocols. In these three weeks, we use a holistic approach for teaching the security objectives of security protocols, their analysis of actual implementations using a network sniffer, their formal verification using a model checker (and comparing it to an approach based on interactive theorem proving). Our approach has been proven successful in teaching (both, in-person and remotely) the benefits of formal methods to numerous students. The students do perform well in the corresponding assessments, and each year we are able to attract students for final year projects (i.e., their B.Sc. thesis) in the area of formal methods.
引用
收藏
页码:124 / 140
页数:17
相关论文
共 50 条
  • [1] Application of Security Metrics in Auditing Computer Network Security: A Case Study
    Premaratne, Upeka
    Samarabandu, Jagath
    Sidhu, Tarlochan
    Beresh, Bob
    Tan, Jian-Cheng
    2008 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION FOR SUSTAINABILITY (ICIAFS), 2008, : 448 - +
  • [2] New Cryptography and Computer Security Teaching Methods Using Network Technologies
    Shcherbakov A.Y.
    Shcherbakov, A. Yu. (x509@ras.ru), 1600, Pleiades journals (44): : 305 - 307
  • [3] Formal analysis methods of network security design
    Stawowski, Mariusz
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 313 - 318
  • [4] Study on the Application of Computer Network Resources in Japanese Teaching
    Li, Ya
    Journal of Physics: Conference Series, 2021, 1992 (03):
  • [5] Application of lightweight formal methods to software security
    Gilliam, DP
    Powell, JD
    Bishop, M
    FOURTEENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2005, : 160 - 165
  • [6] Methods for Strengthening a Computer Network Security
    Purboyo, Tito Waluyo
    Kuspriyanto
    PROCEEDINGS OF THE 2013 JOINT INTERNATIONAL CONFERENCE ON RURAL INFORMATION & COMMUNICATION TECHNOLOGY AND ELECTRIC-VEHICLE TECHNOLOGY (RICT & ICEV-T), 2013,
  • [7] A Study on Application of Neural Networks in Assessment of Computer Network Security
    Shen, Jifeng
    Xu, Jun
    Li, Kang
    Yang, Ke
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 141 - 145
  • [8] Application of formal methods to railway signalling. A case study
    Cullyer, John
    Wong, Wai
    Computing and Control Engineering Journal, 1993, 4 (01): : 15 - 22
  • [9] Application of formal methods to the analysis of web services security
    Tobarra, L
    Cazorla, D
    Cuartero, F
    Díaz, G
    FORMAL TECHNIQUES FOR COMPUTER SYSTEMS AND BUSINESS PROCESSES, PROCEEDINGS, 2005, 3670 : 215 - 229
  • [10] A Review of Computer Vision Methods in Network Security
    Zhao, Jiawei
    Masood, Rahat
    Seneviratne, Suranga
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (03): : 1838 - 1878