Teaching Formal Methods in Application Domains A Case Study in Computer and Network Security

被引:0
|
作者
Brucker, Achim D. [1 ]
Marmsoler, Diego [1 ]
机构
[1] Univ Exeter, Dept Comp Sci, Exeter, Devon, England
来源
关键词
Formal Methods and Security; Protocol Verification; OFMC; Research-led Teaching; AUTHENTICATION;
D O I
10.1007/978-3-031-71379-8_8
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we report on our experience of teaching formal methods as part of an introductory computer and network security module. This module is part of an applied undergraduate computer science degree. As a consequence, we neither can rely on strong theoretical or mathematical foundations of the students, nor can we focus the whole term on applying formal methods in security. We address these challenges by integrating formal methods into a three-week-long section on security protocols. In these three weeks, we use a holistic approach for teaching the security objectives of security protocols, their analysis of actual implementations using a network sniffer, their formal verification using a model checker (and comparing it to an approach based on interactive theorem proving). Our approach has been proven successful in teaching (both, in-person and remotely) the benefits of formal methods to numerous students. The students do perform well in the corresponding assessments, and each year we are able to attract students for final year projects (i.e., their B.Sc. thesis) in the area of formal methods.
引用
收藏
页码:124 / 140
页数:17
相关论文
共 50 条
  • [21] Information Visualization Applied to Computer Network Security A Case Study of a Wireless Network of a University
    de Camargo, Luiz F.
    Moraes, Alessandro
    Dias, Diego R. C.
    Brega, Jose R. F.
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2020, PT II, 2020, 12250 : 44 - 59
  • [22] The Study on Computer Network Security and Precaution
    Sun Xiaoling
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 1695 - 1698
  • [23] The application of tennis teaching in computer network environment
    Chen J.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [24] Mode and Application Analysis on the Computer Network Teaching
    Huang, Jinshan
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE, EDUCATION TECHNOLOGY, ARTS, SOCIAL SCIENCE AND ECONOMICS (MSETASSE-16), 2016, 85 : 224 - 228
  • [25] Research on application of neural network in computer network security evaluation
    Jin, Shujuan (jinshujuan@163.com), 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (08):
  • [26] Research on application of neural network in computer network security evaluation
    Jin, Shujuan
    Open Electrical and Electronic Engineering Journal, 2015, 8 (01): : 766 - 771
  • [27] Experimental Teaching Research and Practice of "Computer Network Security Technology"
    Peng Hehuan
    Wei Li
    Ran Xinxia
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 610 - 612
  • [28] Teaching Research and Practice Based on CDIO in Computer Network Security
    Yang, Ou
    Dai, GuangZhi
    ICFCSE 2011: 2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SUPPORTED EDUCATION, VOL 2, 2011, : 308 - 310
  • [29] Teaching Web Application Development: A Case Study in a Computer Science Course
    Del Fabro, Marcos Didonet
    de Almeida, Eduardo Cunha
    Sluzarski, Fabiano
    INFORMATICS IN EDUCATION, 2012, 11 (01): : 29 - 44
  • [30] Computer Science Technology and Network Technology in the Application of the Computer Room Security
    Yang Zi-yan
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 1404 - 1406