Teaching Formal Methods in Application Domains A Case Study in Computer and Network Security

被引:0
|
作者
Brucker, Achim D. [1 ]
Marmsoler, Diego [1 ]
机构
[1] Univ Exeter, Dept Comp Sci, Exeter, Devon, England
来源
关键词
Formal Methods and Security; Protocol Verification; OFMC; Research-led Teaching; AUTHENTICATION;
D O I
10.1007/978-3-031-71379-8_8
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we report on our experience of teaching formal methods as part of an introductory computer and network security module. This module is part of an applied undergraduate computer science degree. As a consequence, we neither can rely on strong theoretical or mathematical foundations of the students, nor can we focus the whole term on applying formal methods in security. We address these challenges by integrating formal methods into a three-week-long section on security protocols. In these three weeks, we use a holistic approach for teaching the security objectives of security protocols, their analysis of actual implementations using a network sniffer, their formal verification using a model checker (and comparing it to an approach based on interactive theorem proving). Our approach has been proven successful in teaching (both, in-person and remotely) the benefits of formal methods to numerous students. The students do perform well in the corresponding assessments, and each year we are able to attract students for final year projects (i.e., their B.Sc. thesis) in the area of formal methods.
引用
收藏
页码:124 / 140
页数:17
相关论文
共 50 条
  • [41] Research on the Application of Computer Cloud Technology in Network Teaching
    Wang, Rui
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN ECONOMIC MANAGEMENT AND SOCIAL SCIENCE (IEMSS 2017), 2017, 29 : 1621 - 1625
  • [42] Formal methods for safety-critical embedded software - Flight warning computer case study
    Courty, Patrick
    Hodgson, Ian
    Electronic Engineering (London), 2002, 74 (904): : 28 - 32
  • [43] Formal methods for safety-critical embedded software - flight warning computer case study
    Courty, P
    Hodgson, I
    ELECTRONIC ENGINEERING DESIGN, 2002, 74 (904): : 28 - +
  • [44] A case study on applying formal methods to medical devices: Computer-aided resuscitation algorithm
    Jetley R.P.
    Carlos C.
    Iyer S.P.
    International Journal on Software Tools for Technology Transfer, 2004, 5 (04) : 320 - 330
  • [45] An experiment in parallelizing an application using formal methods -: Computer aided parallelization
    Couturier, R
    Méry, D
    COMPUTER AIDED VERIFICATION, 1998, 1427 : 345 - 356
  • [46] Research on teaching reform about computer network of the information security professional
    Fe Jin-long
    Kang Fei
    Liu Sheng-li
    Liu Nan
    NATIONAL TEACHING SEMINAR ON CRYPTOGRAPHY AND INFORMATION SECURITY (2010NTS-CIS), PROCEEDINGS, 2010, : 51 - 53
  • [47] Using formal methods to increase confidence in a home network system implementation: a case study
    du Bousquet, Lydie
    Nakamura, Masahide
    Yan, Ben
    Igaki, Hiroshi
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2009, 5 (03) : 181 - 196
  • [48] Study on Applying the Neural Network in Computer Network Security Assessment
    Zhou Lianbing
    PROCEEDINGS 2016 EIGHTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION ICMTMA 2016, 2016, : 639 - 642
  • [49] Application of the Data Encryption Technology in the Computer Network Communication Security
    Hu, Xiaoling
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 126 : 283 - 283
  • [50] The Application of Data Encryption Technology in Computer Network Communication Security
    Gong, Lina
    Zhang, Li
    Zhang, Wei
    Li, Xuhong
    Wang, Xia
    Pan, Wenwen
    2017 5TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2017), 2017, 1834