A Survey of Practical Formal Methods for Security

被引:19
|
作者
Kulik, Tomas [1 ]
Dongol, Brijesh [2 ]
Larsen, Peter Gorm [1 ]
Macedo, Hugo Daniel [1 ]
Schneider, Steve [2 ]
Tran-Jorgensen, Peter W., V [3 ]
Woodcock, James [1 ,4 ]
机构
[1] Aarhus Univ, Finlandsgade 22, DK-8200 Aarhus, Denmark
[2] Univ Surrey, Guildford, Surrey, England
[3] Bank Data, Aarhus, Denmark
[4] Univ York, York, N Yorkshire, England
基金
英国工程与自然科学研究理事会;
关键词
Formal Methods; model checking; theorem proving; cyber security; MODEL CHECKING; AUTHENTICATION SCHEME; AUTOMATED VALIDATION; VERIFICATION; FRAMEWORK; PLATFORM; SYSTEMS; DESIGN; LOGIC; TRUST;
D O I
10.1145/3522582
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In today???s world, critical infrastructure is often controlled by computing systems. This introduces new risks for cyber attacks, which can compromise the security and disrupt the functionality of these systems. It is therefore necessary to build such systems with strong guarantees of resiliency against cyber attacks. One way to achieve this level of assurance is using formal verification, which provides proofs of system compli-ance with desired cyber security properties. The use of Formal Methods (FM) in aspects of cyber security and safety-critical systems are reviewed in this article. We split FM into the three main classes: theorem proving, model checking, and lightweight FM. To allow the different uses of FM to be compared, we define a common set of terms. We further develop categories based on the type of computing system FM are applied in. Solu-tions in each class and category are presented, discussed, compared, and summarised. We describe historical highlights and developments and present a state-of-the-art review in the area of FM in cyber security. This review is presented from the point of view of FM practitioners and researchers, commenting on the trends in each of the classes and categories. This is achieved by considering all types of FM, several types of se-curity and safety-critical systems, and by structuring the taxonomy accordingly. The article hence provides a comprehensive overview of FM and techniques available to system designers of security-critical systems, simplifying the process of choosing the right tool for the task. The article concludes by summarising the dis-cussion of the review, focusing on best practices, challenges, general future trends, and directions of research within this field.
引用
收藏
页数:39
相关论文
共 50 条
  • [1] Applying practical formal methods to the specification and analysis of security properties
    Heitmeyer, C
    [J]. INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 84 - 89
  • [2] On the need for practical formal methods
    Heitmeyer, C
    [J]. FORMAL TECHNIQUES IN REAL-TIME AND FAULT-TOLERANT SYSTEMS, 1998, 1486 : 18 - 26
  • [3] Formal methods for web security
    Bugliesi, Michele
    Calzavara, Stefano
    Focardi, Riccardo
    [J]. JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2017, 87 : 110 - 126
  • [4] On the role of formal methods in security
    Rao, JR
    [J]. INFORMATION PROCESSING LETTERS, 2001, 77 (2-4) : 209 - 212
  • [5] Formal methods and security evaluation
    Bolignano, D
    [J]. THEOREM PROVING IN HIGHER ORDER LOGICS, PROCEEDINGS, 1999, 1690 : 291 - 291
  • [6] Formal methods for smartcard security
    Barthe, G
    Dufay, G
    [J]. FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 133 - 177
  • [7] Formal methods for security - Overview
    Gong, L
    Guttmann, J
    Ryan, P
    Schneider, S
    Bux, W
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2003, 21 (01) : 1 - 4
  • [8] Formal methods: practical applications and foundationsEditorial
    Maurice H. ter Beek
    Annabelle McIver
    [J]. Formal Methods in System Design, 2021, 58 : 1 - 4
  • [9] Integrating Formal Methods for Security in Software Security Education
    Modesti, Paolo
    [J]. INFORMATICS IN EDUCATION, 2020, 19 (03): : 425 - 454
  • [10] What Happened to Formal Methods for Security?
    Schaffer, Kim
    Voas, Jeffrey
    [J]. COMPUTER, 2016, 49 (08) : 70 - 79