On the role of formal methods in security

被引:1
|
作者
Rao, JR [1 ]
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
关键词
program correctness; formal methods; separation of concerns; layers of abstraction; cryptography; block cipher design; power analysis;
D O I
10.1016/S0020-0190(00)00216-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Separation of concerns and layers of abstraction have long been advocated by proponents of programming methodology and have been used effectively far building large scale systems. In this paper, we use recent developments on power analysis attacks on cryptographic implementations to raise some questions about the applicability of these approaches especially to cryptography and security. (C) 2001 Published by Elsevier Science B.V.
引用
收藏
页码:209 / 212
页数:4
相关论文
共 50 条
  • [1] Formal methods for web security
    Bugliesi, Michele
    Calzavara, Stefano
    Focardi, Riccardo
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2017, 87 : 110 - 126
  • [2] Formal methods and security evaluation
    Bolignano, D
    THEOREM PROVING IN HIGHER ORDER LOGICS, PROCEEDINGS, 1999, 1690 : 291 - 291
  • [3] Formal methods for smartcard security
    Barthe, G
    Dufay, G
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 133 - 177
  • [4] Formal methods for security - Overview
    Gong, L
    Guttmann, J
    Ryan, P
    Schneider, S
    Bux, W
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2003, 21 (01) : 1 - 4
  • [5] Integrating Formal Methods for Security in Software Security Education
    Modesti, Paolo
    INFORMATICS IN EDUCATION, 2020, 19 (03): : 425 - 454
  • [6] What Happened to Formal Methods for Security?
    Schaffer, Kim
    Voas, Jeffrey
    COMPUTER, 2016, 49 (08) : 70 - 79
  • [7] SECURITY ARCHITECTURES USING FORMAL METHODS
    BOYD, C
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) : 694 - 701
  • [8] A Survey of Practical Formal Methods for Security
    Kulik, Tomas
    Dongol, Brijesh
    Larsen, Peter Gorm
    Macedo, Hugo Daniel
    Schneider, Steve
    Tran-Jorgensen, Peter W., V
    Woodcock, James
    FORMAL ASPECTS OF COMPUTING, 2022, 34 (01)
  • [9] Formal methods for assuring security of protocols
    Older, S
    Chin, SK
    COMPUTER JOURNAL, 2002, 45 (01): : 46 - 54
  • [10] Formal methods for security in the Xenon hypervisor
    Freitas L.
    McDermott J.
    International Journal on Software Tools for Technology Transfer, 2011, 13 (05) : 463 - 489