On the role of formal methods in security

被引:1
|
作者
Rao, JR [1 ]
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
关键词
program correctness; formal methods; separation of concerns; layers of abstraction; cryptography; block cipher design; power analysis;
D O I
10.1016/S0020-0190(00)00216-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Separation of concerns and layers of abstraction have long been advocated by proponents of programming methodology and have been used effectively far building large scale systems. In this paper, we use recent developments on power analysis attacks on cryptographic implementations to raise some questions about the applicability of these approaches especially to cryptography and security. (C) 2001 Published by Elsevier Science B.V.
引用
收藏
页码:209 / 212
页数:4
相关论文
共 50 条
  • [11] Formal Methods for Socio-technical Security (Formal and Automated Analysis of Security Ceremonies)
    Vigano, Luca
    COORDINATION MODELS AND LANGUAGES, 2022, 13271 : 3 - 14
  • [12] Application of lightweight formal methods to software security
    Gilliam, DP
    Powell, JD
    Bishop, M
    FOURTEENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2005, : 160 - 165
  • [13] Special issue on formal methods for security engineering
    Santone, Antonella
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2018, 14 (04) : 251 - 251
  • [14] Security and Privacy of Protocols and Software with Formal Methods
    Biondi, Fabrizio
    Legay, Axel
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: FOUNDATIONAL TECHNIQUES, PT I, 2016, 9952 : 883 - 892
  • [15] Formal analysis methods of network security design
    Stawowski, Mariusz
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 313 - 318
  • [16] A review on security requirements specification by formal methods
    Mishra, Aditya Dev
    Mustafa, Khurram
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (05):
  • [17] Security and Privacy in Big Data: Challenges and Formal Methods
    Han, Jinguang
    Rahulamathavan, Yogachandran
    Susilo, Willy
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (06) : 641 - 643
  • [18] A Formal Methods Approach to Security Requirements Specification and Verification
    Rouland, Quentin
    Hamid, Brahim
    Bodeveix, Jean-Paul
    Filali, Mamoun
    2019 24TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2019), 2019, : 236 - 241
  • [19] Application of formal methods to the analysis of web services security
    Tobarra, L
    Cazorla, D
    Cuartero, F
    Díaz, G
    FORMAL TECHNIQUES FOR COMPUTER SYSTEMS AND BUSINESS PROCESSES, PROCEEDINGS, 2005, 3670 : 215 - 229
  • [20] Formal methods in context:: Security and Java']Java card
    Bolignano, D
    Le Métayer, D
    Loiseaux, C
    JAVA ON SMART CARDS: PROGRAMMING AND SECURITY, 2001, 2041 : 1 - 5