A survey of practical formal methods for security

T Kulik, B Dongol, PG Larsen, HD Macedo… - Formal aspects of …, 2022 - dl.acm.org
In today's world, critical infrastructure is often controlled by computing systems. This
introduces new risks for cyber attacks, which can compromise the security and disrupt the …

Formal methods in industry

MH ter Beek, R Chapman, R Cleaveland… - Formal Aspects of …, 2024 - dl.acm.org
Formal methods encompass a wide choice of techniques and tools for the specification,
development, analysis, and verification of software and hardware systems. Formal methods …

Open questions in formal methods

JB Michael, GW Dinolt, D Drusinsky - Computer, 2020 - computer.org
Open Questions in Formal Methods Toggle navigation IEEE Computer Society Digital Library
Jobs Tech News Resource Center Press Room Advertising About Us IEEE IEEE Computer …

A generic goal-based certification argument for the justification of formal analysis

I Habli, T Kelly - Electronic Notes in Theoretical Computer Science, 2009 - Elsevier
Formal methods are powerful specification and verification techniques for establishing high
confidence in safety-critical systems. However, there are a number of concerns about the …

Formal methods: Use and relevance for the development of safety-critical systems

LM Barroca, JA McDermid - The Computer Journal, 1992 - academic.oup.com
We are now starting to see the first applications of formal methods to the development of
safety-critical computer based systems. Discussion on what are appropriate methods and …

A symbiotic relationship between formal methods and security

JM Wing - … , Dependability, and Assurance: From Needs to …, 1998 - ieeexplore.ieee.org
Security played a significant role in the development of formal methods in the 70s and early
80s. Have the tables turned? Are formal methods now ready to play a significant role in the …

The industrial use of formal methods

M Thomas - Microprocessors and Microsystems, 1993 - Elsevier
Building safety-critical computer systems is a complex engineering task, requiring deep
understanding of the application requirement and rigorous control over the development …

It's time for trustworthy systems

G Heiser, T Murray, G Klein - IEEE Security & Privacy, 2012 - ieeexplore.ieee.org
The time for truly trustworthy systems, backed by machine checked formal proof and
analysis, has arrived. Over the past few decades, advances in formal verification and …

[PDF][PDF] Architectures and formal representations for secure systems

PG Neumann - Final Report. SRI Project, 1995 - Citeseer
As used in this report, the term formal methods encompasses mathematical and logical
techniques for representing and analyzing computer systems, with the intent of increasing …

[HTML][HTML] Whatever happened to formal methods for security?

J Voas, K Schaffer - Computer, 2016 - ncbi.nlm.nih.gov
Whatever Happened to Formal Methods for Security? - PMC Back to Top Skip to main content
NIH NLM Logo Access keys NCBI Homepage MyNCBI Homepage Main Content Main …