Formal Methods for Security: Lightweight Plug-In or New Engineering Discipline
This contribution discusses two main lines of developments concerning the use of formal methods in security engineering. Fully automated and highly specialized methods that hide most of the formal theory from its users are compared to formal security models centered around explicit formal system models. It is argued that only the latter offer the perspective to comprehensively control the development process with its various security aspects and phases. In putting more emphasis on the combination of theories, fragmentation could be overcome by an integration of the specialized methods that are presently still applied in isolation.
KeywordsSmart Card Cryptographic Protocol Covert Channel Security Engineering Interactive Proof
Unable to display preview. Download preview PDF.
- 1.Sabelfeld, A., Sands, D.: A Per Model of Secure Information Flow in Sequential Programs. In: European Symposium on Programming, pp. 40–58 (1999)Google Scholar
- 2.AbsInt: Advanced Compiler Technology for Embedded Systems, http://www.absint.com
- 3.The AVISPA project, http://www.avispa-project.org/
- 4.Hutter, D., Langenstein, B., Sengler, C., Siekmann, J.H., Stephan, W., Wolpers, A.: Verification support environment (vse). High Integrity Systems 1(6), 523–530 (1996)Google Scholar
- 7.Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6, 85–128 (1998)Google Scholar