Kulik, Tomas, Dongol, Brijesh, Larsen, Peter Gorm et al. (4 more authors) (2022) A Survey of Practical Formal Methods for Security. Formal Aspects of Computing. 3522582. ISSN 1433-299X
Abstract
In today's world, critical infrastructure is often controlled by computing systems. This introduces new risks for cyber attacks, which can compromise the security and disrupt the functionality of these systems. It is therefore necessary to build such systems with strong guarantees of resiliency against cyber attacks. One way to achieve this level of assurance is using formal verification, which provides proofs of system compliance with desired cyber security properties. The use of Formal Methods (FM) in aspects of cyber security and safety-critical systems are reviewed in this article. We split FM into the three main classes: theorem proving, model checking, and lightweight FM. To allow the different uses of FM to be compared, we define a common set of terms. We further develop categories based on the type of computing system FM are applied in. Solutions in each class and category are presented, discussed, compared, and summarised. We describe historical highlights and developments and present a state-of-the-art review in the area of FM in cyber security. This review is presented from the point of view of FM practitioners and researchers, commenting on the trends in each of the classes and categories. This is achieved by considering all types of FM, several types of security and safety-critical systems, and by structuring the taxonomy accordingly. The article hence provides a comprehensive overview of FM and techniques available to system designers of security-critical systems, simplifying the process of choosing the right tool for the task. The article concludes by summarising the discussion of the review, focusing on best practices, challenges, general future trends, and directions of research within this field.
Metadata
Item Type: | Article |
---|---|
Authors/Creators: |
|
Copyright, Publisher and Additional Information: | Funding Information: This work is supported by the Manufacturing Academy of Denmark; for more information, see www.made.dk . Brijesh Dongol is supported by grants “FaCT: Faithful Composition of Trust,” EPSRC grants EP/R032556/1 and EP/V038915/1, and ARC Discovery Grant DP190102142. Steve Schneider is supported by EPSRC grants EP/P031811/1 and EP/R006938/1. Jim Woodcock is supported by the Poul Due Jensen Foundation and grants EP/M025756/1, EP/R025479/1, and IEC/NSFC/170319. Publisher Copyright: © 2022 Association for Computing Machinery. |
Keywords: | cyber security,Formal Methods,model checking,theorem proving |
Dates: |
|
Institution: | The University of York |
Academic Units: | The University of York > Faculty of Sciences (York) > Computer Science (York) |
Depositing User: | Pure (York) |
Date Deposited: | 02 Dec 2022 13:40 |
Last Modified: | 16 Oct 2024 18:54 |
Published Version: | https://doi.org/10.1145/3522582 |
Status: | Published |
Refereed: | Yes |
Identification Number: | 10.1145/3522582 |
Related URLs: | |
Open Archives Initiative ID (OAI ID): | oai:eprints.whiterose.ac.uk:194011 |