A Survey of Practical Formal Methods for Security

09/03/2021
by   Tomas Kulik, et al.
0

In today's world, critical infrastructure is often controlled by computing systems. This introduces new risks for cyber attacks, which can compromise the security and disrupt the functionality of these systems. It is therefore necessary to build such systems with strong guarantees of resiliency against cyber attacks. One way to achieve this level of assurance is using formal verification, which provides proofs of system compliance with desired cyber security properties. The use of Formal Methods (FM) in aspects of cyber security and safety-critical systems are reviewed in this article. We split FM into the three main classes: theorem proving, model checking and lightweight FM. To allow the different uses of FM to be compared, we define a common set of terms. We further develop categories based on the type of computing system FM are applied in. Solutions in each class and category are presented, discussed, compared and summarised. We describe historical highlights and developments and present a state-of-the-art review in the area of FM in cyber security. This review is presented from the point of view of FM practitioners and researchers, commenting on the trends in each of the classes and categories. This is achieved by considering all types of FM, several types of security and safety critical systems and by structuring the taxonomy accordingly. The article hence provides a comprehensive overview of FM and techniques available to system designers of security-critical systems, simplifying the process of choosing the right tool for the task. The article concludes by summarising the discussion of the review, focusing on best practices, challenges, general future trends and directions of research within this field.

READ FULL TEXT
research
09/09/2020

A Security Architecture for Railway Signalling

We present the proposed security architecture Deutsche Bahn plans to dep...
research
06/28/2021

Developing a cyber security culture: Current practices and future needs

While the creation of a strong security culture has been researched and ...
research
09/08/2022

Evaluating the Security of Aircraft Systems

The sophistication and complexity of cyber attacks and the variety of ta...
research
09/03/2023

Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions

Many of our critical infrastructure systems and personal computing syste...
research
03/26/2020

Applying the Isabelle Insider Framework to Airplane Security

Avionics is one of the fields in which verification methods have been pi...
research
09/24/2018

On Using Blockchains for Safety-Critical Systems

Innovation in the world of today is mainly driven by software. Companies...
research
02/24/2022

Handwriting Biometrics: Applications and Future Trends in e-Security and e-Health

Background- This paper summarizes the state-of-the-art and applications ...

Please sign up or login with your details

Forgot password? Click here to reset