DeepAI AI Chat
Log In Sign Up

A Survey of Practical Formal Methods for Security

by   Tomas Kulik, et al.

In today's world, critical infrastructure is often controlled by computing systems. This introduces new risks for cyber attacks, which can compromise the security and disrupt the functionality of these systems. It is therefore necessary to build such systems with strong guarantees of resiliency against cyber attacks. One way to achieve this level of assurance is using formal verification, which provides proofs of system compliance with desired cyber security properties. The use of Formal Methods (FM) in aspects of cyber security and safety-critical systems are reviewed in this article. We split FM into the three main classes: theorem proving, model checking and lightweight FM. To allow the different uses of FM to be compared, we define a common set of terms. We further develop categories based on the type of computing system FM are applied in. Solutions in each class and category are presented, discussed, compared and summarised. We describe historical highlights and developments and present a state-of-the-art review in the area of FM in cyber security. This review is presented from the point of view of FM practitioners and researchers, commenting on the trends in each of the classes and categories. This is achieved by considering all types of FM, several types of security and safety critical systems and by structuring the taxonomy accordingly. The article hence provides a comprehensive overview of FM and techniques available to system designers of security-critical systems, simplifying the process of choosing the right tool for the task. The article concludes by summarising the discussion of the review, focusing on best practices, challenges, general future trends and directions of research within this field.


A Security Architecture for Railway Signalling

We present the proposed security architecture Deutsche Bahn plans to dep...

Developing a cyber security culture: Current practices and future needs

While the creation of a strong security culture has been researched and ...

Evaluating the Security of Aircraft Systems

The sophistication and complexity of cyber attacks and the variety of ta...

Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions

Many of our critical infrastructure systems and personal computing syste...

Applying the Isabelle Insider Framework to Airplane Security

Avionics is one of the fields in which verification methods have been pi...

On Using Blockchains for Safety-Critical Systems

Innovation in the world of today is mainly driven by software. Companies...

Handwriting Biometrics: Applications and Future Trends in e-Security and e-Health

Background- This paper summarizes the state-of-the-art and applications ...