24
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Formal Methods and CyberSecurity

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Formal methods have been largely thought of in the context of safety-critical systems, where they have achieved major acceptance. Tens of millions of people trust their lives every day to such systems, based on formal proofs rather than ``we haven't found a bug'' (yet!). Why is ``we haven't found a bug'' an acceptable basis for systems trusted with hundreds of millions of people's personal data? This paper looks at some of the issues in CyberSecurity, and the extent to which formal methods, ranging from ``fully verified'' to better tool support, could help. Alas The Royal Society (2016) only recommended formal methods in the limited context of ``safety critical applications'': we suggest this is too limited.

          Related collections

          Most cited references11

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Language-Based Isolation of Untrusted JavaScript

                Bookmark

                Author and article information

                Journal
                07 September 2019
                Article
                1909.03325
                9ba68625-6b9f-4b6d-97ab-8b691fbfca41

                http://creativecommons.org/licenses/by-nc-sa/4.0/

                History
                Custom metadata
                To appear in "Short Papers FROM 2019"
                cs.CR cs.SE

                Software engineering,Security & Cryptology
                Software engineering, Security & Cryptology

                Comments

                Comment on this article