Conference Paper/Proceeding/Abstract 985 views 361 downloads
Cybersecurity Education and Formal Methods
Communications in Computer and Information Science, Volume: 1301, Pages: 159 - 172
Swansea University Author: Tom Crick
-
PDF | Accepted Manuscript
Download (207.52KB)
DOI (Published version): 10.1007/978-3-030-71374-4_8
Abstract
Formal methods have been largely thought of in the context of safety-critical systems, where they have achieved major acceptance. Tens of millions of people trust their lives every day to such systems, based on formal proofs rather than "we haven’t found a bug" (yet!); but why is "we...
Published in: | Communications in Computer and Information Science |
---|---|
ISBN: | 9783030713737 9783030713744 |
ISSN: | 1865-0929 1865-0937 |
Published: |
Cham
Springer International Publishing
2021
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa55027 |
Abstract: |
Formal methods have been largely thought of in the context of safety-critical systems, where they have achieved major acceptance. Tens of millions of people trust their lives every day to such systems, based on formal proofs rather than "we haven’t found a bug" (yet!); but why is "we haven’t found a bug" an acceptable basis for systems trusted with hundreds of millions of people’s personal data?This paper looks at some of these issues in cybersecurity, and the extent to which formal methods, ranging from "fully verified" to better tool support, could help. More importantly, recent policy reports and curricula initiatives appear to recommended formal methods in the limited context of "safety critical applications"; we suggest this is too limited in scope and ambition. Not only are formal methods needed in cybersecurity, the repeated and very public weaknesses of the cybersecurity industry provide a powerful motivation for formal methods. |
---|---|
Keywords: |
Formal methods; Cybersecurity; Curricula |
College: |
Faculty of Humanities and Social Sciences |
Start Page: |
159 |
End Page: |
172 |