Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Insights on Formal Methods of Cybersecurity

Published

Author(s)

Jeffrey M. Voas, Kim B. Schaffer

Abstract

We asked 7 experts 1 simple question to find out what has occurred recently in terms of applying formal methods (FM) to security-centric, cyber problems: Please summarize in a paragraph the state of the research and practitioner communities in formal method as you see it. Please include standards, conferences, tools, and anything else for our readers that they may not be aware of concerning recent noteworthy advancements and improvements in the FM community in recent years. Our experts were John McLean (Naval Research Labs), Paul Black (National Institute of Standards and Technology), Karl Levitt (University of California at Davis), Joseph Williams (CloudEconomist.Com), Connie Heitmeyer (Naval Research Labs), Eugene Spafford (Purdue University), and Joseph Kiniry (Galois, Inc.).
Citation
Computer (IEEE Computer)
Volume
49
Issue
5

Keywords

cyber-trust, cyber-security, formal methods

Citation

Voas, J. and Schaffer, K. (2016), Insights on Formal Methods of Cybersecurity, Computer (IEEE Computer), [online], https://doi.org/10.1109/MC.2016.131 (Accessed October 14, 2024)

Issues

If you have any questions about this publication or are having problems accessing it, please contact reflib@nist.gov.

Created May 27, 2016, Updated November 10, 2018