Insights on Formal Methods of Cybersecurity

Published: May 27, 2016

Author(s)

Jeffrey M. Voas, Kim B. Schaffer

Abstract

We asked 7 experts 1 simple question to find out what has occurred recently in terms of applying formal methods (FM) to security-centric, cyber problems: Please summarize in a paragraph the state of the research and practitioner communities in formal method as you see it. Please include standards, conferences, tools, and anything else for our readers that they may not be aware of concerning recent noteworthy advancements and improvements in the FM community in recent years. Our experts were John McLean (Naval Research Labs), Paul Black (National Institute of Standards and Technology), Karl Levitt (University of California at Davis), Joseph Williams (CloudEconomist.Com), Connie Heitmeyer (Naval Research Labs), Eugene Spafford (Purdue University), and Joseph Kiniry (Galois, Inc.).
Citation: Computer (IEEE Computer)
Volume: 49
Issue: 5
Pub Type: Journals

Keywords

cyber-trust, cyber-security, formal methods
Created May 27, 2016, Updated November 10, 2018