Whatever Happened to Formal Methods for Security?

Published: August 23, 2016


Kim B. Schaffer, Jeffrey M. Voas


We asked 7 experts 7 questions to find out what has occurred recently in terms of applying formal methods (FM) to security-centric, cyber problems. We were curious as to whether this successful methodology in "safety-critical" has succeeded as well for today's "build it, hack it, patch it" mindset. Our experts were John McLean (Naval Research Labs), Paul Black (National Institute of Standards and Technology), Karl Levitt (University of California at Davis), Joseph Williams (CloudEconomist.Com), Connie Heitmeyer (Naval Research Labs), Eugene Spafford (Purdue University), and Joseph Kiniry (Galois, Inc.).
Citation: Computer (IEEE Computer)
Volume: 49
Issue: 8
Pub Type: Journals

Download Paper


formal methods, cyber-security, tools, techniques, conferences, proof of correctness
Created August 23, 2016, Updated February 19, 2017