usenix conference policies
Formal Methods and Computer Security
Abstract:
Formal methods are variously considered to be arcane, tedious, and oblivious to practical concerns. However, such techniques as specification, type checking, proofs of correctness, and model checking, offer the power to analyze system properties under many or even infinitely many possible inputs and execution conditions without running an implemented system through all of the associated test cases. This talk will summarize some of the successful applications of formal methods for security problems such as protocol analysis, mobile code security, access control, and rights specifications.
BibTeX
@inproceedings {270565,
author = {John C. Mitchell},
title = {Formal Methods and Computer Security},
booktitle = {11th USENIX Security Symposium (USENIX Security 02)},
year = {2002},
address = {San Francisco, CA},
url = {https://www.usenix.org/conference/11th-usenix-security-symposium/formal-methods-and-computer-security},
publisher = {USENIX Association},
month = aug
}
author = {John C. Mitchell},
title = {Formal Methods and Computer Security},
booktitle = {11th USENIX Security Symposium (USENIX Security 02)},
year = {2002},
address = {San Francisco, CA},
url = {https://www.usenix.org/conference/11th-usenix-security-symposium/formal-methods-and-computer-security},
publisher = {USENIX Association},
month = aug
}
connect with us