3.8 Proceedings Paper

Formal Model In-The-Loop for Secure Industrial Control Networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Software Engineering

A Survey of Practical Formal Methods for Security

Tomas Kulik et al.

Summary: This article provides a comprehensive overview of the application of formal methods in cyber security and safety-critical systems. It introduces solutions in theorem proving, model checking, and lightweight formal methods, and analyzes trends in each category from the perspective of formal methods practitioners and researchers.

FORMAL ASPECTS OF COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments

Wei Li et al.

Summary: This paper addresses the security flaws and high computational costs of existing three-factor Mutual Authentication and Key Agreement (MAKA) protocols, proposing a dynamic revocable protocol that utilizes Schnorr signatures for user dynamic management. The protocol provides a formal security proof in the random oracle, meeting various demands in multi-server environments and being well suited for computing resource constrained smart devices. Simulation implementation proves the feasibility of the protocol.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

A formal approach to derive an aspect oriented programming-based implementation of a secure access control filter

Amel Mammar et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2017)

Article Computer Science, Information Systems

A survey of cyber security management in industrial control systems

William Knowles et al.

INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION (2015)

Article

A brief account of runtime verification

Martin Leucker et al.

JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING (2009)