14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)
DOI: 10.1109/wetice.2005.19
|View full text |Cite
|
Sign up to set email alerts
|

Application of Lightweight Formal Methods to Software Security

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…Formal methods may prove to be a solution to the problem related to security requirement specification. 62,63 Therefore, attention toward the knowledge on security requirement specification by formal methods appears imminent. This approach includes identification, classification, and specification of security requirements, the objective of the proposed topic is to enable an SRSFM framework to specified security requirements and in turn, avoid the inception of security vulnerabilities.…”
Section: Rq 1 What Research Topics Are Being Addressed?mentioning
confidence: 99%
“…Formal methods may prove to be a solution to the problem related to security requirement specification. 62,63 Therefore, attention toward the knowledge on security requirement specification by formal methods appears imminent. This approach includes identification, classification, and specification of security requirements, the objective of the proposed topic is to enable an SRSFM framework to specified security requirements and in turn, avoid the inception of security vulnerabilities.…”
Section: Rq 1 What Research Topics Are Being Addressed?mentioning
confidence: 99%
“…The SDF model and hardware models are then transformed to priced time automata which are used as inputs to UPPAAL for verification of requirements and also to compute the energy-optimal schedule for given requirements. However, some of these solutions are 'heavy-weight' , as discussed in [59,60], and thus not suitable as part of an iterative development approach as is one of the important aspects of our work here.…”
Section: Related Workmentioning
confidence: 99%
“…This can be mapped to partiality in analysis. Gilliam et al (2005) proposed a framework for system verification using Promela and the model checker SPIN, introduced by Holzmann ( 2004). They use a compositional approach that allows one to conduct proofs for a subset of the overall environment in a manner that those results can be extrapolated to the environment at large.…”
Section: Related Workmentioning
confidence: 99%