From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification.
Michael BackesMatthias SchunterPublished in: NSPW (2003)
Keyphrases
- formal verification
- information security
- security vulnerabilities
- security issues
- model checking
- security mechanisms
- access control
- automated verification
- security risks
- network security
- security breaches
- model checker
- bounded model checking
- security problems
- buffer overflow
- denial of service
- intrusion detection
- dos attacks
- security flaws
- symbolic model checking
- security patterns
- cryptographic protocols
- countermeasures
- security policies
- information systems
- program slicing
- security threats
- security properties
- security requirements
- resource constrained