Teaching Formal Methods in Application Domains A Case Study in Computer and Network Security

被引:1
作者
Brucker, Achim D. [1 ]
Marmsoler, Diego [1 ]
机构
[1] Univ Exeter, Dept Comp Sci, Exeter, Devon, England
来源
FORMAL METHODS TEACHING, FMTEA 2024 | 2024年 / 14939卷
关键词
Formal Methods and Security; Protocol Verification; OFMC; Research-led Teaching; AUTHENTICATION;
D O I
10.1007/978-3-031-71379-8_8
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we report on our experience of teaching formal methods as part of an introductory computer and network security module. This module is part of an applied undergraduate computer science degree. As a consequence, we neither can rely on strong theoretical or mathematical foundations of the students, nor can we focus the whole term on applying formal methods in security. We address these challenges by integrating formal methods into a three-week-long section on security protocols. In these three weeks, we use a holistic approach for teaching the security objectives of security protocols, their analysis of actual implementations using a network sniffer, their formal verification using a model checker (and comparing it to an approach based on interactive theorem proving). Our approach has been proven successful in teaching (both, in-person and remotely) the benefits of formal methods to numerous students. The students do perform well in the corresponding assessments, and each year we are able to attract students for final year projects (i.e., their B.Sc. thesis) in the area of formal methods.
引用
收藏
页码:124 / 140
页数:17
相关论文
共 17 条
[1]  
Backes J, 2018, PROCEEDINGS OF THE 2018 18TH CONFERENCE ON FORMAL METHODS IN COMPUTER AIDED DESIGN (FMCAD), P206
[2]  
Basin David A., 2005, International Journal of Information Security, V4, P181, DOI [10.1007/s10207-004-0055-7, DOI 10.1007/S10207-004-0055-7]
[3]  
Broy M., 2024, Form. Asp. Comput., DOI DOI 10.1145/36707
[4]   Verifying Feedforward Neural Networks for Classification in Isabelle/HOL [J].
Brucker, Achim D. ;
Stell, Amy .
FORMAL METHODS, FM 2023, 2023, 14000 :427-444
[5]  
Brucker AD., 2010, P INT WORKSH FORM ME, P17, DOI DOI 10.1007/978-3-642-15898-82
[6]   The Lean Theorem Prover (System Description) [J].
de Moura, Leonardo ;
Kong, Soonho ;
Avigad, Jeremy ;
van Doorn, Floris ;
von Raumer, Jakob .
AUTOMATED DEDUCTION - CADE-25, 2015, 9195 :378-388
[7]  
Dolev D., 1981, 22nd Annual Symposium on Foundations of Computer Science, P350, DOI 10.1109/SFCS.1981.32
[8]   On Formal Methods Thinking in Computer Science Education [J].
Dongol, Brijesh ;
Dubois, Catherine ;
Hallerstede, Stefan ;
Hehner, Eric ;
Morgan, Carroll ;
Mueller, Peter ;
Ribeiro, Leila ;
Silva, Alexandra ;
Smith, Graeme ;
DE Vink, Erik .
FORMAL ASPECTS OF COMPUTING, 2025, 37 (01) :1-23
[9]  
Greenaway David, 2012, Interactive Theorem Proving. Proceedings of the Third International Conference, ITP 2012, P99, DOI 10.1007/978-3-642-32347-8_8
[10]  
Hess A.V., 2020, Archive of Formal Proofs