Options
Causality, behavioural equivalences, and the security of cyberphysical systems
Publikationstyp
Conference Paper
Date Issued
2015-11-10
Sprache
English
Author(s)
First published in
Number in series
9360 LNCS
Start Page
83
End Page
98
Article Number
A8
Citation
Lecture Notes in Computer Science 9360 LNCS: A8, 83-98 (2015)
Contribution to Conference
Publisher DOI
Scopus ID
Publisher
Springer
The large cyberphysical systems that are currently being developed such as Car2X come with sophisticated security architectures that involve a complex interplay of security protocols and security APIs. Although formal methods for security protocols have achieved a mature stage there are still many challenges left. One is to improve the verification of equivalence-based security properties. A second challenge is the compositionality problem: how can the security of a composition of security protocols and APIs be derived from the security of its components. It seems intuitively clear that foundational results on causal equivalences and process calculi could help in this situation. In this talk we first identify four ways to exploit causality in security verification. In particular, this will lead us to review results on causal equivalences. Finally, we discuss how such results could help us to tackle the two challenges.
DDC Class
004: Informatik
More Funding Information
This work is partially supported by the Niedersächsisches Vorab of the Volkswagen Foundation and the Ministry of Science and Culture of Lower Saxony as part of the Interdisciplinary Research Center on Critical Systems Engineering for Socio-Technical Systems.