Fröschle, Sibylle B.Sibylle B.Fröschle2021-11-262021-11-262015-11-10Lecture Notes in Computer Science 9360 LNCS: A8, 83-98 (2015)http://hdl.handle.net/11420/11091The large cyberphysical systems that are currently being developed such as Car2X come with sophisticated security architectures that involve a complex interplay of security protocols and security APIs. Although formal methods for security protocols have achieved a mature stage there are still many challenges left. One is to improve the verification of equivalence-based security properties. A second challenge is the compositionality problem: how can the security of a composition of security protocols and APIs be derived from the security of its components. It seems intuitively clear that foundational results on causal equivalences and process calculi could help in this situation. In this talk we first identify four ways to exploit causality in security verification. In particular, this will lead us to review results on causal equivalences. Finally, we discuss how such results could help us to tackle the two challenges.enInformatikCausality, behavioural equivalences, and the security of cyberphysical systemsConference Paper10.1007/978-3-319-23506-6_8Other