Toward a taxonomy of communications security models

  • Mark Brown
  • Published 2013 in Journal of Cryptographic Engineering


Formal specifications, models and their accompanying proofs have long been promoted as setting the highest standard for program verification. But computer security remains threatened by covert channels, subliminal channels, side channels, fault injections, bypass, protocol attacks, and subversion despite rigorous application of formal methods. We advance… (More)
DOI: 10.1007/s13389-013-0058-2


4 Figures and Tables