Additional Material for Selected Chapters
Here you will find source files of the specifications discussed in the book and hints for additional reading.
Chapter 1: Formal Methods
Further reading:
- Formal Methods for Safe and Secure Computers Systems, 2013, editor Hubert Garavel. BSI Study 875. Federal Office for Information Security.
Chapter 3: The Process Algebra CSP
Source files: chapter-3.zip
View individual files online:
- ATM0_and_ATM1.csp
- ATM2.csp
- ATM3.csp
- ATM4.csp
- ATM5.csp
- ATM6_and_ATM7.csp
- ATM8_and_ATM9.csp
- ATM10_and_ATM11.csp
- ATM12_and_ATM13.csp
- manualGroundStart.csp
- commSystem.csp
- candy.csp
Chapter 4: Algebraic Specification in CASL
Source files: chapter-4.zip
View individual files online:
PDFs on CASL:
- CoFi note M-6, 2002, by Markus Roggenbach and Till Mossakowski.
- Hets User Guide by Till Mossakowski, Christian Maeder, and Mihai Codescu.
Chapter 8: Formal Verification of Security Protocols
Source files: chapter-8.zip
View individual files online:
Further reading:
- Attacks on RFID Protocols, 2009, by Ton van Deursen and Saša Radomirovi.
- A Survey of Authentication Protocol Literature: Version 1.0, 1997, by John Clark and Jeremy Jacob.
Chapter 9: Origins and Development of Formal Methods
Further reading:
- The Unforeseen Evolution of Theorem Proving in ARM Processor Verification, 28th April 2015, by Michael Gordon. Talk at Swansea University. Slides.
- The Triumph of Types: Principia Mathematica’s Impact on Computer Science, by Robert L. Constable. Unpublished.
Conclusion
Further reading:
- Rooting Formal Methods within Higher Education Curricula for Computer Science and Software Engineering - A White Paper, 2020, by Antonio Cerone, Markus Roggenbach, et al.