{"id":300,"date":"2019-03-30T17:38:47","date_gmt":"2019-03-30T21:38:47","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?post_type=cu_video&#038;p=300"},"modified":"2026-01-27T10:53:30","modified_gmt":"2026-01-27T15:53:30","slug":"formal-approaches-for-automated-security-evaluation","status":"publish","type":"cu_video","link":"https:\/\/carleton.ca\/cybersea\/video\/formal-approaches-for-automated-security-evaluation\/","title":{"rendered":"Formal Approaches for Automated Security Evaluation"},"content":{"rendered":"\n\n\n<header class=\"mb-6 cu-pageheader cu-component-updated md:mb-12\">\n    <h1 id=\"\" class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px\">\n        \n    <\/h1>\n\n    <\/header>\n\n\n\n<div class=\"cu-section cu-section--white w-screen ml-offset-center px-4 md:px-6 lg:px-12\"><div class=\"cu-max-w-child-5xl space-y-6 md:space-y-10   cu-prose-first-last\"><figure class=\"cu-figure not-prose  max-w-full\"><div class=\"not-prose overflow-hidden bg-white shadow-lg max-w-full rounded-none\"><div class=\"relative none overflow-hidden w-full pb-[56.25%] border border-cu-black-100\"><iframe title=\"Videos Embed\" src=\"https:\/\/www.youtube.com\/embed\/mARKHA154zc\" class=\"cu-embed-iframe\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/div><\/div><\/figure><\/div><\/div>\n\n\n\n<p>Dr. Jason Jaskolka of the CyberSEA Research Lab presents at the 2017 <a href=\"https:\/\/www.serene-risc.ca\/en\">Smart Cybersecurity Network (SERENE-RISC)<\/a> Workshop.<\/p>\n\n\n\n<h3 id=\"presentation-abstract\" class=\"wp-block-heading\">Presentation Abstract<\/h3>\n\n\n\n<p>Many of today\u2019s most critical systems such as those found in the transportation, financial, medical, communications, and national defence domains are becoming more complex and interconnected. Because of this, there is an increasingly critical need for ensuring the security of these systems and the information that they use, store, and communicate, in the face of cyber-attacks and failures. In particular, the ability to automatically evaluate the security of such systems is in high demand. Security evaluation involves examining a system to determine its degree of compliance with standards and specifications by analyzing system designs, observing system behaviours, and\/or attempting to penetrate the system using techniques available to potential adversaries.<\/p>\n\n\n\n<p>Recently, formal (mathematically rigorous) methods and tools that are incorporated into system design processes have had increased success in capturing the evidence needed to prove important system security, safety, and reliability properties. These methods and tools provide systematic frameworks upon which automated security evaluation methodologies capable of verifying and validating system security properties can be developed.<\/p>\n\n\n\n<p>In this talk, I will highlight current efforts in identifying and analyzing potential vulnerabilities to assess the security of complex systems, and we will discuss recent advances in formal approaches for automated security evaluation.<\/p>\n","protected":false},"author":2,"template":"","meta":{"_acf_changed":false,"cu_video_source":"https:\/\/www.youtube.com\/watch?v=mARKHA154zc","cu_video_service":"YouTube","footnotes":"","_links_to":"","_links_to_target":""},"cu_video_type":[33],"class_list":["post-300","cu_video","type-cu_video","status-publish","has-post-thumbnail","hentry","cu_video_type-presentations"],"acf":[],"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/cu_video\/300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/cu_video"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/cu_video"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"version-history":[{"count":1,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/cu_video\/300\/revisions"}],"predecessor-version":[{"id":2154,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/cu_video\/300\/revisions\/2154"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media\/301"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"cu_video_type","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/cu_video_type?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}