Process algebras (PAs) provide the mathematical foundation for several verification techniques and have profoundly influenced many areas of computer science. One of the main reasons for their success is their compact yet expressive and flexible syntax, which allows for the modeling of the relevant aspects of computation while abstracting away the irrelevant ones. Cybersecurity is no exception, and most authors acknowledge the importance of PAs in this field. However, estimating the impact of PAs is not trivial. In this survey, we consider lines of research that employ PAs to address security problems. Our systematization of knowledge aims to assess and measure the impact of PAs. To achieve this goal, we start by briefly reviewing the evolution of PAs. Then, we analyze the literature by mapping each contribution to three cybersecurity sub-fields: secure development, attack modeling, and vulnerability assessment. Our methodology follows the chronological development of process algebras and identifies the emerging features specifically introduced for dealing with security problems. Although our analysis confirms that PAs have been greatly influential in general, it provides a fine-grained understanding of how PAs have shaped research in cybersecurity. Interestingly, our work highlights that some application areas remain underexplored, thus providing the research community with valuable insights on future directions.
The Beauty and the Beast: a survey on process algebras and cybersecurity / Costa, Gabriele; De Francisci, Silvia; De Nicola, Rocco. - In: COMPUTER SCIENCE REVIEW. - ISSN 1574-0137. - 57:(2025). [10.1016/j.cosrev.2025.100758]
The Beauty and the Beast: a survey on process algebras and cybersecurity
Costa Gabriele;De Francisci Silvia;De Nicola Rocco
2025
Abstract
Process algebras (PAs) provide the mathematical foundation for several verification techniques and have profoundly influenced many areas of computer science. One of the main reasons for their success is their compact yet expressive and flexible syntax, which allows for the modeling of the relevant aspects of computation while abstracting away the irrelevant ones. Cybersecurity is no exception, and most authors acknowledge the importance of PAs in this field. However, estimating the impact of PAs is not trivial. In this survey, we consider lines of research that employ PAs to address security problems. Our systematization of knowledge aims to assess and measure the impact of PAs. To achieve this goal, we start by briefly reviewing the evolution of PAs. Then, we analyze the literature by mapping each contribution to three cybersecurity sub-fields: secure development, attack modeling, and vulnerability assessment. Our methodology follows the chronological development of process algebras and identifies the emerging features specifically introduced for dealing with security problems. Although our analysis confirms that PAs have been greatly influential in general, it provides a fine-grained understanding of how PAs have shaped research in cybersecurity. Interestingly, our work highlights that some application areas remain underexplored, thus providing the research community with valuable insights on future directions.| File | Dimensione | Formato | |
|---|---|---|---|
|
1-s2.0-S1574013725000346-main.pdf
accesso aperto
Descrizione: The Beauty and the Beast: A survey on process algebras and cybersecurity
Tipologia:
Versione Editoriale (PDF)
Licenza:
Creative commons
Dimensione
2.17 MB
Formato
Adobe PDF
|
2.17 MB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

