Process algebras (PAs) provide the mathematical foundation for several verification techniques and have profoundly influenced many areas of computer science. One of the main reasons for their success is their compact yet expressive and flexible syntax, which allows for the modeling of the relevant aspects of computation while abstracting away the irrelevant ones. Cybersecurity is no exception, and most authors acknowledge the importance of PAs in this field. However, estimating the impact of PAs is not trivial. In this survey, we consider lines of research that employ PAs to address security problems. Our systematization of knowledge aims to assess and measure the impact of PAs. To achieve this goal, we start by briefly reviewing the evolution of PAs. Then, we analyze the literature by mapping each contribution to three cybersecurity sub-fields: secure development, attack modeling, and vulnerability assessment. Our methodology follows the chronological development of process algebras and identifies the emerging features specifically introduced for dealing with security problems. Although our analysis confirms that PAs have been greatly influential in general, it provides a fine-grained understanding of how PAs have shaped research in cybersecurity. Interestingly, our work highlights that some application areas remain underexplored, thus providing the research community with valuable insights on future directions.

The Beauty and the Beast: a survey on process algebras and cybersecurity / Costa, Gabriele; De Francisci, Silvia; De Nicola, Rocco. - In: COMPUTER SCIENCE REVIEW. - ISSN 1574-0137. - 57:(2025). [10.1016/j.cosrev.2025.100758]

The Beauty and the Beast: a survey on process algebras and cybersecurity

Costa Gabriele;De Francisci Silvia;De Nicola Rocco
2025

Abstract

Process algebras (PAs) provide the mathematical foundation for several verification techniques and have profoundly influenced many areas of computer science. One of the main reasons for their success is their compact yet expressive and flexible syntax, which allows for the modeling of the relevant aspects of computation while abstracting away the irrelevant ones. Cybersecurity is no exception, and most authors acknowledge the importance of PAs in this field. However, estimating the impact of PAs is not trivial. In this survey, we consider lines of research that employ PAs to address security problems. Our systematization of knowledge aims to assess and measure the impact of PAs. To achieve this goal, we start by briefly reviewing the evolution of PAs. Then, we analyze the literature by mapping each contribution to three cybersecurity sub-fields: secure development, attack modeling, and vulnerability assessment. Our methodology follows the chronological development of process algebras and identifies the emerging features specifically introduced for dealing with security problems. Although our analysis confirms that PAs have been greatly influential in general, it provides a fine-grained understanding of how PAs have shaped research in cybersecurity. Interestingly, our work highlights that some application areas remain underexplored, thus providing the research community with valuable insights on future directions.
2025
Attack modeling
Process algebra
Secure development
Vulnerability assessment
File in questo prodotto:
File Dimensione Formato  
1-s2.0-S1574013725000346-main.pdf

accesso aperto

Descrizione: The Beauty and the Beast: A survey on process algebras and cybersecurity
Tipologia: Versione Editoriale (PDF)
Licenza: Creative commons
Dimensione 2.17 MB
Formato Adobe PDF
2.17 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.11771/39678
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
social impact