Gabriele Costa, Silvia De Francisci, Rocco De Nicola
{"title":"The Beauty and the Beast: A survey on process algebras and cybersecurity","authors":"Gabriele Costa, Silvia De Francisci, Rocco De Nicola","doi":"10.1016/j.cosrev.2025.100758","DOIUrl":null,"url":null,"abstract":"<div><div>Process algebras (PAs) provide the mathematical foundation for several verification techniques and have profoundly influenced many areas of computer science. One of the main reasons for their success is their compact yet expressive and flexible syntax, which allows for the modeling of the relevant aspects of computation while abstracting away the irrelevant ones. Cybersecurity is no exception, and most authors acknowledge the importance of PAs in this field. However, estimating the impact of PAs is not trivial.</div><div>In this survey, we consider lines of research that employ PAs to address security problems. Our systematization of knowledge aims to assess and measure the impact of PAs. To achieve this goal, we start by briefly reviewing the evolution of PAs. Then, we analyze the literature by mapping each contribution to three cybersecurity sub-fields: <em>secure development</em>, <em>attack modeling</em>, and <em>vulnerability assessment</em>. Our methodology follows the chronological development of process algebras and identifies the emerging features specifically introduced for dealing with security problems. Although our analysis confirms that PAs have been greatly influential in general, it provides a fine-grained understanding of how PAs have shaped research in cybersecurity. Interestingly, our work highlights that some application areas remain underexplored, thus providing the research community with valuable insights on future directions.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100758"},"PeriodicalIF":13.3000,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science Review","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574013725000346","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Process algebras (PAs) provide the mathematical foundation for several verification techniques and have profoundly influenced many areas of computer science. One of the main reasons for their success is their compact yet expressive and flexible syntax, which allows for the modeling of the relevant aspects of computation while abstracting away the irrelevant ones. Cybersecurity is no exception, and most authors acknowledge the importance of PAs in this field. However, estimating the impact of PAs is not trivial.
In this survey, we consider lines of research that employ PAs to address security problems. Our systematization of knowledge aims to assess and measure the impact of PAs. To achieve this goal, we start by briefly reviewing the evolution of PAs. Then, we analyze the literature by mapping each contribution to three cybersecurity sub-fields: secure development, attack modeling, and vulnerability assessment. Our methodology follows the chronological development of process algebras and identifies the emerging features specifically introduced for dealing with security problems. Although our analysis confirms that PAs have been greatly influential in general, it provides a fine-grained understanding of how PAs have shaped research in cybersecurity. Interestingly, our work highlights that some application areas remain underexplored, thus providing the research community with valuable insights on future directions.
期刊介绍:
Computer Science Review, a publication dedicated to research surveys and expository overviews of open problems in computer science, targets a broad audience within the field seeking comprehensive insights into the latest developments. The journal welcomes articles from various fields as long as their content impacts the advancement of computer science. In particular, articles that review the application of well-known Computer Science methods to other areas are in scope only if these articles advance the fundamental understanding of those methods.