Formal Methods for Information Security (Lecture with Exercises, Summer Term 2008)

Lecturer: Prof. Heiko Mantel

Format: V4 + Ü2

Place and Time:

  • Tuesday, 9:50 - 11:30, Lecture in S2/02-C110
  • Tuesday, 11:40 - 13:20, Exercises in S2/02-C110
  • Thursday, 9:50 - 11:30, Lecture in S2/02-C110

The lecture starts on Thursday, 03.04.2008.


  • Midterm: 13.5.2008, 9:50-11:30, S2-02-C110
  • Final: 1.7.2008, 9:50-11:30, S2-02-C110


The course gives an overview on formal approaches to:

  • formal modeling of security-critical systems
  • formal specification of security requirements
  • formal security analysis of systems 
  • theoretical foundations for developing secure software by stepwise refinement and composition.

The topics covered include:

  • introduction to formal methods for information security
  • formal modeling and analysis of access control mechanisms
  • formal modeling and analysis of information flow control
  • formal modeling and analysis of security protocols
  • formal modeling of trust relationships in distributed systems


Knowledge of Computer Science and Mathematics, equivalent to the first four Semesters in the Computer Science Bachelor program, in particular

  • ability to use formal languages and calculi
  • and basic knowledge about logic.


Scientific articles (to be announced in the lecture) and slides of the lectures (will be available online after the lecture). Additionally, e.g., one of the following books:

  • M. Bishop: "Computer Security", Pearson Education, 2003. 
  • D. Gollmann: "Computer Security", Wiley, 2000.
  • D. Denning: "Cryptography and Data Security", Addison Wesley,  1982 (out of print, but still available on the internet)
A A A | Print | Imprint | Sitemap | Contact
zum Seitenanfang