Formal Methods for Information Security (Summer Term 2011)

Lecturer: Prof. Heiko Mantel
Format: Lecture with exercises (V4 + Ü2)
Language: English
Place and Time: Tuesday 11:40-13:20 in S2|02/C120
  Wednesday 9:50-11:30 in S1|03/226
  Thursday 9:50-11:30 in S2|02/C110
First Lecture: Tuesday, April 12, 2011

News

  • 2011-07-18: The results of the exam will be available Wednesday afternoon. The exam inspection is planned for Thursday - July, the 21st - from 3 pm until 4 pm in room S2|02 E202.
  • 2011-07-06: The final exam will take place on Thursday, July 14,  at 9:50–11:40 am in the regular lecture hall (S2|02/C110).
  • 2011-07-06: The midterm exam inspection will take place on Friday - July, the 8th - at 3 pm until 4 pm in room S2|02 E302.
  • 2011-07-06: The results of the midterm examination are now available at the pinboard next to S2|02 E317.
  • 2011-05-23: You may bring a printed dictionary with you for the exam. Electronic dictionaries are not allowed. Your dictionary must not contain any notes. If we find any notes in your dictionary, this will be considered as an attempt to defraud ("Betrugsversuch").
  • 2011-05-17: The exam on Tuesday, May 24, at 11:40 am takes place in the regular lecture hall (S2|02/C120).
  • 2011-05-17: Sarah offers an additional office hour on Monday, May 23, from 10 am till 11 am
  • 2011-04-14: Bachelor and Master students, please register for the exam before April 24 in TUCaN. Attention, this is a sunday!

Content

The course (see also the description of the module) gives an overview on formal approaches to:

  • formal modeling of security-critical systems
  • formal specification of security requirements
  • formal security analysis of systems
  • theoretical foundations for developing secure software by stepwise refinement and composition.

The topics covered include:

  • introduction to formal methods for information security
  • formal modeling and analysis of access control mechanisms
  • formal modeling and analysis of information flow control
  • formal modeling and analysis of security protocols
  • formal modeling of trust relationships in distributed systems

Additional information for participants can be accessed using the password that is communicated during the first lecture.

Prerequisites

Knowledge of Computer Science and Mathematics, equivalent to the first four Semesters in the Computer Science Bachelor program, in particular

  • ability to use formal languages and calculi
  • and basic knowledge about logic.

Literature

Scientific articles (to be announced in the lecture) and slides of the lectures (will be available online after the lecture). Additionally, e.g., one of the following books:

  • M. Bishop: "Computer Security", Pearson Education, 2003.
  • D. Gollmann: "Computer Security", Wiley, 2000.
  • D. Denning: "Cryptography and Data Security", Addison Wesley, 1982 (out of print, but still available on the internet)

Last modified on 18 July 2011.

A A A | Print | Imprint | Sitemap | Contact
zum Seitenanfang