Formal Methods for Information Security (Summer Term 2015)

Lecturer: Prof. Dr.-Ing. Heiko Mantel
Format: Integrated course (IV6)
Language: English
Place and time: Tuesday 11:40-13:20 in S2|02/C120
  Wednesday 9:50-11:30 in S2|07/167
  Thursday 9:50-11:30 in S2|02/C110
Midterm exam: Tuesday, 02.06.2014, 11:40-13:20 (rooms: see below)
Final exam: Thursday, 16.07.2014, 9:50-11:30 (room: see below)
Max. participants: 80
Links: TUCaN page (course id: 20-00-0362-iv),
bulletin board of student association (D120)


  • The inspection for the final exam will be on Thu, 30.07.2015, at 9:15-11:15 in S2|02, E202. Bring your student ID card and official photo ID for authentication. The results should be visible in TUCaN soon.
  • The room for the final term exam on Thu, 16.07.2015, will be S1|01 A01 (in the basement!). Bring your student ID card and official photo ID for authentication. Bring a blue or black pen (not pencil).
  • The inspection for the midterm exam will be on Fri, 03.07.2015, at 13:15-15:15 in S2|02, E202.
  • The room distribution for the mid-term exam on Tue, 02.06.2015, will be as follows:

    Last name starts with Room
    A to Ka S114/266
    Ke to P S202/C120
    R to Z S217/103
  • The lecture will start on 14th April (Tuesday).

Online Materials

The internal page for participants can be accessed using the password that is communicated during the first lecture.


The course gives an overview on formal approaches to:

  • formal modeling of security-critical systems
  • formal specification of security requirements
  • formal security analysis of systems
  • theoretical foundations for developing secure software by stepwise refinement and composition.

The topics covered include:

  • introduction to formal methods for information security
  • formal modeling and analysis of access control mechanisms
  • formal modeling and analysis of information flow control
  • formal modeling and analysis of security protocols
  • formal modeling of trust relationships in distributed systems


Knowledge of Computer Science and Mathematics, equivalent to the first four Semesters in the Computer Science Bachelor program, in particular

  • ability to use formal languages and calculi
  • and basic knowledge about logic.


Scientific articles (to be announced in the lecture) and slides of the lectures (will be available online after the lecture). Additionally, e.g., one of the following books:

  • M. Bishop: "Computer Security", Addison-Wesley, 2002.
  • D. Gollmann: "Computer Security", Wiley, 2010.
  • C. P. Pfleeger, S. L. Pfleeger: "Security in Computing", Prentice Hall, 2006.
  • J. Viega, G. McGraw: "Building Secure Software", Addison-Wesley, 2011.
  • D. Denning: "Cryptography and Data Security", Addison Wesley, 1982 (out of print, but still available on the internet)

Reference literature on logics and automata theory

  • H.-D. Ebbinghaus, J. Flum, and W. Thomas: "Mathematical Logic", 2nd Edition, Springer, 1996.
  • H.-D. Ebbinghaus, J. Flum, and W. Thomas: "Einführung in die mathematische Logik", 5th edition, Spektrum, 2007.
  • J. E. Hopcroft, R. Motwani, and J. Ullman: "Introduction To Automata Theory, Languages, And Computation", Pearson Education Limited, 2013.

Last modified on 7 March 2016.

A A A | Print | Imprint | Sitemap | Contact
zum Seitenanfang