Lecturer: Prof. Dr.-Ing. Heiko Mantel
Contact: teachingatmais.informatik.tu-darmstadt.de
Format: Integrated Course (IV6, 9CP) - In-Person Teaching only
Language: English
Place and time: Tuesday 9:50-11:30 in S204/213 (not on April 12)
  Wednesday 16:15-17:55 in S313/30 (April 13: S101/A5, April 20: S103/123)
  Thursday 9:50-11:30 in S214/24

The lecture on April 20 is moved to room S103/123 due to construction work.
Max. participants: 100
Midterm exam: Wednesday, June 8, 2022
Final exam: Thursday, July 14, 2022
TUCaN Link: TUCaN page (course id: 20-00-0362-iv)

Deadline extended to April 26: Due to space restrictions in the lecture rooms, the number of participants is limited to 100. If more than 100 people register, the participants will be determined randomly. If you want to participate in the course, please register in TUCaN by April 26. We will inform you whether you can definitely participate.

What if I missed the registration deadline?
If you missed the deadline but would still like to participate, please contact us under teachingatmais.informatik.tu-darmstadt.de as soon as possible. We will then inform you whether there are leftover places and whether you can participate in the course.

 

    Online Materials

    Moodle course (registration credentials will be announced in the first lecture).

    Content

    When talking about security of IT systems, best-practices for the development of secure systems or mechanisms for the protection of systems against illegal access of valuable assets play a major role. With this focus systems are called "secure" when the security appears substantiated by the used design processes and the deployed security mechanisms. This focus does not allow an objective assessment of the security properties the IT system does actually satisfy. To enable such an assessment, it is a necessity to make the desired security properties explicit with the necessary level of precision, to provide a view on the system appropriate to analyze the security of a system wrt. the desired requirements and to come up with analysis techniques to ease the process of judging the security of a system.

    The course gives an overview on formal approaches to:

    • formal modeling of security-critical systems
    • formal specification of security requirements
    • formal security analysis of systems
    • theoretical foundations for developing secure software by stepwise refinement and composition.

    The topics covered include:

    • introduction to formal methods for information security
    • formal modeling and analysis of access control mechanisms
    • formal modeling and analysis of information flow control
    • formal modeling and analysis of security protocols

    Prerequisites

    Knowledge of Computer Science and Mathematics, equivalent to the first four Semesters in the Computer Science Bachelor program, in particular

    • ability to use formal languages and calculi
    • and basic knowledge about logic.

    Literature

    Will be announced in the lecture.

    Last modified on 17 April 2022.

A A A | Print | Imprint | Sitemap | Contact
zum Seitenanfang