December 7, 2001DIMI, Universita’ di Udine, Italy Graduate Course on Computer Security Lecture 9: Automated Verification Iliano Cervesato ITT Industries, NRL – Washington DC
Computer Security: 9 – Automated Verification 2 Outline Complexity of protocol verification Techniques and tools Model checking Theorem proving Process equivalence Belief logics
Computer Security: 9 – Automated Verification 3 Readings
Computer Security: 9 – Automated Verification 4 Exercises for Lecture 9
Computer Security: 9 – Automated Verification 5 Next … Beyond authentication