December 7, 2001DIMI, Universita’ di Udine, Italy Graduate Course on Computer Security Lecture 9: Automated Verification Iliano Cervesato

Slides:



Advertisements
Similar presentations
Maurizio Pighin, University of Udine, Italy Venezia, marzo 2001 Workshop SALADIN Slide 1 Maurizio Pighin Dipartimento di Matematica e Informatica.
Advertisements

Using UML, Patterns, and Java Object-Oriented Software Engineering Chapter 1: Introduction.
BDDs & Theorem Proving Binary Decision Diagrams Dr. Eng. Amr T. Abdel-Hamid NETW 703 Winter 2012 Network Protocols Lectures are based on slides by: K.
Modelling and Analysing of Security Protocol: Lecture 7 Automatically Checking Protocols Tom Chothia CWI.
LIFE CYCLE MODELS FORMAL TRANSFORMATION
Software Reliability CIS 640 Adapted from the lecture notes by Doron Pelel (
1 Formal Methods in SE Qaisar Javaid Assistant Professor Lecture 05.
1 Static Analysis Methods CSSE 376 Software Quality Assurance Rose-Hulman Institute of Technology March 20, 2007.
A Concurrent Logical Framework (Joint work with Frank Pfenning, David Walker, and Kevin Watkins) Iliano Cervesato ITT Industries,
MSR 3: One Year Later Iliano Cervesato ITT Industries, NRL Washington, DC Protocol eXchange.
Hardware and Petri nets: application to asynchronous circuit design Jordi CortadellaUniversitat Politècnica de Catalunya, Spain Michael KishinevskyIntel.
MSR 3.0: The Logical Meeting Point of Multiset Rewriting and Process Algebra Iliano Cervesato ITT Industries, NRL Washington,
Exercise Exercise3.1 8 Exercise3.1 9 Exercise
ECE Synthesis & Verification1 ECE 667 Spring 2011 Synthesis and Verification of Digital Systems Verification Introduction.
Exercise Exercise Exercise Exercise
Fine-Grained MSR Specifications for Quantitative Security Analysis Iliano Cervesato ITT Industries, NRL Washington, DC
Model Checking Anders P. Ravn Department of Computer Science, Aalborg University, Denmark Hybrid Systems – PhD School Aalborg University January 2007.
Exercise Exercise Exercise Exercise
Exercise Exercise6.1 7 Exercise6.1 8 Exercise6.1 9.
Fault Tree Representation of Security Requirements0.
Fine-Grained MSR Specifications for Quantitative Security Analysis Iliano Cervesato ITT Industries, NRL Washington, DC
Slides 00 1 Advanced Logics Part 1: Lambda Calculus and Type Theory Lecturer: Lim Yohanes Stefanus Part 2: Modal Logic Lecturer: Gregory Wheeler.
December 6, 2001DIMI, Universita’ di Udine, Italy Graduate Course on Computer Security Lecture 8: Intruder Models Iliano Cervesato
DeMorgan Theorem, Computer Simulation Exercises
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introductory Lecture Advanced Computer Programming.
CPSC 321 Introduction to Logic Circuit Design Mihaela Ulieru (‘Dr. M’)
computer
Software Verification 1 Deductive Verification Prof. Dr. Holger Schlingloff Institut für Informatik der Humboldt Universität und Fraunhofer Institut.
University of Paderborn Software Engineering Group Prof. Dr. Wilhelm Schäfer Towards Verified Model Transformations Holger Giese 1, Sabine Glesner 2, Johannes.
Formal Verification Lecture 9. Formal Verification Formal verification relies on Descriptions of the properties or requirements Descriptions of systems.
Lecture Comp 25 Math & Logic Discussion. What is logic? Logic is the study of reason Focus is the method or process by which an argument unfolds Aristotle.
Kansas State University Department of Computing and Information Sciences CIS 730: Introduction to Artificial Intelligence Lecture 13 of 41 Monday, 20 September.
Verification of Security Protocols Lecture 0: admin Sandro Etalle.
IAEA Training in Emergency Preparedness and Response Lecture Preparing, Conduct and Evaluation of Exercises to Test Preparedness for a Nuclear or Radiological.
HACNet Simulation-based Validation of Security Protocols Vinay Venkataraghavan Advisors: S.Nair, P.-M. Seidel HACNet Lab Computer Science and Engineering.
IS’ Application Development This course introduces students to the fundamental concepts and models of application development so that they can understand.
Teaching Functional Verification – Course Organization Design Automation Conference Sunday, June 9, 2002.
Exercise: Z-paths A Z-cycle is a Z-path that begins and ends with the same checkpoint. e.g. m5 m3 m4.
Formal Methods: for All or for Chosen? Victor Kuliamin 1 Vitaliy Omelchenko 1 Olga Petrenko 2 1 Institute for System Programming 2 Institute of Open Education.
URL: by Wishnu Prasetya Course on Program Verification 2015/2016.
Frederico Araujo CS6362 – Fall 2010 Automated Theorem Proving.
Using UML, Patterns, and Java Object-Oriented Software Engineering Chapter 1: Introduction.
Raymond Plante National Center for Supercomputing Applications Coming DC3 Middleware Development.
CENG 424-Logic for CS Introduction Based on the Lecture Notes of Konstantin Korovin, Valentin Goranko, Russel and Norvig, and Michael Genesereth.
IT 244 Week 8 DQ 1 To purchase this material link Week-8-DQ-1 For more courses visit our website
Discussion Lecture Comp 25 Math & Logic.
Iliano Cervesato ITT Industries, NRL Washington, DC
Ethical Hacking By: Erin Noonan.
2009: Topics Covered in COSC 6368
Moving Companies in VA Moving Companies in Washington DC.
ECET 370 Competitive Success-- snaptutorial.com
Home Automation - Maui, Hawaii.
ECET 370 Education for Service-- snaptutorial.com
ECET 370 Teaching Effectively-- snaptutorial.com
ECET 370 Inspiring Innovation-- snaptutorial.com
Teaching Functional Verification
IS 2935: Developing Secure Systems
Clark Barrett Analysis of Computer Systems Group
CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena
Course Software Testing & Verification 2017/18 Wishnu Prasetya
DATA DOWNLOADING Introduction and Course Content
CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena
Reading: ‘Washington, DC’
Linear Algebra Lecture 6.
PGD Students Masters Students Ph.D Students
2004: Topics Covered in COSC 6368
Algorithms Lecture # 01 Dr. Sohail Aslam.
CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena
CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena
Presentation transcript:

December 7, 2001DIMI, Universita’ di Udine, Italy Graduate Course on Computer Security Lecture 9: Automated Verification Iliano Cervesato ITT Industries, NRL – Washington DC

Computer Security: 9 – Automated Verification 2 Outline  Complexity of protocol verification  Techniques and tools  Model checking  Theorem proving  Process equivalence  Belief logics

Computer Security: 9 – Automated Verification 3 Readings

Computer Security: 9 – Automated Verification 4 Exercises for Lecture 9

Computer Security: 9 – Automated Verification 5 Next …  Beyond authentication