December 6, 2001DIMI, Universita’ di Udine, Italy Graduate Course on Computer Security Lecture 8: Intruder Models Iliano Cervesato ITT Industries, NRL – Washington DC
Computer Security: 8 – Intruder Models 2 Outline What is an attack? Intruders Real Polynomial Dolev-Yao Completeness of the Dolev-Yao intr. Type-Flaw attacks
Computer Security: 8 – Intruder Models 3 Readings
Computer Security: 8 – Intruder Models 4 Exercises for Lecture 8
Computer Security: 8 – Intruder Models 5 Next … Automated Verification