Download presentation
Presentation is loading. Please wait.
1
December 6, 2001DIMI, Universita’ di Udine, Italy Graduate Course on Computer Security Lecture 8: Intruder Models Iliano Cervesato iliano@itd.nrl.navy.mil ITT Industries, Inc @ NRL – Washington DC http://www.cs.stanford.edu/~iliano/
2
Computer Security: 8 – Intruder Models 2 Outline What is an attack? Intruders Real Polynomial Dolev-Yao Completeness of the Dolev-Yao intr. Type-Flaw attacks
3
Computer Security: 8 – Intruder Models 3 Readings
4
Computer Security: 8 – Intruder Models 4 Exercises for Lecture 8
5
Computer Security: 8 – Intruder Models 5 Next … Automated Verification
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.