University of Birmingham > Talks@bham > Computer Security Seminars > Symbolic protocol verification - where next?

Symbolic protocol verification - where next?

Add to your list(s) Download to your calendar using vCal

If you have a question about this talk, please contact Gurchetan Grewal.

During the last twenty years, there has been a surge in symbolic analysis methods for security protocols and APIs. During the early years, most attacks that were found were of a theoretical nature. More recently, several concrete attacks that were found in this domain have impacted real-world standards. This talk covers some historical aspects of these methods, the current state, and sketches some of the many remaining challenges. As an example of a current tool, we will discuss the underlying model of the Tamarin prover. We will highlight some of its strengths and show where we would like to go next.

This talk is part of the Computer Security Seminars series.

Tell a friend about this talk:

This talk is included in these lists:

Note that ex-directory lists are not shown.


Talks@bham, University of Birmingham. Contact Us | Help and Documentation | Privacy and Publicity.
talks@bham is based on from the University of Cambridge.