![]() |
![]() |
University of Birmingham > Talks@bham > Computer Security Seminars > Symbolic protocol verification - where next?
Symbolic protocol verification - where next?Add to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Gurchetan Grewal. During the last twenty years, there has been a surge in symbolic analysis methods for security protocols and APIs. During the early years, most attacks that were found were of a theoretical nature. More recently, several concrete attacks that were found in this domain have impacted real-world standards. This talk covers some historical aspects of these methods, the current state, and sketches some of the many remaining challenges. As an example of a current tool, we will discuss the underlying model of the Tamarin prover. We will highlight some of its strengths and show where we would like to go next. This talk is part of the Computer Security Seminars series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsComputer Science Distinguished Seminars Condensed Matter Physics Seminars computer sienceOther talksProvably Convergent Plug-and-Play Quasi-Newton Methods for Imaging Inverse Problems Sensing and metrology activities at NPL, India Modelling uncertainty in image analysis. When less is more - reduced physics simulations of the solar wind The development of an optically pumped magnetometer based MEG system TBC |