Class Location: Skilling
193 [map link]
Class Timings: Tuesdays and Thursdays,
Instructor: John C. Mitchell
Office Hours: TBD, Gates 476
Course Assistant: Arnab Roy
Office Hours: 5:30-6:30PM Tuesdays and
4-5:30PM Thursdays, Gates 490
Course Description:
The course will cover a variety of contemporary
network protocols and give students hands-on experience in using automated
tools or other techniques to analyze and evaluate security mechanisms. To
understand security properties and requirements, we will look at several
current protocols and their properties, including secrecy, authentication, key
establishment, and fairness. In parallel, the course will look at several
models and tools used in security analysis and examine their advantages and
limitations. In addition to fully automated finite-state model checking
techniques, we will also study other approaches, such as constraint solving,
process algebras, protocol logics, probabilistic model checking, game theory,
and executable models based on logic programming.
Individually or in small teams, students will
select a protocol or system to analyze, identify the system and its desired
properties in a precise way, and use one of the tools or methods covered in the
course to perform a security analysis. A set of candidate systems will be
given, but students may propose their own. Projects may look at network
protocols, or other kinds of systems, such as privacy systems, web security,
and trusted computing architectures.
Announcements:
·
·
·
Reminder
– Project presentation #1 due on
·
·
Resources from current
students:
Resources from past offerings of the course:
·
Winter 2006 Home Work 2a, Solutions