TUM Logo

Common Flaws in Protocolsecurity

Common Flaws in Protocolsecurity  

Seminare 2 SWS / 5 ECTS
Veranstalter: Ludwig Peuckert and Maximilian Tschirschnitz
Beginn:


 

Dates

Registration

  1. Register via the matching system

Contents

  1. Common Attacks on Protocols
  2. Techniques in Protocol Modelling
  3. Formal Verification of Protocols
  4. Attack Mitigation in Protocols

Previous Knowledge

Not mandatory, but basic Knowledge in IT Security, Protocolsecurity, Cryptography is welcome

Final Presentations

If the pandemic situations allows, we plan to have a voluntary in-person conference at the end of the semester together with other seminars.
In past semesters we have visited Frauenchiemsee:

frauenchiemsee scaled