Professional Documents
Culture Documents
FormalSecurityAnalysis 1
FormalSecurityAnalysis 1
Karthikeyan Bhargavan
2. We then study the syntax and semantics of the applied pi-calculus, a vari-
ant of the pi-calculus designed specifically for the modelling and proof
of cryptographic protocols. We study a translation from F programs to
applied pi-calculus processes and formalize the correctness of this trans-
lation. We learn how to automatically verify the security of F programs
by translating them using the compiler FS2PV and then verifying the
resulting processes using the cryptographic prover ProVerif. We evalu-
ate the strengths and weaknesses of this technique over large verification
case studies of standard protocols, such as the Transport Layer Security
protocol (TLS).
By the end of the course, the student will have been exposed to the theory
underlying the security analysis of distribured programs and gained some ex-
perience in the use of a leading security verification tool. The course will be
accessible to students with some background in programming language theory,
specifically some working knowledge of the syntax and semantics of foundational
calculi such as the lambda calculus and pi calculus, and some basic type theory.