Topic Name Description
File Threat Modeling Designing for Security Adam Shostack
File Giampaolo Bella Formal Correctness of Security Protocols
File ISABELLE HOLtutorial
File Zobel - Writing for computer science 3rd edition
Course Presentation and Initial Discussions URL Official Lecture Plan
URL Lecture 1
URL Lecture Recording
Cryptographic Primitives - Symmetric and Asymmetric cryptography URL Lecture Recording
URL Lecture 2
Security Properties, Advanced Security Properties and Properties Composition URL Lecture Recording
URL Lecture 3
File Abadi, M. Security Protocols and their Properties
File Bellare, M. Rogawayy., P . Entity Authentication and Key Distribution
File Delaune, S. Kremer, S. Formalising security properties in electronic voting protocols
File Lowe, G. A Hierarchy of Authentication Specifications
Needham-Shcroeder Protocol Family URL Lecture Recording
URL Lecture 4
File Needham R., Schroeder M. Authentication in Large Networks of Computers
File Needham R., Schroeder M. Authentication Revisited
File Lowe,G. An attack on the Needham-Schroeder public-key authentication protocol
File Denning D., Sacco, G. Timestamps in Key Distribution Protocols
Classical Protocols URL Lecture Recording
URL Lecture 5
File Weidenbach, C. Towards and Automatic Analysis of Security Protocols in First-Order Logic
File Shaikh, S., Bush, V. Analysing the Woo-Lam Protocol Using CSP and Rank Functions
File Otway,D., Rees O. Efficient and Timely Mutual Authentication
File Neuman,B. C. ,Stubblebine, S. G. A Note on the Use of Timestamps as Nonces
File Chen,L. , Shi, M. Security Analysis and Improvement of Yahalom Protocol
File Hwang et. al. Two attacks on Neuman-Stubblebine authentication protocols
File Burrows et. al, A Logic of Authentication
Threat Modelling URL Lecture Recording
URL Lecture 6
File Herzog, J. .A Computational Interpretation of Dolev-Yao Adversaries
File Dolev,D. Yao, A. C. On the Security of Public Key Protocols
File Wihem et al. Multi-Attacker Protocol Validation
Advanced Threat Models for Symbolic Evaluation URL Lecture Recording
URL Lecture 7
File Carlos et al. An Updated Threat Model for Security Ceremonies
Final Project Discussions URL Lecture Recording
Protocol Verification Techniques - Belief Logics URL Lecture Recording
URL Lecture 12
File Burrows, M. Abadi, M. A Logic of AUthentication
Protocol Verification Techniques - State Enumeration URL Lecture Recording
URL Lecture 13
URL Lecture Recording
URL Lecture 14
File Lowe, G. Breaking and Fixing Needham-Schroeder Public Key Protocol Using FDR
File Hoare, C. A. R. Communicating Sequential Processes
Protocol Verification Techniques - Theorem Provers URL Lecture Recording
URL Lecture 15
File Weidenbach, C. Towards and Automatic Analysis of Security Protocols in First-Order Logic
URL Lecture Recording
URL Lecture 16
File Paulson, L.C., The Inductive Approach to Verifying Cryptographic Protocols
Advanced Security Protocols - Kerberos/SSL/TLS URL Lecture Recording
URL Lecture 17
URL Lecture 18
Advanced Security Ceremonies - Carlomagno et. al. approach and Security Ceremony Concertina URL Lecture 19
URL Lecture 20