Master of Ceremonies

You are interested in security protocols. Ceremonies are a new view which extends security protocols by integrating the human factor in the picture, as well as looking at the security protocol/system in entirety, making the assumptions explicit and composing several protocols for communication and security in the same analyses.

There are very few tools and formalisms for ceremonies, therefore you will have a lot of freedom. You will investigate and build a tool for ceremonies based on an existing tool for security protocols. You will investigate graphical languages and code generation, or you can look into how to analyze ceremonies.

See project link. Ask for discussions with one of the supervisors, for more information or variations of the project. See also general concerns.

This topic is part of a series of Master topics about formal tools that can be used to analyze and build systems in various forms. These tools are of industrial quality and many of them have reached a learning level that can easily be taken by a master student from IFI. Some tools are used to analyze systems to ensure lack of errors. Other tools can be used to generate code. Whereas other tools can be sued to obtain quantitative and qualitative information about a system, like what is the expected uptime of this server. The tools can be used for systems from real-life, as well as software systems, security protocols, networking, multi-processor, supercomputer, or distributed systems, etc.

Each topic has as focus one such tool. The goal is to learn the tool and to apply it to a real-life case study.

The topics in this series are part of the recent ConSeRNS team that was formed at IFI with the purpose to combine competences on security, concurrency and parallelism, and resilient networks, also focusing on the integration of the human in such systems. The competences of ConSeRNS can be seen useful for analyzing formally the security properties of complex systems. The same competences can be useful for future complex systems such as ubiquitous systems where networking and communication, as well as parallel and distributed computation are extremely central, and the human aspect imposes strict safety and security concerns.

Tags: security ceremonies, protocols, verification, analysis, graphical language, actor network theory
Published Aug. 23, 2017 10:27 AM - Last modified Apr. 13, 2018 10:27 AM


Scope (credits)