Typing and Subtyping for Security

This projects involves working with typing systems (one needs background from a course like ) to guarantee security properties. A cases study of a security protocol will guide the work. Your work will start from investigating existing research papers on this topic, like [16, 11, 12, 2, 1], as well as studying the specification of a security protocol/ceremony, like ZRTP or OTR.

See project link. Ask for discussions with one of the supervisors, for more information or variations of the project. See also general concerns.

Tags: ZRTP, security, typing systems
Published Sep. 22, 2016 10:26 AM - Last modified May 24, 2017 10:50 AM

Scope (credits)