In protocol verification we observe a wide spectrum from fully automated methods
to interactive theorem proving with proof assistants like Isabelle/HOL. The
latter provide overwhelmingly high assurance of the correctness, which
automated methods often cannot: due to their complexity, bugs in such automated
verification tools are likely and thus the risk of erroneously verifying a
flawed protocol is non-negligible. There are a few works that try to combine
advantages from both ends of the spectrum: a high degree of automation and
assurance.
A warm welcome to Dr Avik
Chakraborti. Avik is
joining the Security and Trust of Advanced Systems
Group at
the Department of Computer Science of the University of
Exeter as a Lecturer in Cyber
Security.
We are proud to announce the release of
Isabelle/DOF 1.1.0.
Isabelle/DOF is a
novel Document Ontology Framework on top of Isabelle. Isabelle/DOF allows for
both conventional typesetting and formal development.
In this post, Sakine
explains her PhD research. This post has also been published on the Research
and Innovation
Blog
of the University of Exeter.
Artificial Intelligence (AI) and machine learning (ML) seem to revolutionize all
aspects of our life. Of course, this also is true for cybersecurity - at least
if we believe the statements from vendors that want to sell their latest
AI/ML-enhanced security product. But is this really true?
Modern systems, ranging from (smart) IoT devices to enterprise software
applications, are rarely developed “on the green field”: modern developers are
“composers” that build systems by combining existing solutions with own
developments. It is not uncommon that the final product consists of up to 90% of
third-party components.
In March, Michael passed successful his PhD
viva. Now, his PhD thesis is available
online
herzberg:formal-web-components:2020?. The thesis investigates one of the
cornerstones of modern software development that enables the creation of
sophisticated software systems: the concept of reusable software components
for web applications.
Wondering with video conference software to use? There are plenty of options
available, but not all of them are equally privacy-friendly.