Applications of Formal Methods for
|
InstructorCourse DescriptionNetwork protocols and distributed systems are at the core of all computing systems we rely on today. Thus, it is important that we have assurance about their design and implementation, i.e. their designs and implementations are free of bugs and vulnerabilities. For secure protocols, their goals must also be achieved in the presence of adversaries that must be clearly specified. Formal methods can help disambiguate system specifications and can expose flaws in system requirements, often not captured through testing. In this class we will study how formal methods have been applied to gain assurance about network protocols and distributed systems design and implementation. We will focus both on the benefits and limitations of formal methods based approaches. The objectives of the course are the following:
Academic IntegrityAcademic Honesty and Ethical behavior are required in this course, as it is in all courses at Northeastern University. There is zero tolerance to cheating. You are encouraged to talk with the professor about any questions you have about what is permitted on any particular assignment. | |||||||||||||||||||||||||||||||||||||||||||||||||
Lecture slides *will be posted* below for public access as the class progresses. Class platform is canvas available through mynortheastern. All additional material for the class and all class communication will take place on canvas. For the most updated information check canvas.
| |||||||||||||||||||||||||||||||||||||||||||||||||
Summary of readings related to the class. |