Dec. 7, 2022, 2:10 a.m. | Linard Arquint, Malte Schwerhoff, Vaibhav Mehta, Peter Müller

cs.CR updates on arXiv.org arxiv.org

Security protocols are essential building blocks of modern IT systems. Subtle
flaws in their design or implementation may compromise the security of entire
systems. It is, thus, important to prove the absence of such flaws through
formal verification. Much existing work focuses on the verification of protocol
*models*, which is not sufficient to show that their *implementations* are
actually secure. Verification techniques for protocol implementations (e.g.,
via code generation or model extraction) typically impose severe restrictions
on the used programming …

modular protocol security verification

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Staff DFIR Investigator

@ SentinelOne | United States - Remote

Senior Consultant.e (H/F) - Product & Industrial Cybersecurity

@ Wavestone | Puteaux, France

Information Security Analyst

@ StarCompliance | York, United Kingdom, Hybrid

Senior Cyber Security Analyst (IAM)

@ New York Power Authority | White Plains, US