FBK > IT

ST - Security and Trust

The design and development of security-sensitive distributed applications is usually so complex that flaws are often present in complex applications even after intensive use of traditional verification techniques, such as manual inspection or testing.  This is witnessed, for example, by the severe vulnerabilities that have been found in various Single Sign-On (SSO) protocols, such as SAML SSO, MS Passport/CardSpace and the SAML-based SSO for Google Apps, even years after their publication, implementation, deployment, and massive usage.

The Security and Trust (ST) Research Unit develops techniques for the formal specification and automatic analysis  of security-sensitive, distributed applications to be used in several phases of the application life-cycle, ranging from design to deployment.  These techniques contribute to improving the security of complex distributed applications as well as of the applications based on them. 

The ST Unit is currently focusing on the development of techniques for the automated analysis of browser-based security protocols and distributed access control policies as they play a central role in securing web-based applications. The techniques developed by the ST Research Unit are implemented in verification tools and are thoroughly assessed by running these tools against real-world security protocols and policies.

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.