Master in Information Security
For more information about the Information Security Master Track visit: http://www.infsecmaster.ethz.ch
Bachelor Course 252-0058-00L, Spring Semester 2010
Classes: Tue 9-11 in HG E 7, Thu 10-12 in HG F 7
(second half of the course)
Solutions can be submitted in one of two ways. Either send them by email to the appropriate assistant, or submit them by hand in the appropriate box which will be located at the end of the corridor outside room RZ F1. In either case, solutions must be received by 9:15am on the Monday after the exercise is published, in order to receive feedback (which will be given in the exercise sessions that week).
(first half of the course - now completed)
Homework is optional, but highly recommended. There will be a midterm and a final exam. The grade in the course will be determined based on the average points received in the midterm and the final exam.
In this course, participants will learn about new ways of specifying, reasoning about, and developing programs and computer systems. Our objective is to help students raise their level of abstraction in modeling and implementing systems.
The first part of the course will focus on designing and reasoning about functional programs. Functional programs are mathematical expressions that are evaluated and reasoned about much like ordinary mathematical functions. As a result, these expressions are simple to analyze and compose to implement large-scale programs. We will cover the mathematical foundations of functional programming, the lambda calculus, as well as higher-order programming, typing, and proofs of correctness.
The second part of the course will focus on deductive and algorithmic validation of programs modeled as transition systems. As an example of deductive verification, students will learn how to formalize the semantics of imperative programming languages and how to use a formal semantics to prove properties of languages and programs. As an example of algorithmic validation, the course will introduce model checking and apply it to programs and program designs.
Literature for the second part:
Literature for the first part:
Additional literature for interested students:
Course Material: here
Diese Website wird in älteren Versionen von Netscape ohne graphische Elemente dargestellt. Die Funktionalität der Website ist aber trotzdem gewährleistet. Wenn Sie diese Website regelmässig benutzen, empfehlen wir Ihnen, auf Ihrem Computer einen aktuellen Browser zu installieren. Weitere Informationen finden Sie auf
The content in this site is accessible to any browser or Internet device, however, some graphics will display correctly only in the newer versions of Netscape. To get the most out of our site we suggest you upgrade to a newer browser.