BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Verification Across Intellectual Property Boundaries - Helmut Veit
 h\, Technische Universität München
DTSTART:20070302T140000Z
DTEND:20070302T150000Z
UID:TALK6752@talks.cam.ac.uk
CONTACT:Tom Ridge
DESCRIPTION:In many industries\, the share of software components provided
  by\nthird-party suppliers is steadily increasing. As the suppliers seek t
 o\nsecure their intellectual property (IP) rights\, the customer usually\n
 has no direct access to the suppliers' source code\, and is able to\nenfor
 ce the use of verification tools\, and other measures for\nenhancing softw
 are quality\, only by legal requirements. In turn\, the\nsupplier has no m
 eans to convince the customer about successful\nverification without revea
 ling the source code.\n\nIn this talk\, we present a new approach to resol
 ve the conflict\nbetween the IP interests of the supplier and the quality 
 interests of the\ncustomer. We introduce a protocol in which a dedicated s
 erver (called\nthe ``amanat'') is controlled by both parties: the customer
  controls\nthe verification task performed by the amanat\, while the suppl
 ier\ncontrols the communication channels of the amanat to ensure that the\
 namanat does not leak information about the source code.\n\nWe argue that 
 the protocol is both practically useful and\nmathematically sound. As the 
 protocol is based on well-known (and\nrelatively lightweight) cryptographi
 c primitives\, it allows a\nstraightforward implementation on top of exist
 ing verification tool\nchains. To substantiate our security claims\, we es
 tablish the\ncorrectness of the protocol by cryptographic reduction proofs
 .
LOCATION:FW11
END:VEVENT
END:VCALENDAR
