Embedded System Security

Organizational Matters

  • Lecture [2 SWS]

    • Lecturer: Prof. Dr.-Ing. Ahmad-Reza Sadeghi
    • Date: Every Friday from 11:40 am to 13:20 pm (starting from 15.04.2011)
    • Location: Building S4|14, room 5.3.01

  • Exercises [1 SWS]

    • Lecturer: Research Assistant Team of System Security Lab
    • Date: Every second Friday from 13:30 pm to 15:00 pm
    • Location: Building S4|14, room 4.3.01 (practical exercises will take place in the system security lab in S4|14)

Content

  • Trusted Computing

    • Authenticated Boot
    • Binding and Sealing
    • Integrity Measurement and Attestation
    • Direct Anonymous Attestation
    • Trusted Platform Modules (TPM/MTM)
    • On-board Credentials

  • Mobile Security (with focus on smartphones)

    • Selected Access Control and Permission Model Aspects
    • Security of User Applications
    • Privacy Issues
    • Context-Based Policies
    • Selected Modern Attack Techniques
    • Security Architectures

  • Hardware-based Cryptography

    • Hardware-assisted Cryptographic Protocols
    • Introduction to Physically Unclonable Functions (PUFs)

Prerequisites

  • Basics of cryptography

Recommended Literature

  • Chal­le­ner, David, Van­Doorn, Leen­dert, Saf­ford, David, Yoder, Kent, Ca­ther­man, Ryan "A Prac­tical Guide to Trusted Com­pu­ting", IBM Press, 2007
  • Smith, Sean W. "Trusted Com­pu­ting Plat­forms: De­sign and Ap­p­li­ca­ti­ons", Sprin­ger Ver­lag, 2005
  • Scientific research papers on mobile security

    • Android References [PDF]

Course Material

  • Course Introduction [PDF]
  • Chapter 1: Introduction to Trusted Computing [PDF]
  • Chapter 2: Trusted Platform Module (TPM) [PDF]
  • Chapter 3: Trusted Computing Functionalities based on TPM [PDF]
  • Chapter 4: Applications of Attestation [PDF]
  • Chapter 5: Mobile Trusted Platform [PDF]
  • Chapter 6: Return-oriented Programming [PDF-colored] [PDF-grayscale]
  • Chapter 7: Android OS Security [PDF-colored] [PDF-grayscale]
  • Chapter 8: Electronic Passports and Electronic Identity Cards [PDF-colored] [PDF-grayscale]
  • Exercise 1: Trusted Computing Concepts (deadline: 23.05.2011) [PDF]
  • Exercise 2: Authenticated Boot and Sealing (deadline: 03.06.2011) [PDF]
  • Exercise 3: Mobile Trusted Module (deadline: 01.07.2011) [PDF]
  • Exercise 4: Buffer Overflow Basics [PDF]
  • Exercise 5: Practical Lab on Runtime Attacks [PDF]

Credit Points

  • 6 CP

Events

no news in this list.

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang