Organizational Matters

  • Lecture [2 SWS]

    • Lecturer: Prof. Dr.-Ing. Ahmad-Reza Sadeghi
    • Date: Every Friday from 11:40 am to 13:20 pm (starting from 13.04.2012)
    • Location: Building S4|14, room 5.3.01

  • Exercises [1 SWS]

    • Lecturer: Research Assistant Team of System Security Lab
    • Date: Every second Friday from 13:30 pm to 15:00 pm
    • Location: Building S4|14, room 4.3.01 (practical exercises will take place in the system security lab in S4|14)

  • Exam [2h]

    • Date: Wednesday, 19.09.2012 from 2 to 4 pm
    • Location: Building S2|02, room C205

Content

  • Trusted Computing 

    • Authenticated Boot
    • Binding and Sealing
    • Integrity Measurement and Attestation
    • Direct Anonymous Attestation
    • Trusted Platform Modules (TPM/MTM)
    • On-board Credentials

  • Mobile Security (with focus on smartphones)

    • Security Architectures
    • Selected Access Control and Permission Model Aspects
    • Selected Modern Attack Techniques

  • Hardware-based Cryptography

    • Hardware-assisted Cryptographic Protocols
    • Introduction to Physically Unclonable Functions (PUFs)

Prerequisites

  • Basics of cryptography

Recommended Literature

  • Chal­le­ner, David, Van­Doorn, Leen­dert, Saf­ford, David, Yoder, Kent, Ca­ther­man, Ryan "A Prac­tical Guide to Trusted Com­pu­ting", IBM Press, 2007 
  • Smith, Sean W. "Trusted Com­pu­ting Plat­forms: De­sign and Ap­p­li­ca­ti­ons", Sprin­ger Ver­lag, 2005 
  • Scientific research papers on mobile security

    • Android References [PDF]

Course Material

  • Lectures

    • Introduction to Trusted Computing [PDF]
    • Trusted Platform Module [PDF]
    • TPM (Part 2) and Mobile Trusted Module [PDF]
    • Introduction to Smartphone Security [PDF]
    • Android Security Architecture [PDF]
    • Android Security Extensions [PDF]
    • Electronic Passports and Identity Cards [PDF] [PDF grayscale]
    • Physically Unclonable Functions (PUFs) [PDF]  [PDF grayscale]
    • Overview on iOS [PDF]
    • Runtime Attacks (updated: 12 July 2012) [PDF]

  • Exercises

    • Exercise 1: Trusted Computing [PDF]
    • Exercise 2: Mobile Trusted Module [PDF]
    • Exercise 3: Android Security [PDF]
    • Exercise 4: Android Security (Lab Session) [PDF]
    • Exercise 5: Electronic Passports [PDF]
    • Exercise 6: Runtime Attacks [PDF]
    • Exercise 7: Runtime Attacks (Lab Session) [PDF]

Credit Points

  • 6 CP

Events

no news in this list.

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang