Embedded System Security

Organizational Matters

  • Lecture [2 SWS]

    • Lecturer: Prof. Dr.-Ing. Ahmad-Reza Sadeghi
    • Date: Every Friday from 11:40 am to 13:20 pm
    • Location: Building S4|14, room 5.3.01

  • Exercises [1 SWS]

    • Lecturer: Research Assistant Team of System Security Lab
    • Date: Every second Friday from 13:30 pm to 15:00 pm
    • Location:

      • Theoretical exercises: Building S4|14, room 3.1.01
      • Lab exercises: Building S4|14, room 3.2.06

  • Exam [2h]

    • Date: 12.08.2013
    • Time: 9:00 to 12:00
    • Location: Piloty building, room C205

Content

  • Trusted Computing 

    • Authenticated Boot
    • Binding and Sealing
    • Integrity Measurement and Attestation
    • Direct Anonymous Attestation
    • Trusted Platform Modules (TPM/MTM)
    • On-board Credentials

  • Mobile Security (with focus on smartphones)

    • Security Architectures
    • Selected Access Control and Permission Model Aspects
    • Selected Modern Attack Techniques

  • Hardware-based Cryptography

    • Hardware-assisted Cryptographic Protocols
    • Introduction to Physically Unclonable Functions (PUFs)

Prerequisites

  • Basics of cryptography

Recommended Literature

  • Chal­le­ner, David, Van­Doorn, Leen­dert, Saf­ford, David, Yoder, Kent, Ca­ther­man, Ryan "A Prac­tical Guide to Trusted Com­pu­ting", IBM Press, 2007 
  • Smith, Sean W. "Trusted Com­pu­ting Plat­forms: De­sign and Ap­p­li­ca­ti­ons", Sprin­ger Ver­lag, 2005 
  • Scientific research papers on mobile security

    • Android References [PDF]

Credit Points

  • 6 CP

Course Material 

  • Lecture Slides

    • Introduction and Course Organization (PDF, PDF grayscale)
    • Introduction to Trusted Computing (PDF)
    • Trusted Platform Module (PDF)
    • Trusted Computing Functionalities based on TPM and Mobile Trusted Platforms (PDF; revised MTM part on 24.05.2013)
    • Introduction to Smartphone Security (PDF, PDF grayscale)
    • Android Security Architecture (PDF, PDF grayscale)
    • Physically Unclonable Functions (PDF, PDF grayscale)
    • Runtime Attacks and Their Relevance for Mobile Devices (PDF, PDF grayscale)
    • Electronic Passports and Identity Cards (PDF, PDF grayscale; fixed typo on slide 15 on 08.07.2013)
    • Overview on Apple iOS (PDF, PDF grayscale)

  • Exercises

    • Trusted Computing and TCG Concepts (PDF)
    • Android Theory (PDF)
    • Android Lab (PDF)
    • Runtime Attacks Theory (PDF)
    • Runtime Attacks Lab (PDF)
    • Electronic Passports Theory (PDF)

Events

no news in this list.

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang