Embedded System Security

Organizational Matters

  • Lecture [2 SWS]

    • Lecturer: Prof. Dr.-Ing. Ahmad-Reza Sadeghi
    • Date: Every Friday from 11:40 am to 13:20 pm
    • Location: 

      • 17 April: S1|01, room A02
      • from 24 April: S2|17, room 103
      • May 8: Lecture time will be used for practical lab
      • June 12: No lecture
      • from June 19: CASED, Building S4|14, Mornewegstraße 32, room 5.3.01

  • Exercises [1 SWS]

    • Lecturer: Research Assistant Team of System Security Lab
    • Date: Every second Friday (see tentative dates below) from 13:30 pm to 15:10 pm

      • 24 April, Exercise 1 in S2|17, room 103
      • 8 May, Practical Lab in S4|14, room 3.2.06

        • Group 1 from 11:00 -13:00pm
        • Group 2 from 13:00 - 15:00pm

    • Location:

      • from June 19 ALL Exercises: CASED, Building S4|14, Mornewegstraße 32, room 5.3.01
      • Theoretical exercises: Building S2|17, room 103
      • Lab exercises: Building S4|14, room 3.2.06

  • Exam [2h]

    • Date: 10 August 2015, 9:00 - 11:00am
    • Location: S105/122

  • Repeat Exam [2h]

    •  March 22nd, 2016, 14:00 - 16:00
    • Location: CASED, Building S4|14, Mornewegstr. 32, room 3.1.01

Content

  • Trusted Computing 

    • Authenticated Boot
    • Binding and Sealing
    • Integrity Measurement and Attestation
    • Direct Anonymous Attestation
    • Trusted Platform Modules (TPM/MTM)
    • On-board Credentials

  • Mobile Security (with focus on smartphones)

    • Security Architectures
    • Selected Access Control and Permission Model Aspects
    • Selected Modern Attack Techniques

  • Hardware-based Cryptography

    • Hardware-assisted Cryptographic Protocols
    • Introduction to Physically Unclonable Functions (PUFs)

Prerequisites

  • Basics of cryptography

Recommended Literature

  • Chal­le­ner, David, Van­Doorn, Leen­dert, Saf­ford, David, Yoder, Kent, Ca­ther­man, Ryan "A Prac­tical Guide to Trusted Com­pu­ting", IBM Press, 2007 
  • Smith, Sean W. "Trusted Com­pu­ting Plat­forms: De­sign and Ap­p­li­ca­ti­ons", Sprin­ger Ver­lag, 2005 

Credit Points

  • 6 CP

Course Material 

  • Lecture Slides

    • Course Introduction [undefinedPDF]
    • Runtime Attacks [undefinedPDF]
      (last update on 26 April 2015: corrections on slide 35, 37, and 38)
    • Introduction to Trusted Computing [undefinedPDF]
    • Trusted Platform Module (UPDATED June 24th, 2015) [undefinedPDF]
    • Embedded Attestation and Trusted Execution (UPDATED June 24th, 2015) [undefinedPDF]
    • Trusted Computing Functionalities [undefinedPDF]
    • Securing Legacy Software [undefinedPDF]
    • Introduction Mobile Security [undefinedPDF]
    • Android Security [undefinedPDF]
    • Android Security Extensions [undefinedPDF]
    • SEAndroid, FlaskDroid, ASM [undefinedPDF]

Events

no news in this list.

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang