Organizational Matters

  • Lecture [2 SWS]

    • Lecturer: Prof. Dr.-Ing. Ahmad-Reza Sadeghi
    • Date: Every Friday from 9:50 am to 11:30 am (on 03.12.2010 in building S2|02, room C205; on 14.01.2011 in building S4|14, room 4.3.01)
    • Location: Building S4|14, room 5.3.01

  • Exercises [1 SWS]

    • Lecturer: Research Assistant Team of System Security Lab
    • Date: Every second Friday from 11:40 am to 13:20 pm (starting from 19.11.2010)
    • Location: Building S4|14, room 4.3.01 (on 03.12.2010, in building S2|02, room A102)

Goal

Gaining overview of essential concepts, methods and models in the areas of secure, trustworthy and Trusted Computing.

Content

  • Security notions and basics
  • Special aspects of runtime attacks (buffer overflows, return-oriented programming)
  • Software-based secure computing (homomorphic encryption, oblivious transfer, secure function evaluation)
  • Hardware-based secure computing (one-time programs, token-based secure computing)
  • Trusted Computing (trustworthy architectures, infrastructures and applications)
  • Trusted Platform Module (TPM)

Prerequisites

  • Basics of cryptography

Recommended Literature

  • Chal­le­ner, David, Van­Doorn, Leen­dert, Saf­ford, David, Yoder, Kent, Ca­ther­man, Ryan "A Prac­tical Guide to Trusted Com­pu­ting", IBM Press, 2007
  • Pei, Din­gyi, Yung , Moti, Lin, Dongdai, Wu, Chuan­kun "In­for­ma­ti­on Se­cu­ri­ty and Cryp­to­lo­gy", Sprin­ger, 2007
  • Smith, Sean W. "Trusted Com­pu­ting Plat­forms: De­sign and Ap­p­li­ca­ti­ons", Sprin­ger Ver­lag, 2005
  • Mül­ler, Tho­mas "Trusted Com­pu­ting Sys­te­me", Sprin­ger, 2008

Course Material

Credit Points

  • 5 CP: Bachelor Informatik (WS 09/10), Master Informatik (WS09/10)
  • 4,5 CP: Bachelor Informatik (WS 03/04, WS 04/05, WS 07/08), Master Informatik (WS 04/05)

Events

no news in this list.

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang