Secure, Trusted and Trustworthy Computing

Organizational Matters

  •  Lectures

    • Lecturer: Prof. Dr.-Ing. Ahmad-Reza Sadeghi
    • Date: Every Friday from 11:40 am to 13:20 pm (starting from 19 October 2012)
    • Location: Building S4|14 (CASED building), room 5.3.01

  • Exercises

    • Lecturer: Research Assistant Team of System Security Lab
    • Date: Every second Friday from 13:30 am to 15:00 pm (starting from 26 October 2012)
    • Location: Building S4|14 (CASED building), room 3.2.06

  • Exam

    • Date: Monday, 25 February 2013, from 14:00 pm to 16:00pm 
    • Location: Building S2|02, room C205

Goal

Gaining overview of essential concepts, methods and models in the areas of secure, trustworthy and Trusted Computing.

Content

  • Security notions and basics
  • Special aspects of runtime attacks (buffer overflows, return-oriented programming)
  • Hardware-based secure computing (one-time programs, token-based secure computing)
  • Trusted Computing (trustworthy architectures, infrastructures and applications)
  • Trusted Platform Module (TPM)
  • Software-based secure computing

Prerequisites

  • Basics of cryptography

Recommended Literature

  • Chal­le­ner, David, Van­Doorn, Leen­dert, Saf­ford, David, Yoder, Kent, Ca­ther­man, Ryan "A Prac­tical Guide to Trusted Com­pu­ting", IBM Press, 2007 
  • Pei, Din­gyi, Yung, Moti, Lin, Dongdai, Wu, Chuan­kun "In­for­ma­ti­on Se­cu­ri­ty and Cryp­to­lo­gy", Sprin­ger, 2007 
  • Smith, Sean W. "Trusted Com­pu­ting Plat­forms: De­sign and Ap­p­li­ca­ti­ons", Sprin­ger Ver­lag, 2005 
  • Mül­ler, Tho­mas "Trusted Com­pu­ting Sys­te­me", Sprin­ger, 2008 

Course Material

  • Chapter 1: Introduction to System Security [PDF]
  • Chapter 2: Introduction to Trusted Compting [PDF]
  • Chapter 3: Trusted Platform Module [PDF]
  • Chapter 4: TCG Concepts [PDF, updated slides 26-36 on 13.12.2012]
  • Chapter 5: TNC and IMA [PDF]
  • Chapter 6: MTM [PDF]
  • Chapter 7: Introduction to Runtime Attacks [PDF]
  • Chapter 8: Code Reuse Attacks [PDF colored] [PDF grayscale]
  • Exercise 1 (26.10.2012) [PDF]
  • Exercise 2 (09.11.2012) [PDF]
  • Exercise 3 (30.11.2012) [PDF]
  • Exercise 4 (14.12.2012) [PDF]
  • Exercise 5 (18.01.2013) [PDF]
  • Exercise 6 (25.01.2013) [PDF]
  • Exercise 7 (01.02.2013) [PDF]
  • Exercise 8 (15.02.2013) [PDF]

Credit Points

  • 5 CP

Events

no news in this list.

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang