Secure, Trusted and Trustworthy Computing

Organizational Matters

  •  Lectures

    • Lecturer: Prof. Dr.-Ing. Ahmad-Reza Sadeghi
    • Date: Every Friday from 11:40 am to 13:20 pm (starting from 18th October 2013)
    • Location: Building S4|14 (CASED building), room 5.3.01

  • Exercises

    • Lecturer: Research Assistant Team of System Security Lab
    • Date: Dates announced in the lecture and below; from 13:30 am to 15:00 pm

      • Friday, 01.11.2013: System Security Basics
      • Friday, 22.11.2013: Trusted Computing Concepts
      • Friday, 13.12.2013: Trusted Computing Lab
      • Friday, 17.01.2014: Privacy CA and Direct Anonymous Attestation (DAA)
      • Friday, 24.01.2014: Basics of Buffer Overflow Attacks
      • Friday, 31.01.2014: Lab Session on Buffer Overflow Attacks & return-into-libc
      • Friday, 07.02.2014: Lab Session on Return-Oriented Programming

    • Location: Building S4|14 (CASED building), room 3.2.06

  • Exam
    • Date: Thursday, 13.03.2014 from 14:00 to 16:00 pm
    • Location: Room C205, C110 and C120 (Room assignment will be announced at the end of the semester)

Goal

Gaining overview of essential concepts, methods and models in the areas of secure, trustworthy and Trusted Computing.

Content

  • Security notions and basics
  • Special aspects of runtime attacks (buffer overflows, return-oriented programming)
  • Hardware-based secure computing (one-time programs, token-based secure computing)
  • Trusted Computing (trustworthy architectures, infrastructures and applications)
  • Trusted Platform Module (TPM)
  • Software-based secure computing

Prerequisites

  • Basics of cryptography

Recommended Literature

  • Chal­le­ner, David, Van­Doorn, Leen­dert, Saf­ford, David, Yoder, Kent, Ca­ther­man, Ryan "A Prac­tical Guide to Trusted Com­pu­ting", IBM Press, 2007 
  • Pei, Din­gyi, Yung, Moti, Lin, Dongdai, Wu, Chuan­kun "In­for­ma­ti­on Se­cu­ri­ty and Cryp­to­lo­gy", Sprin­ger, 2007 
  • Smith, Sean W. "Trusted Com­pu­ting Plat­forms: De­sign and Ap­p­li­ca­ti­ons", Sprin­ger Ver­lag, 2005 
  • Mül­ler, Tho­mas "Trusted Com­pu­ting Sys­te­me", Sprin­ger, 2008 

Course Material

  • Slides

    • Course Organization [PDF]
    • Introduction to System Security [PDF]
    • Introduction to Trusted Computing [PDF]
    • The Trusted Platform Module (TPM) [PDF]
    • Trusted Computing Functionalities based on TPM [PDF]
    • Runtime Attacks I: Basics and Code Injection [PDF]
    • Runtime Attacks II: Code Reuse Attacks [PDF]
    • Runtime Attacks III: Countermeasures and New Attacks [PDF]
    • Mobile and Embedded Trusted Computing [PDF]

  • Exercises

    • System Security Basics [PDF]
    • Trusted Computing Concepts (Abgabe der Hausübung bis 13.12.2013) [PDF]
    • Trusted Computing Practice (Abgabe der Hausübung bis 23.12.2013) [PDF]
    • Privacy CA and Direct Anonymous Attestation [PDF]
    • Basics of Buffer Overflow Attacks [PDF]
    • Lab on Buffer Overflow Attacks & return-into-libc [PDF]
    • Lab on Return-Oriented Programming [PDF]

Credit Points

  • 5 CP

Events

no news in this list.

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang