Secure, Trusted and Trustworthy Computing

Organizational Matters

  • Announcements: 

    • Repetitive exam dates announced through Tucan
    • Exam inspection date announced (see below)
    • Questions and answer session on 10.02.17
    • Practical exercise on 20.01.17. Details were announced on the mailing list. 
    • No lecture on the 23rd Dec 2016 (paper reading assignment)
    • New room for lecture and exercise starting from 11.11.16 (Building S4|14, Room 5.3.01 *)

  • Lectures

    • Lecturer: Prof. Dr.-Ing. Ahmad-Reza Sadeghi
    • Date: Every Friday from 13:30 to 15:10 (starting from 21st Oct 2016)
    • New Location: Building S4|14, Room 5.3.01 *

  • Exercises

    • Lecturer: Research Assistant Team of System Security Lab
    • Date: Dates announced in the lecture; from 15:20 to 17:00
    • New Location: Building S4|14, Room 5.3.01 *

  • Exam

    • Date: 9th Mar 2017, 14:00 - 16:00 (see Tucan)
    • Location: Building S2|02, Room C205 (see Tucan)

  • Exam Inspection

    • Data: 11th of April 2017, Time slots see undefinedPDF
    • Location: Building S4|14, Room 4.1.02

  • Repetitive Exam

    • Date: 22./23. Aug (time slots have been announced through Tucan)
    • Location: Building S4|14, Room 4.1.02

* Building S4|14, Room 5.3.01: Mornewegstraße 32, 5th floor (map)

 

Goal

Gaining overview of essential concepts, methods and models in the areas of secure, trustworthy and Trusted Computing.

Content

  • Security notions and basics
  • Special aspects of runtime attacks (buffer overflows, return-oriented programming)
  • Hardware-based secure computing (one-time programs, token-based secure computing)
  • Trusted Computing (trustworthy architectures, infrastructures and applications)
  • Trusted Platform Module (TPM)
  • Software-based secure computing

Prerequisites

  • Basics of cryptography

Recommended Literature

  • Chal­le­ner, David, Van­Doorn, Leen­dert, Saf­ford, David, Yoder, Kent, Ca­ther­man, Ryan "A Prac­tical Guide to Trusted Com­pu­ting", IBM Press, 2007 
  • Pei, Din­gyi, Yung, Moti, Lin, Dongdai, Wu, Chuan­kun "In­for­ma­ti­on Se­cu­ri­ty and Cryp­to­lo­gy", Sprin­ger, 2007 
  • Smith, Sean W. "Trusted Com­pu­ting Plat­forms: De­sign and Ap­p­li­ca­ti­ons", Sprin­ger Ver­lag, 2005 
  • Mül­ler, Tho­mas "Trusted Com­pu­ting Sys­te­me", Sprin­ger, 2008 

 

 

Course Material

  • Slides

    • Introduction to System Security (undefinedpdf)
    • Introduction to Trusted Computing (undefinedpdf)
    • Trusted Platform Module (undefinedpdf)
    • TPM Functionalities (undefinedpdf)
    • TPM 2.0 (undefinedpdf)
    • DRTM and TEE (undefinedpdf)
    • Introduction to SGX (Update v2 undefinedpdf)

      • Reading material (1, 2, 3)
      • Page-fault side-channel (link)

    • SGX Details (undefinedpdf)
    • ROP [1] (undefinedpdfv2)
    • ROP [2] (undefinedpdf)

Credit Points

  • 5 CP

Events

no news in this list.

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang