Secure, Trusted and Trustworthy Computing

 

Organizational Matters

  • Exam Inspection

    • Data: 28th of Mai 2018. See undefinedtimeslots  
    • Location: Building S4|14, Room 4.1.02
    • We offer the possibility to inspect your corrected exam in a group of five students for 25 minutes in our room. There is a 5-minute break between two groups to allow the new group to enter the room. We kindly ask you to leave your bags and electronic devices. We will provide paper and pens for you to take notes and write down questions. Please note that we will register any violation of this as subsequently attempted fraud. At the end, we ask you to sign and return your inspected exams. Please refer to the list of names and times below.

  • Exam

    • Location: S2|02 C205
    • No aids allowed

  • Announcements: 

    • 09.02.18: Question and answer session
    • Exam date published in Tucan
    • 22.12.17: No Lecture, No exercise
    • 10.11.17: Lecure in Room 3.1.01**

      • Important: Use entrance Mornewegstraße 30**

    • Lecture (and exercise) relocated to Building S4|14, Room 5.3.01* starting 27.10.

      • Exception: 10.11. (Room 3.1.01, details see above)

    • (Repetitive) exam dates announced through Tucan 

  • Lectures

    • Lecturer: Prof. Dr.-Ing. Ahmad-Reza Sadeghi
    • Date: Every Friday from 13:30 to 15:10 (starting from 20st Oct 2016)

  • Exercises

    • Lecturer: Research Assistant Team of System Security Lab
    • Date: Dates announced in the lecture; from 15:20 to 17:00

* Building S4|14, Room 5.3.01: Mornewegstraße 32, 5th floor (map)

** Building S4|14, Room 3.1.01: Mornewegstraße 30, 3rd floor (map)

 

Goal

Gaining overview of essential concepts, methods and models in the areas of secure, trustworthy and Trusted Computing.

Content

  • Security notions and basics
  • Special aspects of runtime attacks (buffer overflows, return-oriented programming)
  • Hardware-based secure computing (one-time programs, token-based secure computing)
  • Trusted Computing (trustworthy architectures, infrastructures and applications)
  • Trusted Platform Module (TPM)
  • Software-based secure computing

Prerequisites

  • Basics of cryptography

Recommended Literature

  • Chal­le­ner, David, Van­Doorn, Leen­dert, Saf­ford, David, Yoder, Kent, Ca­ther­man, Ryan "A Prac­tical Guide to Trusted Com­pu­ting", IBM Press, 2007 
  • Pei, Din­gyi, Yung, Moti, Lin, Dongdai, Wu, Chuan­kun "In­for­ma­ti­on Se­cu­ri­ty and Cryp­to­lo­gy", Sprin­ger, 2007 
  • Smith, Sean W. "Trusted Com­pu­ting Plat­forms: De­sign and Ap­p­li­ca­ti­ons", Sprin­ger Ver­lag, 2005 
  • Mül­ler, Tho­mas "Trusted Com­pu­ting Sys­te­me", Sprin­ger, 2008 

 

 

Course Material

  • Exercises

    • Exercise 01 (undefinedpdf)
    • Exercise 02 (undefinedpdf)
    • Exercise 03 (Hands-on training on SGX)
    • Exercise 04 (undefinedpdf_v2)
    • Exercise 05 (undefinedpdf)
    • Exercise 06 (undefinedpdf) <-- this is a practial lab in S4|14, Room 3.2.06

  • Slides

    • Course Organisation (undefinedpdf)
    • Introduction to System Security (undefinedpdf_v2)
    • Introduction to Memory Management (undefinedpdf)
    • Introduction to Trusted Computing (undefinedpdf)
    • Trusted Platform Module (undefinedpdf)
    • Trusted Computing Functionality based on TPM (undefinedpdf)
    • DRTM and TEE (undefinedpdf v2)
    • SGX Details (undefinedpdf)
    • Side-Channel Attacks (undefinedpdf)
    • Code-Reuse Attacks (undefinedpdf_v2)

Events

no news in this list.

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang