Secure, Trusted and Trustworthy Computing

 

Organizational Matters

  • Announcements: 

    • 09.02.18: Question and answer session
    • Exam date published in Tucan
    • 22.12.17: No Lecture, No exercise
    • 10.11.17: Lecure in Room 3.1.01**

      • Important: Use entrance Mornewegstraße 30**

    • Lecture (and exercise) relocated to Building S4|14, Room 5.3.01* starting 27.10.

      • Exception: 10.11. (Room 3.1.01, details see above)

    • (Repetitive) exam dates announced through Tucan

  • Lectures

    • Lecturer: Prof. Dr.-Ing. Ahmad-Reza Sadeghi
    • Date: Every Friday from 13:30 to 15:10 (starting from 20st Oct 2016)

  • Exercises

    • Lecturer: Research Assistant Team of System Security Lab
    • Date: Dates announced in the lecture; from 15:20 to 17:00

* Building S4|14, Room 5.3.01: Mornewegstraße 32, 5th floor (map)

** Building S4|14, Room 3.1.01: Mornewegstraße 30, 3rd floor (map)

 

Goal

Gaining overview of essential concepts, methods and models in the areas of secure, trustworthy and Trusted Computing.

Content

  • Security notions and basics
  • Special aspects of runtime attacks (buffer overflows, return-oriented programming)
  • Hardware-based secure computing (one-time programs, token-based secure computing)
  • Trusted Computing (trustworthy architectures, infrastructures and applications)
  • Trusted Platform Module (TPM)
  • Software-based secure computing

Prerequisites

  • Basics of cryptography

Recommended Literature

  • Chal­le­ner, David, Van­Doorn, Leen­dert, Saf­ford, David, Yoder, Kent, Ca­ther­man, Ryan "A Prac­tical Guide to Trusted Com­pu­ting", IBM Press, 2007 
  • Pei, Din­gyi, Yung, Moti, Lin, Dongdai, Wu, Chuan­kun "In­for­ma­ti­on Se­cu­ri­ty and Cryp­to­lo­gy", Sprin­ger, 2007 
  • Smith, Sean W. "Trusted Com­pu­ting Plat­forms: De­sign and Ap­p­li­ca­ti­ons", Sprin­ger Ver­lag, 2005 
  • Mül­ler, Tho­mas "Trusted Com­pu­ting Sys­te­me", Sprin­ger, 2008 

 

 

Course Material

  • Exercises

    • Exercise 01 (undefinedpdf)
    • Exercise 02 (undefinedpdf)
    • Exercise 03 (Hands-on training on SGX)
    • Exercise 04 (undefinedpdf_v2)
    • Exercise 05 (undefinedpdf)
    • Exercise 06 (undefinedpdf) <-- this is a practial lab in S4|14, Room 3.2.06

  • Slides

    • Course Organisation (undefinedpdf)
    • Introduction to System Security (undefinedpdf_v2)
    • Introduction to Memory Management (undefinedpdf)
    • Introduction to Trusted Computing (undefinedpdf)
    • Trusted Platform Module (undefinedpdf)
    • Trusted Computing Functionality based on TPM (undefinedpdf)
    • DRTM and TEE (undefinedpdf v2)
    • SGX Details (undefinedpdf)
    • Side-Channel Attacks (undefinedpdf)
    • Code-Reuse Attacks (undefinedpdf_v2)

Events

no news in this list.

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang