|MODULBEAUFTRAGTE:R:||Prof. Dr. Ghassan Karame|
|DOZENT:IN:||Prof. Dr.-Ing. Jörg Schwenk|
|FAKULTÄT:||Fakultät für Informatik|
|ANGEBOTEN IM:||jedes Sommersemester|
Hörsaalvorlesung mit Medienunterstützung, eLearning, Übungen am Rechner, zusätzlich Selbststudium mit ergänzend bereitgestellten Materialien und Aufgaben
LERNZIELEAt the end of this course, students will be able to (1) classify and describe vulnerabilities and protection mechanisms of popular systems and protocols, and (2) analyze / reason about basic protection mechanisms for modern OSs, software, and hardware systems. Students will also develop the ability to reason about the security of a given protocol and independently develop appropriate security defenses and security models.
INHALTWhile clearly beneficial, the large-scale deployment of online services has resulted in the increase of security threats against existing services. As the size of the global network grows, the incentives of attackers to abuse the operation of online applications also increase and their advantage in mounting successful attacks becomes considerable.
These cyber-attacks often target the resources, availability, and operation of online services. With an increasing number of services relying on online resources, integrating proper security measures therefore becomes integral to ensure the correct functioning of every online service.
In this course, we discuss important theoretical and analytical aspects in system security. The focus of the course is to understand basic attack strategies on modern systems and platforms, with a focus on side-channel attacks, software-based attacks, malware analysis, as well as software-based defenses (e.g., address space randomization and non-executable memory) and hardware-based defenses (e.g., using TPMs and TEEs). Other topics of the course include analyzing the security of modern cryptocurrencies and ML platforms, and similar aspects in system security.
An integral part of this course are exercises and homeworks, which aim to deepen the understanding of the material with practical examples.
VORAUSSETZUNGEN CREDITSBestandene Modulabschlussprüfung
EMPFOHLENE VORKENNTNISSEbackground in Cryptographic primitives (encryption methods, signatures, MACs, hash functions), principles of communication networks, is recommended.
LITERATUR1. D. Gollmann: „Computer Security“, Wiley and Sons
2. A.J. Menezes, P.C. van Oorschot and A. S. Vanstone: “Handbook of Applied Cryptography”, CRC Press
3. C. Boyd and A. Manthuria: “Protocols for Authentication and Key Establishment”, Springer Verlag
4. R. Anderson: “Security Engineering – A Guide for Building Dependeble Distributed Systems”, Wiley and Sons