STC 2016

Secure, Trusted and Trustworthy Computing

Organizational Matters

  • Announcements:
    • Repetitive exam dates announced through Tucan
    • Exam inspection date announced (see below)
    • Questions and answer session on 10.02.17
    • Practical exercise on 20.01.17. Details were announced on the mailing list.
    • No lecture on the 23rd Dec 2016 (paper reading assignment)
    • New room for lecture and exercise starting from 11.11.16 (Building S4|14, Room 5.3.01 *)

  • Lectures
    • Lecturer: Prof. Dr.-Ing. Ahmad-Reza Sadeghi
    • Date: Every Friday from 13:30 to 15:10 (starting from 21st Oct 2016)
    • New Location: Building S4|14, Room 5.3.01 *

  • Exercises
    • Lecturer: Research Assistant Team of System Security Lab
    • Date: Dates announced in the lecture; from 15:20 to 17:00
    • New Location: Building S4|14, Room 5.3.01 *

  • Exam
    • Date: 9th Mar 2017, 14:00 – 16:00 (see Tucan)
    • Location: Building S2|02, Room C205 (see Tucan)

  • Exam Inspection
    • Data: 11th of April 2017, Time slots see undefinedPDF
    • Location: Building S4|14, Room 4.1.02

  • Repetitive Exam
    • Date: 22./23. Aug (time slots have been announced through Tucan)
    • Location: Building S4|14, Room 4.1.02

* Building S4|14, Room 5.3.01: Mornewegstraße 32, 5th floor (map)

Goal

Gaining overview of essential concepts, methods and models in the areas of secure, trustworthy and Trusted Computing.

Content

  • Security notions and basics
  • Special aspects of runtime attacks (buffer overflows, return-oriented programming)
  • Hardware-based secure computing (one-time programs, token-based secure computing)
  • Trusted Computing (trustworthy architectures, infrastructures and applications)
  • Trusted Platform Module (TPM)
  • Software-based secure computing

Prerequisites

  • Basics of cryptography

Recommended Literature

  • Challener, David, VanDoorn, Leendert, Safford, David, Yoder, Kent, Catherman, Ryan “A Practical Guide to Trusted Computing”, IBM Press, 2007
  • Pei, Dingyi, Yung, Moti, Lin, Dongdai, Wu, Chuankun “Information Security and Cryptology”, Springer, 2007
  • Smith, Sean W. “Trusted Computing Platforms: Design and Applications”, Springer Verlag, 2005
  • Müller, Thomas “Trusted Computing Systeme”, Springer, 2008