STC 2017

Secure, Trusted and Trustworthy Computing

Organizational Matters

  • Exam
    • Exam date for Summer Semester 2018 is published in TUCaN
    • No aids allowed

  • Announcements:
    • 09.02.18: Question and answer session
    • Exam date published in TUCaN
    • 22.12.17: No Lecture, No exercise
    • 10.11.17: Lecure in Room 3.1.01**

  • Important: Use entrance Mornewegstraße 30**

  • Lecture (and exercise) relocated to Building S4|14, Room 5.3.01* starting 27.10.
    • Exception: 10.11. (Room 3.1.01, details see above)
  • (Repetitive) exam dates announced through Tucan

  • Lectures
    • Lecturer: Prof. Dr.-Ing. Ahmad-Reza Sadeghi
    • Date: Every Friday from 13:30 to 15:10 (starting from 20st Oct 2016)

  • Exercises
    • Lecturer: Research Assistant Team of System Security Lab
    • Date: Dates announced in the lecture; from 15:20 to 17:00

* Building S4|14, Room 5.3.01: Mornewegstraße 32, 5th floor (map)

** Building S4|14, Room 3.1.01: Mornewegstraße 30, 3rd floor (map)

Goal

Gaining overview of essential concepts, methods and models in the areas of secure, trustworthy and Trusted Computing.

Content

  • Security notions and basics
  • Special aspects of runtime attacks (buffer overflows, return-oriented programming)
  • Hardware-based secure computing (one-time programs, token-based secure computing)
  • Trusted Computing (trustworthy architectures, infrastructures and applications)
  • Trusted Platform Module (TPM)
  • Software-based secure computing

Prerequisites

  • Basics of cryptography

Recommended Literature

  • Challener, David, Van­Doorn, Leendert, Safford, David, Yoder, Kent, Catherman, Ryan “A Practical Guide to Trusted Computing”, IBM Press, 2007
  • Pei, Dingyi, Yung, Moti, Lin, Dongdai, Wu, Chuankun “Information Security and Crypto­ogy”, Springer, 2007
  • Smith, Sean W. “Trusted Computing Platforms: Design and Applications”, Sprin­ger Verlag, 2005
  • Müller, Thomas “Trusted Computing Systeme”, Springer, 2008