System and IoT Security (Mobile Security) 2018

System and IoT Security (Mobile Security) 2018

Lecturer

Kick-Off Meeting

  • Date: 30.04.2018, 14:30
  • Location: Building S4|14, Room 3.2.06

Presentation

  • Date: TBA, middle of August
  • Location: Building S4|14, Room TBA

Important dates

  • Final date to cancel participation: 03.06.2018, 23:59
  • In case you cancel your participation, please do not forget to cancel your registration also in TUCaN!
  • Submission deadline: 05.08.2018, 23:59
  • At most 18 students can participate
  • Register until 06.05.2018, 23:59 using this form and in TUCaN

Content and Goal

This seminar covers several topics in the area of system security with the focus on platform and communication security aspects of embedded and.IoT devices. There will be interdisciplinary topics as well. The students should gain detailed knowledge on the security and privacy aspects of hardware platforms, operating systems, network communication, infrastructures, and end-user applications. Moreover, they should examine current research in this area, learn how to dive into a scientific topic, and present their results in a short paper and an oral presentation.

Procedure

Each student will be given a number of scientific papers related to a specific topic in the area of embedded/IoT security. The student has to summarize, compare, and validate these publications in the form of a seminar work (paper). In addition, we will reserve 1 to 3 days (depending on the number of participants) where each student will present his seminar work in an oral presentation. Both the paper and the final presentation will be in English.

Credit Points

  • 3 CP

Course Material

LaTeX template

Kick-Off Slides

Contact

M.Sc. Tigist Abera

M.Sc. Patrick Jauernig

Topics

# Title Supervisor Root Paper
1 Non-volatile Processors for IoT devices Shaza Zeitouni [1]
2 Remote side-channel attacks on FPGAs Shaza Zeitouni & Ghada Dessouky [1] [2]
3 Breaking the Chain (of Trust): Survey on Automatic Vulnerability Discovery in Privileged Software Patrick Jauernig [1] [2]
4 Anarchism: Security Implications of Out-of-Order Execution Patrick Jauernig & Emmanuel Stapf [1] [2] [3]
5 Stuxnet and friends – Survey on industrial control system attacks Ferdinand Brasser [1] [2]
6 Access Control for the Home Internet of Things (IoT) Thien Nguyen & Markus Miettinen [1] [2] [3] [4]
7 Security and privacy issues of smart home assistants Thien Nguyen & Markus Miettinen [1] [2] [3] [4] [5]
8 State of the Art Intrusion Detection System for IoT Thien Nguyen & Markus Miettinen [1] [2] [3] [4]
9 Static analysis for security vulnerabilities detection Tigist Abera [1]
10 Dynamic symbolic execution for automated test generation Tigist Abera [1]
11 Automatic Vulnerability Discovery using Fuzzing Tommaso Frassetto [1]
12 Network Function Virtualization for IoT Network Security Reham Mohamed [1]
13 Software-Defined Networks-based architecture for IoT Network Security Reham Mohamed [1] [2]
14 Formal Methods for modern TEE Technologies Raad Bahmani [1]
15 Attestation for the IoT Ahmad Ibrahim [1] [2] [3]
16 Cyber Intrusion Detection in Industrial Control Systems Hamid Reza Ghaeini [1] [2] [3]
17 Stateful Anomaly Detection in Industrial Control Systems Hamid Reza Ghaeini [1] [2]
18 B$-Bingo: Vulnerabilities in Dumb Contracts David Gens [1]