In this seminar, different security aspects of artificial intelligence, systems, and embedded devices will be analyzed and discussed. Students will process, summarize, and evaluate a number of current scientific publications for a certain topic in the form of an essay. Additionally, each student will present his work in front of the group at the end of the semester.
Possible topics include:
https://moodle.informatik.tu-darmstadt.de/course/view.php?id=1727
This course covers current security topics in research and development.
Analyzing and developing security solutions are complex tasks requiring knowledge from different areas of computer science. This lab aims to combine competencies from different areas within the framework of a security project.
As part of this course, tasks from a broad spectrum (including algorithms, space travel, machine learning, Deep Neural Networks, software analysis, hardware development, and reverse engineering) will be presented.
The individual tasks will be determined individually and according to the interests/skills of the participants.
Depending on the scope and level of the task, this course will be completed as a Lab (InoSys Lab with 6CP) or as a Practical Project (InoSys Project with 9CP). This type is determined individually and task-specifically. When choosing between the two types, and if the nature of the task allows it, students have the opportunity to participate intellectually in the design of the task.
https://moodle.informatik.tu-darmstadt.de/course/view.php?id=1752
To be able to handle more and more complex tasks, Deep Neural Networks need to be trained with more and more data. One strategy to obtain a large dataset in times of increasing privacy awareness is Federated Learning. Instead of requiring all data on one central place, Federated Learning outsources the training to several clients, such that each client trains its own model locally and only shares the parameters of the trained models.
The lectures will be accompanied by practical homeworks, where state-of-the-art attacks and defenses will be implemented. At the end, you will implement your own attack and defenses that have to compete against the submissions of the other participants.
https://moodle.informatik.tu-darmstadt.de/course/view.php?id=1747
https://moodle.informatik.tu-darmstadt.de/course/view.php?id=1746