Trusted Systems Group

Trusted and Secure Computing SS 17

Lecture type Advanced lecture
Credits 6 CP
Instructor Dr.-Ing. Sven Bugiel
Teaching assistants Dhiman Chakraborty
Time/Place Sep 11 – Sep 22, E9.1, lecture hall
Language English
LSF Here
Course management / registration Here

Description

In this two-week lecture, the participants will be introduced to essential concepts in the domain of secure, trusted, and trustworthy computing. The focus is particularly on hardware-based security architectures in different settings like server, network, cloud, or embedded device security. Examples for such hardware security primitives are Trusted Platform Modules, Intel SGX, or ARM TrustZone.

Central questions of this course are:

  • What is the threat model against which those hardware-based solutions offer protection?
  • How do those solutions support defensive programming?
  • Which applications have been built or proposed on top of such hardware-based security primitives?
  • What are the pitfalls and limitations of those security modules?

In addition to the lecture, the participants should gather some hands-on experience with these technologies through two compact projects (one TPM based, one about hardware-isolated execution environments) and thus provides a perfect opportunity to understand hardware-based security architectures more deeply in theory and practice. Based on this experience, the participants should be additionally enabled to discuss and evaluate state-of-the-art research solutions in this domain. Given the fashionability of those primitives in modern system designs, this course will also have a strong connection to current system security research topcis, e.g., through discussion of relevant research results.

Prerequisites

There are no formal requirements for participation. Students who want to participate in the course should

  • be familiar with programming in C/C++
  • should be comfortable with working with Linux

Background in security is also an advantage (e.g., prior participation in the Foundations of Cybersecurity lecture or Security core lecture), however, the necessary background on system design be briefly provided in this lecture.

Requirements for obtaining credit points (Scheinvergabe)

For passing the course, the following minimal amount of points is needed:
  • 50% of the points from the final exam.

The endterm exam will take place Fri, 29.09.2017, in E1.3 HS001 from 14:00-16:00 (s.t.).

The backup exam will take place Fri, 13.10.2017, in E1.3 HS002 from 14:00-16:00 (s.t.).

Registration

For registration please use the new central course management of CISPA.