Litteratur
The course literature consist of the lecture slides and following reading material.
Forensics:
- Video The death of computer forensics
- Video on steganography using images: construction and detection. Thanks Johan!
- Forensics of data in Flash memory
- Forensics of mobile phone internal memory: by Svein Y. Willassen. Norwegian University of Science and Technology
- (not compulsary reading) Digital Evidence and Computer Crime, 2nd edition, Eoghan Casey, 2004, Academic Press
- Lest We Remember: Cold Boot Attacks on Encryption Keys:
- Bender et all, Techniques for data hiding
LTE Security:
•Security in the Evolved Packet System, R. Blom, et al. Ericsson Review, Oct 2010, http://www.ericsson.com/res/thecompany/docs/publications/ericsson_review/2010/security_eps.pdf
Crypto:
Menezes, van Oorschot and Vanstone - Handbook of Applied Cryptography
Trusted computing:
- TCG specification on TPM (note there are specs for TPM versions 1.2 and 2.0)
- Mobile Trusted Computing, Ansokan et all
- Guidelines on Hardware-Rooted Security for Mobile devices, NIST draft
- Security Analysis of Dockers: http://arxiv.org/pdf/1501.02967.pdf
- HSM, An Overview of Hardware Security Modules, brief description
- TPM software: TPM Software to test: http://ibmswtpm.sourceforge.net/
- SGX: Intel Tutorial on SGX, 2015
- SGX: Innovative Instructions and Software Model for Isolated Execution
- SGX: Video Standford by Frank McKeen
- TrustZone: Samsung Knox
- TrustZone: Reflections, from Blackhat conference
-
Mifare (Little Security, Despite Obscurity), Karsten Nohl, Henryk Plötz
- RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication, 3rd Edition
Klaus Finkenzeller, Dorte Muller (Translated by) Wiley, June 2010 - New Algorithms about learning in the presence of errors, Sanjeev Arora
Rong Ge, Princeton
Trusted Computing applied:
- ICT Infrastructure
- Trusted computing in infrastructure: Trusted Infrastructure
- Cloud:
- OpenStack Trustpools:
- Secure VM lauch: Trusted Launch of Virtual Machine Instances in Public IaaS Environments, Gehrmann, et all
SW security: