Föreläsningar
Teachers: Ben Smeets, Jonathan Sönnerup
Location:
-
Wednesday: 13.15-15.00: M:B
-
Friday: 13.15-15.00: E:B (except 14/9 it will be M:A)
See also TimeEdit
Material will be updated as course proceeds.
Date |
Planned Content |
Link |
New |
5/9 |
Introduction, Forensics: self study C Altheide(video), |
7/9 | |
7/9 |
walkthrough of quiz preparation, Forensics finish, Crypto applied |
Lect2 | 13/9 |
12/9 |
Ways of Encryption , Perfect Foward Secrecy, Object security, Network security: AAA, Securing communication, TLS |
Lect2 cont'd |
|
14/9 |
Network security: IPsec, IoT, GSM, LTE, DDOS, botnets |
20/9 |
|
19/9 |
NO LECTURE |
||
21/9 |
Remainder Lect 3. Trused computing: General concepts, What are the challenges, Roots of Trust, |
Lect4 |
21/9 |
26/9 |
Platform security: TPM |
26/9 |
|
28/9 |
Platform security: TPM fort, UEFI, Intel TXT, Trusted Computing Pools, TEE, SGX,EPID, ARM TrustZone, |
Lect6 |
07/10 |
3/10 |
TrustZone cont'd, HSM, Smartcards (self-study) , NFC |
Lect7 | |
5/10 |
NO LECTURE |
||
10/10 |
PUFFs, Virtualization, SELinux, Java, Containers, Android, iOS, BYOD, KSI, |
7/10 |
|
12/10 |
Homomorphic encryption, Database operations on encrypted data, Cloud computing, Secure VM launch | Lect9 |
12/10 |
17/10 |
Security and Economics, DRM, Block chain, Software Security: ROP attack, SW design, writing and analysis, | Lect10, Lect11 | 17/10 |
19/10 |
Project E: Common Criteria, EAL2 |
ProjectE, | 18/10 |
If you want to have the course slides in the format of one slide per page you can find these by using the existing links modified as follows. Replace .../Lectures/Lectn_slides.pdf by .../Lectures/oneperpage/Lectn_slides_1P.pdf where n is the lecture number.