Lectures
Project Teachers: Daniel Dimitric, Ben Smeets
-
Wednesday: 15.15-17.00: zoom link
-
Friday: 13.15-15.00:
See also TimeEdit
The lectures of this course will be on-line. I
Lectures on Fridays will be on-line as well even it says otherwise in TimeEdit. We keep the room booking to make it possible to have occasionally a lecture/question session on prem.
Material will be updated as course proceeds. Except Intro slides are protected.
Date |
Planned Content |
Link |
New |
2/9 |
Introduction, Forensics: self study C Altheide(video), |
||
4/9 |
walkthrough of quiz preparation, Forensics finish, Crypto applied, Ways of Encryption , Perfect Foward Secrecy, Object security, |
Lect2 | |
9/9 |
Network security: AAA, Securing communication, TLS, IPsec |
Lect2 cont'd |
|
11/9 |
Network security: Project B,IoT, GSM, LTE, DDOS, botnets |
25/9 |
|
16/9 |
Trused computing: General concepts, What are the challenges, Roots of Trust, |
Lect4 | |
18/9 | Platform security: TPM | Lect 4, contd |
|
23/9 |
NO LECTURE |
|
|
25/9 |
Platform security: TPM fort, UEFI, Intel TXT, Trusted Computing Pools, TEE, Project C |
Lect5 |
|
30/9 |
SGX,ARM TrustZone |
Lect6 | |
2/10 |
EPID, ARM TrustZone, HSM, Smartcards (self-study), NFC |
Lect7 | |
7/10 |
PUFFs, Virtualization, SELinux, Java, Containers, Android, iOS, BYOD |
06/10 | |
9/10 |
Homomorphic encryption, Database operations on encrypted data, Cloud computing, Secure VM launch | Lect9 |
|
14/10 |
Security and Economics, DRM, Block chain, Software Security: ROP attack, SW design, writing and analysis, | Lect10, Lect11 | 14/10 |
16/10 |
Project E: Common Criteria, EAL2 |
ProjectE, |
If you want to have the course slides in the format of one slide per page you can find these by using the existing links modified as follows. Replace .../Lectures/Lectn_slides.pdf by .../Lectures/Lectn_slides_1P.pdf where n is the lecture number.