Srdjan Capkun: Catalogue data in Autumn Semester 2018

Name Prof. Dr. Srdjan Capkun
FieldComputer Science
Address
Institut f. Informationssicherheit
ETH Zürich, CNB F 102.2
Universitätstrasse 6
8092 Zürich
SWITZERLAND
Telephone+41 44 632 71 90
Fax+41 44 632 11 72
E-mailsrdjan.capkun@inf.ethz.ch
URLhttp://www.syssec.ethz.ch/people/capkun
DepartmentComputer Science
RelationshipFull Professor

NumberTitleECTSHoursLecturers
252-1411-00LSecurity of Wireless Networks Information 5 credits2V + 1U + 1AS. Capkun
AbstractCore Elements: Wireless communication channel, Wireless network architectures and protocols, Attacks on wireless networks, Protection techniques.
ObjectiveAfter this course, the students should be able to: describe and classify security goals and attacks in wireless networks; describe security architectures of the following wireless systems and networks: 802.11, GSM/UMTS, RFID, ad hoc/sensor networks; reason about security protocols for wireless network; implement mechanisms to secure
802.11 networks.
ContentWireless channel basics. Wireless electronic warfare: jamming and target tracking. Basic security protocols in cellular, WLAN and
multi-hop networks. Recent advances in security of multi-hop networks; RFID privacy challenges and solutions.
252-1414-00LSystem Security Information 5 credits2V + 2US. Capkun, A. Perrig
AbstractThe first part of the lecture covers individual system aspects starting with tamperproof or tamper-resistant hardware in general over operating system related security mechanisms to application software systems, such as host based intrusion detection systems. In the second part, the focus is on system design and methodologies for building secure systems.
ObjectiveIn this lecture, students learn about the security requirements and capabilities that are expected from modern hardware, operating systems, and other software environments. An overview of available technologies, algorithms and standards is given, with which these requirements can be met.
ContentThe first part of the lecture covers individual system's aspects starting with tamperproof or tamperresistant hardware in general over operating system related security mechanisms to application software systems such as host based intrusion detetction systems. The main topics covered are: tamper resistant hardware, CPU support for security, protection mechanisms in the kernel, file system security (permissions / ACLs / network filesystem issues), IPC Security, mechanisms in more modern OS, such as Capabilities and Zones, Libraries and Software tools for security assurance, etc.

In the second part, the focus is on system design and methodologies for building secure systems. Topics include: patch management, common software faults (buffer overflows, etc.), writing secure software (design, architecture, QA, testing), compiler-supported security, language-supported security, logging and auditing (BSM audit, dtrace, ...), cryptographic support, and trustworthy computing (TCG, SGX).

Along the lectures, model cases will be elaborated and evaluated in the exercises.
252-4601-00LCurrent Topics in Information Security Information Restricted registration - show details
Number of participants limited to 24.

The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
2 credits2SD. Basin, S. Capkun, A. Perrig
AbstractThe seminar covers various topics in information security: security protocols (models, specification & verification), trust management, access control, non-interference, side-channel attacks, identity-based cryptography, host-based attack detection, anomaly detection in backbone networks, key-management for sensor networks.
ObjectiveThe main goals of the seminar are the independent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques.
ContentThe seminar covers various topics in information security, including network security, cryptography and security protocols. The participants are expected to read a scientific paper and present it in a 35-40 min talk. At the beginning of the semester a short introduction to presentation techniques will be given.

Selected Topics

- security protocols: models, specification & verification
- trust management, access control and non-interference
- side-channel attacks
- identity-based cryptography
- host-based attack detection
- anomaly detection in backbone networks
- key-management for sensor networks
LiteratureThe reading list will be published on the course web site.
268-0201-00LInformation Security Seminar and Project Restricted registration - show details
Only for CAS and DAS in Cyber Security.
4 credits2SP. Schaller, D. Basin, S. Capkun, U. Maurer, A. Perrig
AbstractParticipants of the seminar are assigned a recent topic in cyber security. They are expected to become acquainted with the assigned issue and to prepare a corresponding presentation in the context of the seminar.
ObjectiveParticipants have understood and presented a publication or report on a present topic in information security. By attending other participants presentations students get further introduced to additional current information security related topics/incidents.
ContentParticipants of the seminar are assigned a recent topic in cyber security. They are expected to become acquainted with the assigned issue and to prepare a corresponding presentation in the context of the seminar.