Srdjan Capkun: Katalogdaten im Herbstsemester 2024

NameHerr Prof. Dr. Srdjan Capkun
LehrgebietInformatik
Adresse
Institut f. Informationssicherheit
ETH Zürich, CNB F 102.2
Universitätstrasse 6
8092 Zürich
SWITZERLAND
Telefon+41 44 632 71 90
Fax+41 44 632 11 72
E-Mailsrdjan.capkun@inf.ethz.ch
URLhttp://www.syssec.ethz.ch/people/capkun
DepartementInformatik
BeziehungOrdentlicher Professor

NummerTitelECTSUmfangDozierende
252-1411-00LSecurity of Wireless Networks Information 6 KP2V + 1U + 2AS. Capkun, K. Kostiainen
KurzbeschreibungThis course discusses physical layer aspects of wireless communication and a wide range of security-related topics in the domain of wireless technologies. It mainly targets computer science students. Though useful, a background in signal processing or physical layer concepts is not required. A basic understanding of security (e.g. as taught in 252-0211.00L Information Security) is recommended.
LernzielAfter this course, students should be able to describe and classify security goals of and attacks on various wireless networks and technologies, with an emphasis on physical layer aspects.
Inhalt- Introduction to wireless communication
- Physical layer security schemes
- Spreading techniques and their application in jamming-resilient communication and Global Navigation Satellite Systems (GNSSs)
- Secure ranging with Ultra-Wide Band (UWB)
- Security aspects of cellular networks, WiFi, and Bluetooth Low Energy (BLE)
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Problemlösunggeprüft
Soziale KompetenzenKooperation und Teamarbeitgefördert
Persönliche KompetenzenKritisches Denkengefördert
252-1414-00LSystem Security Information 7 KP2V + 2U + 2AS. Capkun, S. Shinde
KurzbeschreibungThe first part of the course covers general security concepts and hardware-based support for security.
In the second part, the focus is on system design and methodologies for building secure systems.
LernzielIn this lecture, students learn about the security requirements and capabilities that are expected from modern hardware, operating systems, and other software environments. An overview of available technologies, algorithms and standards is given, with which these requirements can be met.
InhaltThe first part of the lecture covers hardware-based security concepts. Topics include the concept of physical and software-based side channel attacks on hardware resources, architectural support for security (e.g., memory management and permissions, disk encryption), and trusted execution environments (Intel SGX, ARM TrustZone, AMD SEV, and RISC-​V Keystone).

In the second part, the focus is on system design and methodologies for building secure systems. Topics include: common software faults (e.g., buffer overflows, etc.), bug-​detection, writing secure software (design, architecture, QA, testing), compiler-​supported security (e.g., control-​flow integrity), and language-​supported security (e.g., memory safety).

Along the lectures, model cases will be elaborated and evaluated in the exercises.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengefördert
Entscheidungsfindunggefördert
Problemlösunggefördert
Soziale KompetenzenKommunikationgefördert
Persönliche KompetenzenAnpassung und Flexibilitätgefördert
Kreatives Denkengefördert
Kritisches Denkengefördert
252-4601-00LCurrent Topics in Information Security Information Belegung eingeschränkt - Details anzeigen
The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
2 KP2SS. Capkun, K. Paterson, S. Shinde
KurzbeschreibungThe seminar covers various topics in information security: security protocols (models, specification & verification), trust management, access control, non-interference, side-channel attacks, identity-based cryptography, host-based attack detection, anomaly detection in backbone networks, key-management for sensor networks.
LernzielThe main goals of the seminar are the independent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques.
InhaltThe seminar covers various topics in information security, including network security, cryptography and security protocols. The participants are expected to read a scientific paper and present it in a 35-40 min talk. At the beginning of the semester a short introduction to presentation techniques will be given.

Selected Topics

- security protocols: models, specification & verification
- trust management, access control and non-interference
- side-channel attacks
- identity-based cryptography
- host-based attack detection
- anomaly detection in backbone networks
- key-management for sensor networks
LiteraturThe reading list will be published on the course web site.
263-0009-00LInformation Security Lab Information Belegung eingeschränkt - Details anzeigen 8 KP2V + 1U + 3P + 1AS. Shinde, D. Basin, S. Capkun, K. Paterson
KurzbeschreibungThis InterFocus Course will provide a broad, hands-on introduction to Information Security, introducing adversarial thinking and security by design as key approaches to building secure systems.
LernzielThis course will introduce key concepts from Information Security, both from attack and defence perspectives. Students will gain an appreciation of the complexity and challenge of building secure systems.
InhaltThe course is organised in three-week segments. In each segment, a new concept from Information Security will be introduced. The overall scope will be broad, including cryptography, protocol design, system security, and privacy.
SkriptWill be made available during the semester.
LiteraturPaul C. van Oorschot, Computer Security and the Internet: Tools and Jewels.
Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography.
Voraussetzungen / BesonderesIdeally, students will have taken the D-INFK Bachelors course “Information Security" or an equivalent course at Bachelors level.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Problemlösunggeprüft
Persönliche KompetenzenAnpassung und Flexibilitätgefördert