Suchergebnis: Katalogdaten im Herbstsemester 2021
Informatik Master | ||||||
Master-Studium (Studienreglement 2020) | ||||||
Vertiefungen | ||||||
Vertiefung in Secure and Reliable Systems | ||||||
Wahlfächer | ||||||
Nummer | Titel | Typ | ECTS | Umfang | Dozierende | |
---|---|---|---|---|---|---|
252-1411-00L | Security of Wireless Networks | W | 6 KP | 2V + 1U + 2A | S. Capkun, K. Kostiainen | |
Kurzbeschreibung | Core Elements: Wireless communication channel, Wireless network architectures and protocols, Attacks on wireless networks, Protection techniques. | |||||
Lernziel | After this course, the students should be able to: describe and classify security goals and attacks in wireless networks; describe security architectures of the following wireless systems and networks: 802.11, GSM/UMTS, RFID, ad hoc/sensor networks; reason about security protocols for wireless network; implement mechanisms to secure 802.11 networks. | |||||
Inhalt | Wireless channel basics. Wireless electronic warfare: jamming and target tracking. Basic security protocols in cellular, WLAN and multi-hop networks. Recent advances in security of multi-hop networks; RFID privacy challenges and solutions. | |||||
263-2400-00L | Reliable and Trustworthy Artificial Intelligence | W | 6 KP | 2V + 2U + 1A | M. Vechev | |
Kurzbeschreibung | Creating reliable and explainable probabilistic models is a fundamental challenge to solving the artificial intelligence problem. This course covers some of the latest and most exciting advances that bring us closer to constructing such models. | |||||
Lernziel | The main objective of this course is to expose students to the latest and most exciting research in the area of explainable and interpretable artificial intelligence, a topic of fundamental and increasing importance. Upon completion of the course, the students should have mastered the underlying methods and be able to apply them to a variety of problems. To facilitate deeper understanding, an important part of the course will be a group hands-on programming project where students will build a system based on the learned material. | |||||
Inhalt | This comprehensive course covers some of the latest and most important research advances (over the last 3 years) underlying the creation of safe, trustworthy, and reliable AI (more information here: https://www.sri.inf.ethz.ch/teaching/reliableai21): * Adversarial Attacks on Deep Learning (noise-based, geometry attacks, sound attacks, physical attacks, autonomous driving, out-of-distribution) * Defenses against attacks * Combining gradient-based optimization with logic for encoding background knowledge * Complete Certification of deep neural networks via automated reasoning (e.g., via numerical relaxations, mixed-integer solvers). * Probabilistic certification of deep neural networks * Training deep neural networks to be provably robust via automated reasoning * Fairness (different notions of fairness, certifiably fair representation learning) * Federated Learning (introduction, security considerations) | |||||
Voraussetzungen / Besonderes | While not a formal requirement, the course assumes familiarity with basics of machine learning (especially linear algebra, gradient descent, and neural networks as well as basic probability theory). These topics are usually covered in “Intro to ML” classes at most institutions (e.g., “Introduction to Machine Learning” at ETH). For solving assignments, some programming experience in Python is expected. | |||||
263-4657-00L | Advanced Encryption Schemes | W | 5 KP | 2V + 1U + 1A | R. Gay | |
Kurzbeschreibung | Public-Key Encryption has had a significant impact by enabling remote parties to communicate securely via an insecure channel. Latest schemes go further by providing a fine-grained access to the encrypted data. | |||||
Lernziel | The student is comfortable with formal security definitions and proof techniques used to analyze the security of the latest encryption schemes with advanced features. This prepares the student to start reading research papers on the field. | |||||
Inhalt | We will start by presenting the notion of Public-Key Encryption with its various security guarantees and some constructions. Then we will look into encryption schemes with fine-grained access control to the encrypted data, such as identity-based encryption or attribute-based encryption and present different methodology to prove their security. | |||||
Literatur | Links to relevant research papers will be given in the course materials. | |||||
Voraussetzungen / Besonderes | It is recommended for students to have prior exposure to cryptography, e.g.the D-INFK course "Digital Signatures" or "Applied Cryptography". | |||||
263-4665-00L | Zero-Knowledge Proofs Number of participants limited to 50. | W | 5 KP | 2V + 1U + 1A | J. Bootle | |
Kurzbeschreibung | This course is a detailed introduction to zero-knowledge proof protocols. | |||||
Lernziel | To understand various methods of constructing zero-knowledge proof protocols, and be able to analyse their security properties. | |||||
Inhalt | The course will discuss interactive zero-knowledge proofs based on various commitment schemes, and explore connections to other areas like secure multi-party computation. The course may also describe some more advanced constructions of non-interactive proofs. | |||||
Skript | The course notes will be written in English. | |||||
Voraussetzungen / Besonderes | Students should have taken a first course in Cryptography (as taught in the Information Security course at Bachelor’s level). Confidence with algebra and probability is desirable. | |||||
227-0579-00L | Hardware Security | W | 7 KP | 2V + 2U + 2A | K. Razavi | |
Kurzbeschreibung | This course covers the security of commodity computer hardware (e.g., CPU, DRAM, etc.) with a special focus on cutting-edge hands-on research. The aim of the course is familiarizing the students with hardware security and more specifically microarchitectural and circuit-level attacks and defenses through lectures, reviewing and discussing papers, and executing some of these advanced attacks. | |||||
Lernziel | By the end of the course, the students will be familiar with the state of the art in commodity computer hardware attacks and defenses. More specifically, the students will learn about: - security problems of commodity hardware that we use everyday and how you can defend against them. - relevant computer architecture and operating system aspects of these issues. - hands-on techniques for performing hardware attacks. - writing critical reviews and constructive discussions with peers on this topic. This is the course where you get credit points by building some of the most advanced exploits on the planet! The luckiest team will collect a Best Demo Award at the end of the course. | |||||
Literatur | Slides, relevant literature and manuals will be made available during the course. | |||||
Voraussetzungen / Besonderes | Knowledge of systems programming and computer architecture is a plus. |
- Seite 1 von 1