System and IoT Security (Mobile Security)

Organizational Matters

  • Lecturer

  • Kick-Off Meeting

    • Date: Wednesday 26.04.2017, 14:30
    • Location: Building S4|14, Room 3.2.06
    • Slides

  • Presentation

    • Date: Tuesday 15.08.2017, 09:30 - 18:00
    • Location: Building S4|14, Room 3.2.06
    • Schedule (not final)

  • Important dates

    • Final date to cancel participation: Friday 09.06.2017

      • In case you cancel your participation, please do not forget to cancel your registration also in TUCaN!

    • Submission deadline: Sunday 06.08.2017, at 23:59

  • At most 18 students can participate
  • Register until 05.05.2017, 23:59 using this form and in TUCaN

Content and Goal

This seminar covers several topics in the area of system security with the focus on platform and communication security aspects of embedded and IoT devices. There will be interdisciplinary topics as well. The students should gain detailed knowledge on the security and privacy aspects of hardware platforms, operating systems, network communication, infrastructures, and end-user applications. Moreover, they should examine current research in this area, learn how to dive into a scientific topic, and present their results in a short paper and an oral presentation.

Procedure

Each student will be given a number of scientific papers related to a specific topic in the area of embedded/IoT security. The student has to summarize, compare, and validate these publications in the form of a seminar work (paper). In addition, we will reserve 1 to 3 days (depending on the number of participants) where each student will present his seminar work in an oral presentation. Both the paper and the final presentation will be in English. 

Topics

#TitleSupervisorRoot Paper
1Static Analysis and Formal Verification of OS KernelsDavid Genslink
2Synthesizable Open-Source Hardware DesignGhada Dessouky[1] (chapters 3 and 6) [2][3][4]
3Data Mining and Machine Learning in Mobile/CybersecurityGhada Dessouky / Markus Miettinen[1][2]
4Towards Provably Secure Hardware DesignGhada Dessouky[1][2]
5Tools for Verifying Security Properties of SoftwareDavid Gens / Ghada Dessoukylink
6State-of-the art in malicious software targeted at IoT devicesMarkus Miettinenlink
7Security analysis of Smart City environments: attacks and defencesMarkus Miettinenlink
8Intrusion detection and attack mitigation in IoT frameworksMarkus Miettinenlink
9The rise of IoT malware and telnet attacksThien Nguyen[1][2]
10Samsung: “SmartThings is the easy way to turn your home into a smart home”. Or the simple way to make your home insecure!Thien Nguyen[1][2][3]
11Stuxnet and Friends: Attacks on Industrial Control SystemsFerdinand Brasserlink
12(Cache) Side-Channel Attacks on Intel SGXFerdinand Brasserlink
13Security features of Real-Time Operating SystemsRaad Bahmanilink
14Survey on DRAM PUFs: Construction and AttacksShaza Zeitounilink
15Survey on Invasive/semi invasive attacks on PUFsShaza Zeitounilink
16Malware analysis based on machine learningTigist Aberalink
17Android Platform Security ArchitectureTigist Aberalink
18Automatic Vulnerability Discovery using FuzzingTommaso Frassettolink

 

Credit Points 

  • 3 CP

Course Material

undefinedLaTeX template

Contact

Events

no news in this list.

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang