Winter
2004

Security Engineering
(Seminar 2 SWS)

Instructor: Dr. Wolf Müller


Computer Science Department
Systems Architecture Group

 

 
Abstract: As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere the network reaches are all vulnerable to potentially disastrous infiltration by hackers. [W. Cheswick. Firewalls and Internet Security] 
 
Synopsis:
  • Seminar, Praktische Informatik, Hauptstudium.
  • 2h each week, over one semester (2 SWS).
  • Students will present a selection of papers that will help you understand which threats exist, judge their significance and learn methods to defend your system against hackers. In addition you will explore the mathematical underpinnings of today's most common security tools and protocols. But most of all you will learn that there is no absolute security - i.e. your will have to learn ways to detect security breaches and recover from them.

Credits:

In order to obtain credits for this seminar, participants are expected to:

  • Attend regularly (at least 90%).
  • Read each paper before the seminar, to be adequately prepared for discussion.
  • Present 1-2 papers (45 min presentation; 30 min discussion).
  • Presenters summarize their presentation and relevant discussions on a WIKI page within 2 weeks.
  • Presentations may be given in English or German. All documents are in English (exceptions may be granted).

Prerequisites:

  • This seminar is suitable for students of all technical science disciplines who have previously completed course PI-1 or equivalent.

Syllabus:

  • What is Security Engineering - How to think about Security (PDF)
  • Protocols (PDF)
  • Passwords (PDF)
  • Access Control (PDF)
  • Cryptography (PDF)
    The DES Algorithm Illustrated (tutorial)
  • Security in Distributed Systems (PDF)
  • Multilevel Security
  • Multilateral Security
  • Monitoring Systems (PDF)
  • Digital Certificates and Digital Signatures (PDF, openSSL)
  • Security Printing and Seals
  • Evaluation of Programs and Code
  • Biometrics
  • Physical Tamper Resistance
    • Wireless LAN WEP
    • German Mout-System
  • Emission Security (PDF)
  • Electronic and Information Warfare
  • Telecom System Security
  • Network Attack and Defense
  • Security in E-Commerce Systems (PDF)
    • Public Key Infrastructure (PKI)
    • X.509 Certificates
  • Secure Electronic Documents (Case Study: Acrobat/PDF)
  • Copyright and Privacy Protection
    • Digital Rights Management (DRM)
       

Assignments (Themenvergabe):

Date

Presenter 

Topic

19.10.04 Wolf Müller Introduction
26.10.04 Wolf Müller Security Concerns (Authenticity, Integrity, Privacy, Non-Repudiation)
02.11.04 Niklas Darien Lambert
Robert Schumann
Passwords
9.11.04 Andreas Weiß
Daniel Mauter
Encryption Algorithms (DES, RSA)
16.11.04 Martin Apel
Alexander Röhnsch
Attack Types (Denial of Service, Man in the Middle)
23.11.04 Robert Gabriel Stein Access Control
30.11.04 Philipp Reinecke
Michael Spranger
Distributed Systems
07.12.04 Andre Masula
Maximilian Buder
Digital Certificates and Digital Signatures (PPT)
14.12.04 Bayarkhun Munkhbaatar
Friedrich Hildebrand
Authentication Mechanisms
Security in E-Commerce Systems
04.01.05 Stephan Edel
Anne Walther
Monitoring Systems
11.01.05 Guido Furche
Michael Menz
Emission Security
18.01.05 Christian Carstensen
Jens Kleine
Evaluation of Programs and Code: stack and heap based overflow exploits, shellcode
“Reflections on Trusting Trust” (PPT)
25.01.05 Stefan Ziller Network Attack & Defense (Introduction, Defense against   Network Attacks, Nessus) 
01.02.05 Thorsten Schröder
Gregor Kopf
Network Attack & Defense II: (Trojans, Viruses, Intrusion Detection, chkrootkit)
8.02.05 Henryk Plötz
Matthias Plischke
Biometry
15.02.05 Mathias Jeschke
Sven Wittig
Secure Documents (PDF, EFS/Windows)


Suggested Readings (Books):

  • Ross Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems.
  • Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition.
 Links
SAR WiKi
Security Engineering
Cambridge
Ross Anderson's home page
NIH
Computer Security Information
NIST
Computer Security Resource Center
NIST
Federal Information Processing Standards Publications (FIPS)


 


Legal disclaimer. .  © 2024 Humboldt-Universität zu Berlin, Computer Science Department, Systems Architecture Group. Contact: sar@informatik.hu-berlin.de .