Content |
In this lecture series we will look at different aspects of „ubiquitous“ security, i.e. security concerns and solutions in our daily life as consumers, application developers or software architects interacting with distributed systems and across different layers in a system stack. We will start with selected topics in the lifecycle of a mobile or IoT device, covering readily available security technologies as well as emerging R&D. We will realize that an important aspect is to identify what can be assumed to be available as a trusted computing base, i.e. the set of all hardware, firmware, and/or software components that are critical to the security of a computing device. For that reason, we will investigate trusted execution environments (TEEs) trusted platform modules (TPM) as well as the currently emerging software guard extensions (SGX). We will address different security concerns in cloud computing and cloud infrastructures, for example looking at identity management in distributed systems as well as selected emerging topics when interacting with encrypted cloud databases. As part of this lecture series we will also touch on blockchain technology as well as security in industrial control systems. |
Literature |
Pfleeger, C. et al.: “Security in Computing“, 5th Edition, Prentice Hall, 2015 Russell, B., van Duren, D.:“ Practical Internet of Things Security“, 2016, Packt Publishing Will, A. and Challener, D.: „A Practical Guide to TPM 2.0 Using the Trusted Platform Module in the New Age of Security“, Apress, 2015 Ginter, A.: „SCADA Security: Security: What's Broken and How To Fix It“, Abterra Technologies,2016
https://www.owasp.org/index.php/Application_Threat_Modeling https://software.intel.com/en-us/articles/intel-software-guard-extensions-tutorial-part-1-foundation
|