|Prof. Dr. Kenneth Paterson
Institut f. Informationssicherheit
ETH Zürich, CAB E 79
|+41 44 632 32 52
|Current Topics in Information Security
Number of participants limited to 24.
The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
|S. Capkun, K. Paterson, A. Perrig
|The seminar covers various topics in information security: security protocols (models, specification & verification), trust management, access control, non-interference, side-channel attacks, identity-based cryptography, host-based attack detection, anomaly detection in backbone networks, key-management for sensor networks.
|The main goals of the seminar are the independent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques.
|The seminar covers various topics in information security, including network security, cryptography and security protocols. The participants are expected to read a scientific paper and present it in a 35-40 min talk. At the beginning of the semester a short introduction to presentation techniques will be given.
- security protocols: models, specification & verification
- trust management, access control and non-interference
- side-channel attacks
- identity-based cryptography
- host-based attack detection
- anomaly detection in backbone networks
- key-management for sensor networks
|The reading list will be published on the course web site.
|Information Security Lab
Only for master students, otherwise a special permission by the study administration of D-INFK is required.
Number of participants limited to 150.
|2V + 1U + 3P + 1A
|K. Paterson, D. Basin, S. Capkun, D. Hofheinz, A. Perrig
|This InterFocus Course will provide a broad, hands-on introduction to Information Security, introducing adversarial thinking and security by design as key approaches to building secure systems.
|This course will introduce key concepts from Information Security, both from attack and defence perspectives. Students will gain an appreciation of the complexity and challenge of building secure systems.
|The course is organised in two-week segments. In each segment, a new concept from Information Security will be introduced. The overall scope will be broad, including cryptography, protocol design, network security, system security.
|Will be made available during the semester.
|Paul C. van Oorschot, Computer Security and the Internet: Tools and Jewels.
Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography.
|Prerequisites / Notice
|Ideally, students will have taken the D-INFK Bachelors course “Information Security" or an equivalent course at Bachelors level.