Name | Prof. Dr. Kenneth Paterson |
Field | Computer Science |
Address | Institut f. Informationssicherheit ETH Zürich, CAB E 79 Universitätstrasse 6 8092 Zürich SWITZERLAND |
Telephone | +41 44 632 32 52 |
kenny.paterson@inf.ethz.ch | |
Department | Computer Science |
Relationship | Full Professor |
Number | Title | ECTS | Hours | Lecturers | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
252-4601-00L | Current Topics in Information Security The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar. | 2 credits | 2S | S. Capkun, K. Paterson, A. Perrig, S. Shinde | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | The seminar covers various topics in information security: security protocols (models, specification & verification), trust management, access control, non-interference, side-channel attacks, identity-based cryptography, host-based attack detection, anomaly detection in backbone networks, key-management for sensor networks. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | The main goals of the seminar are the independent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Content | The seminar covers various topics in information security, including network security, cryptography and security protocols. The participants are expected to read a scientific paper and present it in a 35-40 min talk. At the beginning of the semester a short introduction to presentation techniques will be given. Selected Topics - security protocols: models, specification & verification - trust management, access control and non-interference - side-channel attacks - identity-based cryptography - host-based attack detection - anomaly detection in backbone networks - key-management for sensor networks | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Literature | The reading list will be published on the course web site. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
263-0009-00L | Information Security Lab | 8 credits | 2V + 1U + 3P + 1A | S. Shinde, D. Basin, S. Capkun, K. Paterson, F. Tramèr | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | This InterFocus Course will provide a broad, hands-on introduction to Information Security, introducing adversarial thinking and security by design as key approaches to building secure systems. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | This course will introduce key concepts from Information Security, both from attack and defence perspectives. Students will gain an appreciation of the complexity and challenge of building secure systems. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Content | The course is organised in three-week segments. In each segment, a new concept from Information Security will be introduced. The overall scope will be broad, including cryptography, protocol design, system security, and privacy. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Lecture notes | Will be made available during the semester. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Literature | Paul C. van Oorschot, Computer Security and the Internet: Tools and Jewels. Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | Ideally, students will have taken the D-INFK Bachelors course “Information Security" or an equivalent course at Bachelors level. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Competencies |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
263-4640-00L | Network Security | 8 credits | 2V + 2U + 3A | A. Perrig, S. Frei, K. Paterson | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | Some of today's most damaging attacks on computer systems involve exploitation of network infrastructure, either as the target of attack or as a vehicle to attack end systems. This course provides an in-depth study of network attack techniques and methods to defend against them. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | - Students are familiar with fundamental network-security concepts. - Students can assess current threats that Internet services and networked devices face, and can evaluate appropriate countermeasures. - Students can identify and assess vulnerabilities in software systems and network protocols. - Students have an in-depth understanding of a range of important state-of-the-art security technologies. - Students can implement network-security protocols based on cryptographic libraries. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Content | The course will cover topics spanning four broad themes with a focus on the first two themes: (1) network defense mechanisms such as public-key infrastructures, TLS, VPNs, anonymous-communication systems, secure routing protocols, secure DNS systems, and network intrusion-detection systems; (2) network attacks such as hijacking, spoofing, denial-of-service (DoS), and distributed denial-of-service (DDoS) attacks; (3) analysis and inference topics such as traffic monitoring and network forensics; and (4) new technologies related to next-generation networks. In addition, several guest lectures will provide in-depth insights into specific current real-world network-security topics. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | This lecture is intended for students with an interest in securing Internet communication services and network devices. Students are assumed to have knowledge in networking as taught in a communication networks lecture like 252-0064-00L or 227-0120-00L. Basic knowledge of information security or applied cryptography as taught in 252-0211-00L or 263-4660-00L is beneficial, but an overview of the most important cryptographic primitives will be provided at the beginning of the course. The course will involve several graded course projects. Students are expected to be familiar with a general-purpose or network programming language such as C/C++, Go, Python, or Rust. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Competencies |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
364-1058-00L | Risk Center Seminar Series | 0 credits | 2S | H. Schernberg, D. Basin, A. Bommier, D. N. Bresch, S. Brusoni, L.‑E. Cederman, P. Cheridito, F. Corman, H. Gersbach, C. Hölscher, K. Paterson, G. Sansavini, B. Stojadinovic, B. Sudret, J. Teichmann, R. Wattenhofer, S. Wiemer, R. Zenklusen | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | This course is a mixture between a seminar primarily for PhD and postdoc students and a colloquium involving invited speakers. It consists of presentations and subsequent discussions in the area of modeling complex socio-economic systems and crises. Students and other guests are welcome. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | Participants should learn to get an overview of the state of the art in the field, to present it in a well understandable way to an interdisciplinary scientific audience, to develop novel mathematical models for open problems, to analyze them with computers, and to defend their results in response to critical questions. In essence, participants should improve their scientific skills and learn to work scientifically on an internationally competitive level. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Content | This course is a mixture between a seminar primarily for PhD and postdoc students and a colloquium involving invited speakers. It consists of presentations and subsequent discussions in the area of modeling complex socio-economic systems and crises. For details of the program see the webpage of the colloquium. Students and other guests are welcome. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Lecture notes | There is no script, but a short protocol of the sessions will be sent to all participants who have participated in a particular session. Transparencies of the presentations may be put on the course webpage. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Literature | Literature will be provided by the speakers in their respective presentations. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | Participants should have relatively good mathematical skills and some experience of how scientific work is performed. |