Shweta Shinde: Katalogdaten im Herbstsemester 2021

NameFrau Prof. Dr. Shweta Shinde
Dep. Informatik
ETH Zürich, CAB F 71.2
Universitätstrasse 6
8092 Zürich
Telefon+41 44 633 09 88
BeziehungAssistenzprofessorin (Tenure Track)

252-0217-00LComputer Systems Information 8 KP4V + 2U + 1AT. Roscoe, S. Shinde, R. Wattenhofer
KurzbeschreibungThis course is about real computer systems, and the principles on which they are designed and built. We cover both modern OSes and the large-scale distributed systems that power today's online services. We illustrate the ideas with real-world examples, but emphasize common theoretical results, practical tradeoffs, and design principles that apply across many different scales and technologies.
LernzielThe objective of the course is for students to understand the theoretical principles, practical considerations, performance tradeoffs, and engineering techniques on which the software underpinning almost all modern computer systems is based, ranging from single embedded systems-on-chip in mobile phones to large-scale geo-replicated groups of datacenters.

By the end of the course, students should be able to reason about highly complex, real, operational software systems, applying concepts such as hierarchy, modularity, consistency, durability, availability, fault-tolerance, and replication.
InhaltThis course subsumes the topics of both "operating systems" and "distributed systems" into a single coherent picture (reflecting the reality that these disciplines are highly converged). The focus is system software: the foundations of modern computer systems from mobile phones to the large-scale geo-replicated data centers on which Internet companies like Amazon, Facebook, Google, and Microsoft are based.

We will cover a range of topics, such as: scheduling, network protocol stacks, multiplexing and demultiplexing, operating system structure, inter-process communication, memory managment, file systems, naming, dataflow, data storage, persistence, and durability, computer systems performance, remove procedure call, consensus and agreement, fault tolerance, physical and logical clocks, virtualization, and blockchains.

The format of the course is a set of about 25 topics, each covered in a lecture. A script will be published online ahead of each lecture, and the latter will consist of an interactive elaboration of the material in the script. There is no book for the course, but we will refer to books and research papers throughout to provide additional background and explanation.
Voraussetzungen / BesonderesWe will assume knowlege of the "Systems Programming" and "Computer Networks" courses (or equivalent), and their prerequisites, and build upon them.
252-4601-00LCurrent Topics in Information Security Information Belegung eingeschränkt - Details anzeigen
Number of participants limited to 24.

The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
2 KP2SS. Capkun, K. Paterson, A. Perrig, S. Shinde
KurzbeschreibungThe seminar covers various topics in information security: security protocols (models, specification & verification), trust management, access control, non-interference, side-channel attacks, identity-based cryptography, host-based attack detection, anomaly detection in backbone networks, key-management for sensor networks.
LernzielThe main goals of the seminar are the independent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques.
InhaltThe seminar covers various topics in information security, including network security, cryptography and security protocols. The participants are expected to read a scientific paper and present it in a 35-40 min talk. At the beginning of the semester a short introduction to presentation techniques will be given.

Selected Topics

- security protocols: models, specification & verification
- trust management, access control and non-interference
- side-channel attacks
- identity-based cryptography
- host-based attack detection
- anomaly detection in backbone networks
- key-management for sensor networks
LiteraturThe reading list will be published on the course web site.
263-0009-00LInformation Security Lab Information Belegung eingeschränkt - Details anzeigen
Only for master students!
Number of participants limited to 250.
8 KP2V + 1U + 3P + 1AK. Paterson, S. Capkun, D. Hofheinz, A. Perrig, S. Shinde
KurzbeschreibungThis InterFocus Course will provide a broad, hands-on introduction to Information Security, introducing adversarial thinking and security by design as key approaches to building secure systems.
LernzielThis course will introduce key concepts from Information Security, both from attack and defence perspectives. Students will gain an appreciation of the complexity and challenge of building secure systems.
InhaltThe course is organised in two-week segments. In each segment, a new concept from Information Security will be introduced. The overall scope will be broad, including cryptography, protocol design, network security, system security.
SkriptWill be made available during the semester.
LiteraturPaul C. van Oorschot, Computer Security and the Internet: Tools and Jewels.
Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography.
Voraussetzungen / BesonderesIdeally, students will have taken the D-INFK Bachelors course “Information Security" or an equivalent course at Bachelors level.