Module CS4515-KP12

Computer and System Security (ComSysSec)


Duration

2 Semester

Turnus of offer

each year, can be started in winter or summer semester

Credit points

12

Course of studies, specific fields and terms:

  • Master Entrepreneurship in Digital Technologies 2020, advanced module, specific
  • Master Entrepreneurship in Digital Technologies 2014, advanced module, specific
  • Master Computer Science 2019, optional subject, advanced module

Classes and lectures:

  • Computer Security (lecture, 2 SWS)
  • Advanced Systems Security (lecture, 1 SWS)
  • Advanced Systems Security (practical course, 3 SWS)
  • Computer Security (practical course, 3 SWS)

Workload:

  • 20 hours exam preparation
  • 255 hours private studies
  • 85 hours in-classroom work

Contents of teaching:

  • Project on a scientific problem in the field of system security
  • Preparation of a scientific report using Latex and in English based on the results of the project
  • Participation in a peer review process that replicates the scientific peer review process
  • Presentation of project results in English
  • Applied cryptography in systems and protocols: Overview of common methods and their applications
  • Efficient and secure implementation of common crypto procedures: multiple-precision arithmetic, efficient exponentiation, constant time algorithms etc.
  • Physical implementation attacks and countermeasures: Error injection attacks, passive physical attacks such as SPA/DPA and timing attacks, modern inference methods and associated cryptanalysis methods, classes of protective measures
  • Virtualization security and microarchitecture attacks: security concepts in the operating system and hypervisor, microarchitecture attacks such as cache attacks, spectre, etc., measures to restore system security
  • Trusted computing and hardware-assisted system security: How TPMs, Secure Elements and Trusted Execution work environments, basics and cryptographic techniques, design basics for secure systems

Qualification-goals/Competencies:

  • Students are able to work independently on a scientific topic.
  • Students are able to present complex scientific topics in a clear and structured manner tailored to a target group and using standard academic formatting.
  • Students can present their work appropriately in presentations for specific audiences within given time constraints.
  • Students have experience in scientific discussions and can ask competent questions and interpret their own results.
  • Students understand the review process of scientific papers and can offer constructive criticism in the review process.
  • The students can demonstrate a deep understanding of cryptographic methods and their applications in communication systems.
  • They can construct secure and efficient cryptographic primitives and implement them securely in computer systems.
  • They can explain methods and algorithms for efficient multiple-precision arithmetic.
  • They can perform basic side-channel attacks on systems with physical access or shared systems with code execution rights.
  • They can implement protection against specific physical attacks for cryptographic primitives.
  • They can evaluate the security of existing primitives.

Grading through:

  • Written or oral exam as announced by the examiner
  • written homework

Responsible for this module:

Literature:

  • S. Mangard, E. Oswald & T. Popp : Power analysis attacks: Revealing the secrets of smart cards Vol. 31, Springer Science & Business Media, 2008
  • D. Stinson : Cryptography: Theory and Practice 4th ed., CRC Press, 2018
  • Stallings, Brown : Computer Security: Principles and Practice 4th ed., Pearson, 2018
  • Katz, Lindell : Introduction to Modern Cryptography 2nd ed., CRC Press, 2014
  • : Recent literature

Language:

  • English, except in case of only German-speaking participants

Notes:

Module examination(s):

- CS4515-L1: Computer and System Security, oral exam, 100% of the module grade

Last Updated:

11.12.2025