IT & Mobile Security

Embedded Security Assessment

Integrated course, 2.00 ECTS

 

Course content

Introduction on Embedded Secure Elements
• Programming Interfaces
• Secure System Integration
* Attack Scenarios and Countermeasures
• Differential Power Analysis and EMA Attacks
• Light Attacks
• Timing Analysis
• Countermeasures in HW and SW
• Setups for Analysis and Attacks
* Common Criteria Certification
• Definition
• Development Process and Security Evaluation
• Lifecycle

Learning outcomes

Graduates gain knowledge concerning security principles of IT systems.

Recommended or required reading and other learning resources / tools

Books:
Robert Love, Linux Kernel Development, Addison-Wesley, 2010
Peter Mell, Timothy Grance: The NIST Definition of Cloud Computing, NIST SP 800-145
The IDA PRO Book, Chriss Eagle
ISECOM OSSTMM - Open Source Security Testing Methodology Manual
Hacking Exposed Malware & Rootkits, Elisan
Hacking Exposed Industrial Control Systems, Bodungen, Singer
Professional Journals: Linux Magazin, IX

Mode of delivery

1 ECTS lecture, 1 ECTS tutorial

Prerequisites and co-requisites

module ISC 2

Assessment methods and criteria

Lecture: final exam, tutorial: continuous assessment