|
Master in Information Security
For more information about the Information Security Master Track visit: http://www.infsecmaster.ethz.ch
251-0409-00 S
Fall Semester 2009
D. Basin, S. Capkun, U. Maurer, B. Plattner
The seminar covers various topics in information security: security protocols (models, specification & verification), trust management, access control, non-interference, side-channel attacks, identity-based cryptography, host-based attack detection, anomaly detection in backbone networks, key-management for sensor networks.
at least one of
The main goals of the seminar are the independent study of scientific
literature and assessment of its contributions as well as learning and
practicing presentation techniques.
The seminar covers various topics in information security, including
network security, cryptography and security protocols. The participants
are expected to read a scientific paper and present it in a 35-40 min
talk. At the beginning of the semester a short introduction to
presentation techniques will be given.
The reading list will be published on the course web site.
2 ECTS credits
Time: Mondays, 14:15-16:00 (starting 28 September 2009)
Place: IFW A34
Graded semester performance
(see the list of papers for details on each topic)
Sep 28 |
|
Introduction to seminar topics, assignment of papers to participants |
Oct. 5 | No lecture. | |
Oct. 12 |
14:00 - 14:45 15:00 - 15:45 |
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers (Peter K. Brandt) Privacy-Preserving Remote Diagnostics (Mahdi Asadpour) |
Oct. 19 |
14:00 - 14:45 15:00 - 15:45 |
Vanish: Increasing Data Privacy with Self-Destructing Data (Luka Malisa) Dialog Codes for Secure Wireless Communications (Pascal Sachs) |
Oct. 26 |
14:00 - 14:45 15:00 - 15:45 |
Hardening Functions for Large Scale Distributed Computations (Stephen Ackermann) A Practical Message Falsification Attack on WPA (Mat Onur) |
Nov. 2 | 13:30 - 14:15 | Stronger Security of Authenticated Key Exchange (Lucas Braun) |
14:15 - 15:00 | The Inductive Approach to Verifying Cryptographic Protocols (Andreas Ruedlinger) | |
15:15 - 16:00 | Model checking SPKI/SDSI (Tobias Heinzen) | |
Nov. 9 | 14:15 - 15:00 | DKAL: Distributed-Knowledge Authorization Language (Ivo Colombo) |
15:15 - 16:00 | Enforceable Security Properties (Raphael Tawil) | |
Nov. 16 | 14:15 - 15:00 | 802.11 user fingerprinting (Adrian Schmidmeister) |
15:15 - 16:00 | Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations (Panayiota Chapoupi) | |
Nov. 23 | 13:15 - 14:00 | Secret Sharing Scheme Realizing General Access Structure (Simona Mockute) |
14:15 - 15:00 | Generalized Secret Sharing and Monotone Functions (Ueli Ehrbar) | |
15:15 - 16:00 | A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0 (Peter Hladky) | |
Nov. 30 | 13:15 - 14:00 | The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) (Daniela Meier) |
14:15 - 15:00 | Second Preimages on n-Bit Hash Functions for Much Less than 2^n Work (Mathieu Pretre) | |
15:15 - 16:00 | Herding Hash Functions and the Nostradamus Attack (Michael Belfrage) | |
Dec. 7 | 14:15 - 15:00 | What's going on? Learning communication rules in edge networks (Pia Windisch) |
15:15 - 16:00 | Effective and Efficient Malware Detection at the End Host (Dominik Rüegger) | |
Dec. 14 | 13:30 - 14:15 | DKAL: Distributed-Knowledge Authorization Language (Ivo Colombo) |
14:15 - 15:00 | Mapping internet sensors with probe response attacks (Dominique Im Obersteg) | |
15:15 - 16:00 | Spamming Botnets: Signatures and Characteristics (Frank Walter) |
Wichtiger Hinweis:
Diese Website wird in älteren Versionen von Netscape ohne
graphische Elemente dargestellt. Die Funktionalität der
Website ist aber trotzdem gewährleistet. Wenn Sie diese
Website regelmässig benutzen, empfehlen wir Ihnen, auf
Ihrem Computer einen aktuellen Browser zu installieren. Weitere
Informationen finden Sie auf
folgender
Seite.
Important Note:
The content in this site is accessible to any browser or
Internet device, however, some graphics will display correctly
only in the newer versions of Netscape. To get the most out of
our site we suggest you upgrade to a newer browser.
More
information