printlogo
ETH Zuerich - Homepage
Information Security
 
print
  

Current Topics in Information Security

Master in Information Security

For more information about the Information Security Master Track visit: http://www.infsecmaster.ethz.ch

252-4601-00L
Fall Semester 2010
D. Basin, S. Capkun, U. Maurer, B. Plattner

Announcements

Course Description

The seminar covers various topics in information security: security protocols (models, specification & verification), trust management, access control, non-interference, side-channel attacks, identity-based cryptography, host-based attack detection, anomaly detection in backbone networks, key-management for sensor networks.

Prerequisites

at least one of

Objectives

The main goals of the seminar are the independent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques.

Content

The seminar covers various topics in information security, including network security, cryptography and security protocols. The participants are expected to read a scientific paper and present it in a 35-40 min talk.

Topics covered include
Course material

Grading

2 ECTS credits

Lectures

Time: Mondays, 14-16 (starting September 27)
Place: ML J 34.1

Exam

Graded semester performance

Schedule (tentative)

Sep 27
  Introduction to seminar papers, assignment of papers to students
Oct 4
  No lecture.
Oct 11   No lecture.
Oct 18

  No lecture.
Oct 25
U. Maurer (Pavel Raykov)
14:00 - 15:00


15:00 - 16:00
Secret Sharing Scheme Realizing General Access Structure (Christian Peter Badertscher)

Tracing Traitors (Michael Andreas Chau)
Nov 1
S. Capkun (Ghassan Karame)
14:00 - 15:00


15:00 - 16:00
Physical-layer Identification of RFID Devices (Sara Khalatbari)

Nov 8
S. Capkun (Ghassan Karame)
14:00 - 15:00


15:00 - 16:00

Keeping Data Secret under Full Compromise using Porter Devices (Kirila Iliyanova Adamova)

Location Privacy of Distance Bounding Protocols (Petar Tsankov)
Nov 15
B. Plattner (Martin Burkhart)
14:00 - 15:00


15:00 - 16:00
The case for ubiquitous transport-level encryption (Mathias Wellig)

Hiding Stars with Fireworks: Location Privacy through Camouflage (Mike Christof Klausmann)
Nov 22
B. Plattner (Martin Burkhart)
14:00 - 15:00


15:00 - 16:00
SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks (Hubert Benjamin Ritzdorf)

Chipping Away at Censorship Firewalls with User-Generated Content (Esriel Mottus)
Nov 29
D. Basin (Cas Cremers and Christoph Sprenger)
14:00 - 15:00


15:00 - 16:00
Specifying Secure Transport Channels (David Jean-Bernard Tortel)

Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps (Pascal Olivier Brogle)
Dec 6
D. Basin (Cas Cremers and Christoph Sprenger)
14:00 - 15:00


15:00 - 16:00
Chipping Away at Censorship Firewalls with User-Generated Content (Esriel Mottus, 2nd run)

Stronger security of authenticated key exchange (Kevin Borgolte)

Dec 13
U. Maurer (Pavel Raykov)
14:00 - 15:00


15:00 - 16:00
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions (Nikolaos Karapanos)

Herding Hash Functions and the Nostradamus Attack (Milan Campara)
Dec 20
  Back up slot
 

Wichtiger Hinweis:
Diese Website wird in älteren Versionen von Netscape ohne graphische Elemente dargestellt. Die Funktionalität der Website ist aber trotzdem gewährleistet. Wenn Sie diese Website regelmässig benutzen, empfehlen wir Ihnen, auf Ihrem Computer einen aktuellen Browser zu installieren. Weitere Informationen finden Sie auf
folgender Seite.

Important Note:
The content in this site is accessible to any browser or Internet device, however, some graphics will display correctly only in the newer versions of Netscape. To get the most out of our site we suggest you upgrade to a newer browser.
More information

© 2011 ETH Zurich | Imprint | Disclaimer | 1 December 2010
top