printlogo
ETH Zuerich - Homepage
Information Security
 
print
  

Current Topics in Information Security

Master in Information Security

For more information about the Information Security Master Track visit: http://www.infsecmaster.ethz.ch

251-0409-00 (2S)
Fall Semester 2008
D. Basin, S. Capkun, U. Maurer, B. Plattner

Announcements

Course Description

The seminar covers various topics in information security: security protocols (models, specification & verification), trust management, access control, non-interference, side-channel attacks, identity-based cryptography, host-based attack detection, anomaly detection in backbone networks, key-management for sensor networks.

Prerequisites

at least one of

Objectives

The main goals of the seminar are the independent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques.

Content

The seminar covers various topics in information security, including network security, cryptography and security protocols. The participants are expected to read a scientific paper and present it in a 35-40 min talk. At the beginning of the semester a short introduction to presentation techniques will be given.

Topics covered include
Literature

The reading list will be published on the course web site.

Grading

4 ECTS credits

Lectures

Time: Mondays, 14:15-16:00 (starting 22 September 2008)
Place: IFW A34

Exam

Graded semester performance

Schedule (tentative)

(see the list of papers for details on each topic)

Sep 22
Introduction to seminar topics,
assignment of papers to participants
 
Sep 29
14:15 - 18:00
Guidelines/course of how to give a presentation.  
Oct 6
no seminar
 
Oct 13
Operational Semantics of Security Protocols (Adrian Kyburz)
  SDSIrep: A Reputation System Based on SDSI (Florian Widmer)
Oct 20
   
Oct 27
Secure Multi-party Computation Made Simple (Florian Leu)
  Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 (Emre Yilmaz)
Nov 3    
14:15 - 15:00 Provable Data Storage at Untrusted Stores (Basil Hess)
15:15 - 16:00 Remote Physical Device Fingerprinting (Arthur Schmitt)
Nov 10    
14:15 - 15:00 Distance Bounding in Noisy Environments (Markus Eckert)
15:15 - 16:00 Secure Time Synchronization in Sensor Networks (Claudio Marforio)
Nov 17
   
14:15 - 15:00
Mixminion: Design of a Type III Anonymous Remailer Protocol
(Luciano Franceschina)
15:15 - 16:00 Integrity Codes: Message Integrity Protection and Authentication over insecure channels (Stefan Schneider)
Nov 24    
14:15 - 15:00 Spamming Botnets: Signatures and Characteristics (Sami Galal)
Dec 1
   
14:15 - 15:00 Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations (Lars Krapf)
15:15 - 16:00 Mapping internet sensors with probe response attacks (Eugene Filimon)
Dec 8
Protocol Interactions and the Chosen Protocol Attack (Lukas Flubacher)
  Enforceable Security Policies (Nils Blattner)
  Specifying and Reasoning about Dynamic-Control Policies (Amin Baumeler)
Dec 15
no seminar; instead there are 3 talks on Dec 8th.  
 

Wichtiger Hinweis:
Diese Website wird in älteren Versionen von Netscape ohne graphische Elemente dargestellt. Die Funktionalität der Website ist aber trotzdem gewährleistet. Wenn Sie diese Website regelmässig benutzen, empfehlen wir Ihnen, auf Ihrem Computer einen aktuellen Browser zu installieren. Weitere Informationen finden Sie auf
folgender Seite.

Important Note:
The content in this site is accessible to any browser or Internet device, however, some graphics will display correctly only in the newer versions of Netscape. To get the most out of our site we suggest you upgrade to a newer browser.
More information

© 2011 ETH Zurich | Imprint | Disclaimer | 27 November 2008
top