ETH Zuerich - Homepage
Information Security

Current Topics in Information Security

Master in Information Security

For more information about the Information Security Master Track visit:

251-0409-00 S
Fall Semester 2009
D. Basin, S. Capkun, U. Maurer, B. Plattner


Course Description

The seminar covers various topics in information security: security protocols (models, specification & verification), trust management, access control, non-interference, side-channel attacks, identity-based cryptography, host-based attack detection, anomaly detection in backbone networks, key-management for sensor networks.


at least one of


The main goals of the seminar are the independent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques.


The seminar covers various topics in information security, including network security, cryptography and security protocols. The participants are expected to read a scientific paper and present it in a 35-40 min talk. At the beginning of the semester a short introduction to presentation techniques will be given.

Topics covered include

The reading list will be published on the course web site.


2 ECTS credits


Time: Mondays, 14:15-16:00 (starting 28 September 2009)
Place: IFW A34


Graded semester performance

Schedule (tentative)

(see the list of papers for details on each topic)

Sep 28

Introduction to seminar topics,
assignment of papers to participants
Oct. 5   No lecture.
Oct. 12 14:00 - 14:45

15:00 - 15:45
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers (Peter K. Brandt)

Privacy-Preserving Remote Diagnostics (Mahdi Asadpour)
Oct. 19 14:00 - 14:45

15:00 - 15:45
Vanish: Increasing Data Privacy with
Self-Destructing Data (Luka Malisa)

Dialog Codes for Secure Wireless
Communications (Pascal Sachs)
Oct. 26 14:00 - 14:45

15:00 - 15:45
Hardening Functions for Large Scale
Distributed Computations (Stephen Ackermann)

A Practical Message Falsification Attack
on WPA (Mat Onur)
Nov. 2 13:30 - 14:15 Stronger Security of Authenticated Key Exchange (Lucas Braun)
  14:15 - 15:00 The Inductive Approach to Verifying Cryptographic Protocols (Andreas Ruedlinger)
  15:15 - 16:00 Model checking SPKI/SDSI (Tobias Heinzen)
Nov. 9 14:15 - 15:00 DKAL: Distributed-Knowledge Authorization Language (Ivo Colombo)
  15:15 - 16:00 Enforceable Security Properties (Raphael Tawil)
Nov. 16 14:15 - 15:00 802.11 user fingerprinting (Adrian Schmidmeister)
  15:15 - 16:00 Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations (Panayiota Chapoupi)
Nov. 23 13:15 - 14:00 Secret Sharing Scheme Realizing General Access Structure (Simona Mockute)
  14:15 - 15:00 Generalized Secret Sharing and Monotone Functions (Ueli Ehrbar)
  15:15 - 16:00 A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0 (Peter Hladky)
Nov. 30 13:15 - 14:00 The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) (Daniela Meier)
  14:15 - 15:00 Second Preimages on n-Bit Hash Functions for Much Less than 2^n Work (Mathieu Pretre)
  15:15 - 16:00 Herding Hash Functions and the Nostradamus Attack (Michael Belfrage)
Dec. 7 14:15 - 15:00 What's going on? Learning communication rules in edge networks (Pia Windisch)
  15:15 - 16:00 Effective and Efficient Malware Detection at the End Host (Dominik Rüegger)
Dec. 14 13:30 - 14:15 DKAL: Distributed-Knowledge Authorization Language (Ivo Colombo)
  14:15 - 15:00 Mapping internet sensors with probe response attacks (Dominique Im Obersteg)
  15:15 - 16:00 Spamming Botnets: Signatures and Characteristics (Frank Walter)

Wichtiger Hinweis:
Diese Website wird in älteren Versionen von Netscape ohne graphische Elemente dargestellt. Die Funktionalität der Website ist aber trotzdem gewährleistet. Wenn Sie diese Website regelmässig benutzen, empfehlen wir Ihnen, auf Ihrem Computer einen aktuellen Browser zu installieren. Weitere Informationen finden Sie auf
folgender Seite.

Important Note:
The content in this site is accessible to any browser or Internet device, however, some graphics will display correctly only in the newer versions of Netscape. To get the most out of our site we suggest you upgrade to a newer browser.
More information

© 2011 ETH Zurich | Imprint | Disclaimer | 10 December 2009