|
Master in Information Security
For more information about the Information Security Master Track visit: http://www.infsecmaster.ethz.ch
251-0409-00 (2S)
Fall Semester 2008
D. Basin, S. Capkun, U. Maurer, B. Plattner
The seminar covers various topics in information security: security protocols (models, specification & verification), trust management, access control, non-interference, side-channel attacks, identity-based cryptography, host-based attack detection, anomaly detection in backbone networks, key-management for sensor networks.
at least one of
The main goals of the seminar are the independent study of scientific
literature and assessment of its contributions as well as learning and
practicing presentation techniques.
The seminar covers various topics in information security, including
network security, cryptography and security protocols. The participants
are expected to read a scientific paper and present it in a 35-40 min
talk. At the beginning of the semester a short introduction to
presentation techniques will be given.
The reading list will be published on the course web site.
4 ECTS credits
Time: Mondays, 14:15-16:00 (starting 22 September 2008)
Place: IFW A34
Graded semester performance
(see the list of papers for details on each topic)
Sep 22 |
Introduction to seminar topics, assignment of papers to participants |
|
Sep 29 14:15 - 18:00 |
Guidelines/course of how to give a presentation. | |
Oct 6 |
no seminar |
|
Oct 13 |
Operational Semantics of Security Protocols | (Adrian Kyburz) |
SDSIrep: A Reputation System Based on SDSI | (Florian Widmer) | |
Oct 20 |
||
Oct 27 |
Secure Multi-party Computation Made Simple | (Florian Leu) |
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 | (Emre Yilmaz) | |
Nov 3 | ||
14:15 - 15:00 | Provable Data Storage at Untrusted Stores | (Basil Hess) |
15:15 - 16:00 | Remote Physical Device Fingerprinting | (Arthur Schmitt) |
Nov 10 | ||
14:15 - 15:00 | Distance Bounding in Noisy Environments | (Markus Eckert) |
15:15 - 16:00 | Secure Time Synchronization in Sensor Networks | (Claudio Marforio) |
Nov 17 |
||
14:15 - 15:00 |
Mixminion: Design of a Type III Anonymous Remailer Protocol |
(Luciano Franceschina) |
15:15 - 16:00 | Integrity Codes: Message Integrity Protection and Authentication over insecure channels | (Stefan Schneider) |
Nov 24 | ||
14:15 - 15:00 | Spamming Botnets: Signatures and Characteristics | (Sami Galal) |
Dec 1 |
||
14:15 - 15:00 | Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations | (Lars Krapf) |
15:15 - 16:00 | Mapping internet sensors with probe response attacks | (Eugene Filimon) |
Dec 8 |
Protocol Interactions and the Chosen Protocol Attack | (Lukas Flubacher) |
Enforceable Security Policies | (Nils Blattner) | |
Specifying and Reasoning about Dynamic-Control Policies | (Amin Baumeler) | |
Dec 15 |
no seminar; instead there are 3 talks on Dec 8th. |
Wichtiger Hinweis:
Diese Website wird in älteren Versionen von Netscape ohne
graphische Elemente dargestellt. Die Funktionalität der
Website ist aber trotzdem gewährleistet. Wenn Sie diese
Website regelmässig benutzen, empfehlen wir Ihnen, auf
Ihrem Computer einen aktuellen Browser zu installieren. Weitere
Informationen finden Sie auf
folgender
Seite.
Important Note:
The content in this site is accessible to any browser or
Internet device, however, some graphics will display correctly
only in the newer versions of Netscape. To get the most out of
our site we suggest you upgrade to a newer browser.
More
information