SyS

4TU.CybSec Syllabus System Security (SyS)
4TU Delft
4TU Eindhoven
4TU Twente
4TU Wageningen

Credits: 5EC

Prerequisites: Click the checklist “Do I meet the prerequisites?”

  • Language based Security (CS4105) or Software Security (UT201600051) and
  • Security and Cryptography (IN4191) and
  • Network Security (ET4397IN) or Internet Security (192654000) and
  • A bachelor level Operating Systems course

Capacity: 30 students maximum in Twente and 20 students maximum in Delft. EIT Digital Cyber Security and 4TU.CybSec students have priority. Please email the lecturers if you want to sign up.

Motivation: Computers, ranging from smart cards, via mobile devices and PCs to powerful servers consist of complex hardware, firmware and software that is vulnerable to a large variety of attacks. Existing protection mechanisms provide a base line of security but new attacks appear every day, demanding new approaches to mitigate the risks.

Synopsis: The systems security covers the security of all layers from the hardware to the operating system, exploring the security problems and solutions at each layer as well as the interplay between the layers. Some problems are due to bugs, others are due to intricate interactions between system components, and some are due to design errors or poor management and maintenance.

 Learning outcomes: The student will acquire:

  • An appreciation of the security architecture of computer systems
  • Detailed knowledge of the security of a specific operating system
  • Skills in exploiting vulnerabilities of computer systems
  • Skills in developing counter measures against exploits

 Language: The course is taught in English.

 Lecturers: Dr Erik Tews (UT) and Dr Stjepan Picek (TUD)

 Contact hours: 2 hours per week lectures, 4 hours per week lab

 Examination: 50% lab work and 50% written open book examination.

 Contents:  Malware (polymorphism & packers, Ransom ware, Zero days); Counter measures (host based intrusion detection, signature & anomaly based detection);  Hardware, embedded system and IoT security (tamper resistant hardware, physically unclonable functions, trusted platform module, trusted boot, resource tradeoffs, State of the art attacks on IoT); Covert channels (side channel attacks, timing & caches, power, co-tenancy); Secure systems engineering (virtualisation, sandboxing, dockerisation)

Core text: Various pares from the literature.

Core system: We propose to base the course and the practical assignments on Linux. Students may be asked to purchase a cheap, X86 single board computer; alternatively VM images will be provided that students must be able to run on their laptops. 

Credits: 5EC

Prerequisites: Click the checklist “Do I meet the prerequisites?”

  • Language based Security (CS4105) or Software Security (UT201600051) and
  • Security and Cryptography (IN4191) and
  • Network Security (ET4397IN) or Internet Security (192654000) and
  • A bachelor level Operating Systems course

Capacity: 30 students maximum in Twente and 20 students maximum in Delft. EIT Digital Cyber Security and 4TU.CybSec students have priority. Please email the lecturers if you want to sign up.

Motivation: Computers, ranging from smart cards, via mobile devices and PCs to powerful servers consist of complex hardware, firmware and software that is vulnerable to a large variety of attacks. Existing protection mechanisms provide a base line of security but new attacks appear every day, demanding new approaches to mitigate the risks.

Synopsis: The systems security covers the security of all layers from the hardware to the operating system, exploring the security problems and solutions at each layer as well as the interplay between the layers. Some problems are due to bugs, others are due to intricate interactions between system components, and some are due to design errors or poor management and maintenance.

 Learning outcomes: The student will acquire:

  • An appreciation of the security architecture of computer systems
  • Detailed knowledge of the security of a specific operating system
  • Skills in exploiting vulnerabilities of computer systems
  • Skills in developing counter measures against exploits

 Language: The course is taught in English.

 Lecturers: Dr Erik Tews (UT) and Dr Stjepan Picek (TUD)

 Contact hours: 2 hours per week lectures, 4 hours per week lab

 Examination: 50% lab work and 50% written open book examination.

 Contents:  Malware (polymorphism & packers, Ransom ware, Zero days); Counter measures (host based intrusion detection, signature & anomaly based detection);  Hardware, embedded system and IoT security (tamper resistant hardware, physically unclonable functions, trusted platform module, trusted boot, resource tradeoffs, State of the art attacks on IoT); Covert channels (side channel attacks, timing & caches, power, co-tenancy); Secure systems engineering (virtualisation, sandboxing, dockerisation)

Core text: Various pares from the literature.

Core system: We propose to base the course and the practical assignments on Linux. Students may be asked to purchase a cheap, X86 single board computer; alternatively VM images will be provided that students must be able to run on their laptops. 

SyS

Credits: 5EC

Prerequisites: Click the checklist “Do I meet the prerequisites?”

  • Language based Security (CS4105) or Software Security (UT201600051) and
  • Security and Cryptography (IN4191) and
  • Network Security (ET4397IN) or Internet Security (192654000) and
  • A bachelor level Operating Systems course

Capacity: 30 students maximum in Twente and 20 students maximum in Delft. EIT Digital Cyber Security and 4TU.CybSec students have priority. Please email the lecturers if you want to sign up.

Motivation: Computers, ranging from smart cards, via mobile devices and PCs to powerful servers consist of complex hardware, firmware and software that is vulnerable to a large variety of attacks. Existing protection mechanisms provide a base line of security but new attacks appear every day, demanding new approaches to mitigate the risks.

Synopsis: The systems security covers the security of all layers from the hardware to the operating system, exploring the security problems and solutions at each layer as well as the interplay between the layers. Some problems are due to bugs, others are due to intricate interactions between system components, and some are due to design errors or poor management and maintenance.

 Learning outcomes: The student will acquire:

  • An appreciation of the security architecture of computer systems
  • Detailed knowledge of the security of a specific operating system
  • Skills in exploiting vulnerabilities of computer systems
  • Skills in developing counter measures against exploits

 Language: The course is taught in English.

 Lecturers: Dr Erik Tews (UT) and Dr Stjepan Picek (TUD)

 Contact hours: 2 hours per week lectures, 4 hours per week lab

 Examination: 50% lab work and 50% written open book examination.

 Contents:  Malware (polymorphism & packers, Ransom ware, Zero days); Counter measures (host based intrusion detection, signature & anomaly based detection);  Hardware, embedded system and IoT security (tamper resistant hardware, physically unclonable functions, trusted platform module, trusted boot, resource tradeoffs, State of the art attacks on IoT); Covert channels (side channel attacks, timing & caches, power, co-tenancy); Secure systems engineering (virtualisation, sandboxing, dockerisation)

Core text: Various pares from the literature.

Core system: We propose to base the course and the practical assignments on Linux. Students may be asked to purchase a cheap, X86 single board computer; alternatively VM images will be provided that students must be able to run on their laptops. 

Credits: 5EC

Prerequisites: Click the checklist “Do I meet the prerequisites?”

  • Language based Security (CS4105) or Software Security (UT201600051) and
  • Security and Cryptography (IN4191) and
  • Network Security (ET4397IN) or Internet Security (192654000) and
  • A bachelor level Operating Systems course

Capacity: 30 students maximum in Twente and 20 students maximum in Delft. EIT Digital Cyber Security and 4TU.CybSec students have priority. Please email the lecturers if you want to sign up.

Motivation: Computers, ranging from smart cards, via mobile devices and PCs to powerful servers consist of complex hardware, firmware and software that is vulnerable to a large variety of attacks. Existing protection mechanisms provide a base line of security but new attacks appear every day, demanding new approaches to mitigate the risks.

Synopsis: The systems security covers the security of all layers from the hardware to the operating system, exploring the security problems and solutions at each layer as well as the interplay between the layers. Some problems are due to bugs, others are due to intricate interactions between system components, and some are due to design errors or poor management and maintenance.

 Learning outcomes: The student will acquire:

  • An appreciation of the security architecture of computer systems
  • Detailed knowledge of the security of a specific operating system
  • Skills in exploiting vulnerabilities of computer systems
  • Skills in developing counter measures against exploits

 Language: The course is taught in English.

 Lecturers: Dr Erik Tews (UT) and Dr Stjepan Picek (TUD)

 Contact hours: 2 hours per week lectures, 4 hours per week lab

 Examination: 50% lab work and 50% written open book examination.

 Contents:  Malware (polymorphism & packers, Ransom ware, Zero days); Counter measures (host based intrusion detection, signature & anomaly based detection);  Hardware, embedded system and IoT security (tamper resistant hardware, physically unclonable functions, trusted platform module, trusted boot, resource tradeoffs, State of the art attacks on IoT); Covert channels (side channel attacks, timing & caches, power, co-tenancy); Secure systems engineering (virtualisation, sandboxing, dockerisation)

Core text: Various pares from the literature.

Core system: We propose to base the course and the practical assignments on Linux. Students may be asked to purchase a cheap, X86 single board computer; alternatively VM images will be provided that students must be able to run on their laptops.