PV204 Security Technologies

Faculty of Informatics
Spring 2016
Extent and Intensity
2/2/2. 6 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium), z (credit).
Teacher(s)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Ing. Milan Brož, Ph.D. (lecturer)
Mgr. Vít Bukač, Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
RNDr. Václav Lorenc (seminar tutor), doc. RNDr. Petr Švenda, Ph.D. (deputy)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: doc. RNDr. Petr Švenda, Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Thu 8:00–9:50 A217
  • Timetable of Seminar Groups:
PV204/01: Thu 10:00–11:50 A403, Z. Říha, P. Švenda
PV204/02: Thu 14:00–15:50 A403, Z. Říha, P. Švenda
PV204/03: Thu 16:00–17:50 A403, Z. Říha, P. Švenda
Prerequisites
Registration to PV204 requires: 1) long-term interest in IT security; 2) programming skills (ideally C and Java) under Unix/Linux or Windows; 3) fluent English.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 36 student(s).
Current registration and enrolment status: enrolled: 0/36, only registered: 0/36, only registered with preference (fields directly associated with the programme): 0/36
fields of study / plans the course is directly associated with
there are 33 fields of study the course is directly associated with, display
Course objectives
The aim of this subject is to understand details of smart cards security, secure authentication and authorization, security of hardware modules, trusted boot, analysis of malware and rootkits (both black-box and gray-box), reverse engineering of binary applications, multilevel security and file/disk encryption. Student should be able to apply the gained knowledge in a practice based on experience gained from laboratory a project work.
Syllabus
  • Side channel attacks (timing, power and fault analysis)
  • Basics of smart cards (PC/SC, APDU, basic applet – JavaCard & .net card & MULTOS)
  • Secure programs on JavaCard platform
  • Secure authentication and authorization (common protocols, secure implementation, attacks)
  • Hardware Security Modules (HSM), PKCS#11 API
  • Trusted boot (TPM, trusted boot process, remote attestation)
  • Black-box analysis of malware (infection vectors, analysis of environment, network analysis)
  • Grey-box analysis of malware (analysis of memory dumps, tools)
  • Reverse engineering of binary applications (decompiler, disassembler, native-code debugging, binary patching)
  • Windows and Linux Rootkits (User-mode, kernel-mode, Hypervisor-level, software vs. hardware level, bootkits)
  • Multilevel security (isolation, confinement, security kernels)
  • File and disk encryption (Common architectures, used cryptographic modes, typical attacks)
Teaching methods
lectures, seminars in a security lab, homeworks
Assessment methods
Two hours per week are scheduled for lecture, two hours per week scheduled for seminars, otherwise students work on projects, homework etc. in their free time. There are 6 homeworks and collaborative project. 50 % of points are required to pass the course.
Language of instruction
English
Follow-Up Courses
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
The course is also listed under the following terms Spring 2008, Spring 2009, Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014, Spring 2015, Spring 2017, Spring 2018, Spring 2019, Spring 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.
  • Enrolment Statistics (Spring 2016, recent)
  • Permalink: https://is.muni.cz/course/fi/spring2016/PV204