Secure and Dependable Systems

About

  • Course: Secure and Dependable Systems (CO-566)
  • Semester: Spring 2023
  • Prerequisites: Operating Systems (CO-562)
  • Instructor: Jürgen Schönwälder
  • Office Hours: Monday, 11:15-12:30, R.1-87
  • TA: Bodaveli, Nikolozi
  • Class: Tuesday, 15:45-17:00, RLH-172 Conrad Naber Lecture Hall
  • Class: Thursday, 15:45-17:00, RLH-172 Conrad Naber Lecture Hall
  • 1st Module Exam: 2023-05-23 18:00-20:00, ICC East Wing
  • 2nd Module Exam: 2023-08-29 14:00-16:00, Research I, Lecture Hall

Content and Educational Aims

This module introduces students to the fundamentals of computer security and techniques used to build and analyze dependable systems. This is an important topic given that computer systems are increasingly embedded in everyday objects (such as light bulbs) and taking over important control functions (such as driving cars). Furthermore, computer systems control complex communication systems that form critical infrastructure of the modern globalized world. Proper protection of information requires an applied understanding of cryptography and how cryptographic primitives are used to secure data and information exchanges. The aim of this module is to make students aware of what types of security vulnerabilities may arise in computing systems and how to prevent, identify, and fix them.

Intended Learning Outcomes

By the end of this module, students will be able to

  • recall dependability terminology and concepts;
  • explain control flow attacks and injection attacks and defense mechanisms;
  • describe network data plane and control plane attacks and defense mechanisms;
  • understand symmetric and asymmetric cryptographic algorithms;
  • explain how digital signatures and public key infrastructures work;
  • analyze key exchange protocols for weaknesses;
  • describe secure network protocols (e.g., PGP, TLS, and SSH);
  • recall anonymity terminology and concepts;
  • discuss information hiding mechanisms (e.g., steganography, and watermarking);
  • illustrate anonymization techniques (mixes, onion routing);

Literature

  • Bruce Schneier: Applied Cryptography, 20th Anniversary Edition, Wiley, 2015
  • Wm.Arthur Conklin, Gregory White: Principles of Computer Security, 5th Edition, McGraw-Hill, 2018
  • Simon Singh: The Code Book: Science of Secrecy from Ancient Egypt to Quantum Cryptography, Anchor Books, 2000
  • Dan Boneh and Victor Shoup: A Graduate Course in Applied Cryptography, 2023

Schedule

Tue 15:45 Thu 15:45 Topics
2023-02-02 Recent Computing Disasters
2023-02-07 2023-02-09 Recent Computing Disasters and Dependability Concepts
2023-02-14 2023-02-16 Software Engineering Aspects, Software Verification
2023-02-21 2023-02-23 Software Testing and Software Security by Design
2023-02-28 2023-03-02 Software Vulnerabilities, Control Flow Attacks, Code Injection Attacks
2023-03-07 2023-03-09 Software and Network Vulnerabilities, Denial of Service
2023-03-14 2023-03-16 Network Vulnerabilities, Data and Control Plane Vulnerabilities
2023-03-21 2023-03-23 Cryptography, Block Ciphers, Symmetric Encryption Algorithms
2023-03-28 2023-03-30 Asymmetric Encryption Algorithms, Cryptographic Hash Functions
2023-04-04 2023-04-06 [Spring Break]
2023-04-11 2023-04-13 Digital Signatures, Certificates, Key Exchange Schemes
2023-04-18 2023-04-20 Pretty Good Privacy, Secure Shell
2023-04-25 2023-04-27 Transport Layer Security
2023-05-02 2023-05-04 Steganography, Covert Channels, Anonymity, Mix Networks and Onion Routing
2023-05-09 2023-05-11 Authentication, Authorization Auditing, Isolation, Trusted Computing

Assignments

Date/Due Name Topics
2023-02-16 Sheet 01 system reliability calculation
2023-02-23 Sheet 02 test coverages, fuzzying
2023-03-02 Sheet 03 x86_64 assembly and stack frames
2023-03-10 Sheet 04 compiler hardening, SQL injection, CVSS scores
2023-03-17 Sheet 05 network exploration and reconnaissance (virtual machine)
2023-03-24 Sheet 06 denial of service and network packet filtering
2023-03-31 Sheet 07 feistel network and substitution/permutation network (p07-scrypt.zip)
2023-04-14 Sheet 08 block encryption modes of operation
2023-04-21 Sheet 09 RSA decryption, DH key exchange, SHA proof of work
2023-04-28 Sheet 10 elliptic curve cryptography
2023-05-05 Sheet 11 TLS connection establishment
2023-05-12 Sheet 12 password guessing, access control lists and capabilities

Rules

The final grade is determined by a final exam (100%). There will be weekly marked homework assignments, each worth 10 points. Regular submission of good solutions for homework assignments can lead to bonus points. Bonus points can improve the final grade but they cannot turn a failing grade into a passing grade and they are limited to a maximum of 10 percent of the grade (see the undergraduate education policies). The usual rules for (medical) excuses apply.

The bonus b is derived from the points p earned in the homeworks as follows. For p in [0..50) points, the bonus is 0. For p in [50..100] points, the bonus b = p / 10. For p > 100, the b = 10. Bonus points can improve the final grade but they can't turn a failing grade into a passing grade and they are limited to a maximum of 10 percent of the grade (see the undergraduate education policies). The usual rules for (medical) excuses apply.

Electronic submission is the preferred way to hand in homework solutions. Please submit documents (plain ASCII/UTF-8 text or PDF, no Word) and your source code (packed into a tar or zip archive after removing all binaries and temporary files) via the online submission system. If you have problems, please contact one of the TAs. Solutions for assignments may need to be defended in an oral interview.

Late submissions will not be accepted. In case you are ill, you have to follow the procedures defined in the university policies to obtain an official excuse. If you obtain an excuse, the new deadline will be calculated as follows:

  1. Determine the number of days you were excused until the deadline day, not counting excused weekend days.
  2. Determine the day of the end of your excuse and add the number of day you obtained in first step. This gives you the initial new deadline.
  3. If the period between the end of your excuse and the new deadline calculated in the second step includes weekend days, add them as well to the new deadline. (Iterate this step if necessary.)

For any questions stated on assignment sheets, quiz sheets, exam sheets or during makeups, we by default expect a reasoning for the answer given, unless explicitly stated otherwise.

Students must submit individual solutions. If you copy material verbatim from the Internet or other sources, you have to provide a proper reference. If we find your solution text on the Internet without a proper reference, you risk to lose your points. Any cheating cases will be reported to the registrar. In addition, you will lose the points (of course). These rules also apply to any generative AI tool, such as ChatGPT.

  1. You are discouraged from using AI tools UNLESS under direct instruction from your instructor to do so.
  2. If AI is permitted to be used, you must clearly state how AI was used in completing the assignments. No more than 25% of an assignment should be created with AI if the instructor gives permission for its use.
  3. Note that the material generated by these programs may be inaccurate, incomplete, or otherwise problematic. Their use may also stifle your own independent thinking and creativity. Accordingly, reduction in the grade is likely when using AI. Rather use your own brain.

Any programs, which have to be written, will be evaluated based on the following criteria:

  • correctness including proper handling of error conditions
  • proper use of programming language constructs
  • clarity of the program organization and design
  • readability of the source code and any output produced

Source code must be accompanied by a README file providing an overview of the source files and giving instructions how to build the programs. A suitable Makefile is required if the build process involves more than a single source file.

If any part of these rules are confusing or uncertain, please reach out to your instructor for a conversation before submitting your work.

If you are unhappy with the grading, please report immediately (within one week) to the TAs. If you can't resolve things, contact the instructor. Problem reports which come late, that is after the one-week period, are not considered anymore.