Course teacher(s)
Jan Tobias Mühlberg (Coordinator)ECTS credits
5
Language(s) of instruction
english
Course content
- Low-level vulnerabilities and defences in software and hardware
- Vulnerabilities and defences in light-weight embedded systems
- Automated detection, exploitation, and prevention of vulnerabilities in software
- System security and secure hardware
- Sustainability aspects in security and privacy engineering
- Security assessment techniques
Objectives (and/or specific learning outcomes)
The course strives to link theoretical knowledge with current industry practice and will feature a few interventions from guest lecturers who highlight and discuss recent industry trends, as well as a number of exercises and self-study tasks to provide hands-on experience and to deepen the students' knowledge on more specialised subjects.
The course is open to engineers/computer scientists from different backgrounds: computer sciences, computer engineering, telecommunications, and others.
Prerequisites and Corequisites
Required and Corequired knowledge and skills
- Understanding of processor architectures and computer systems
- Understanding of operating systems, processes, memory management, concurrency
- Programming skills, preferably some background in Rust/C/C++/Assembly
Teaching methods and learning activities
The course involves students in group projects to identify challenging problems in embedded systems security through extensive reading, practical challenges, and discussion.
Laboratories and self-study exercises include:
- Exploration and exploitation of software-level vulnerabilities
- Software fuzzing as a means to automatically detect vulnerabilities
- Exploration of defensive techniques to harden embedded software
- Research project on Internet of Things technology
References, bibliography, and recommended reading
- Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition, Ross Anderson, 2020: https://www.cl.cam.ac.uk/~rja14/book.html
- Threat Modeling: Designing for Security, Adam Shostack, 2014: https://shostack.org/books/threat-modeling-book
Course notes
- Université virtuelle
Other information
Contacts
Jan Tobias Muehlberg <jan.tobias.muehlberg@ulb.be>
Campus
Solbosch
Evaluation
Method(s) of evaluation
- Oral examination
- Oral presentation
Oral examination
- Examination with preparation
- Open question with short answer
Oral presentation
Language(s) of evaluation
- english