direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Inhalt des Dokuments

Embedded Systems Security Lab

Embedded Systems Security Lab (SecLab) canceled in SS 2020

Because the Embedded Systems Security Lab (SecLab) can not be given in an online fashion, it will not take place in the upcoming semester (SS 2020).

Embedded Systems Security Lab (SecLab) canceled in WS 19/20

Due to restructuring of our syllabus, the Embedded Systems Security Lab (SecLab) will not take place in the upcoming semester (WS 19/20). Interested students can instead participate in the IT Security Lab: Vulnerability Assessment. Watch out for announcements on our homepage.

UPDATE 3.10.2019: The IT Security Lab: Vulnerability Assessment will only take place in the next summer term.

In case you have to repeat the SecLab, please contact us at "". We will ensure that those who have to repeat the SecLab can do so (Note, expect an delay in answers until the 31st of September, due to vacation).

Course Overview

6 ECTS / 4 SWS
Teaching Period
Summer and Winter semesters
Prof. Jean-Pierre Seifert, Robert Buhren

Course ID
0434 L 972
TEL Audi 3 (20th floor)
Thursday, 10 - 12 hrs (weekly)
The security lab offers students the opportunity to learn how to analyze the system security of Linux-based systems, with a focus on embedded systems. It covers topics from hardware security and debug facilities and then moves on to software security issues in applications and finally the kernel.
Students will have to solve multiple challenges, where a system has to be analyzed and then compromised. Basic Linux and C programming knowledge is required.
The lab is organized as a practical course (PR) and students will be working individually with an ARM development board (Raspberry Pi II).

* Serial interface
* ARM introduction
* JTAG hardware debugging interface
* OpenOCD, BusPirate
* Software debugging with GDB
* Linux security tools
* Applied public key cryptography, certificates and signatures
* (Advanced) shellcode
* Format string vulnerabilities
* NX/XD/XN, ASLR, stack canaries
* ELF binary format
* Heap
* Integer overflows
* Kernel security
Linux and C programming knowledge is required
Target Audience
Students interested in hardware and software security with a focus on embedded systems and Linux
Course Language
Contact Information
Robert Buhren

Nach oben

Zusatzinformationen / Extras


Schnellnavigation zur Seite über Nummerneingabe

Postal Address

Technische Universität Berlin - An-Institut Telekom Innovation Laboratories
Fakultät IV
Sekr. TEL16
Ernst-Reuter-Platz 7
10587 Berlin


Claudia Petzsch
+49 - 30 - 8353 58 681
Raum TEL16