TU Berlin

Security in TelecommunicationsSecurity Lab

isti-logo

Inhalt des Dokuments

zur Navigation

Security Lab

Embedded Systems Security Lab (SecLab) canceled in SS 2020

Because the Embedded Systems Security Lab (SecLab) can not be given in an online fashion, it will not take place in the upcoming semester (SS 2020).

Embedded Systems Security Lab (SecLab) canceled in WS 19/20

Due to restructuring of our syllabus, the Embedded Systems Security Lab (SecLab) will not take place in the upcoming semester (WS 19/20). Interested students can instead participate in the IT Security Lab: Vulnerability Assessment. Watch out for announcements on our homepage.

UPDATE 3.10.2019: The IT Security Lab: Vulnerability Assessment will only take place in the next summer term.

In case you have to repeat the SecLab, please contact us at "". We will ensure that those who have to repeat the SecLab can do so (Note, expect an delay in answers until the 31st of September, due to vacation).

Course Overview

Credit
6 ECTS / 4 SWS
Teaching Period
Summer and Winter semesters
Lecturer
Prof. Jean-Pierre Seifert, Robert Buhren

Course ID
0434 L 972
Room
TEL Audi 3 (20th floor)
Time
Thursday, 10 - 12 hrs (weekly)
Content
The security lab offers students the opportunity to learn how to analyze the system security of Linux-based systems, with a focus on embedded systems. It covers topics from hardware security and debug facilities and then moves on to software security issues in applications and finally the kernel.
Students will have to solve multiple challenges, where a system has to be analyzed and then compromised. Basic Linux and C programming knowledge is required.
The lab is organized as a practical course (PR) and students will be working individually with an ARM development board (Raspberry Pi II).

TOPICS:
* Serial interface
* ARM introduction
* JTAG hardware debugging interface
* OpenOCD, BusPirate
* Software debugging with GDB
* Linux security tools
* Applied public key cryptography, certificates and signatures
* (Advanced) shellcode
* Format string vulnerabilities
* NX/XD/XN, ASLR, stack canaries
* ELF binary format
* Heap
* Integer overflows
* Kernel security
Prerequisites
Linux and C programming knowledge is required
Target Audience
Students interested in hardware and software security with a focus on embedded systems and Linux
Course Language
English
Contact Information
Robert Buhren

Nach oben

Navigation

Direktzugang

Schnellnavigation zur Seite über Nummerneingabe