Lecture Type
Basic Lecture
Advisors
Fabian Bendun (part: Cryptography)
Oliver Schranz , Sven Bugiel (part: System Security)
Erik Derr , Milivoj Simeonovski (part: Network Security)
Tutors
Joshua Steffensky
Peter Axt
Marius Steffens
Alexander Rassier
Christian Thiel
Time/Place
Thursday 14 – 16, Building E1 3, HS 001
L:Admin
Tutors’ office hour
Tuesday 13 – 14, Building E1 3, CIP-R 104
Language
English
Grundlagen der Cybersicherheit

Latest News

  • 03.11.2015: Room for tutorial 2 has changed!
  • 02.11.2015: Added 5th tutorial slot
  • 14.10.2015: Information on exam dates, tutorial slots, and lecture topics
  • 14.10.2015: The website is online

Description

Students learn the basics of cryptography, system security, network security and privacy-preserving mechanisms. They learn to define security goals and are familiarized with the most common attack scenarios.

Topics

  • Basics of cryptography
  • Basics of system security
  • Basics of network security
  • Basics of privacy-preserving mechanisms

Mailing List

There is a mailing list that you can use for general discussions and to ask questions. The mailing list’s address is:

cysec14(aeht)mail-infsec.cs.uni-saarland.de

You will get subscribed to the mailing list upon registering for the lecture.

Tutorials

ID Day Time Room TA
1 Wed 14-16 SR 107 (E1 3) Joshua Steffensky
2 Mon 12-14 U 11 (E2 5) Peter Axt
3 Fri 12-14 SR 016 (E1 3) Marius Steffens
4 Wed 16-18 SR 107 (E1 3) Alexander Rassier
5 Fri 14-16 SR 014 (E1 3) Christian Thiel

Assignments and Grading

There will be both theoretical exercise sheets and practical projects. For passing the course, the following minimal amount of points is needed:

  • 50% of the points from the theoretical exercise sheets; and
  • 50% of the points from the practical projects; and
  • 50% of the points from the final exam.

To be admitted to the exam, you need at least 50% of the points from the theoretical exercise sheets and 50% of the points from the practical projects.

The final exam will take place on 24 February 2016 , 9:00-12:00 , in the Günter-Hotz-Hörsaal , building E2 2. The backup exam will take place 30 March 2016 , 9:00-12:00 , in the Günter-Hotz-Hörsaal , building E2 2.

Your final grade (in percent) G is calculated by

  • G = 0.2P + 0.2T + 0.6 max{F,B}

where P is the final percentage from your practical projects, T is the final percentage from your theoretical exercises, F is the final percentage from your final exam and B is the final percentage from your backup exam.

Lecture Notes

Date Slides Theoretical exercise Practical project Material and remarks
29.10.2015 Welcome lecture & Cryptography: Introduction and History Exercise sheet 1 (due: 5 Nov 2015)
Solution of exercise sheet 1
Slide set 1
Slide set 1 (three on one)
Lecture Notes
5.11.2015 System Security: Security Principles & Authentication Exercise sheet 2 (due: 12 Nov 2015)
Solution of exercise sheet 2
Slide set 2
Slide set 2 (three on one)
12.11.2015 System Security: Access Control & Malware Exercise sheet 3 (due: 19 Nov 2015)
Solution of exercise sheet 3
Slide set 3
Slide set 3 (three on one)
19.11.2015 System Security: Control-flow hijacking Exercise sheet 4 (due: 03 Dec 2015)
buffer.ova
Solution of exercise sheet 4
Slide set 4
Slide set 4 (three on one)
Transcript Exploit Demo
26.11.2015 Network Security: Basic Network Security and Defenses Exercise sheet 5 (due: 10 Dec 2015)

Trace file
Solution of exercise sheet 5
Slide set 5
Slide set 5 (three on one)
3.12.2015 no lecture
10.12.2015 Network Security: Web Application Security Exercise sheet 6 (due: 17 Dec 2015)
Solution of exercise sheet 6
Slide set 6
Slide set 6 (three on one)
17.12.2015 Cryptography: Symmetric Cryptography Exercise sheet 7 (due: 07 Jan 2016)

Solution of exercise sheet 7
Slide set 7
Slide set 7 (three on one)

Lecture Notes
24.12.2015 no lecture Christmas vacation
31.12.2015 no lecture Christmas vacation
7.1.2016 Cryptography: MACs and Hashes Exercise sheet 8 (due: 14 Jan 2016)

Solution of exercise sheet 8
Slide set 8
Slide set 8 (three on one)

Lecture Notes
14.1.2016 Cryptography: Mathematical Foundations and Asymmetric Cryptography I Exercise sheet 9 (due: 21 Jan 2016)

Solution of exercise sheet 9
Slide set 9
Slide set 9 (three on one)

Lecture Notes
21.1.2016 Cryptography:Asymmetric Cryptography II; Privacy: Network Anonymity Exercise sheet 10 (due: 28 Jan 2016)

Solution of exercise sheet 10
Slide set 10
Slide set 10 (three on one)
Lecture Notes
28.1.2016 no lecture Lecture Cancelled
4.2.2016 Privacy: Network Anonymity and Database Privacy Exercise sheet 11 (due: 11 Feb 2016)
Solution of exercise sheet 11
Exercise sheet 11b (due: 15 Feb 2016, 2pm)
MD.sig MD.sml
Solution of exercise sheet 11b
good evil
Slide set 11
Slide set 11 (three on one)
11.2.2016 Special lecture