Current Term (SS 2018)
Secure Compilation SS 18
This is not a standard seminar, it includes Lectures.
Registration for the course is mandatory, course registration is already open and it ends on 20/04.
Past Terms
Grundlagen der Cybersicherheit WS 17/18
Students learn the basics of cryptography, system security, network security and privacy-preserving mechanisms. They learn to define security goals and are familiarized with the most common attack scenarios.
Joint CISPA Conference Seminar WS 17/18
In this seminar, students will be exposed to a researcher's bread and butter, i.e., publishing their work at a conference. Apart having chosen a topic, each student will independently research the state-of-the-art in the area and write a paper about it. By the deadline, this paper must be submitted to a conference management system for review. At this point, students change the perspective and become reviewers themselves, giving constructive feedback to the papers of other students. Once a paper is accepted, the students are expected to address the comments from the reviewers and submit a camera-ready version of their paper. As the final step in the publication process, each student then presents his or her paper at the conference at the end of the semester.
Formal Models and Techniques for Analyzing Security Protocols SS 17
In this seminar, we will give a thorough and systematic introduction into the current research on protocol verification. It follows the tutorial "Formal Models and Techniques for Analyzing Security Protocols: A Tutorial" by Véronique Cortier and Steve Kremer, and discusses each chapter in a weekly reading group followed by the presentation and discussion of one or two papers from current research that pertain to this chapter. The aim is to provide an insight into cutting edge research while providing the necessary foundation to understand and contextualize it.
Hacking SS 17
Goal of this Proseminar is to give students a deep understanding of the typical security problems and weaknesses that pervade all kinds of IT systems today. To provide a more solid understanding of the discussed attack techniques, this seminar strongly mixes theoretical and practical aspects. On the one hand, participants are conveyed the typical Proseminar learning contents (e.g., presentation techniques, etc.). On the other hand, the participants are required to also introduce and apply established tools for exploiting and attacking IT systems in the context of capture-the-flag styled exercises.
Web Security SS 17
This block course introduces Web security principles for both server and client side. Students are expected to participate in the discussion of state-of-the-art work in each lecture. Moreover, the course features practical exercises each afternoon.
Grundlagen der Cybersicherheit WS 16/17
Students learn the basics of cryptography, system security, network security and privacy-preserving mechanisms. They learn to define security goals and are familiarized with the most common attack scenarios.
Theoretical Aspects of Modern Security & Privacy Research WS 16/17
In this seminar, we will discuss recent theoretical developments in privacy and security research. We will simulate a computer science conference's review process by critically reviewing, presenting and discussing research papers with the participants in a block seminar.
Android Security Lab SS 16
In this practical course, the students deal with different aspects of smartphone security at the example of the open-source Android OS. In general, the awareness and understanding of the students for security and privacy problems in the area of smartphones is increased and they learn to tackle current security and privacy issues on smartphones from the perspectives of different actors in the smartphone ecosystem (e.g., end-users, app developers, market operators, etc.). The focus of this course is on the application-layer of Android.
From Idea to Paper: Usable Security Research in Theory and Practice SS 16
In this course, we will give you introductions into the methods used for usable security and privacy research. We will present you research topics - you are welcome to bring your own ideas! - that focus on usable security and privacy. You will program an application (either mobile or desktop) that helps answer your research question, use it to conduct a user study - the other seminar participants will be your subjects, and you will take part in their user studies, too - and evaluate it. You will write a short report that motivates your research, gives an insight into related work, presents your tool, your study, the results and their implications. In the end, you will give a short presentation about your insights.
Hacking SS 16
Goal of this Proseminar is to give students a deep understanding of the typical security problems and weaknesses that pervade all kinds of IT systems today. To provide a more solid understanding of the discussed attack techniques, this seminar strongly mixes theoretical and practical aspects. On the one hand, participants are conveyed the typical Proseminar learning contents (e.g., presentation techniques, etc.). On the other hand, the participants are required to also introduce and apply established tools for exploiting and attacking IT systems in the context of capture-the-flag styled exercises.
Theory of Modern Privacy Research SS 16
In this seminar, we will take a close look at the last decade of research on privacy and privacy enhancing technologies. Our main focus will be on the theory of private data release and data protection. We will simulate a computer science conference's review process by critically reviewing, presenting and discussing research papers with the participants in a 2-day block seminar.
Usable Security and Privacy WS 15/16
In this course, students will become familiar with the most important research of the last decade in Usable Security and Privacy. Simulating a computer science conference's review process, you will critically read and review papers, give short presentations and discuss the papers with other participants in a weekend seminar. The topics will include (but are not limited to) usability challenges of passwords, warning messages, TLS and permission systems.
Grundlagen der Cybersicherheit WS 15/16
Students learn the basics of cryptography, system security, network security and privacy-preserving mechanisms. They learn to define security goals and are familiarized with the most common attack scenarios.
Hacking SS 15
Goal of this Proseminar is to give students a deep understanding of the typical security problems and weaknesses that pervade all kinds of IT systems today. To provide a more solid understanding of the discussed attack techniques, this seminar strongly mixes theoretical and practical aspects. On the one hand, participants are conveyed the typical Proseminar learning contents (e.g., presentation techniques, etc.). On the other hand, the participants are required to also introduce and apply established tools for exploiting and attacking IT systems in the context of capture-the-flag styled exercises.
Android Security Lab WS 14/15
In this practical course, the students deal with different aspects of smartphone security at the example of the open-source Android OS. In general, the awareness and understanding of the students for security and privacy problems in the area of smartphones is increased and they learn how to extend Android with new security features to tackle current security and privacy issues.
Grundlagen der Cybersicherheit WS 14/15
Students learn the basics of cryptography, system security, network security and privacy-preserving mechanisms. They learn to define security goals and are familiarized with the most common attack scenarios.
Bachelor/Master Seminar WS 16/17
In the Bachelor/Master Seminar each student that writes a bachelor's or master's thesis with a member of the IS&C group has to present the topic of the thesis.