News
Submit presentation slidesWritten on 21.07.18 by Dhiman Chakraborty Please submit the presentation slides you have used to present your topic in the seminar. In the submission section you can find a link where you can submit. |
Submission for 14/06/2018's paper is openWritten on 13.06.18 by Dhiman Chakraborty Submission for 14/06/2018's paper is open. Sorry for the late. |
Next meeting is on 14/06/2018Written on 05.06.18 by Dhiman Chakraborty Hello, Next meeting is on 14/06/2018. The due paper will be "SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment". No meeting on 07/06/2018. |
No review/questions required for presenterWritten on 20.04.18 by Dhiman Chakraborty The presenter of each week does not need to submit any review or questions for the paper he is presenting. He needs to write review and questions for other papers. |
LSF registration for credit pointWritten on 19.04.18 by Dhiman Chakraborty As the paper assignment is done, please register the seminar in LSF within 3 weeks, if you want to get credit from the seminar. |
Review TemplateWritten on 19.04.18 by Dhiman Chakraborty The review template is uploaded in the material section. Use this latex templates as learning latex is very important in academics. |
Paper AssignmentWritten on 18.04.18 (last change on 19.04.18) by Dhiman Chakraborty Hello, The papers are assigned. I tried to assign one of the three choices that each of you provided. The first presentation will be on 26th April 2018. So you have to submit your review and questions by 26th April 10am. And the next submissions will follow similar as per the date of… Read more Hello, The papers are assigned. I tried to assign one of the three choices that each of you provided. The first presentation will be on 26th April 2018. So you have to submit your review and questions by 26th April 10am. And the next submissions will follow similar as per the date of presentation. paper assignment : https://cms.cispa.saarland/trust18/3/Paper_assignment_and_dates |
Trusted and Secure Computing Seminar
(Summer Term 2018)
CISPA / Saarland University
Overview
In this seminar, the participants will be introduced to essential concepts in the domain of secure, trusted, and trustworthy computing. The focus is particularly on hardware-based security architectures in different settings like server, network, cloud, or embedded device security. Examples for such hardware security primitives are Trusted Platform Modules, Intel SGX, or ARM TrustZone. The participants should be additionally enabled to discuss and evaluate state-of-the-art research solutions in this domain.
Logistics
Location | E9 1 Room 0.06 or CISPA lecture hall |
Time | Thursday 14:00 - 16:00 |
Meeting | Seminar (Weekly Meeting) |
Number of Students | 10 - 12 |
Instructor | Sven Bugiel |
Adviser | Dhiman Chakraborty |
Contact | Dhiman Chakraborty (email) |
Language | English |
Kickoff | 12/04/2018 14:00 , E9 1 Lecture Hall |
Course structure and grading
The course is structured as a standard seminar. Every week, one or two students will present one or more papers on a single topic, which we will then discuss. Prior to this, all students are expected to read the papers carefully, prepare a list of discussion questions and write a short critical review of the papers. Grading will be based on presentations, reviews, criticality of discussions questions and general in-class participation.
You can take the course without taking university credit.
Registration and pre-requisites
There are no formal pre-requisites beyond a basic knowledge of how computer systems work internally. Some of the seminar papers will talk about certain hardware configuration. But no formal background on hardware design is required.
Places in the seminar are limited. If you wish to take the seminar without credit, just say so in your email. Non-credit participation is not subject to any cap.
Topics
1. | Dynamic Root of Trust Measurement |
2. | Protocol Verification |
3. | Trusted Programming Module |
4. | Trusted Execution Environment |
5. | Trusted Computing in Mobile |
6. | Trusted Execution Environment Exploitation |
7. | Hardware Isolation |
8. | Intel SGX |
List of Papers
You can find the list of papers here.
The final list of papers with presenters name and schedule will be available once the attendance and paper selection is completed after Kick-off meeting.