The presenter of each week does not need to submit any review or questions for the paper he is presenting. He needs to write review and questions for other papers.
As the paper assignment is done, please register the seminar in LSF within 3 weeks, if you want to get credit from the seminar.
The review template is uploaded in the material section. Use this latex templates as learning latex is very important in academics.
The papers are assigned. I tried to assign one of the three choices that each of you provided. The first presentation will be on 26th April 2018. So you have to submit your review and questions by 26th April 10am. And the next submissions will follow... Read more
The papers are assigned. I tried to assign one of the three choices that each of you provided. The first presentation will be on 26th April 2018. So you have to submit your review and questions by 26th April 10am. And the next submissions will follow similar as per the date of presentation.
paper assignment : https://cms.cispa.saarland/trust18/3/Paper_assignment_and_dates
Trusted and Secure Computing Seminar
(Summer Term 2018)
CISPA / Saarland University
In this seminar, the participants will be introduced to essential concepts in the domain of secure, trusted, and trustworthy computing. The focus is particularly on hardware-based security architectures in different settings like server, network, cloud, or embedded device security. Examples for such hardware security primitives are Trusted Platform Modules, Intel SGX, or ARM TrustZone. The participants should be additionally enabled to discuss and evaluate state-of-the-art research solutions in this domain.
|Location||E9 1 Room 0.06 or CISPA lecture hall|
|Time||Thursday 14:00 - 16:00|
|Meeting||Seminar (Weekly Meeting)|
|Number of Students||10 - 12|
|Contact||Dhiman Chakraborty (email)|
|Kickoff||12/04/2018 14:00 , E9 1 Lecture Hall|
Course structure and grading
The course is structured as a standard seminar. Every week, one or two students will present one or more papers on a single topic, which we will then discuss. Prior to this, all students are expected to read the papers carefully, prepare a list of discussion questions and write a short critical review of the papers. Grading will be based on presentations, reviews, criticality of discussions questions and general in-class participation.
You can take the course without taking university credit.
Registration and pre-requisites
There are no formal pre-requisites beyond a basic knowledge of how computer systems work internally. Some of the seminar papers will talk about certain hardware configuration. But no formal background on hardware design is required.
Places in the seminar are limited. If you wish to take the seminar without credit, just say so in your email. Non-credit participation is not subject to any cap.
|1.||Dynamic Root of Trust Measurement|
|3.||Trusted Programming Module|
|4.||Trusted Execution Environment|
|5.||Trusted Computing in Mobile|
|6.||Trusted Execution Environment Exploitation|
List of Papers
You can find the list of papers here.
The final list of papers with presenters name and schedule will be available once the attendance and paper selection is completed after Kick-off meeting.