Trusted and Secure Computing Sven Bugiel, Michael Schwarz, Dhiman Chakraborty

News

Currently, no news are available
 

Trusted and Secure Computing

(Summer Term 2021)

Overview

In this seminar, the participants will discuss and evaluate state-of-the-art research solutions in the domain of secure, trusted, and trustworthy computing, both from the constructive as well as from the offensive perspective. The focus is particularly on hardware-based security architectures that are nowadays becoming omnipresent in different settings like server, cloud, or embedded device security. Examples of such hardware security primitives are Trusted Platform Modules, Intel SGX, RISC-V Keystone, or ARM TrustZone.


Logistics

Location Online via Zoom
Time Determined via poll before kick-off
Meeting Seminar (Weekly Meetings)
No. of Students max. 10
Instructor Sven Bugiel, Michael Schwarz, Dhiman Chakraborty
Language  English
Kickoff Wednesday, April 14, 16–17 via Zoom

 

While sending any email related to the seminar, please prepend [tsc21] to the subject line of the email.

Course structure and grading

The course is structured as a standard seminar. Every week, one student will present an assigned topic, which we will then discuss. Prior to this, all students are expected to read the handed-out papers carefully and prepare a list of discussion questions. Additionally, every student will write a short report on their assigned papers, in which the presentation should be elaborated in more detail and potentially including the results of the discussion. Grading will be based on the presentations (40%), report (40%), and general in-class participation in the discussion (20%). 


Registration and pre-requisites

There are no formal prerequisites beyond a basic knowledge of how computer systems work internally. Some of the seminar papers will talk about a certain hardware configuration. But no formal background in hardware design is required. However, participants are expected to carefully read the background sections of the discussed papers to understand the topic.
Previous participation in “Side-Channel Attacks and Defences” (https://cms.cispa.saarland/scad20/) by Dr. Michael Schwarz can be helpful to understand the topics easily.

Registration is handled via the central registration system of the UdS.


Presentation schedule and topics

The concrete week day and time slot will be determined via poll among the participants.

Week Topic Presenter
17.05.–21.05 TPM Design and Deployments  
24.05.–28.05. TPM Vulnerabilities and Issues  
31.05.–04.06. TrustZone Design and Solutions  
07.06.–11.06. TrustZone Side-Channels and Attacks  
14.06.–18.06. Intel SGX Design and Use-cases  
21.05.–25.06. Intel SGX Side-Channels  
28.06.–02.07. Intel SGX Software Security  
05.07.–09.07. TEE Trusted I/O  
12.07.–16.07. AMD SEV Design and Issues  
19.07.–23.07. RISC-V Keystone Design  


Privacy Policy | Legal Notice
If you encounter technical problems, please contact the administrators