Trusted and Secure Computing Sven Bugiel

News

21.09.2017

Device return

Please return the devices you have collected for the course between 11.00am to 2.00pm on Monday(25/09/2017) at E9 1 Room no 3.10.

You do not need them for exam purpose.

19.09.2017

Lab 4 is online

Lab 4 is online now.

 

Some more questions added to Lab 4.

19.09.2017

Lecture 5 sildes online

The content of Lecture 5 Direct Anonymous Attestation is online now.

18.09.2017

Lab 3 online

Lab 3 is on Policies.

17.09.2017

Updated lecture 3 slides

Slide 13 of Lecture 3 on key duplication attributes has been updated, since there was an error on the slide. Further, small explanation regarding the fixedTPM attribute has been added.

14.09.2017

Changed lecture hall Sep 15 and Sep 21

Please note that the lectures on Sep 15 and Sep 21 will take place in the CISPA show room (0.01) instead of the lecture hall.

13.09.2017

Lab 2 online

Hello,

Lab 2 is online now.

~

Dhim

13.09.2017

Updated lecture schedule

The lecture schedule has been updated to give time to do some examples on EAP tomorrow.

11.09.2017

Lab 1 Online

Hello,

Lab 1 is online.

Cheers,

Dhim

11.09.2017

Exercise Sheet

Hello,

The voluntary exercise sheet will be online today or early tomorrow. You do not need to submit any solution. It is for you to play and learn with TPM 2.0 physical hardware.

All the needed information(hardware collection, setup process, commands to play... Read more

Hello,

The voluntary exercise sheet will be online today or early tomorrow. You do not need to submit any solution. It is for you to play and learn with TPM 2.0 physical hardware.

All the needed information(hardware collection, setup process, commands to play with) will be given in the sheet.

Cheers,

Dhim

22.05.2017

Course website online and registration open

The registration for the TSC'17 course is now open.

Show all
 

Trusted and Secure Computing

In this two-week lecture, the participants will be introduced to essential concepts in the domain of secure, trusted, and trustworthy computing. The focus is particularly on hardware-based security architectures in different settings like server, network, cloud, or embedded device security. Examples for such hardware security primitives are Trusted Platform Modules, Intel SGX, or ARM TrustZone. In addition to the lecture, the participants should gather some hands-on experience with these technologies through two compact projects (one TPM based, one about hardware-isolated execution environments) and thus provides a perfect opportunity to understand hardware-based security architectures more deeply in theory and practice. Based on this experience, the participants should be additionally enabled to discuss and evaluate state-of-the-art research solutions in this domain.

The course will offered as a two weeks block course at the end of the summer term 2017, between Sep 11 and Sep 22.

Exams

The endterm exam will take place Fri, 29.09.2017, in E1.3 HS001 from 14:00-16:00 (s.t.).

The backup exam will take place Fri, 13.10.2017, in E1.3 HS002 from 14:00-16:00 (s.t.).



If you encounter technical problems, please contact the administrators