Selected Topics in IT-Security (FSS 2019)

Lecturers: Prof. Dr. Frederik Armknecht, Dr. Ghassan Karame

Teaching Assistant: Christian Müller

Exam: 2019-06-13

Lecture & Exercise

  • Tuesdays: 15:30-17:00h, room: A1.01 in B6 23-25
  • Tuesdays: 17:15-18:45h, room: A1.01 in B6 23-25


We have an ILIAS course where you will find all lecture materials, which you may find here:

Background and Learning Objectives

The large-scale deployment of Internet-based services and the open nature of the Internet come alongside with the increase of security threats against existing services. As the size of the global network grows, the incentives of attackers to abuse the operation of online applications also increase and their advantage in mounting successful attacks becomes considerable.

These cyber-attacks often target the resources, availability, and operation of online services. In the recent years, a considerable number of online services such as Amazon, CNN, eBay, and Yahoo were hit by online attacks; the losses in revenues of Amazon and Yahoo were almost 1.1 million US dollars. With an increasing number of services relying on online resources, security becomes an essential component of every system.

This course aims to increase the security awareness of students and offers them a basic understanding with respect to a variety of interesting topics. After this course, students will be able to (1) learn about symmetric and asymmetric encryption schemes, (2) classify and describe vulnerabilities and protection mechanisms of popular network protocols, web protocols, and software systems (3) analyze / reason about basic protection mechanisms for modern OSs, software and hardware systems.

Lecture Topics

  • Bitcoin & Blockchain
  • Password Security
  • Biometric Authentication
  • Symmetric and Asymmetric Crypto
  • Side Channels
  • TLS
  • TOR
  • WEP / WPA / WPA2
  • System Security
  • Spam & Social Engineering
  • Mail Spoofing & Mail Encryption
  • Web Security & SQL Injection & XSS
  • Buffer Overflows & Meltdown/Spectre
  • Malware & Trusted Computing

Lecture Roadmap

Please note: you have to bring your own laptop to the exercises!

The exercise scoreboard can be found here:

Tentative Agenda (Last update on: 2019-03-15)
Feb. 1215:30 - 18:45Symmetric CryptographyArmknecht
Feb. 1915:30 - 17:00WEP/WPA/WPA2 SecurityArmknecht
Feb. 1917:15 - 18:45Exercise Session 01Müller
Feb. 2615:30 - 18:45Asymmetric Cryptography & Side ChannelsKarame
Mar. 0515:30 - 17:00IPsec & Tor & VPNArmknecht
Mar. 0517:15 - 18:45Exercise Session 02Müller
Mar. 1215:30 - 18:45Spam & Phishing & Social Engineering & Mail Spoofing + Rights ManagementArmknecht
Mar. 1915:30 - 17:00TLSKarame
Mar. 1917:15 - 18:45Exercise Session 03Müller
Mar. 2615:30 - 17:00TBAN.N.
Apr. 0215:30 - 18:45Web Security & SQL Injection & XSSKarame
Apr. 0915:30 - 18:45Malware & Botnet & Trusted ComputingKarame
Apr. 16---/**  Easter---
Apr. 23---   *  Holidays  **/---
Apr. 3015:30 - 17:00Password-based Security & Biometric AuthenticationMüller
Apr. 3017:15 - 18:45Exercise Session 05Müller
May 0715:30 - 18:45BitcoinKarame
May 1415:30 - 17:00Buffer Overflow & Meltdown/SpectreArmknecht
May 1417:15 - 18:45Exercise Session 06Müller
May 2115:30 - 17:00Blockchain and other AltcoinsKarame
May 2815:30 - 17:00Information Security Management Obligations & Risk Management PracticeR. Kopp
May 2817:15 - 18:45Exercise Session 07 + Q&ATBA

Exam Admission Requirements

You need to achieve at least 40% of the exercise points of the first half of the semester, and 40% of the exercise points of the second half of the semester to participate in the exam. You can track your progress in the ITSec-Flag-System. You will receive an exercise points notification via email on TBD and TBD, respectively.