Information Security - 5 - Secure Systems Engineering
ABOUT THE COURSE:
With the increase in the threat of cyber-security attacks, it is important to develop computer systems that are not only efficient but also secure. This course will discuss various vulnerabilities in systems and mechanisms by which these vulnerabilities can be mitigated. The first part of the course will discuss various security vulnerabilities in software code that, if left unfixed, can potentially lead to major cyber-attacks. We will see how these vulnerabilities can arise from simple programming flaws like a buffer that overflows, to complex application runtime characteristics that get manifested through side-channels such as the execution time and power consumption of the device. We will look at some recent cyber-attacks such as Meltdown and Spectre, Heartbleed, and Stagefright. The pre-requisites are a good understanding of C and a basic understanding of computer organization and operating systems.
PREREQUISITES: C programming must be strongMinimum understanding of digital logic /operating systems/computer organization
INDUSTRY SUPPORT: All companies developing embedded products /IoT etc.
4472 students have enrolled already!!
ABOUT THE INSTRUCTOR:
Chester Rebeiro is an Assistant Professor at the Indian Instituted of Technology Madras.Prior to this he was a post-doctoral researcher at Columbia University. He has a PhD from IIT Kharagpur in the area of hardware security. Before joining IIT Kharagpur forhis PhD studies, he worked as a member technical staff at CDAC, Bangalore. His area ofinterests includes security aspect in the operating system, computer architecture, andVLSI. He is particularly interested in applying learning algorithms and formal methodsto analyze the security of systems.
COURSE LAYOUT:
Week 1 : Introduction / gdb / buffer overflow Week 2 : Preventing buffer overflow based malware Week 3 : Integer overflow and buffer overread and heap overflow Week 4 : More on heap overflow; Access Control Week 5 : Confinement Week 6 : SGX and Trustzone Week 7 : Micro-architectural Attacks Week 8 : Hardware Security.
TEACHING ASSISTANT
Nikhilesh Singh, MS Research Scholar, IIT Madras SLPSK Patanjali, PhD Research Scholar, IIT Madras CERTIFICATION EXAM :
The exam is optional for a fee.
Date and Time of Exams: March 31st 2019(Sunday). Morning session 9am to 12 noon; Afternoon Session 2pm to 5pm.
Registration url: Announcements will be made when the registration form is open for registrations.
The online registration form has to be filled and the certification exam fee needs to be paid. More details will be made available when the exam registration form is published.
CERTIFICATION:
Final score will be calculated as : 25% assignment score + 75% final exam score
25% assignment score is calculated as 25% of average of Best 6 out of 8 assignments
E-Certificate will be given to those who register and write the exam and score greater than or equal to 40% final score. Certificate will have your name, photograph and the score in the final exam with the breakup.It will have the logos of NPTEL and IIT Madras.It will be e-verifiable at nptel.ac.in/noc.