X
X
X

X
Courses » Information Security - 5 - Secure Systems Engineering

Information Security - 5 - Secure Systems Engineering

ABOUT THE COURSE:

With the increase in the threat of cyber-security attacks, it is important to develop computer systems that are not only efficient but also secure. This course will discuss various vulnerabilities in systems and mechanisms by which these vulnerabilities can be mitigated. The first part of the course will discuss various security vulnerabilities in software code that, if left unfixed, can potentially lead to major cyber-attacks. We will see how these vulnerabilities can arise from simple programming flaws like a buffer that overflows, to complex application runtime characteristics that get manifested through side-channels such as the execution time and power consumption of the device. We will look at some recent cyber-attacks such as Meltdown and Spectre, Heartbleed, and Stagefright. The pre-requisites are a good understanding of C and a basic understanding of computer organization and operating systems.


INTENDED AUDIENCE:
BTech/BE/ME/MTech/MS/MCA/BCA studentsIn computer science/information technology/electrical engineering / electronics engineering /instrumentation engineering

CORE/ELECTIVE: Elective

UG/PG: UG/PG

PREREQUISITES: C programming must be strongMinimum understanding of digital logic /operating systems/computer organization

INDUSTRY SUPPORT: All companies developing embedded products /IoT etc.

4472 students have enrolled already!!

ABOUT THE INSTRUCTOR:



Chester Rebeiro is an Assistant Professor at the Indian Instituted of Technology Madras.Prior to this he was a post-doctoral researcher at Columbia University. He has a PhD from IIT Kharagpur in the area of hardware security. Before joining IIT Kharagpur forhis PhD studies, he worked as a member technical staff at CDAC, Bangalore. His area ofinterests includes security aspect in the operating system, computer architecture, andVLSI. He is particularly interested in applying learning algorithms and formal methodsto analyze the security of systems.

COURSE LAYOUT:

Week 1  :  Introduction / gdb / buffer overflow
Week 2  :  Preventing buffer overflow based malware
Week 3  :  Integer overflow and buffer overread and heap overflow
Week 4  :  More on heap overflow; Access Control
Week 5  :  Confinement
Week 6  :  SGX and Trustzone
Week 7  :  Micro-architectural Attacks
Week 8  :  Hardware Security.

 
TEACHING ASSISTANT

Nikhilesh Singh, MS Research Scholar, IIT Madras
SLPSK Patanjali, PhD Research Scholar, IIT Madras

CERTIFICATION EXAM :

  • The exam is optional for a fee.
  • Date and Time of Exams: March 31st 2019(Sunday).  Morning session 9am to 12 noon; Afternoon Session 2pm to 5pm.
  • Registration url: Announcements will be made when the registration form is open for registrations.
  • The online registration form has to be filled and the certification exam fee needs to be paid. More details will be made available when the exam registration form is published.

CERTIFICATION:

  • Final score will be calculated as : 25% assignment score + 75% final exam score
  • 25% assignment score is calculated as 25% of average of  Best 6 out of 8 assignments
  • E-Certificate will be given to those who register and write the exam and score greater than or equal to 40% final score. Certificate will have your name, photograph and the score in the final exam with the breakup.It will have the logos of NPTEL and IIT Madras.It will be e-verifiable at nptel.ac.in/noc.