192.111 Attacks and Defenses in Computer Security
This course is in all assigned curricula part of the STEOP.
This course is in at least 1 assigned curriculum part of the STEOP.

2022W, UE, 4.0h, 6.0EC

Properties

  • Semester hours: 4.0
  • Credits: 6.0
  • Type: UE Exercise
  • Format: Hybrid

Learning outcomes

After successful completion of the course, students are able to use and extend state of the art security tools and actively participate in international IT security competitions, also called Capture The Flag (CTF). In particular, students will acquire the necessary technical skills to tackle modern security challenges and develop the required software.

Subject of course

Security topics:

  • Binary exploitation
  • Reverse engineering
  • Web security
  • Cryptography
  • Network security
  • Forensics
  • Mobile security
  • Fuzzing
  • Security of virtualized environments

Teaching methods

Technical discussions on computer security problems and introduction to state of the art security tools. Participation to on-line international Capture The Flag security contests with WE_0WN_Y0U (https://w0y.at/).

Mode of examination

Immanent

Additional information

The lecture is held in English.

ECTS Breakdown (6 ECTS = 150 hours):

  • On-line meetings and presentations (20 hours)
  • Individual project work (130 hours)

Lecturers

Institute

Course dates

DayTimeDateLocationDescription
Thu17:00 - 18:0006.10.2022FAV Hörsaal 1 - INF Kickoff Event
Fri17:00 - 19:0014.10.2022FAV Hörsaal 1 - INF Presentation of the Projects
Fri17:00 - 19:0011.11.2022FAV Hörsaal 1 - INF Individual Presentations
Fri17:00 - 19:0025.11.2022FAV Hörsaal 1 - INF Individual Presentations
Fri17:00 - 19:0009.12.2022FAV Hörsaal 1 - INF Individual Presentations
Fri17:00 - 19:0016.12.2022FAV Hörsaal 1 - INF Individual Presentations

Examination modalities

Participation to on-line international Capture The Flag security contests and a short talk on a challenge taken from a competition. Assessment of a project focused on protecting or attacking computer systems. Projects will be agreed upfront between lecturers and students and will include the development of innovative security challenges, the creation of new tools or contributions to existing open-source projects to extend the original capabilities. Depending on the estimated effort of each project, students will be allowed to work in groups.

Course registration

Begin End Deregistration end
01.09.2022 00:01 16.10.2022 23:59 19.10.2022 23:59

Group Registration

GroupRegistration FromTo
Individual Presentations 2 (25.11.2022)27.10.2022 18:3023.11.2022 23:59
Individual Presentations 3 (09.12.2022)03.11.2022 18:3007.12.2022 23:59
Individual Presentations 4 (16.12.2022)10.11.2022 18:3014.12.2022 23:59
Team 114.10.2022 18:3028.10.2022 23:59
Team 214.10.2022 18:3028.10.2022 23:59
Team 314.10.2022 18:3028.10.2022 23:59
Team 414.10.2022 18:3028.10.2022 23:59
Team 514.10.2022 18:3028.10.2022 23:59
Team 614.10.2022 18:3028.10.2022 23:59
Team 714.10.2022 18:3028.10.2022 23:59
Team 814.10.2022 18:3028.10.2022 23:59
Team 914.10.2022 18:3028.10.2022 23:59
Team 1014.10.2022 18:3028.10.2022 23:59

Curricula

Literature

No lecture notes are available.

Previous knowledge

Background on system and web security. Basic programming and scripting skills (python and unix shell usage are strongly recommended). Good familiarity with the Linux operating system. 

Preceding courses

Miscellaneous

  • Attendance Required!

Language

English