Welcome to the DASP WS 23/24 Course!

If you have any questions regarding the course, please feel free to contact the course supervisor Federico Tiblias

Die Kommunikationsfähigkeit der Bevölkerung untereinander ist für die Bewältigung von Krisen von höchster Bedeutung. In dieser Veranstaltung wird der Aufbau von drahtlosen Kommunikationsnetzen von Null behandelt, d.h. unter der Annahme, dass keinerlei Kommunikationsinfrastruktur mehr vorhanden ist. Die Veranstaltung vermittelt theoretische Grundlagen aus den Bereichen der Nachrichtentechnik und des Amateurfunks und vertieft diese um die nötigen Kenntnisse, um Netze für den Krisenfall zu entwerfen und praktisch zu realisieren. Die vorgestellten Verfahren umfassen dabei Reichweiten von lokaler Kommunikation bis hin zur Kommunikation um den ganzen Globus, ohne auf bestehende Infrastruktur angewiesen zu sein. Theoretische Übungen sowie das Durchführen von Messungen, der Aufbau von Schaltungen und die Vorführung von Funkverfahren in unserer Laborumgebung vertiefen die Veranstaltung.

  • Signale, Wellenausbreitung, Antennen und elektrotechnische Grundlagen
  • Verfahren zur Modulation und Demodulation analoger und digitaler Signale (OFDM, ATV/SSTV, Packet Radio, SSB, …)
  • Systemaspekte für Kommunikation im Krisenfall
  • Entwurf und praktischer Aufbau von drahtlosen Kommunikationssystemen für den Krisenfall von Null
Erste Veranstaltung: Dienstag, 15. Oktober 2024, 16:15

Instructors: Prof. Ph.D. Sebastian Faust; M.Sc. Elena Micheli; M.Sc. Kathrin Wirschem

Event type: Integrated Course

Org-unit: Dept. 20 - Computer Science

Displayed in timetable as: Einf Krypto

Subject:

Crediting for:

Hours per week: 4

Language of instruction: German

Min. | Max. participants: - | -

Course Contents:

  • Perfect Security
  • Different definitions
  • One Time Pad and its security
  • Limitations
  • Private Key Encryption
  • Computationally secure Priv. Key Encryption
  • Pseudo Random Generators (PRG)
  • Building secure Encryption scheme from PRG
  • Practical PRGs - Stream Ciphers
  • Stronger security notions
  • Pseudo Random Functions (PRF)
  • CPA security
  • Pseudorandom Permutation (PRP) and Block Cipher
  • Practical construction of Block Ciphers
  • Message Authentication Codes
  • Hash Functions
  • Cryptographic Assumptions
  • Key Agreement
  • Introduction to Public Key Encryption
  • Public Key Encryption Schemes - RSA
  • Signatures

Literature:

  • Your notes, exercise sheets, slides
  • Jonathan Katz, Yehuda Lindell: Introduction to Modern Cryptography
  • A graduate course on applied cryptography

Preconditions:

  • Probability Theory Basics

Further Grading Information: WS17/18: Einführung in die Kryptographie

Empfohlene Voraussetzungen

  • Grundlegende Kenntnisse im Umgang mit Embedded Linux
  • Bluespec SystemVerilog aus Architektur und Entwurf von Rechnersystemen (AER)
  • Grundlegende Kenntnisse in C

Inhalt

Diese Veranstaltung richtet sich an Studierende, die grundlegende Kenntnisse im Design von Hardwarebeschleunigern im Rahmen eines Systems-on-Chip erhalten möchten. Im Rahmen des Praktikums erhalten Studierende umfangreiche Einblicke in relevante Themen wie:

  • Treiber für selbst erstellte Hardwarebeschleuniger
  • Einbindung von in Bluespec erstellten Beschleunigern in ein Xilinx ZynqMP-SoC
  • Toolchains für Hardware- und Software-Komponenten

Die Teilnehmer werden im Rahmen des Praktikums Aufgaben zu einem typischen Einsatzgebiet von Hardwarebeschleunigung bearbeiten. Ein typisches Anwendungsgebiet eines solchen Hardwarebeschleunigers ist die Verarbeitung und Erfassung von Kamerabildern, zum Beispiel im Rahmen von Stereo Vision.

Database management systems (DBMS) in the cloud are the backbone for managing large volumes of data efficiently and thus play a central role in business and science today. For providing high performance, many of the most complex DBMS components such as query optimizers or schedulers involve solving non-trivial problems.

To tackle such problems, very recent work has outlined a new direction of so-called learned DBMS components where AI-based methods are used to replace and enhance core DBMS components, which has been shown to provide significant performance benefits. This route is particularly interesting since Cloud vendors such as Google, Amazon, and Microsoft are already applying these techniques to optimize the performance of their cloud data systems.

Besides learned DBMS components, AI has been used to improve many other data management-related tasks. For example, classical data engineering tasks like error detection, missing value imputation, and data augmentation typically cause high manual overheads and can be automated with AI. Finally, AI has also been used to extend databases through better data access interfaces (e.g., natural language querying and chatbots for data) or by supporting data beyond structured tabular data (i.e., text and images).

This seminar is designed to introduce students to the foundational concepts of using AI for data management. The course will include a mini lecture series that provides the necessary background on AI in data management, preparing students for the seminar tasks. The seminar is divided into two parts, each focusing on key themes as introduced above: learned DBMS components and the application of AI for data engineering. Students will engage in practical tasks related to these topics, as outlined below.

The goal of this course is to familiarize you with the modern hardware stack present in clouds and datacenters. This is an important goal because, to be able to build and maintain efficient data processing systems (e.g., database management systems, streaming analytics pipelines, machine learning training, etc.), an in-depth understanding of the modern hardware is necessary.

This lecture provides a complete view of the cloud hardware architecture and programming aspects from a software systems aspect and shows how to utilise them best. Throughout the semester we will cover the wide spectrum of hardware which is used today in cloud data centers such as:

  • multi-core and multi-socket CPUs
  • flash-based storage stacks
  • user-space networking
  • RDMA and programmable networks
  • GPUs and specialized hardware-based accelerators

In addition to the in-depth presentation of how these hardware components are designed and how they work, you will also acquire hands-on experience in programming for them in several coding labs as part of the lecture.

---------------------------------------------------------------------------------

Dieser Moodle-Kurs dient dem Austausch von Materialien, Folien, Aufzeichnungen, Übungen, Quizzen etc. 

Kurs: Informationssicherheitsmanagement
Kürzel: ISM
TUCaN-ID: 20-00-1123
Dozent: Maximilian Müller
Inhalte
: Management der organisatorischen und prozessualen Informationssicherheit in Unternehmen, Fokus dabei weniger auf formale oder technische IT-Sicherheit sondern mehr auf Themen der organisatorischen Informationssicherheit, mit denen man auch als ISO/ISB (Information Security Officer/Informationssicherheitsbeauftragter) in einem Unternehmen zu tun hat.
Wann: Montags, 09:50 - 11:20 Uhr
Wo: S1|01 A4
Klausur: Dienstag, der 18. Februar von 12:00 - 13:30 (90 min)

---------------------------------------------------------------------------------

Erste Veranstaltung: Montag, 14. Oktober 2024, 09:50
Prüfungsdatum (falls Klausur): Dienstag, 18. Februar 2025, 12:00

Modern cryptographic algorithms provide a reasonable level of security against known mathematical and cryptanalytic attacks. These cryptographic primitives are implemented on different platforms to be used in a security-enabled applications. Such a realization is done by implementing the desired cryptographic algorithm using some program code (in software) or using logic elements/circuits (in hardware). Physical access of the users to the cryptographic devices (e.g., a smartcard used for payment, a contactless card used for authentication, or a smartphone) where a secret key is embedded, led to a new form of attacks called physical attacks. This kind of attacks aims at extracting the secret key used by the cryptographic algorithm from the target implementation. Breaking a system by means of a physical attack does not infer to the weakness of the algorithm, but of the implementation. Therefore, considering such kinds of attacks as a potential risk for the security is a must when designing a cryptographic device and weaknesses in that regard need to be avoided from the start. The goal of this lecture is to give an overview about the known physical attacks and most considerably the schemes developed to counter such kinds of attacks. In the first part of the lecture different kinds of physical attacks are introduced, while in the second part we focus on countermeasures and the methods to make implementations resistant against known physical attacks.

Recommended: basic knowledge of digital circuit design, basic knowledge of data security and cryptography, solid programming ability in at least one programming language (e.g. C++), basic knowledge of computer architecture, basic knowledge of signal processing.

In this practical course, the students deal with different security aspects of artificial intelligence (AI) and systems. The project tasks comprise the following areas:

  • Design and implementation of selected software attacks (ethical hacking)
  • Design and implementation of secure user apps
  • Modifications of the Android Middleware and Kernel to build security architectures
  • System programming in general
  • Applications of Machine Learning for Security
  • Security and Privacy of Deep Neural Networks

In today's rapidly evolving technological landscape, artificial intelligence, specifically deep learning, becomes able to solve increasingly complex tasks. Their increasing capabilities make them useful for real-world problems and deployed even for critical tasks such as making hiring decisions, medical diagnostics, or safety-critical operations. However, deep learning algorithms face new challenges, constraints, and threats when deployed outside well-controlled test environments to solve real-world problems.
In this seminar, students will summarize and critically analyze the recent literature on the assigned topic in the form of a report. Additionally, each student will present his work in front of the group at the end of the semester.
Possible topics include:

  • Fair and non-biased deep learning
  • Explainable and trustworthy decisions
  • Privacy and the right to be forgotten for deep neural networks
  • Robust and trustworthy deep learning for security-critical applications
  • Distributed learning schemes
  • Deep neural networks in environments with runtime constraints
  • Detecting AI-generated content
  • Responsible deep fake generation

Scalable Data Management Systems Winter Semester 2024/25

Contents:

  • Database Architectures
  • Parallel and Distributed Databases
  • Cloud Databases
  • Data Warehousing
  • MapReduce and Hadoop
  • Spark and its Ecosystem
  • Optional: NoSQL Databases, Stream Processing, Graph Databases, Scalable Machine Learning

Important: Our kick-off meeting is on Thursday, October 17, 2024, 16:10 in room S220/9

Course for the lab (20-00-0552-pr) and project (20-00-0553-pp) on secure mobile networking.

Erste Veranstaltung: Donnerstag, 17. Oktober 2024, 16:10

Chair of Implementation Security offers a seminar for Master students. As a side note, previous knowledge in the field of IT Security or cryptography is recommended, but is not a must. The topics offered by the group are assigned via moodle. 

The kickoff meeting will take place in the Piloty Building, room A312, on 16th of October at 09:50.

We will add more information here, closer to the semester dates.

Important: Our kick-off meeting is on Thursday, October 17, 2024, 17:10 in room S220/9

Course for the seminar (20-00-0582-se) and advanced seminar (20-00-0549-se) on Networking, Security, Mobility, and Wireless Communications

Erste Veranstaltung: Donnerstag, 17. Oktober 2024, 17:10