- Trusted Computing
- Authenticated Boot
- Binding and Sealing
- Integrity Measurement and Attestation
- On-board Credentials
- Mobile Security with focus on smartphones
- Security Architectures
- Selected Access Control and Permission Model Aspects
- Selected Modern Attack Techniques
- Hardware-assisted Cryptographic Protocols
- Hardware Vulnerabilities in Embedded Devices
- Dozent*in: Phillip Rieger
- Dozent*in: Mohamadreza Rostami
- Dozent*in: Nikhilesh Kumar Singh