Seminar Computer Security
Responsible
Lecture
Michael Nüsken
Daniel Loebenberger
Time & Place
Monday, 16:10h - 17:40h (single sessions),
16:05h - 19:10h (double sessions), b-it 2.1.
Start (Organizational):
16.10.2006, 17:00h, b-it 2.1.
Contents
This seminar discusses various topics from applied and theoretical computer security. Possible areas cover security on the internet, electronic elections, encryption standards, stream ciphers, and hash functions.
Schedule
- October 30, 2006, 16:00: Jia Zhu , The SSH protocol.
- Wikipedia, Secure Shell .
- Dan Barrett, Richard Silverman, & Robert Byrnes: SSH: The Secure Shell The Definitive Guide, Chapter Protocols .
Presentation (PowerPoint). - November 6, 2006, 16:00: Pei Guo , How to bypass a firewall.
- Wikipedia, Understanding Firewalls .
- Wikipedia, Firewall (networking) .
- Wikipedia, Stateful firewall .
- Stallings, "Cryptography and Network Security", Chapter 20, ISBN 0-13-111-502-2.
Presentation (PowerPoint). Seminar paper (PDF). - November 13, 2006, 16:00: Adil Amjad , About Malware.
- Stallings, "Cryptography and Network Security", Chapter 19, ISBN 0-13-111-502-2.
- Bruce Schneier (2006), Targeted Trojan Horses Are the Future of Malware .
Presentation (??). - November 20, 2006, 16:00: Hannes Korte , DoS/DDoS attacks and botnets.
- Steve Gibson (2002), The Strange Tale of the Denial of Service Attacks Against GRC.COM .
Presentation (PDF). - November 20, 2006, 17:30: Muthiyalu Jothir Navaneetha Krishnan , Email spam filtering.
Presentation (PowerPoint). - November 27, 2006, 16:00: Shirley Ong , Intrusion Detection.
- Stallings, "Cryptography and Network Security", Chapter 18, ISBN 0-13-111-502-2.
- SNORT .
Presentation (??). - November 27, 2006, 17:30: Tillmann Werner , Rootkits.
- Hoglund, Greg & Butler, James (2005). Rootkits: Subverting the Windows Kernel. Addison-Wesley. ISBN 0321294319.
Presentation (PowerPoint). - December 4, 2006, 16:00: Michael May , Security aspects of online banking.
Presentation (??). - December 4, 2006, 17:30: Bastian Sopora , Security flaws of the WEP protocol.
- Fluhrer, Mantin, Shamir, "Weaknesses in the Key Scheduling Algorithm of RC4" .
- Stubblefield, Ioannidis, Rubin, "Using the Fluhrer, Mantin, and Shamir Attack to Break WEP" .
Presentation (PowerPoint). - December 11, 2006: CANCELLED: Erdinc Sevim , Security of Bluetooth.
- Morrow, "Bluetooth: Operation and Use", Chapter 9, ISBN 0-07-138779-X.
- December 11, 2006, 16:00: Anuradha Jambunathan , Sneaking RFIDs.
- RFID .
Presentation (PowerPoint). - December 18, 2006, 16:00: Christmas Session
- January 15, 2007, 16:00: Michael Dwucet , DES = Destructed Encryption Standard?
- NIST, Cryptographic Toolkit , The Data Encryption Standard (FIPS 46-2).
- Stinson, "Cryptography. Theory and Practice", Chapter 3.1-3.5, ISBN 1-58488-206-9.
- Wikipedia, Differential cryptanalysis .
Presentation (??). - January 15, 2007, 17:30: Hema Mahato , The destruction of SHA-1.
- Wang, Yu, Yin (2005), "Efficient Collision Search Attacks on SHA-0" .
- Wang, Yu, Yin (2005), "Finding Collisions in the Full SHA-1" .
- Bruce Schneier (2005 February), Cryptanalysis of SHA-1 .
- Bruce Schneier (2005 August), New Cryptanalytic Results Against SHA-1 .
Presentation (??). - January 22, 2007, 16:00: Sukesh Jain , Cache-attacks on AES.
- NIST, Cryptographic Toolkit , The Advanced Encryption Standard (FIPS-197).
- Stinson, "Cryptography. Theory and Practice", Chapter 3.6-3.8, ISBN 1-58488-206-9.
- Bernstein (2005), "Cache-timing attacks on AES" .
Presentation (PowerPoint). - January 29, 2007, 16:00: Sufian Hamed , Identity based cryptography.
- Baek, Newmarch, Safavi-Naini, Susilo, "A Survey of Identity-Based Cryptography" ( PDF ).
- Boneh, Katz, "Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption" .
- Canetti, Halevi, Katz, "Chosen-Ciphertext Security from Identity-Based Encryption" .
Presentation (??). - January 29, 2007, 17:30: Shakeeb Ahmed , Program obfuscation.
- Barak, Goldreich, Impagliazzo, Rudich, Sahai, Vadhan, Yang, "On the (Im)Possibility of Obfuscating Programs" .
- Lynn, Prabhakaran, Sahai, "Positive Results and Techniques for Obfuscation" .
Presentation (??).