In this lecture series we will look at different aspects of „ubiquitous“ security, i.e.
security concerns and solutions in our daily life as consumers, application developers or software
architects interacting with distributed systems and across different layers in a system stack.
We will start with selected topics in the lifecycle of a mobile or IoT device, covering readily available
security technologies as well as emerging R&D. We will realize that an important aspect is to identify
what can be assumed to be available as a trusted computing base, i.e. the set of all hardware,
firmware, and/or software components that are critical to the security of a computing device. For that
reason, we will investigate trusted execution environments (TEEs) trusted platform modules (TPM)
as well as the currently emerging software guard extensions (SGX).
We will address different security concerns in cloud computing and cloud infrastructures, for example
looking at identity management in distributed systems as well as selected emerging topics when
interacting with encrypted cloud databases.
As part of this lecture series we will also touch on blockchain technology as well as security in
industrial control systems.
Pfleeger, C. et al.: “Security in Computing“, 5th Edition, Prentice Hall, 2015
Russell, B., van Duren, D.:“ Practical Internet of Things Security“, 2016, Packt Publishing
Will, A. and Challener, D.: „A Practical Guide to TPM 2.0 Using the Trusted Platform Module in the New Age of Security“, Apress, 2015
Ginter, A.: „SCADA Security: Security: What's Broken and How To Fix It“, Abterra Technologies,2016