Technische Universität Ilmenau

Security in Embedded Systems - Modultafeln of TU Ilmenau

The module lists provide information on the degree programmes offered by the TU Ilmenau.

Please refer to the respective study and examination rules and regulations for the legally binding curricula (Annex Curriculum).

You can find all details on planned lectures and classes in the electronic university catalogue.

Information and guidance on the maintenance of module descriptions by the module officers are provided at Module maintenance.

Please send information on missing or incorrect module descriptions directly to

module properties Security in Embedded Systems in degree program Master Informatik 2013
module number200134
examination number2200828
departmentDepartment of Computer Science and Automation
ID of group 2231 (Computer Architecture and Embedded Systems)
module leaderProf. Daniel Ziener
term summer term only
credit points5
on-campus program (h)45
self-study (h)105
obligationelective module
examoral examination performance, 20 minutes
details of the certificate
signup details for alternative examinations
maximum number of participants
previous knowledge and experience

computer engineering, basic knowledge in embedded systems

learning outcome

Learning Goals

  • The students have knowledge about types of attacks.
  • The students have knowledge about detection of atacks.
  • The students have knowledge about prevention of attacks.
  • The students have knowledge about countermeasures against attacks.



. The students can show the influence of attacks and the corresponding countermeasures on the dependability of embedded systems

. The students can describe the different countermeasures of attacks

. The students can summarize different security facilities and measures for embedded systems

. The students can show the overhead (area, time) of security facilities

. The students can classify different types of attack on embedded systems


Social Competence

. The students can develop concepts in groups with subsequent implementations


. The students can acquire new knowledge from specific literature and associate this knowledge with other classes.




Due to increasing networking of embedded systems, the protection of such systems against attacks on stored or processed data as well as implementation details is an increasingly important but also challenging task. The protection of embedded systems against known as well as new sophisticated attack possibilities is the subject of this lecture. It shows what attacks exist, what countermeasures can be taken and how to design secure embedded systems.


Course coverage:

  • Attack scenarios
    • Examples of attack scenarios
    • Attacks on cryptographic algorithms and their implementations
  • Code injection attacks
    • Different type of code injection attacks
    • Countermeasures
  • Invasive physical attacks
    • Microprobing
    • Prevention and detection of single event effects
    • Reverse engineering
    • IP Protection
    • Watermarking
  • Non-invasive logical attacks
    • Phishing
    • Forged authenticity
    • Countermeasures
  • Non-invasive physical attacks
    • Eavesdroping
    • Side-channel attacks
  • Case study: Security in automotive applications
media of instruction

slides (presentation+download), exercises (download), examples



Die Vorlesung kann bei begründeter Notwendigkeit hybrid erfolgen. Hierfür wird ein Hörsaal mit Streaming-Ausstattung benötigt, inklusive Kamera für das Tafelbild.
Das Tutorial kann entweder in Präsenz oder online durchgeführt werden, jedoch nicht hybrid. Der praktische Teil kann jedoch nur in Präsenz durchgeführt werden.



literature / references

- Catherine H. Gebotys, Security in Embedded Devices. Springer 2010.
- Benoit Badrignans et al., Security Trends for FPGAs. Springer 2011.
- Daniel Ziener, Techniques for Increasing Security and Reliability of IP Cores Embedded in FPGA and ASIC Designs. Dr. Hut 2010.

evaluation of teaching