Security in Embedded Systems - Modultafeln of TU Ilmenau
The module lists provide information on the degree programmes offered by the TU Ilmenau.
Please refer to the respective study and examination rules and regulations for the legally binding curricula (Annex Curriculum).
You can find all details on planned lectures and classes in the electronic university catalogue.
Information and guidance on the maintenance of module descriptions by the module officers are provided at Module maintenance.
Please send information on missing or incorrect module descriptions directly to email@example.com.
|module properties Security in Embedded Systems in degree program Master Ingenieurinformatik 2014|
|department||Department of Computer Science and Automation|
|ID of group||2231 (Computer Architecture and Embedded Systems)|
|module leader||Prof. Daniel Ziener|
|term||summer term only|
|on-campus program (h)||45|
|exam||oral examination performance, 20 minutes|
|details of the certificate|
|alternative examination performance due to COVID-19 regulations incl. technical requirements|
|signup details for alternative examinations|
|maximum number of participants|
|previous knowledge and experience|
computer engineering, basic knowledge in embedded systems
. The students can show the influence of attacks and the corresponding countermeasures on the dependability of embedded systems
. The students can describe the different countermeasures of attacks
. The students can summarize different security facilities and measures for embedded systems
. The students can show the overhead (area, time) of security facilities
. The students can classify different types of attack on embedded systems
. The students can develop concepts in groups with subsequent implementations
. The students can acquire new knowledge from specific literature and associate this knowledge with other classes.
Due to increasing networking of embedded systems, the protection of such systems against attacks on stored or processed data as well as implementation details is an increasingly important but also challenging task. The protection of embedded systems against known as well as new sophisticated attack possibilities is the subject of this lecture. It shows what attacks exist, what countermeasures can be taken and how to design secure embedded systems.
|media of instruction and technical requirements for education and examination in case of online participation|
slides (presentation+download), exercises (download), examples
|literature / references|
- Catherine H. Gebotys, Security in Embedded Devices. Springer 2010.
|evaluation of teaching|