General
- study semester
-
5-6
- standard study semester
-
6
- cycle
- occasional
- duration
- 1 semester
- SWS
- 4
- ECTS
- 6
- teaching language
- English
People
- responsible
-
Dr. Nils-Ole Tippenhauer
- lectures
-
Dr. Nils-Ole Tippenhauer
Assessment & Grades
- entrance requirements
-
Security or Foundations of Cyber Security I + II
- assessment / exams
Übungen und schriftliche Abschlussklausur
- grade
Das Modul ist insgesamt bestanden, wenn die Prüfungsleistung bestanden wurde.
Workload
- course type /weekly hours
2 h lectures
+ 2 h tutorial
= 4 h (weekly)
- total workload
60 h of classes
+ 120 h private study
= 180 h (= 6 ECTS)
Aims / Competences to be developed
- Classify and describe common physical-layer attacks and countermeasures
- Apply known side-channel attacks, e.g., simple power analysis
- Model, analyze, and simulate physical-layer attacks and defenses for
wireless communications (e.g., eavesdropping, jamming, manipulation)
- Classify and describe countermeasures such as distance bounding protocols to
prevent relay attacks
- Evaluate the security of existing cyber-physical systems against
physical-layer attacks
- Classify and describe security issues and solutions for industrial control
systems
Content
The lecture will cover three main topic areas: attacks (and countermeasures) that
leverage physical channels (e.g., side-channel attacks), attacks (and
countermeasures) involving wireless communications (e.g., jamming, manipulation,
and forwarding), and security for cyber-physical systems (such as industrial
control systems).
Selected list of topics:
- Relay attacks
- Distance Bounding
- Physical-Layer Identification
- Wireless eavesdropping and manipulations
- GPS spoofing and countermeasures
- Industrial Control System security, attacks and countermeasures
- Security issues related to PLC logic applications, proprietary industrial
protocols and end devices
Literature & Reading
The teaching material will be in English and will be announced at the beginning of the lecture.
Additional Information
While the lecture will touch physical-layer concepts such as (wireless) signal processing, no background in that area is assumed. Exercises will require students to run Linux applications (e.g., via a virtual machine).
Curriculum
This module is part of the following study programmes:
Cybersicherheit BSc: Vertiefungsvorlesungen der Cybersicherheit
study semester: 5-6 / standard study semester: 6
Cybersecurity MSc: Vertiefungsvorlesungen Cybersecurity
study semester: 1-3 / standard study semester: 4
Cybersecurity BSc (English): Kernthemen der Cybersicherheit
study semester: 5-6 / standard study semester: 6