Diese Webseite wird nicht mehr aktualisiert.

Mit 1.10.2022 ist die Fakultät für Physik in der TUM School of Natural Sciences mit der Webseite https://www.nat.tum.de/ aufgegangen. Unter Umstellung der bisherigen Webauftritte finden Sie weitere Informationen.

de | en

Praktikum - Trusted Execution Environments and Software Security (IN2106, IN0012, IN4260)

Lehrveranstaltung 0000003687 im SS 2019

Basisdaten

LV-Art Praktikum
Umfang 6 SWS
betreuende Organisation Informatik 20 - Lehrstuhl für Sicherheit in der Informatik (Prof. Eckert)
Dozent(inn)en Leitung/Koordination: Claudia Eckert
Termine Di, 10:00–12:00, MI 01.05.013
sowie 1 einzelner oder verschobener Termin

Zuordnung zu Modulen

weitere Informationen

Lehrveranstaltungen sind neben Prüfungen Bausteine von Modulen. Beachten Sie daher, dass Sie Informationen zu den Lehrinhalten und insbesondere zu Prüfungs- und Studienleistungen in der Regel nur auf Modulebene erhalten können (siehe Abschnitt "Zuordnung zu Modulen" oben).

ergänzende Hinweise With the amount of threats that increasingly pressure companies and private usage, it is important to guarantee the application are completely secure. Therefore, secure software development becomes more and more attractive and necessary. In this course, we want to discuss how to develop the secure software with the Trusted Execution Environment (TEE) based ways. TEE presents two separated virtual cores for each of the physical processor on the SoC level. One is the secure world which provides more secure code region and data region, meanwhile, the other is non-secure world which is used to run the rich OS, the normal application. Normally the non-secure virtual processor can only access non-secure system resources, but the secure virtual processor can see all resources. Based on the TEE-enabled core, there are many available secure world software architectures, from the range of the most complex secure world operating system to the simplest synchronous library of code placed in the Secure world. In this course, we will delve into a set of software components supporting TEE mechanism on mobile devices (ARM Trustzone) as well as desktop (Intel SGX) and make sense how to develop the trusted application or services that run on the TEE processor. Meanwhile, how to develop normal/untrusted applications that run on the main processor and use services provided by Trusted applications is also our topic. Since this course is a topic on the advanced software security level, we hope the students have the c program language background as well as the basic knowledge of operating system. In addition, information security knowledge is also necessary. Knowledge on Android OS as well as compiler could be better.
Links TUMonline-Eintrag
Nach oben