master specialisation in computing science computer security erik poll digital security group...

14
Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Upload: suzanna-cunningham

Post on 13-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Master Specialisation in Computing Science

Computer security

Erik Poll

Digital Security GroupInstitute for Computing and Information Sciences (ICIS)

Page 2: Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Why study computer security?

• Interesting and hot topic, with excellent job opportunities• Real impact in everyday life & society• Opportunities for multidisciplinary research

And why study it here in Nijmegen?

• Leading research group in computer security in the Netherlands • Broad range of research, from theoretical to practical

• eg work on online privacy & electronic identities in

Page 3: Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Organisation & Practicalities

• The Master is taught together with TU Eindhoven Previously also with UTwente, as

• Courses in Nijmegen and Eindhoven You have to at least take 3 obligatory courses in Eindhoven

• To reduce travel hassle- Courses scheduled on the same day and not in the first 2 hours- Some courses via tele-lecturing

• Minimal travel hassle over 2 years: 1 quarter going to Eindhoven twice a week (for 2 mandatory courses, on same day); the 3rd mandatory course is tele-lectured.

Page 4: Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Topics that you study

• Security protocols

• Cryptography

• Software security

• Network security

• Organisational aspects of computer security

• Privacy

• Hardware security – esp. smartcards and RFID

• Legal aspects of computer security

Page 5: Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Programme

• 6 mandatory courses (30 EC)• Seminar: Privacy Seminar at RU (or IST Seminar at TUE)• Electives - choice from 6 optional security courses• Free choice • Computer Science & Society (3EC)

plus

• Research internship (15EC) • Master thesis (30 EC)

Page 6: Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Specialisation-specific courses

Optional

•Law in Cyberspace•Hardware Security•Cryptographic Engineering

•Physical Aspects of Computer Security•Applied Cryptography•Hacker’s Hut

Mandatory

•Software Security•Security in Organisations•Network Security•Privacy Seminar

At TUE•Cryptography •Principles of Data Protection •Verification of Security Protocols

Page 7: Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Some of the researchers

Bart Jacobs correctness & security of softwarequantum logics

Erik Poll software security smartcard security payment systems, smart grids

Jaap Henk Hoepman privacy Internet of Things identity management

Mireille Hildebrandt legal aspects ofsecurity, privacy

and profiling

Lejla Batina physical security lightweight crypto

RFID

Peter Schwabe high-speed crypto

cryptanalysis

Page 8: Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Master thesis projects with company?

Page 9: Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Going abroad?

Going abroad for a semester can be a great experience!

Eg for your master thesis, or for regular courses & research internship.

If you’re interested in this, plan ahead!

E.g. Bart van Delft went to Chalmers in Gothenborg, Sweden (and never came back...)

Page 10: Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Master theses: topics, impact & careers

• Tim Cooijmans. Cryptographic Key Storage and TEE on Android Presented at SPSM 2014, USA. Tim is now with SNS bank• Manu Drijvers. Delegation in attribute based credentials Manu joined IBM research in Zurich as PhD student• Mathias Morbitzer. TCP Idle scans in IPv6 Presented at Hack in the Box Malaysia and at HACK.LU. Joined Fox-IT• Pol van Aubel. Effective host-based intrusion of real-time systems

Joined DS group as PhD student on project with TenneT• Arturo Cedillo Torres & Brinio Hond. Fuzzing the GSM protocol Presented at Essos 2014. They both joined KPMG• Gerhard de Koning Gans. Analysis of the MIFARE classic.

Now with High Tech Crime Unit of Dutch police after PhD in DS group

Page 11: Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)
Page 12: Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Master theses: topics, impact & careers

• Ruben Muijrers. RAM: Rapid Alignment Method Published at CARDIS 2012 & implemented in commercial tool. Joined Riscure

Page 13: Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

Master theses: topics, impact & careers

• Arjan Blom. ABN-AMRO E-dentifier2 reverse engineering Published at NordSec 2012 and lots of media attention. Started own company

• Georg Chalupar, Stefan Peherstorfer. Reverse Engineering Using LEGO Published at WOOT 2014 in San Diego

Page 14: Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)

More info?

TRU/e Master: info at http://true-security.nl

Peter Schwabe is the contact person for the Master specialisation in security

Pre-master programme? If you have done HBO or other bachelor than computer science:contact study advisors Perry Groot