1 Hardware Security Organisational stuff Lejla Batina & Erik Poll Digital Security Radboud University Nijmegen.

Slides:



Advertisements
Similar presentations
Security of JavaCard smart card applets Erik Poll University of Nijmegen
Advertisements

Lecture 14: Diet Problem/Intro to Final Project AGEC 352 Spring 2011 – March 21 R. Keeney.
Master track Computer security: studying at the Kerckhoffs Institute Lejla Batina Digital Security Group Institute for Computing and Information Sciences.
Jaap-Henk Hoepman TNO ICT, Groningen, the Netherlands  Digital Security (DS) Radboud University Nijmegen, the Netherlands 
E- passports Erik Poll Digital Security Group Radboud University Nijmegen.
Course summary COS 433: Crptography -Spring 2010 Boaz Barak.
© 2008 T.Zlateva, L.Burstein, A.MacNeil Virtual Laboratories for Learning Real World Security The 12 th Colloquium for Information Systems Security Education.
G53SEC 1 Hardware Security The (slightly) more tactile side of security.
RFID Security and Privacy. RFID Radio Frequency IDentification Warning: "RFID tag" can mean a lot of things.
1-1 Welcome to: CSC225 Introduction to Computer Organization Paul Hatalsky.
Lecture 3.3: Public Key Cryptography III CS 436/636/736 Spring 2012 Nitesh Saxena.
CS510 Concurrent Systems Course Overview. CS510 - Concurrent Systems 2 About the Instructor  Instructor – Jonathan Walpole o Professor at PSU o Research.
Feb 19, 2002Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
EECS 110: Introduction to Programming for Non-Majors
Assessment Reports Due: 4/4/2011 (Monday) 150 Points.
Networked Systems Practicum Lecture 1 – Introduction 1.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Master Track in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks Authors: Saar Drimer and Steven J. Murdoch Presented in: Usenix Security Symposium.
1 ECE 156 Computer Network Architecture Professor Krish Chakrabarty Department of Electrical and Computer Engineering Fall 2006.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)
Questions: Why is your answer correct? What is wrong with each of the other answers?
ENEE244-02xx Digital Logic Design Lecture 12. Announcements HW4 due today HW5 is up on course webpage. Due on 10/16. Recitation quiz on Monday, 10/13.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Final Exam Thursday, Dec 15 th 1 – 4pm E 230. Process for final exam Handwritten; no laptops or other communicating devices Handwritten; no laptops or.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
SEC835 Security in Databases and Web applications Presentation.
Presented by Prof. Danilo Gligoroski MSc in Telematics Specialization in Information Security.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Computer Information Technology. I need you to submit your project electronically to the Hancock website. Before you can submit your project you will.
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Mohammad Alauthman 1/22/20162 This 3-credit first course for computer science & IT majors, which provides students the basic understanding.
EECS 110: Introduction to Programming for Non-Majors Aleksandar Kuzmanovic Northwestern University
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
Introduction to Developmental Math II. Syllabus Mala Persaud T & R (4:00 –6:45 pm)
Modelling Privacy for Off-line RFID Systems Flavio Garcia Radboud University Nijmegen together with Peter van Rossum RFIDSec 2009.
Lecture 8 Page 1 CS 236 Online Prolog to Lecture 8 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
BIT 115: Introduction To Programming. 2 Today Midterm feedback Getting User Input.
Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)
MiLazyCracker Kevin Larson.
Master Specialisation in Cyber security
FLIPPED CLASSROOM FOR AUTHENTIC LEARNING SUCCESS
Master Specialisation in Cyber security
PV204 Security technologies
CNT 4704 Computer Communication Networking (not “analysis”)
CNT 4704 Computer Communication Networking (not “analysis”)
Course Introduction Yuzhe Tang.
Exercise The university wants to create a database for teaching. The database needs to contain information about the different courses, the different versions.
CNT 4704 Computer Communication Networking (not “analysis”)
CS 7403 Secure Electronic Commerce University of Tulsa Tyler Moore
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
CS4622 Final Project Objective: Research & Teach a “CS4622 Related “ Subject at a high-level using existing knowledge Teams will teach the class about.
CNT 4704 Analysis of Computer Communication Networks
CNT 4704 Analysis of Computer Communication Networks
CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena
CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena
Pima Medical Institute Online Education
Lon-Capa 3rd HW assignment due today 5 pm. 2nd Quiz due today by10 pm.
CS 250, Discrete Structures, Fall 2014 Nitesh Saxena
CS4622 Final Project Objective: Research & Teach a “CS4622 Related “ Subject at a high-level using existing knowledge Teams will teach the class about.
Homework Reading Machine Projects Labs
CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena
CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena
Presentation transcript:

1 Hardware Security Organisational stuff Lejla Batina & Erik Poll Digital Security Radboud University Nijmegen

2 Course webpage Register in BB or sent me an

Other faces you'll see 3 Joeri de Ruite JavaCard project Lejla Batina side-channel Baris Ege side-channel practical

This course: topics Smartcards –as prime example of "secure" hardware today –the standard solution for authentication of username/password is not secure enough RFID tags attacks & countermeasures case studies: EMV, e-passport, Mifare,.. 4

This course: form 1.lectures & some literature 2.group JavaCard smartcard project in groups of 4 3.side-channel lab assignments in groups of 2 4.individual written exam Grade based on 2, 3, 4: 40%, 30%, 30% 5

JavaCard smartcard project Building smartcard system Goals –experience the whole process from high-level design, given security requirements and assumptions, down to actual code on real hardware –appreciate complexity & interplay of design considerations & constraints, key management & distribution, protocols, silly hardware limitations, weird crypto padding,... practicalities of getting all this working,... 6

JavaCard smartcard project Four choices 1)electronic purse 2)loyalty card 3)petrol rationing 4)car rental Form groups of 4 persons asap –also let us know any group problems asap!! so we can distribute smartcards & readers 7

Side-channel lab assignments practical experience with very successful method of attack on smartcards: Power Analysis using our fancy toys in the lab 8