Download presentation
Presentation is loading. Please wait.
Published bySuzanna Cunningham Modified over 9 years ago
1
Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)
2
Why study computer security? Interesting and hot topic, with excellent job opportunities Real impact in everyday life & society Opportunities for multidisciplinary research And why study it here in Nijmegen? Leading research group in computer security in the Netherlands Broad range of research, from theoretical to practical eg work on online privacy & electronic identities in
3
Organisation & Practicalities The Master is taught together with TU Eindhoven Previously also with UTwente, as Courses in Nijmegen and Eindhoven You have to at least take 3 obligatory courses in Eindhoven To reduce travel hassle -Courses scheduled on the same day and not in the first 2 hours -Some courses via tele-lecturing Minimal travel hassle over 2 years: 1 quarter going to Eindhoven twice a week (for 2 mandatory courses, on same day); the 3rd mandatory course is tele-lectured.
4
Topics that you study Security protocols Cryptography Software security Network security Organisational aspects of computer security Privacy Hardware security – esp. smartcards and RFID Legal aspects of computer security
5
Programme 6 mandatory courses (30 EC) Seminar: Privacy Seminar at RU (or IST Seminar at TUE) Electives - choice from 6 optional security courses Free choice Computer Science & Society (3EC) plus Research internship (15EC) Master thesis (30 EC)
6
Specialisation-specific courses Optional Law in Cyberspace Hardware Security Cryptographic Engineering Physical Aspects of Computer Security Applied Cryptography Hacker’s Hut Mandatory Software Security Security in Organisations Network Security Privacy Seminar At TUE Cryptography Principles of Data Protection Verification of Security Protocols
7
Some of the researchers Bart Jacobs correctness & security of software quantum logics Erik Poll software security smartcard security payment systems, smart grids Jaap Henk Hoepman privacy Internet of Things identity management Mireille Hildebrandt legal aspects of security, privacy and profiling Lejla Batina physical security lightweight crypto RFID Peter Schwabe high-speed crypto cryptanalysis
8
Master thesis projects with company?
9
Going abroad? Going abroad for a semester can be a great experience! Eg for your master thesis, or for regular courses & research internship. If you’re interested in this, plan ahead ! E.g. Bart van Delft went to Chalmers in Gothenborg, Sweden (and never came back...)
10
Master theses: topics, impact & careers Tim Cooijmans. Cryptographic Key Storage and TEE on Android Presented at SPSM 2014, USA. Tim is now with SNS bank Manu Drijvers. Delegation in attribute based credentials Manu joined IBM research in Zurich as PhD student Mathias Morbitzer. TCP Idle scans in IPv6 Presented at Hack in the Box Malaysia and at HACK.LU. Joined Fox-IT Pol van Aubel. Effective host-based intrusion of real-time systems Joined DS group as PhD student on project with TenneT Arturo Cedillo Torres & Brinio Hond. Fuzzing the GSM protocol Presented at Essos 2014. They both joined KPMG Gerhard de Koning Gans. Analysis of the MIFARE classic. Now with High Tech Crime Unit of Dutch police after PhD in DS group
12
Master theses: topics, impact & careers Ruben Muijrers. RAM: Rapid Alignment Method Published at CARDIS 2012 & implemented in commercial tool. Joined Riscure
13
Master theses: topics, impact & careers Arjan Blom. ABN-AMRO E-dentifier2 reverse engineering Published at NordSec 2012 and lots of media attention. Started own company Georg Chalupar, Stefan Peherstorfer. Reverse Engineering Using LEGO Published at WOOT 2014 in San Diego
14
More info? TRU/e Master: info at http://true-security.nl Peter Schwabe is the contact person for the Master specialisation in security Pre-master programme? If you have done HBO or other bachelor than computer science: contact study advisors Perry Groot
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.