Data Security for Embedded Systems, 7.5 credits
Datasäkerhet för inbyggda system, 7,5 hp
Course code: DT4020
School of Information Technology
Level: First cycle
Select course syllabus
Finalized by: Forsknings- och utbildningsnämnden, 2024-11-18 and is valid for students admitted for spring semester 2025.
Main field of study with advanced study
Computer Science and Engineering, First cycle, has less than 60 credits in first-cycle course/s as entry requirements. (G1F)Entry requirements
The courses Algorithms and Data Structures 7.5 credits, Algebra and Discrete Mathematics 7.5 credits and Computer Systems Engineering I 7.5 credits. English 6. Exemption of the requirement in Swedish is granted.
Placement in the Academic System
The course is included in Computer Science and Engineering, 300 credits and Computer Engineering, 180 credits.
Objectives
Security concerns (data confidentiality, integrity, privacy, user identity and access) and protection of assets is a major concern in practically all modern computer systems – big scale, personal, and embedded ones. The aim of the course for the students is to develop an understanding of the basic considerations and mechanisms to ensure security of such systems, including the hardware aspects for embedded systems. The students will acquire knowledge about the theoretical core principles of cryptography and data protection, as well as practical experience of how to use language libraries, system tools, and appropriate design methods to construct secure systems.
After successful completion of the course the student should be able to:
Knowledge and understanding
- explain the basic computer security terminology, the principles and mathematics of symmetric and asymmetric key cryptography as well as associated cryptographic mechanisms (e.g., hash codes), authentication and access control methods
- explain the principles and security considerations of designing secure data transfer protocols
- explain the relation of security concepts to social responsibility of providing a functional, privacy friendly, safe, reliable, and sustainable solution
- describe the principles behind the design and developments methods of secure embedded systems, taking also into consideration standardization, certification, integration with existing solutions in the society, and requirements on sustainability
Skills and ability
- apply basic mathematical operations of symmetric and asymmetric key cryptography on examples
- use the standard cryptographic tools and programming language libraries (API) of one or two programming language
- design and implement a basic security sensitive application or system using the principles taught in the course
Judgement and approach
- perform a security analysis of an existing code in the context of side channel attacks and external exploitation, data protection
- evaluate a design or product in IT from the point of view security, usability, social value and acceptance, as well as impact on sustainability (for example, due to device costs, or required computing power)
Content
Security assets in IT, data confidentiality and integrity, secret, private and public ciphers, message authentication codes, public key cryptography, standard cryptographic tools and libraries, access privileges and access control methods, system design for security, secure system development methods, examples of security sensitive applications (in electronic identity and financial domain) with analysis from the technical, social, and impact for society point of view, data transfer protocols and protection against different kind of attacks, hardware protection, side channel attacks, programming for security.
Language of Instruction
Teaching Formats
A series of lectures introducing the concepts and methods described above, accompanied by numerous real examples from the security domain. Supervised exercise/lab classes to solve the lab assignments that are designed to develop the practical skills as well as build the knowledge and understanding required to describe, analyze, evaluate, and judge different security solutions as described above.
Grading scale
Examination formats
The examination will consists of obligatory lab work and a written examen.
1701: Laboratory Assignments, 3 credits
Two-grade scale (UG): Fail (U), Pass (G)
1702: Written Examination, 4.5 credits
Four-grade scale, digits (TH): Fail (U), Pass (3), Pass with credit (4), Pass with distinction (5)
Exceptions from the specified examination format
If there are special reasons, the examiner may make exceptions from the specified examination format and allow a student to be examined in another way. Special reasons can e.g. be study support for students with disabilities.
Course evaluation
Course evaluation is part of the course. This evaluation offers guidance in the future development and planning of the course. Course evaluation is documented and made available to the students.
Course literature and other materials
Literature list 2025-01-20 – Until further notice
DavidKleidermacher & Mike Kleidermacher. Embedded Systems Security, 1st edition, Elsevier (not mandatory).
Ross Anderson, Security Engineering, 2.uppl, Wiley. Available at: http://www.cl.cam.ac.uk/~rja14/book.html
Online materials in the form of news articles and videos from the security field will be made available during the course via the course site on the university's learning platform.