Inizio della pagina -
Logo DISCO
|
Visita la Versione ad elevata leggibilità
|
Vai al Contenuto della pagina
|
Vai alla Fine dei contenuti
|
Vai al Menu Principale
|
Vai alla Barra di navigazione (sei in)
|
Vai al Menu di navigazione (albero)
|
Vai alla Lista dei comandi
|
Vai alla Lista degli approfondimenti
|
Vai al Menu inferiore
|
Logo Ateneo
   
Paradigms and Approaches to Computer Security
Professor

 

Claudio Ferretti

Period and location

 

The lectures for the PhD course "Paradigms and Approaches to Computer Security" will be held in "Sala Seminari" of Bicocca U14 building (viale Sarca 336/14) according the following schedule:

 

to ease the participation given this short notice the opening lecture will be repeated on thu. h14.00-16.00 30/jan/2014 and fri. h10.30-13.30 31/jan/2014

 

and we will continue with the following regular schedule:

thu. h14.00-16.00 06/feb/2014

fri. h10.30-13.30 07/feb/2014

thu. h14.00-16.00 13/feb/2014

fri. h10.30-13.30 14/feb/2014

thu. h14.00-16.00 20/feb/2014

fri. h10.30-13.30 21/feb/2014

thu. h14.00-16.00 27/feb/2014

fri. h10.30-13.30 28/feb/2014

 

 

 

Registration: Send an email to ferretti@disco.unimib.it and robaldo@disco.unimib.it

Topic - Aim organization

 

Introduction:

 Rationale of the research area " Computer Security " :

  complexity of the artifacts (software, networks , ...)

  economy and crime

  privacy

 Approaches to the problem :

  protection from abuse ( simplicity, encryption , ...)

  vulnerability search (analysis, monitoring , ...)

  production of automated tools

 

Some results:

 An attack to the operating system: NULL pointer dereference

 Encryption: from CLIPPER to Trusted Computing for the operating system

 Encryption: attacks based on Fault Injection

 Vulnerability in authentication of Android software : "master key"

 Analysis and Modeling : An Example to locate Buffer Overflow in software

 Model checking: the theoretical foundations ( logic , automata )

 Results for model checking of protocols

 Results for model checking of software

 Compositional analysis of the Heap based on Bi- Abduction

 

Outlook:

 Security issues in some new technologies :

  tools based on big data

  responsive web applications

 Trends and new paradigms

Program

 

Computer security research involves fields and techniques very different, from physics to algebra for encryption, but it always answers to a key challenge: the control of the complexity of computer systems and communication.

Advancements of research has changed the scene where defenses and attackers confront themselves (from the initial simple exploitation of involuntarily weak elements in the software, to the current need, for example, to oganize large coordinated attacks in order to make inroads in modern protections), but the challenge is still open and the problems to be studied countless.

The course will present a selection of the possible areas of research in this varied field. The participants will learn the complete scientific path that has led to some important results, and here that path often requires to be able to start from a base of theoretical models to arrive at producing effective tools, required when responding to technological challenges in the field.

Final Examination

Final report on agreed topic

Operating methods

Lectures + reading and discussion on articles about specific topics

Educational Material
Nessun approfondimento presente per questa pagina

Google Translate
Translate to English Translate to French Translate to German Translate to Spanish Translate to Chinese Translate to Portuguese Translate to Arabic
Translate to Albanian Translate to Bulgarian Translate to Croatian Translate to Czech Translate to Danish Translate to Dutch Translate to Finnish Translate to Greek Translate to Hindi
Translate to Hungarian Translate to Irish Translate to Japanese Translate to Korean Translate to Norwegian Translate to Polish Translate to Romanian Translate to Russian Translate to Serbian
Translate to Slovenian Translate to Swedish Translate to Thai Translate to Turkish

(C) Copyright 2016 - Dipartimento Informatica Sistemistica e Comunicazione - Viale Sarca, 336
20126 Milano - Edificio U14
redazioneweb@disco.unimib.it - ultimo aggiornamento di questa pagina 24/01/2014