6 ECTS credits
150 h study time

Offer 1 with catalog number 4020565ENR for all students in the 2nd semester at a (E) Master - advanced level.

Semester
2nd semester
Enrollment based on exam contract
Impossible
Grading method
Grading (scale from 0 to 20)
Can retake in second session
Yes
Taught in
English
Faculty
Faculty of Sciences and Bioengineering Sciences
Department
Computer Science
Educational team
Ahmed Zerouali (course titular)
Activities and contact hours
26 contact hours Lecture
26 contact hours Seminar, Exercises or Practicals
102 contact hours Independent or External Form of Study
Course Content

This course aims to cover core topics on security in computing.

This will include a selection of the following topics:

    *   Introduction in the domain of software security

    *   Cryptographic primitives

    *   Cryptographic protocols

    *   Cryptographic libraries

    *   Processor Security Primitives

    *   Low-level security

    *   Memory management vulnerabilities

    *   Side-channel vulnerabilities

    *   Capability-based security and object capabilities

    *   Authorization models and techniques

    *   Trusted electronic transactions

    *   Legal and societal aspects of software security and privacy

    *   Web security

The labs focus on practical instances of the above topics, for example practical exploitation techniques or employing cryptographic libraries to solve software security problems.

A software security project supports the course objectives.

Additional info

Study material:  All study material can be found on the learning platform.  It includes slides and digital learning material in pdf.

Learning Outcomes

General competences

Knowledge and insight.
The student gains insight in the properties of building blocks for security and can apply them to build security protocols.  At the end of the course, the student can apply cryptographic libraries to tackle software security problems.  The student can also reason about the security vulnerabilities in advanced software systems.  The student gains insight in state-of-the art mechanisms to protect applications.

The use of knowledge and insight.
The student can apply his knowledge to tackle software security problems.

Communication.
The student can report about a security software project in a written and oral manner.

Skills.
The course contributes to development of the skills necessary to deals with software security problems.

 

This course contributes to the following program outcomes of the Master in Science in Applied Computer Sciences:

-  The Master has advanced knowledge and understanding of the problems related to security and privacy in the context of software and digital data, and has advanced knowledge of techniques to develop secure software. 

- The master can, in the context of software-intensive systems, independently formulate problem statements and solutions with a focus on innovation and considering the scientific and technical constraints, and can implement those solutions or supervise the implementation.

- The master can make abstraction of and critically reflect on the technological state-of-the-art of Computer Science. He or she can choose between the different solutions provided by the relevant sub-domains, to implement a software-intensive project and can motivate his or her choices scientifically.

- The master has good knowledge of the scientific literature of both the theory and practice of advanced topics in computer science.

- The master is able to report and communicate in a scientific manner, both orally and in writing, to an audience of peers as well as to non-specialists, and both in Dutch and in English.

- The master has responsibility, is self-critical, can handle pressure, is scientifically-technically curious, and is disciplined and accurate in the elaboration of an assignment. He or she exhibits these properties both in independent work and in team work.

- The master has an inquiring attitude and an attitude of lifelong learning. He or she is able to independently acquire new scientific and technical information by consulting the literature (and refer correctly to it) and to process this information. He or she is able to actively keep his or her knowledge up-to-date.

- The master is aware of the ethical, social and economic context of his or her work and strives for sustainable solutions with an eye for security, privacy and quality.

Grading

The final grade is composed based on the following categories:
Other Exam determines 100% of the final mark.

Within the Other Exam category, the following assignments need to be completed:

  • Other exam with a relative weight of 1 which comprises 100% of the final mark.

Additional info regarding evaluation

The evaluation consists of two parts.  On the one hand, there is a software security project that must be submitted and orally defended.  This software project is made either alone or in groups consisting of two students, as decided by the didactic team. It counts for 50% in the overall evaluation.  On the other hand, there is a traditional oral exam with written preparation that also counts for 50% in the overall evaluation. Students must participate in both the exam and the course project in order to get a grade for the course.

Allowed unsatisfactory mark
The supplementary Teaching and Examination Regulations of your faculty stipulate whether an allowed unsatisfactory mark for this programme unit is permitted.

Academic context

This offer is part of the following study plans:
Master of Applied Informatics: Big Data Technology (only offered in Dutch)
Master in Applied Sciences and Engineering: Computer Science: Artificial Intelligence (only offered in Dutch)
Master in Applied Sciences and Engineering: Computer Science: Multimedia (only offered in Dutch)
Master in Applied Sciences and Engineering: Computer Science: Software Languages and Software Engineering (only offered in Dutch)
Master in Applied Sciences and Engineering: Computer Science: Data Management and Analytics (only offered in Dutch)
Master of Applied Sciences and Engineering: Computer Science: Artificial Intelligence
Master of Applied Sciences and Engineering: Computer Science: Multimedia
Master of Applied Sciences and Engineering: Computer Science: Software Languages and Software Engineering
Master of Applied Sciences and Engineering: Computer Science: Data Management and Analytics
Master of Applied Informatics: Profile Profile Big Data Technology