Free Online

Graz University of Technology Courses

Show filters

Level

Duration

Subject

Language

Introduction to Software Side Channels and Mitigations

Introduction to Software Side Channels and Mitigations

0

Same as the prerequisite course, we do not just enumerate side-channel effects and how to exploit them. We provide you with the experience of learning about side channels, in a group of students, living in a shared appartment. Together with them you will figure out that what software side channels are, why they are relevant for cybersecurity, in particular in our modern digital lifes, where all our secrets are stored on computers that can be subverted using side channels.In this course, we get one step closer to hugely impactful attacks like Meltdown and Spectre, which internally use side channels. We will learn about different simple software-based side channels and how they can be exploited. We will cover the basics, requiring some programming skills. We again focus on the security or side-channel mindset, as a crucial take-away for you, that you will be able to apply on a day-to-day basis in your studies, your job, and your personal life. You will extend your view on side channels and be able to assess risks in technical contexts in detail. In a set of small exercises, you will demonstrate that you understood the basics, and are able to find and exploit side channels in small software programs.

edX
10 weeks long, 2-3 hours a week
upcoming
view all
Side-Channel Security: Developing a Side-Channel Mindset

Side-Channel Security: Developing a Side-Channel Mindset

0

Side channels have become increasingly important over the past two decades in our digital world. With attacks like Meltdown and Spectre, which internally use side channels, they have gained world-wide relevance, as most computers on the planet are affected, and also the corresponding publicity. But why are side channels relevant to me? Because they are relevant to everyone!This course is not just a list of side-channel effects and how to exploit them. We provide you with the experience of learning about side channels, in a group of students, living in a shared appartment. Together with them you will figure out that what side channels are, why they are relevant for security, how they can inadvertantly influence us or leak our own most personal secrets to others.In this first season, we will cover the basics, without requiring any technical skills. The security or side-channel mindset we teach is still highly valuable, as it allows to assess risks both in the real world and in technical contexts. In a set of small exercises, you will demonstrate that you understood the basics, and acquired the way of thinking needed to find and exploit side channels.A set of small exercises for this course will be solved online with no need to download anything.

edX
10 weeks long, 1-3 hours a week
upcoming
view all
Electromagnetic Compatibility Essentials

Electromagnetic Compatibility Essentials

0

Why can’t I connect to WiFi? Why does my Bluetooth stop working when I use USB 3.0? Oh! I just sparked into my computer after sitting down; is it damaged now? All of these issues have to do with electromagnetic compatibility (EMC). International EMC experts David Pommerenke and Bernd Deutschmann break down situations that seem highly complex in order to highlight the causes of interference.This course is designed to gain essential know-how in today’s world of very high frequencies. For instance, smartphone CPUs already work with clock frequencies above 3 GHz. But did you know that such fast switching disturbs other devices nearby? Such disturbances are either simply annoying or can become a real problem. As a consequence, international regulations exist which demand for emission and immunity tests before selling an electronic device.The topic of EMC must be considered in all aspects of circuit design in order to reduce the number of prototypes. We would like you to gain an intuition for EMC with the help of lab examples. We emphasize basic physical principles and avoid highly complex mathematical derivations instead. After completion, a certificate will be awarded. We are already working on three follow-up courses to obtain a professional EMC certificate, backed by Graz University of Technology.TU Graz offers more than 10 on-campus lectures on the subject of EMC, most of them in small laboratory groups. More than 10 full-time employees investigate electromagnetism in a variety of applications just in our research group only. We would like to share this expertise with the community, since EMC must be considered by all electronics engineers and project managers.The FREE version of this course includes all material except final exam questions and the certificate. This is a self-paced course, so there are no weekly deadlines. You can join this class completely free of charge and purchase the certificate later in case you liked it. Give it a try and dive into the fascinating world of EMC.

edX
4 weeks long, 5-7 hours a week
selfpaced
view all
Side Channel Security Basics

Side Channel Security Basics

0

Side channelsare everywhere. They allow attackers to steal secret information that is protected and never directly exposed to the attacker. They are incredibly powerful and have disrupted the world in the last years, especially with attacks like Meltdown and Spectre that impacted most computers on the planet. Youhave also likely seen side channels and used them already yourself. In this program, consisting of two courses, you will learn and practice the side-channel mindset , understand how to spot side channels in the real-world and how to use them in non-technical and semi-technical settings. The first course will provide you with the ability to spot side channels and the security problems they introduce in your job, research, studies, and in everyday life. In both courses, you will solve simple exercises using side channels in the real world and on computer systems to practically apply the acquired skills.The first course requires no programming skills and has an entirely web-based exercise. In the second course, you will need basic programming skills (reading C code is required).We will provide you with all basics beyond that, including basics on operating systems, computer architecture, cryptography, and most importantly side-channel analysis. You will learn and practice how basic software-based side channels work and how you can mitigate them to protect yourself as well as the hardware and software you develop. We will provide you with Docker containers (and a tutorial on how to use them), to run the exercises on your own computer. Daniel Gruss is a internationally renowned expert in side-channel research and has written many seminal works in this field and presented them at renowned international conferences, especially on transient-execution attacks that affected the entire industry and defenses that have been implemented in all operating systems.

edX
20 weeks long, 1-3 hours a week
view all
Load more

Level

Duration

Language