Current Term

Grundlagen der Cybersicherheit WS 16/17

Students learn the basics of cryptography, system security, network security and privacy-preserving mechanisms. They learn to define security goals and are familiarized with the most common attack scenarios.

Read More

Theoretical Aspects of Modern Security & Privacy Research WS 16/17

In this seminar, we will discuss recent theoretical developments in privacy and security research. We will simulate a computer science conference's review process by critically reviewing, presenting and discussing research papers with the participants in a block seminar.

Read More

Past Terms

Android Security Lab SS 16

In this practical course, the students deal with different aspects of smartphone security at the example of the open-source Android OS. In general, the awareness and understanding of the students for security and privacy problems in the area of smartphones is increased and they learn to tackle current security and privacy issues on smartphones from the perspectives of different actors in the smartphone ecosystem (e.g., end-users, app developers, market operators, etc.). The focus of this course is on the application-layer of Android.

Read More

From Idea to Paper: Usable Security Research in Theory and Practice SS 16

In this course, we will give you introductions into the methods used for usable security and privacy research. We will present you research topics - you are welcome to bring your own ideas! - that focus on usable security and privacy. You will program an application (either mobile or desktop) that helps answer your research question, use it to conduct a user study - the other seminar participants will be your subjects, and you will take part in their user studies, too - and evaluate it. You will write a short report that motivates your research, gives an insight into related work, presents your tool, your study, the results and their implications. In the end, you will give a short presentation about your insights.

Read More

Hacking SS 16

Goal of this Proseminar is to give students a deep understanding of the typical security problems and weaknesses that pervade all kinds of IT systems today. To provide a more solid understanding of the discussed attack techniques, this seminar strongly mixes theoretical and practical aspects. On the one hand, participants are conveyed the typical Proseminar learning contents (e.g., presentation techniques, etc.). On the other hand, the participants are required to also introduce and apply established tools for exploiting and attacking IT systems in the context of capture-the-flag styled exercises.

Read More

Theory of Modern Privacy Research SS 16

In this seminar, we will take a close look at the last decade of research on privacy and privacy enhancing technologies. Our main focus will be on the theory of private data release and data protection. We will simulate a computer science conference's review process by critically reviewing, presenting and discussing research papers with the participants in a 2-day block seminar.

Read More

Usable Security and Privacy WS 15/16

In this course, students will become familiar with the most important research of the last decade in Usable Security and Privacy. Simulating a computer science conference's review process, you will critically read and review papers, give short presentations and discuss the papers with other participants in a weekend seminar. The topics will include (but are not limited to) usability challenges of passwords, warning messages, TLS and permission systems.

Read More

Grundlagen der Cybersicherheit WS 15/16

Students learn the basics of cryptography, system security, network security and privacy-preserving mechanisms. They learn to define security goals and are familiarized with the most common attack scenarios.

Read More

Hacking SS 15

Goal of this Proseminar is to give students a deep understanding of the typical security problems and weaknesses that pervade all kinds of IT systems today. To provide a more solid understanding of the discussed attack techniques, this seminar strongly mixes theoretical and practical aspects. On the one hand, participants are conveyed the typical Proseminar learning contents (e.g., presentation techniques, etc.). On the other hand, the participants are required to also introduce and apply established tools for exploiting and attacking IT systems in the context of capture-the-flag styled exercises.

Read More

Android Security Lab WS 14/15

In this practical course, the students deal with different aspects of smartphone security at the example of the open-source Android OS. In general, the awareness and understanding of the students for security and privacy problems in the area of smartphones is increased and they learn how to extend Android with new security features to tackle current security and privacy issues.

Read More

Grundlagen der Cybersicherheit WS 14/15

Students learn the basics of cryptography, system security, network security and privacy-preserving mechanisms. They learn to define security goals and are familiarized with the most common attack scenarios.

Read More

Bachelor/Master Seminar WS 16/17

In the Bachelor/Master Seminar each student that writes a bachelor's or master's thesis with a member of the IS&C group has to present the topic of the thesis.

Read More

Past Teaching

Teaching Archive