Proseminar - Network Hacking & Defence

Course Registration and Topic Assignment

  • We offer 15 topics / places in total.

  • 14.07.2017, 13:15, 01.13.010: info meeting (presentation of teaching goals, rules and topic overview)
  • Registration and course assignment via TUM matching system in upcoming days / weeks.

  • 20.10.2017, 14:00, 03.07.023: kickoff meeting (presentation of teaching goals, rules and this semester's topics)
  • Topic assignment via matching system based on student preferences in upcoming days

Dates

  • 14.07.2017, 13:15, 01.13.010: info meeting
  • 20.10.2017, 14:00, 03.07.023: kickoff meeting
  • 27.10.2017, 14:00, 03.07.023: introduction lecture
    • how-to write a scientific paper
    • how-to prepare/give a scientific talk
    • how-to review a scientific paper
  • Dates of student talks
    • 12.01.2018, 14:00, 03.07.023
    • 19.01.2018, 14:00, 03.07.023
    • 26.01.2018, 14:00, 03.07.023
    • 02.02.2018, 14:00, 03.07.023
    • 09.02.2018, 14:00, 03.07.023

Topics

In this proseminar we have a look on security weaknesses of various important network protocols of all ISO/OSI layers. Furthermore, we focus on different online services and their security and privacy implications for users. Last not least, we investigate on mechanisms that help to mitigate the outcomes of the weaknesses we identified.

The list below contains topics of previous semesters. The final topic selection of this semester's proseminar might differ and will be presented at the kickoff meeting in the first week of the lecture period.

  • Preparation of attacks on networks, e.g., network scanning, service enumeration, etc.
  • Security weaknesses of network protocols, e.g., ARP, IP, TCP, etc.
  • Attacking the Internet's infrastructural services, e.g. name resolution (DNS), routing (BGP), etc.
  • Security and privacy problems of Internet services, e.g., Voice over IP (VoIP)
  • Weaknesses of security protocols, e.g., TLS, X.509 certificates
  • Attacking Web-2.0-Services, e.g., XSS, SQL injection, etc.
  • Attacks on cloud computing services
  • Malware, bot networks, etc.
  • Defence of attacks using, e.g., network intrusion detection or host intrusion detection systems

Binding rules

In order to successfully finish the proseminar, the following partial results need to be achieved:

  • hand in a written scientific paper about your topic, 6 - 8 pages (1st version)
  • write a review about the papers of two follow students
  • hand in a 2nd, revised version of your paper that incorporates feedback given by reviewers and advisors
  • prepare and give a scientific talk (25 minutes)

  • Presence is mandatory at all dates.

Further Information, Links, etc: