Module overview
The course requires to understand C code, assembly language, x86 architectures and memory allocation (a refresher will be provided).
Linked modules
Pre-requisites: ELEC1201 or COMP1202
Aims and Objectives
Learning Outcomes
Subject Specific Intellectual and Research Skills
Having successfully completed this module you will be able to:
- Understand and recognise instances of the principal attacks on such systems
Subject Specific Practical Skills
Having successfully completed this module you will be able to:
- Take straightforward measures to protect systems from security breaches
Knowledge and Understanding
Having successfully completed this module, you will be able to demonstrate knowledge and understanding of:
- The range of cyber physical and software systems which present potential security hazards
Syllabus
- Types of attack and attacker, range of systems
- Side channel attacks: power analysis and resistant designs
- Wireless ID: ISO14443, Mifare, E-Passports and related near-field communications systems
- Card security, EMV payment systems, GSM and SIM cards
- Physical security: chip and pin machines
- Wired and WiFi network security
- Examples of weak cryptosystems: GSM, WEP
- Infrastructure attacks: smart grids
- Trusted Computing and secure modules
- Hardware Trojans and Trustworthy IC design
Learning and Teaching
Teaching and learning methods
Lectures are used to deliver the core knowledge. Hands-on laboratory sessions are used to explore the practical aspects of security of cyber physical devices. Further reading and code practice outside the lectures and laboratories will be essential.
Type | Hours |
---|---|
Revision | 10 |
Preparation for scheduled sessions | 18 |
Completion of assessment task | 46 |
Wider reading or practice | 22 |
Follow-up work | 18 |
Lecture | 36 |
Total study time | 150 |
Resources & Reading list
Textbooks
Gollmann, D. (2011). Computer Security.
Eilam, E. (2005). Reversing: Secrets of Reverse Engineering.
Ross J Anderson (2008). Security Engineering: A Guide to Building Dependable Distributed Systems.
Anderson, R. J. (2008). Security Engineering: A Guide to Building Dependable Distributed Systems.
Assessment
Assessment strategy
There will be four assessed practical laboratories, related to the topics taught in the module.
Any externally repeating students will need to be present in Southampton during the exam period at the end of the relevant semester. At this time, they will be offered the opportunity to repeat the assessed laboratories.
Summative
This is how we’ll formally assess what you have learned in this module.
Method | Percentage contribution |
---|---|
Continuous Assessment | 100% |
Referral
This is how we’ll assess you if you don’t meet the criteria to pass this module.
Method | Percentage contribution |
---|---|
Set Task | 100% |
Repeat
An internal repeat is where you take all of your modules again, including any you passed. An external repeat is where you only re-take the modules you failed.
Method | Percentage contribution |
---|---|
Set Task | 100% |
Repeat Information
Repeat type: Internal & External