Start Date
01/07/2018
End Date
07/09/2018
Enrollment End Date
07/09/2018
No. of
Enrollments
497 students
No course
syllabus uploaded
Created by
V Kamakoti55
Tutorials
0
Test
0
Assignment
0
Article
0
Weekly Reading list
Overview
Building Secure Systems involve secure hardware, secure micro architecture, secure operating systems, secure compilers and secure application development. Out of these, ensuring security at the hardware is most crucial as it is THE ROOT OF TRUST. In other words, however secure the Operating System, Compilers and Applications be, if the hardware on which these thrive is not secure, then the entire system can be compromised. The security of the system is a collective responsibility of Hardware and Software. In this second course in the Information Security series we shall deal with the hardware infrastructure available in contemporary architectures that are vital for building secure systems. We shall take the x86, ARM and PowerPC based architectures as case studies to explain the concepts.
INTENDED AUDIENCE
Students of Core Course, Both UG and PG, BE, ME, MS, PhD
PRE-REQUISITES
Basic Programming
COURSE LAYOUT
Week 1: Hardware Security in Modern Compute Systems
Week 2: Interaction of Compiler and OS with Hardware
Week 3: Hardware Privilege Levels
Week 4: Memory Segmentation
Week 5: Virtual memory and Paging
Week 6: Interrupt Service Routines
Week 7: Task Switching
Week 8: Establishing Hardware Root of Trust
To access the content, please enroll in the course.
Faculty
1) Prof. V. Kamakoti, Department of Computer Science and Engineering, IIT Madras specializes in the area of Computer Architecture and Hardware Design. His introduction to Information Security is through building secure systems. He is an advisor for many security critical organizations including Banking Institutions. He completed his Master of Science (By research) and PhD at the Department of Computer Science and Engineering, IIT Madras in the years 1992 and 1995 respectively. He completed his BE in Computer Science and Engineering from Sri Venketaswara College of Engineering (Affiliated to University of Madras) in the year 1989.
2) Dilip H. Ayyar has close to 18 years of experience in the Information Security area. He has co-founded two companies, the 7i Security (P) Ltd and Deccan Infotech (P) Ltd. These companies are involved in providing services such as Security operations Center, Network Operations Centre, Cloud computing, Virtualization, Storage as a service, etc. His role as a Technical Director includes Security Policy Formulations for clients, Security Audits and Penetration Testing for Clients, Web Security Audits and Concurrent Audit of Information Security. His clients include Bank data centers and stock exchanges. He holds a Bachelors Degree in Engineering, followed by an MBA. He has also got the following certifications- C|CISO, CRISC, CISM, CISA, CEH, CHFI, CFE, CCNA, ISO 27001 Lead Auditor & Implementer, ISO 9001:2008 LEAD AUDITOR, and, BS 15000 IMPLEMENTER
FAQs
Download App
Download SWAYAM applications from popular app stores