Enrollment End Date
Created byV Kamakoti
Building Secure Systems involve secure hardware, secure micro architecture, secure operating systems, secure compilers and secure application development. Out of these, ensuring security at the hardware is most crucial as it is THE ROOT OF TRUST. In other words, however secure the Operating System, Compilers and Applications be, if the hardware on which these thrive is not secure, then the entire system can be compromised. The security of the system is a collective responsibility of Hardware and Software. In this second course in the Information Security series we shall deal with the hardware infrastructure available in contemporary architectures that are vital for building secure systems. We shall take the x86, ARM and PowerPC based architectures as case studies to explain the concepts.
Students of Core Course, Both UG and PG, BE, ME, MS, PhD
Week 1: Hardware Security in Modern Compute Systems
Week 2: Interaction of Compiler and OS with Hardware
Week 3: Hardware Privilege Levels
Week 4: Memory Segmentation
Week 5: Virtual memory and Paging
Week 6: Interrupt Service Routines
Week 7: Task Switching
Week 8: Establishing Hardware Root of Trust
To access the content, please enroll in the course.
Course Syllabus & Schedule
1) Prof. V. Kamakoti, Department of Computer Science and Engineering, IIT Madras specializes in the area of Computer Architecture and Hardware Design. His introduction to Information Security is through building secure systems. He is an advisor for many security critical organizations including Banking Institutions. He completed his Master of Science (By research) and PhD at the Department of Computer Science and Engineering, IIT Madras in the years 1992 and 1995 respectively. He completed his BE in Computer Science and Engineering from Sri Venketaswara College of Engineering (Affiliated to University of Madras) in the year 1989.
2) Dilip H. Ayyar has close to 18 years of experience in the Information Security area. He has co-founded two companies, the 7i Security (P) Ltd and Deccan Infotech (P) Ltd. These companies are involved in providing services such as Security operations Center, Network Operations Centre, Cloud computing, Virtualization, Storage as a service, etc. His role as a Technical Director includes Security Policy Formulations for clients, Security Audits and Penetration Testing for Clients, Web Security Audits and Concurrent Audit of Information Security. His clients include Bank data centers and stock exchanges. He holds a Bachelors Degree in Engineering, followed by an MBA. He has also got the following certifications- C|CISO, CRISC, CISM, CISA, CEH, CHFI, CFE, CCNA, ISO 27001 Lead Auditor & Implementer, ISO 9001:2008 LEAD AUDITOR, and, BS 15000 IMPLEMENTER