Number of hours
- Lectures 15.0
- Laboratory works 3.0
ECTS
ECTS 1.5
Goal(s)
These lessons aims to acquire the knowledge and skills to develop secure applications. More precisely the targeted skills are the following ones :
- knowledge about classical vulnerabilities, mitigations and characteristics of adequate tools/platforms
- to be able to build security requirements, starting from risk analysis to protection mechanisms
- be able to formalize and verify security properties and security requirements
These lessons are illustrated by several examples and exercises. Two laboratory labs are planned. The first one is dedicated to reverse activity in order to exploit a vulnerable code. The second one is dedicated to formalization and verification of cryptographic protocols.
Contact Marie-Laure POTET
Content(s)
- Access control model and implementation (DAC, MAC, RBAC)
- Vulnerability and attack : programming languages and security features
- Java : a secure platform
- program analsis (high and low level)
- security protocola and property verification
- cryptography, properties and proofs
- Certification and Common Criteria
Prerequisites
Knowledge in compilation and semantics
Test
exam
N1=E1
N2=max(N1,E2)
Additional Information
Curriculum->Information Systems Engineering->Semester 5