cyber security master€¦ · digital 3d geometry processing 5 digital education & learning...

4
MASTER CYBER SECURITY

Upload: others

Post on 01-Oct-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CYBER SECURITY MASTER€¦ · Digital 3D geometry processing 5 Digital education & learning analytics 4 Distributed information systems 4 Distributed intelligent systems 5 Dynamical

MASTER

CYBER SECURITY

Page 2: CYBER SECURITY MASTER€¦ · Digital 3D geometry processing 5 Digital education & learning analytics 4 Distributed information systems 4 Distributed intelligent systems 5 Dynamical

We hear about data breaches and attacks on critical infrastructure every day.

How do we safeguard our information society? How do we engineer systems

that are secure by design? These are the central questions of Cyber Security – an

exciting and crucial research area within Computer Science.

Page 3: CYBER SECURITY MASTER€¦ · Digital 3D geometry processing 5 Digital education & learning analytics 4 Distributed information systems 4 Distributed intelligent systems 5 Dynamical

Speeding up the Interplanetary File System

The Interplanetary File System, or IPFS, is an open-source protocol for file storage and distribution on a peer-to-peer network. It aims to provide a secure, open alternative to cloud storage systems offered

by companies like Google and Dropbox.

The Decentralized and Distributed Systems Lab (DEDIS) has already developed a protocol called CRUX, which enables distributed systems to be faster and more resilient to network failures

through an approach called automated locality. Guillaume’s semester project in the Master in Cyber Security program aims to apply CRUX to IPFS. The goal is to create an automated,

locality-aware networking framework to make stored data available more quickly and securely, in proportion to user distance and location. For example, users in

Switzerland would be able share data faster and more reliably when the processing involves nodes in their own country, rather

than more distant nodes in New Zealand.

© Nasa on Unsplash

Nazli Deniz Uzuner:“The current need to protect our

online data has been an inspiration for choosing this Master. I have always been curious about where my data goes, and what can be done with it when I connect to social networks. I started reading about this topic and thinking about what an adversary could do with my data, and realized that I really like this field. ”

Guillaume Michel:“What interests me the most

in Computer Science is the security aspect, because it’s

like a game. You always get to attack and defend.”

A Guaranteed-Secure WiFi Router

Nazli’s research is part of the “Secure home router” umbrella project in the

Dependable Systems Lab (DSLab) which is led by Professor

George Candea. The overall goal is to verify that all the functions of a modern WiFi

home router execute correctly and securely.Nazli’s part of the project is to formally verify the very

heart of the intrusion detection and prevention function, common on advanced home routers. This is essentially a

regular expression matcher that allows to automatically search for patterns in the network traffic and determine whether an attack is about

to begin or is in progress.

“We verify such programs so that, when they run, you know for sure that they don’t have any vulnerability that can be exploited by a remote attacker keen on taking control over your home router, spying on you, and stealing your data,” Nazli explains. “I wrote such a regular expression matcher, and now I’m working on formally verifying it. A formally verified program is guaranteed to be correct and secure, and doesn’t even need testing anymore.”

Page 4: CYBER SECURITY MASTER€¦ · Digital 3D geometry processing 5 Digital education & learning analytics 4 Distributed information systems 4 Distributed intelligent systems 5 Dynamical

Breadth requirements, depth courses

and options72 ECTS

Seme�er proje� 12 ECTS

Ma�er’s thesis30 ECTS

Proje� in social and human sciences6 ECTS

School of Computer and Communication Sciencesgo.epfl.ch/master-cyber-securitycontact: [email protected]

This program includes an 8-week industrial internship.

Students are required to spend at least one semester in ETH Zürich where they will take classes counting as breadth and depth courses. Upon graduating, they receive a joint Master of Science from both EPFL and ETHZ.

Master of Science in

CYBER SECURITY Joint master EPF Lausanne - ETH Zürich

2-year program - 120ECTS

Cre

dit

s

Depth courses and optionsAdvanced compiler construction 4Advanced computer graphics 6Advanced cryptography 4Advanced multiprocessor architecture 6Advanced probability and applications 6Advanced topics in privacy enhancing technologies 7Advanced VLSI design 4Applied biostatistics 5Applied data analysis 6Artificial neural networks 5Automatic speech processing 3Biological modeling of neural networks 4Biomedical signal processing 6Business design for IT services 3Cellular biology and biochemistry for engineers 4Computational complexity 4Computational photography 5Computer vision 4Concurrent algorithms 5Data visualization 4Deep learning 4Design technologies for integrated systems 6Digital 3D geometry processing 5Digital education & learning analytics 4Distributed information systems 4Distributed intelligent systems 5Dynamical system theory for engineers 4Embedded systems 4Enterprise and service-oriented architecture 6Experience design 6Foundations of data science 6Formal verification 6Fundamentals of VLSI design 4Gödel and recursivity 5Image processing I 3Image processing II 3Industrial automation 3Information theory and coding 7Intelligent agents 6Interaction design 4Introduction to natural language processing 4Learning theory 4Machine learning for behavioral data 4Markov chains and algorithmic applications 4Mathematical foundations of signal processing 6Mobile networks 4Modern digital communications: a hands-on approach 6Networks out of control 4Number theory in cryptography 5Optimization for machine learning 5Optional project in computer science 8Performance evaluation 7Principles of computer systems 7Probabilistic method in combinatorics 5Real-time embedded systems 4Sensors in medical instrumentation 3Set theory 5Smart grids technologies 5Social media 2Software security 6Statistical signal and data processing through applications 6Student seminar : security protocols and applications 3Sublinear algorithms for big data analysis 4Technology ventures in IC 4Topics in theoretical computer science 4Virtual reality 4ETHZ courses counting as depth coursesETHZ courses counting as options

Cre

dit

s

Breadth requirement (min. 30 credits)Advanced algorithms 7Advanced computer architecture 6Cryptography and security 7Database systems 7Decentralized systems engineering 6Distributed algorithms 6Foundations of software 4Information security and privacy 6Machine learning 7TCP/IP networking 6ETHZ courses counting as breadth requirement

© 0

7.20

20, É

cole

pol

ytec

hniq

ue fé

déra

le d

e La

usan

ne -

Des

ign:

did

ier-

ober

son.

ch