Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2025/2026

Introduction to Computer Security 1

Display time-table
Code Completion Credits Range Language
01ZPB1 Z 2 1+1 Czech
Course guarantor:
Petr Vokáč
Lecturer:
Petr Vokáč
Tutor:
Petr Vokáč
Supervisor:
Department of Mathematics
Synopsis:

1. Designing secure systems

2. Secure programming techniques, static code analysis

3. Buffer overflow

4. Securing operation systems

5. Running untrusted code (sandboxing)

Requirements:
Syllabus of lectures:
Syllabus of tutorials:
Study Objective:

Acquired knowledge:

Get familiar with thread modeling, common attacks originating from insecure code and techniques for achieving security. Learn security features provided by operating system to run securely untrustworthy computer code.

Acquired skills:

Design, implement and operate secure computer systems.

Study materials:

Literature:

[1] Akritidis, Periklis, Manuel Costa, et al.: Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors, USENIX Security Symposium, August 2009

[2] Neuman B.C., Ts?o T.: Kerberos: An authentication service for computer networks, IEEE Communications Magazine, September 1994

[3] Loscocco P., Smalley S.: Integrating Flexible Support for Security Policies into the Linux Operating System, Proceedings of the FREENIX, June 2001

[4] Howard M., LeBlanc M.: Writing Secure Code (2nd Edition), Microsoft Press, 2002

[5] Wheeler D.: Secure Programming HOWTO, 2015

[6] Rosenberg J., Remy D.: Securing web service with WS-security, SAMS, May 2004

[7] Russinovich M., Solomon D., Ionescu A.: Windows Internals (6th Edition), Microsoft Press, 2012

Note:
Time-table for winter semester 2025/2026:
Time-table is not available yet
Time-table for summer semester 2025/2026:
Time-table is not available yet
The course is a part of the following study plans:
Data valid to 2025-11-17
For updated information see http://bilakniha.cvut.cz/en/predmet5002106.html