Visual Information Processing and Protection Group
Protecting the digital ecosystem that surrounds us and plays a more and more essential part in our lives is a pressing need that modern society can no longer ignore. The discipline studying the tools and technology that can be used to this aim is usually, and rather vaguely, referred to as cybersecurity. Such a term broadly encompasses a wide and diverse set of techniques including classical cryptographic tools, security protocols for user authentication, end-to-end communication, network monitoring and protection, intrusion detection, malware recognition, authentication and protection of multimedia contents.
In this framework, the goal of this course is to give an overview of some of the most common threats and security measures affecting end-to-end communications and networks. The first part of the course focuses on cryptography, since cryptographic tools are the main ingredient behind most security protocols and information protection systems. Then the course passes to review the main threats to cyber-systems and present the main classes of countermeasures security engineers can take to defend against the cyber-threats.
The second part of the course consists of laboratory classes during which the concepts introduced in the first part are put at work in some specific settings.
The third and last part of the course will adopt a different perspective and introduce the students to the problems related to the protection of multimedia contents, including methods for copyright protection, media authentication and covert communication by means of image steganography. We will also briefly touch upon the security issues related to the use of AI techniques in adversarial settings.
Very basic elements of calculus, probability theory, digital networks, image processing
FOUNDATIONS OF CRYPTOGRAPHY
Basic concepts and definitions
Cryptography, cryptanalysis and security models
Symmetric encryption
- Block ciphers
- DES / AES
- Stream ciphers
- Key distribution
Asymmetric cryptography
- Basic concepts, trapdoor functions
- Some popular public-key cryptosystems: RSA
Key distribution: Diffie-Helman key exchange protocol
Authentication
- MAC functions
- Hash functions
- Digital signatures
Random Number generators
Signal and information processing in the encrypted domain
- Application to privacy protection
COMPUTER SECURITY
User authentication
- Password-Based Authentication
- Token-Based Authentication
- Remote User Authentication
- Biometric-based authentication
Access control
- Basic principles
- Discretionary Access Control
- Role-Based Access Control
- Attribute-Based Access Control
Malicious Software (Malware)
- Classification of Malware
- Propagation mechanisms
- Payloads
- Countermeasures
Denial of Service (DoS) attacks
- Classification of DoS
- Distributed DoS attacks
- Defenses
Intrusion detection and prevention
- Host-based intrusion detection
- Network-based intrusion detection
- Firewalls
LABORATORY EXERCISES
MULTIMEDIA SECURITY
Data hiding and watermarking
Steganography
Steganalysis
Multimedia Forensics
- Source identification
- Tampering detection
AI-security
TEXTBOOKS
- W. Stallings, Cryptography and Network Security, Mc Graw Hill, 4-th edition
- Notes of the course, available below
Offline Website Maker