Visual Information Processing and Protection Group

Cybersecurity

Goals

Protecting the digital ecosystem that surrounds us and plays a more and more essential part in our lives is a pressing need that modern society can no longer ignore. The discipline studying the tools and technology that can be used to this aim is usually, and rather vaguely, referred to as cybersecurity. Such a term broadly encompasses a wide and diverse set of techniques including classical cryptographic tools, security protocols for user authentication, end-to-end communication, network monitoring and protection, intrusion detection, malware recognition, authentication and protection of multimedia contents. 

In this framework, the goal of this course is to give an overview of some of the most common threats and security measures affecting end-to-end communications and networks. The first part of the course focuses on cryptography, since cryptographic tools are the main ingredient behind most security protocols and information protection systems. Then the course passes to review the main threats to cyber-systems and present the main classes of countermeasures security engineers can take to defend against the cyber-threats. 

The second part of the course consists of laboratory classes during which the concepts introduced in the first part are put at work in some specific settings. 

The third and last part of the course will adopt a different perspective and introduce the students to the problems related to the protection of multimedia contents, including methods for copyright protection, media authentication and covert communication by means of image steganography. We will also briefly touch upon the security issues related to the use of AI techniques in adversarial settings.

Required Background

Very basic elements of calculus, probability theory, digital networks, image processing

Syllabus

FOUNDATIONS OF CRYPTOGRAPHY

Basic concepts and definitions

Cryptography, cryptanalysis and security models

Symmetric encryption

- Block ciphers

- DES / AES

- Stream ciphers

- Key distribution

Asymmetric cryptography

- Basic concepts, trapdoor functions

- Some popular public-key cryptosystems: RSA

Key distribution: Diffie-Helman key exchange protocol

Authentication

- MAC functions

- Hash functions

- Digital signatures

Random Number generators

Signal and information processing in the encrypted domain

- Application to privacy protection


COMPUTER SECURITY


User authentication

- Password-Based Authentication

- Token-Based Authentication

- Remote User Authentication

- Biometric-based authentication


Access control

- Basic principles

- Discretionary Access Control

- Role-Based Access Control

- Attribute-Based Access Control


Malicious Software (Malware)

- Classification of Malware

- Propagation mechanisms

- Payloads

- Countermeasures


Denial of Service (DoS) attacks

- Classification of DoS

- Distributed DoS attacks

- Defenses


Intrusion detection and prevention

- Host-based intrusion detection

- Network-based intrusion detection

- Firewalls

LABORATORY EXERCISES

MULTIMEDIA SECURITY

Data hiding and watermarking

Steganography

Steganalysis

Multimedia Forensics

- Source identification

- Tampering detection

AI-security

TEXTBOOKS

- W. Stallings, Cryptography and Network Security, Mc Graw Hill, 4-th edition

- Notes of the course, available below

Course Slides

1.        Introduction to the course on CyberSecurity. Download Slides.
2.        CyberSecurity overview. Download Slides.
3.        Basic Cryptography. Download Slides.
4.        Symmetric Cryptography. Download Slides.
5.        Asymmetric Cryptography. Download Slides.
6.       Miscellanea: Authentication, digital signature, PRNG. Download Slides.
7.        Computing with Private Data. Download Slides.
8.       User Authentication. Download Slides.
9.       Access Control. Download Slides.
10.     Malware: Threats and Defenses. Download Slides.
11.     Denial of Service Attacks. Download Slides.
12.     Intrusion Detection and Prevention. Download Slides.
13.     Steganography, Steganalysis and Watermarking. Download Slides.
14.     Introduction to Multimedia Forensics. Download Slides.
15.     Forensic analysis of JPEG images. Download Slides.
16.     Machine Learning Security. Download Slides.

© Copyright 2025 VIPP Group - All Rights Reserved

Offline Website Maker