Table of Contents

Lectures

Lectures are held weekly on Thursdays, 12:45-14:15 in KN:E-301 according to the following plan:

You can also watch the lectures in live on livestream. After post-processing, lectures are published on this youtube channel
In addition to the extensive “Additional reading” section in each lecture, you can see (and improve) the material created by Vojtech Kozel in 2021

Introduction

Examples

http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/ Limits of SMS 2FA Malicious microchips

(In)security of Internet protocols

Examples

Explanation of BGP man in the middle attack Defense against BGP man-in-the-middle attack Hitchhiker's guide to DNS poisoning Hijacking BGP for profit Examples of hijacking in the press

Secure Protocols

Examples

Visualizer of DNSSEC trust chain 30 000 mis-issued certificates by Symantec

Covert channels, Steganography and Steganalysis

Securing private networks