Security of Resource-constraint Systems

Modul Number11897
Responsible Staff MemberProf. Dr. rer. nat. Langendörfer, Peter
Direct contactElisabeth Vogel, M.Sc.
Language of Teaching / ExaminationEnglish
Teaching me­thodsLecture + Exercise
Duration1 semester
Frequency of OfferEach winter semester even year
Recommended PrerequisitesKnowledge of the content of the modules
  • Potential attacks and attacker models
  • Micro controller architectures
  • Memory management
  • Operating systems
  • Micro Kernels
  • Hypervisor
  • Security protocols
Learning OutcomeThe Students know potential security issues of embedded systems. They can analyse embedded systems and identify security issues. They know standard approaches that can help to solve security issues and can develop security concepts for embedded systems.
Module ExaminationPrerequisite + Final Module Examination (MAP)
Assessment Mode for Module ExaminationPrerequisite:
  • Successful completion of exercise assignments
Final module examination:
  • Written examination, 90 min. OR
  • Oral examination, 30 min. (with small number of participants)

This website uses cookies. Those have two functions: On the one hand they are providing basic functionality for this website. On the other hand they allow us to improve our content for you by saving and analyzing anonymized user data. You can redraw your consent to using these cookies at any time. Find more information regarding cookies on our Data Protection Declaration and regarding us on the Imprint.


These cookies are needed for a smooth operation of our website.


Name Purpose Lifetime Type Provider
_pk_id Used to store a few details about the user such as the unique visitor ID. 13 months HTML Matomo
_pk_ref Used to store the attribution information, the referrer initially used to visit the website. 6 months HTML Matomo
_pk_ses Short lived cookie used to temporarily store data for the visit. 30 minutes HTML Matomo