Studying at the University of Verona
Here you can find information on the organisational aspects of the Programme, lecture timetables, learning activities and useful contact details for your time at the University, from enrolment to graduation.
Study Plan
This information is intended exclusively for students already enrolled in this course.If you are a new student interested in enrolling, you can find information about the course of study on the course page:
Laurea magistrale in Ingegneria e scienze informatiche - Enrollment from 2025/2026The Study Plan includes all modules, teaching and learning activities that each student will need to undertake during their time at the University.
Please select your Study Plan based on your enrollment year.
1° Year
Modules | Credits | TAF | SSD |
---|
2° Year activated in the A.Y. 2016/2017
Modules | Credits | TAF | SSD |
---|
Modules | Credits | TAF | SSD |
---|
Modules | Credits | TAF | SSD |
---|
Modules | Credits | TAF | SSD |
---|
Due insegnamenti a scelta
Legend | Type of training activity (TTA)
TAF (Type of Educational Activity) All courses and activities are classified into different types of educational activities, indicated by a letter.
Software security (2016/2017)
Teaching code
4S003736
Academic staff
Coordinator
Credits
6
Language
Italian
Scientific Disciplinary Sector (SSD)
ING-INF/05 - INFORMATION PROCESSING SYSTEMS
Period
I sem. dal Oct 3, 2016 al Jan 31, 2017.
Learning outcomes
The software security course aims to present some of the main problems in software security, the existing solutions and the open challenges. In particular, the course treats problems related to the protection of the intellectual property of programs and also problems related to the protection of personal/sensitive information in a system.
At the end of the course, the student will have to show to understand the different security issues that raise when developing software or when projecting a system. Moreover, the student should be able to discuss the security solutions used to protect the intellectual property of a software or the security of a system and to suggest potential improvements.
Program
The course will treat the followings:
Computer Security
-- Secure Systems
-- Access Control
-- Non-interference & information flow
-- Intrusion detection, execution monitors, safety properties
-- Software security e vulnerabilities
Software Protection
-- Obfuscation Techniques
-- Watermarking Techniques
-- Tamper-proofing Techniques
Similarity Analysis
Author | Title | Publishing house | Year | ISBN | Notes |
---|---|---|---|---|---|
Christian Collberg, Javis Nagra | Surreptitious Software (Edizione 1) | Addison-Wesley Professional | 2009 | 978-0-321-54925-9 |
Examination Methods
Project on software security and/or software protection. The project can be assigned to groups of at most 3 people. During the course the teacher will present possible topics for projects. The topic of the project can also be suggested by the students to the teacher.
The results of the project will be organized in a written relation and then presented orally to the teacher. During the oral presentation of the project the teacher may ask questions on the whole program of the course.
After the oral exam the teacher will read the relation and propose an evaluation.
Each individual or group exam has to be scheduled by appointment with the teacher.