Studying at the University of Verona

Here you can find information on the organisational aspects of the Programme, lecture timetables, learning activities and useful contact details for your time at the University, from enrolment to graduation.

This information is intended exclusively for students already enrolled in this course.
If you are a new student interested in enrolling, you can find information about the course of study on the course page:

Laurea magistrale in Ingegneria e scienze informatiche - Enrollment from 2025/2026

The Study Plan includes all modules, teaching and learning activities that each student will need to undertake during their time at the University.
Please select your Study Plan based on your enrollment year.

CURRICULUM TIPO:

1° Year 

ModulesCreditsTAFSSD
12
B
ING-INF/05
12
B
ING-INF/05
6
B
ING-INF/05

2° Year   activated in the A.Y. 2016/2017

ModulesCreditsTAFSSD
6
B
INF/01
6
B
ING-INF/05
Altre attivita' formative (taf f)
4
F
-
ModulesCreditsTAFSSD
12
B
ING-INF/05
12
B
ING-INF/05
6
B
ING-INF/05
activated in the A.Y. 2016/2017
ModulesCreditsTAFSSD
6
B
INF/01
6
B
ING-INF/05
Altre attivita' formative (taf f)
4
F
-
Modules Credits TAF SSD
Between the years: 1°- 2°

Legend | Type of training activity (TTA)

TAF (Type of Educational Activity) All courses and activities are classified into different types of educational activities, indicated by a letter.




S Placements in companies, public or private institutions and professional associations

Teaching code

4S003736

Credits

6

Language

Italian

Scientific Disciplinary Sector (SSD)

ING-INF/05 - INFORMATION PROCESSING SYSTEMS

Period

I sem. dal Oct 3, 2016 al Jan 31, 2017.

Learning outcomes

The software security course aims to present some of the main problems in software security, the existing solutions and the open challenges. In particular, the course treats problems related to the protection of the intellectual property of programs and also problems related to the protection of personal/sensitive information in a system.
At the end of the course, the student will have to show to understand the different security issues that raise when developing software or when projecting a system. Moreover, the student should be able to discuss the security solutions used to protect the intellectual property of a software or the security of a system and to suggest potential improvements.

Program

The course will treat the followings:

Computer Security
-- Secure Systems
-- Access Control
-- Non-interference & information flow
-- Intrusion detection, execution monitors, safety properties
-- Software security e vulnerabilities

Software Protection
-- Obfuscation Techniques
-- Watermarking Techniques
-- Tamper-proofing Techniques

Similarity Analysis

Reference texts
Author Title Publishing house Year ISBN Notes
Christian Collberg, Javis Nagra Surreptitious Software (Edizione 1) Addison-Wesley Professional 2009 978-0-321-54925-9

Examination Methods

Project on software security and/or software protection. The project can be assigned to groups of at most 3 people. During the course the teacher will present possible topics for projects. The topic of the project can also be suggested by the students to the teacher.
The results of the project will be organized in a written relation and then presented orally to the teacher. During the oral presentation of the project the teacher may ask questions on the whole program of the course.
After the oral exam the teacher will read the relation and propose an evaluation.
Each individual or group exam has to be scheduled by appointment with the teacher.

Students with disabilities or specific learning disorders (SLD), who intend to request the adaptation of the exam, must follow the instructions given HERE