Security in IoT

General information

This course is a practical introduction to security in IoT systems. During the course, penetration test, or pentest, practices of different real IoT devices will be carried out in order to know their vulnerabilities and thus learn to create more secure devices.

Subject program and evaluation methodology

Program and evaluation

Professors

Guillemo Botella (gbotella@ucm.es) and JoaquĆ­n Recas (recas@ucm.es)

Work groups (for regular lab assignments)

Here you can find the current work groups

Schedule

Day Topic Slides Extra
19/4 Introduction Security in IoT M1-IoT-Security
20/4 Introduction to IoT Pentest M2-Pentest
21/4 Pentest example: IP Camera (I) M3-IPCam Material P1
26/4 Cryptography (I): Introduction M4-Crypto (1)
27/4 Cryptography (I): Introduction M4-Crypto (2)
28/4 Cryptography (I): Introduction M4-Crypto (2) Cont. M4-Crypto (3) Assignments
3/5 Pentest example: IP Camera (II) M3-IPCam (Cont.) Material P1 (Cont.)
4/5 Pentest example: Smart Bulb (I) M5-SmartBulb Material P2
5/5 Pentest project: Smart Socket Setup SmartSocket Setup Material P3
10/5 Cryptography (II) M4-Crypto (4) Lab1
11/5 Cryptography (II) M4-Crypto (4) Lab1 (Cont.)
12/5 Cryptography (II) M4-Crypto (5) Lab2 MPPP (Personal Paper Project)
17/5 Pentest project: Smart Socket (II) M7-SmartSocket2 Material P3
18/5 Pentest project: Smart Socket (III) M7-SmartSocket3 Material P3
19/5 Pentest project: Smart Socket (IV) M7-SmartSocket4 Material P3
24/5 Cryptography (III) M6-Crypto (6)
25/5 Cryptography (III) M6-Crypto (6) (Cont)
26/5 Cryptography (III) M8-Crypto (7)
31/5 Final Project (I)
1/6 Final Project (II)
2/6 Final Project (III)