Software Security, 6 credits
Software Security, 6 hp
TDDC90
Main field of study
Information Technology Computer Science and Engineering Computer ScienceCourse level
Second cycleCourse type
Programme courseExaminer
Ulf KargénDirector of studies or equivalent
Patrick LambrixEducation components
Preliminary scheduled hours: 42 hRecommended self-study hours: 118 h
Available for exchange students
YesMain field of study
Information Technology, Computer Science and Engineering, Computer ScienceCourse level
Second cycleAdvancement level
A1NCourse offered for
- Master of Science in Information Technology
- Master of Science in Computer Science and Software Engineering
- Master of Science in Computer Science and Engineering
- Master of Science in Industrial Engineering and Management - International
- Master of Science in Industrial Engineering and Management
- Master's Programme in Computer Science
- Master's Programme in Cybersecurity
Prerequisites
Basic course in security. Students are expected to have knowledge of operating systems, programming languages, and software engineering. Students should be able to develop, test and debug software in Unix or Linux environments. Some experience with C-programming as well as basic knowledge of web application development are recommended.
Intended learning outcomes
Students taking this course will learn about the issues underlying software security, and develop the skills needed to build secure software. The course covers methods, tools, and best practices for building secure software. Students completing this course should be able to:
- identify and analyze security problems in software;
- formulate security requirements for software;
- devise, evaluate, and explain solutions to software security;
- critically evaluate the effectiveness of methods, state-of-art tools, and best practices, for detecting and preventing vulnerabilities; and
- design and write secure software.
Course content
The course covers:
- vulnerability discovery and analysis, and supporting tools;
- analysis of infamous vulnerabilities and their exploits;
- attack and vulnerability modeling;
- security requirements analysis and design for security;
- principles for secure programming;
- static and dynamic intrusion prevention mechanisms;
- security testing and evaluation; and
- systematic approaches to building secure software.
Teaching and working methods
The course consists of lectures and laboratory work.
Examination
UPG1 | Laboratory work and assignments | 3 credits | U, G |
TEN1 | Written examination | 3 credits | U, 3, 4, 5 |
Grades
Four-grade scale, LiU, U, 3, 4, 5Other information
About teaching and examination language
The teaching language is presented in the Overview tab for each course. The examination language relates to the teaching language as follows:
- If teaching language is “Swedish”, the course as a whole could be given in Swedish, or partly in English. Examination language is Swedish, but parts of the examination can be in English.
- If teaching language is “English”, the course as a whole is taught in English. Examination language is English.
- If teaching language is “Swedish/English”, the course as a whole will be taught in English if students without prior knowledge of the Swedish language participate. Examination language is Swedish or English depending on teaching language.
Other
The course is conducted in such a way that there are equal opportunities with regard to sex, transgender identity or expression, ethnicity, religion or other belief, disability, sexual orientation and age.
The planning and implementation of a course should correspond to the course syllabus. The course evaluation should therefore be conducted with the course syllabus as a starting point.
The course is campus-based at the location specified for the course, unless otherwise stated under “Teaching and working methods”. Please note, in a campus-based course occasional remote sessions could be included.
Department
Institutionen för datavetenskapCourse literature
Other
Articles (see the course home page).
Code | Name | Scope | Grading scale |
---|---|---|---|
UPG1 | Laboratory work and assignments | 3 credits | U, G |
TEN1 | Written examination | 3 credits | U, 3, 4, 5 |
Plagiarism
For examinations that involve the writing of reports, in cases in which it can be assumed that the student has had access to other sources (such as during project work, writing essays, etc.), the material submitted must be prepared in accordance with principles for acceptable practice when referring to sources (references or quotations for which the source is specified) when the text, images, ideas, data, etc. of other people are used. It is also to be made clear whether the author has reused his or her own text, images, ideas, data, etc. from previous examinations, such as degree projects, project reports, etc. (this is sometimes known as “self-plagiarism”).
A failure to specify such sources may be regarded as attempted deception during examination.
Attempts to cheat
In the event of a suspected attempt by a student to cheat during an examination, or when study performance is to be assessed as specified in Chapter 10 of the Higher Education Ordinance, the examiner is to report this to the disciplinary board of the university. Possible consequences for the student are suspension from study and a formal warning. More information is available at Cheating, deception and plagiarism.
Linköping University has also produced a guide for teachers and students' use of generative AI in education (Dnr LiU-2023-02660). As a student, you are always expected to gain knowledge of what applies to each course (including the degree project). In general, clarity to where and how generative AI has been used is important.
Regulations (apply to LiU in its entirety)
The university is a government agency whose operations are regulated by legislation and ordinances, which include the Higher Education Act and the Higher Education Ordinance. In addition to legislation and ordinances, operations are subject to several policy documents. The Linköping University rule book collects currently valid decisions of a regulatory nature taken by the university board, the vice-chancellor and faculty/department boards.
LiU’s rule book for education at first-cycle and second-cycle levels is available at https://styrdokument.liu.se/Regelsamling/Innehall.
Other
Articles (see the course home page).
Note: The course matrix might contain more information in Swedish.
I | U | A | Modules | Comment | ||
---|---|---|---|---|---|---|
1. DISCIPLINARY KNOWLEDGE AND REASONING | ||||||
1.1 Knowledge of underlying mathematics and science (G1X level) |
|
|
|
|||
1.2 Fundamental engineering knowledge (G1X level) |
|
|
X
|
Software development and debugging |
||
1.3 Further knowledge, methods, and tools in one or several subjects in engineering or natural science (G2X level) |
X
|
X
|
X
|
TEN1
UPG1
|
||
1.4 Advanced knowledge, methods, and tools in one or several subjects in engineering or natural sciences (A1X level) |
|
X
|
|
TEN1
UPG1
|
||
1.5 Insight into current research and development work |
X
|
|
|
Novel methods for automated security testing |
||
2. PERSONAL AND PROFESSIONAL SKILLS AND ATTRIBUTES | ||||||
2.1 Analytical reasoning and problem solving |
|
X
|
X
|
TEN1
UPG1
|
||
2.2 Experimentation, investigation, and knowledge discovery |
|
|
X
|
UPG1
|
||
2.3 System thinking |
|
X
|
X
|
TEN1
UPG1
|
||
2.4 Attitudes, thought, and learning |
|
|
X
|
|||
2.5 Ethics, equity, and other responsibilities |
|
|
|
|||
3. INTERPERSONAL SKILLS: TEAMWORK AND COMMUNICATION | ||||||
3.1 Teamwork |
|
|
X
|
UPG1
|
||
3.2 Communications |
|
|
X
|
UPG1
|
||
3.3 Communication in foreign languages |
|
|
X
|
UPG1
|
English |
|
4. CONCEIVING, DESIGNING, IMPLEMENTING AND OPERATING SYSTEMS IN THE ENTERPRISE, SOCIETAL AND ENVIRONMENTAL CONTEXT | ||||||
4.1 External, societal, and environmental context |
X
|
|
|
Societal impact of cybersecurity threats |
||
4.2 Enterprise and business context |
|
|
|
|||
4.3 Conceiving, system engineering and management |
|
X
|
|
TEN1
UPG1
|
||
4.4 Designing |
|
X
|
X
|
TEN1
UPG1
|
||
4.5 Implementing |
|
X
|
X
|
TEN1
UPG1
|
||
4.6 Operating |
|
|
|
|||
5. PLANNING, EXECUTION AND PRESENTATION OF RESEARCH DEVELOPMENT PROJECTS WITH RESPECT TO SCIENTIFIC AND SOCIETAL NEEDS AND REQUIREMENTS | ||||||
5.1 Societal conditions, including economic, social, and ecological aspects of sustainable development for knowledge development |
|
|
|
|||
5.2 Economic conditions for knowledge development |
|
|
|
|||
5.3 Identification of needs, structuring and planning of research or development projects |
|
|
|
|||
5.4 Execution of research or development projects |
|
|
|
|||
5.5 Presentation and evaluation of research or development projects |
|
|
|
This tab contains public material from the course room in Lisam. The information published here is not legally binding, such material can be found under the other tabs on this page.
There are no files available for this course.