Software Security, 6 credits

Software Security, 6 hp

TDDC90

Main field of study

Information Technology Computer Science and Engineering Computer Science

Course level

Second cycle

Course type

Programme course

Examiner

Ulf Kargén

Director of studies or equivalent

Patrick Lambrix

Education components

Preliminary scheduled hours: 42 h
Recommended self-study hours: 118 h

Available for exchange students

Yes
ECV = Elective / Compulsory / Voluntary
Course offered for Semester Period Timetable module Language Campus ECV
6CDDD Computer Science and Engineering, Master of Science in Engineering 7 (Autumn 2025) 2 1 English Linköping, Valla E
6CDDD Computer Science and Engineering, Master of Science in Engineering 9 (Autumn 2025) 2 1 English Linköping, Valla E
6CDDD Computer Science and Engineering, Master of Science in Engineering (Computer Systems Architecture) 9 (Autumn 2025) 2 1 English Linköping, Valla E
6CDDD Computer Science and Engineering, Master of Science in Engineering (International Software Engineering) 9 (Autumn 2025) 2 1 English Linköping, Valla E
6CDDD Computer Science and Engineering, Master of Science in Engineering (Secure Systems) 9 (Autumn 2025) 2 1 English Linköping, Valla C
6CMJU Computer Science and Software Engineering, Master of Science in Engineering 9 (Autumn 2025) 2 1 English Linköping, Valla E
6CMJU Computer Science and Software Engineering, Master of Science in Engineering (International Software Engineering) 9 (Autumn 2025) 2 1 English Linköping, Valla E
6CMJU Computer Science and Software Engineering, Master of Science in Engineering (Secure Systems) 7 (Autumn 2025) 2 1 English Linköping, Valla C
6CMJU Computer Science and Software Engineering, Master of Science in Engineering (Secure Systems) 9 (Autumn 2025) 2 1 English Linköping, Valla C
6MICS Computer Science, Master's Programme 3 (Autumn 2025) 2 1 English Linköping, Valla E
6MICS Computer Science, Master's Programme (Computer Networks, Distributed Systems and Security) 3 (Autumn 2025) 2 1 English Linköping, Valla E
6MICS Computer Science, Master's Programme (Programming and Software Methods) 3 (Autumn 2025) 2 1 English Linköping, Valla E
6MCYS Cybersecurity, Master's Programme 3 (Autumn 2025) 2 1 English Linköping, Valla C
6CIEI Industrial Engineering and Management - International, Master of Science in Engineering, Chinese 9 (Autumn 2025) 2 1 English Linköping, Valla E
6CIEI Industrial Engineering and Management - International, Master of Science in Engineering, French 9 (Autumn 2025) 2 1 English Linköping, Valla E
6CIEI Industrial Engineering and Management - International, Master of Science in Engineering, German 9 (Autumn 2025) 2 1 English Linköping, Valla E
6CIEI Industrial Engineering and Management - International, Master of Science in Engineering, Japanese 9 (Autumn 2025) 2 1 English Linköping, Valla E
6CIEI Industrial Engineering and Management - International, Master of Science in Engineering, Spanish 9 (Autumn 2025) 2 1 English Linköping, Valla E
6CIII Industrial Engineering and Management, Master of Science in Engineering 9 (Autumn 2025) 2 1 English Linköping, Valla E
6CITE Information Technology, Master of Science in Engineering 7 (Autumn 2025) 2 1 English Linköping, Valla E
6CITE Information Technology, Master of Science in Engineering (Computer Systems Architecture) 9 (Autumn 2025) 2 1 English Linköping, Valla E
6CITE Information Technology, Master of Science in Engineering (International Software Engineering) 9 (Autumn 2025) 2 1 English Linköping, Valla E
6CITE Information Technology, Master of Science in Engineering (Secure Systems) 9 (Autumn 2025) 2 1 English Linköping, Valla C

Main field of study

Information Technology, Computer Science and Engineering, Computer Science

Course level

Second cycle

Advancement level

A1N

Course offered for

  • Master of Science in Computer Science and Engineering
  • Master of Science in Industrial Engineering and Management
  • Master of Science in Information Technology
  • Master of Science in Computer Science and Software Engineering
  • Master of Science in Industrial Engineering and Management - International
  • Master's Programme in Computer Science
  • Master's Programme in Cybersecurity

Prerequisites

Basic course in security. Students are expected to have knowledge of operating systems, programming languages, and software engineering. Students should be able to develop, test and debug software in Unix or Linux environments. Some experience with C-programming as well as basic knowledge of web application development are recommended.

Intended learning outcomes

Students taking this course will learn about the issues underlying software security, and develop the skills needed to build secure software. The course covers methods, tools, and best practices for building secure software. Students completing this course should be able to:

  • identify and analyze security problems in software;
  • formulate security requirements for software;
  • devise, evaluate, and explain solutions to software security;
  • critically evaluate the effectiveness of methods, state-of-art tools, and best practices, for detecting and preventing vulnerabilities; and
  • design and write secure software.

Course content

The course covers:

  • vulnerability discovery and analysis, and supporting tools;
  • analysis of infamous vulnerabilities and their exploits;
  • attack and vulnerability modeling;
  • security requirements analysis and design for security;
  • principles for secure programming;
  • static and dynamic intrusion prevention mechanisms;
  • security testing and evaluation; and
  • systematic approaches to building secure software.
Vulnerabilities, attacks, and principles for secure programming are studied with an emphasis on programs written in C/C++ and web applications.

Teaching and working methods

The course consists of lectures and laboratory work.

Examination

UPG1Laboratory work and assignments3 creditsU, G
TEN1Written examination3 creditsU, 3, 4, 5

Grades

Four-grade scale, LiU, U, 3, 4, 5

Other information

About teaching and examination language

The teaching language is presented in the Overview tab for each course. The examination language relates to the teaching language as follows: 

  • If teaching language is “Swedish”, the course as a whole could be given in Swedish, or partly in English. Examination language is Swedish, but parts of the examination can be in English.
  • If teaching language is “English”, the course as a whole is taught in English. Examination language is English.
  • If teaching language is “Swedish/English”, the course as a whole will be taught in English if students without prior knowledge of the Swedish language participate. Examination language is Swedish or English depending on teaching language.

Other

The course is conducted in such a way that there are equal opportunities with regard to sex, transgender identity or expression, ethnicity, religion or other belief, disability, sexual orientation and age.

The planning and implementation of a course should correspond to the course syllabus. The course evaluation should therefore be conducted with the course syllabus as a starting point. 

The course is campus-based at the location specified for the course, unless otherwise stated under “Teaching and working methods”. Please note, in a campus-based course occasional remote sessions could be included.  

Department

Institutionen för datavetenskap

Course literature

Other

  • Articles (see the course home page).

Code Name Scope Grading scale
UPG1 Laboratory work and assignments 3 credits U, G
TEN1 Written examination 3 credits U, 3, 4, 5

Plagiarism

For examinations that involve the writing of reports, in cases in which it can be assumed that the student has had access to other sources (such as during project work, writing essays, etc.), the material submitted must be prepared in accordance with principles for acceptable practice when referring to sources (references or quotations for which the source is specified) when the text, images, ideas, data, etc. of other people are used. It is also to be made clear whether the author has reused his or her own text, images, ideas, data, etc. from previous examinations, such as degree projects, project reports, etc. (this is sometimes known as “self-plagiarism”).

A failure to specify such sources may be regarded as attempted deception during examination.

Attempts to cheat

In the event of a suspected attempt by a student to cheat during an examination, or when study performance is to be assessed as specified in Chapter 10 of the Higher Education Ordinance, the examiner is to report this to the disciplinary board of the university. Possible consequences for the student are suspension from study and a formal warning. More information is available at Cheating, deception and plagiarism.

Linköping University has also produced a guide for teachers and students' use of generative AI in education (Dnr LiU-2023-02660). As a student, you are always expected to gain knowledge of what applies to each course (including the degree project). In general, clarity to where and how generative AI has been used is important.  

Regulations (apply to LiU in its entirety)

The university is a government agency whose operations are regulated by legislation and ordinances, which include the Higher Education Act and the Higher Education Ordinance. In addition to legislation and ordinances, operations are subject to several policy documents. The Linköping University rule book collects currently valid decisions of a regulatory nature taken by the university board, the vice-chancellor and faculty/department boards.

LiU’s rule book for education at first-cycle and second-cycle levels is available at https://styrdokument.liu.se/Regelsamling/Innehall

Other

Articles (see the course home page).

Note: The course matrix might contain more information in Swedish.

I = Introduce, U = Teach, A = Utilize
I U A Modules Comment
1. DISCIPLINARY KNOWLEDGE AND REASONING
1.1 Knowledge of underlying mathematics and science (G1X level)

                            
1.2 Fundamental engineering knowledge (G1X level)
X
Software development and debugging
1.3 Further knowledge, methods, and tools in one or several subjects in engineering or natural science (G2X level)
X
X
X
TEN1
UPG1

                            
1.4 Advanced knowledge, methods, and tools in one or several subjects in engineering or natural sciences (A1X level)
X
TEN1
UPG1

                            
1.5 Insight into current research and development work
X
Novel methods for automated security testing
2. PERSONAL AND PROFESSIONAL SKILLS AND ATTRIBUTES
2.1 Analytical reasoning and problem solving
X
X
TEN1
UPG1

                            
2.2 Experimentation, investigation, and knowledge discovery
X
UPG1

                            
2.3 System thinking
X
X
TEN1
UPG1

                            
2.4 Attitudes, thought, and learning
X

                            
2.5 Ethics, equity, and other responsibilities

                            
3. INTERPERSONAL SKILLS: TEAMWORK AND COMMUNICATION
3.1 Teamwork
X
UPG1

                            
3.2 Communications
X
UPG1

                            
3.3 Communication in foreign languages
X
UPG1
English
4. CONCEIVING, DESIGNING, IMPLEMENTING AND OPERATING SYSTEMS IN THE ENTERPRISE, SOCIETAL AND ENVIRONMENTAL CONTEXT
4.1 External, societal, and environmental context
X
Societal impact of cybersecurity threats
4.2 Enterprise and business context

                            
4.3 Conceiving, system engineering and management
X
TEN1
UPG1

                            
4.4 Designing
X
X
TEN1
UPG1

                            
4.5 Implementing
X
X
TEN1
UPG1

                            
4.6 Operating

                            
5. PLANNING, EXECUTION AND PRESENTATION OF RESEARCH DEVELOPMENT PROJECTS WITH RESPECT TO SCIENTIFIC AND SOCIETAL NEEDS AND REQUIREMENTS
5.1 Societal conditions, including economic, social, and ecological aspects of sustainable development for knowledge development

                            
5.2 Economic conditions for knowledge development

                            
5.3 Identification of needs, structuring and planning of research or development projects

                            
5.4 Execution of research or development projects

                            
5.5 Presentation and evaluation of research or development projects

                            

This tab contains public material from the course room in Lisam. The information published here is not legally binding, such material can be found under the other tabs on this page.

There are no files available for this course.