Display language
To modulepage Generate PDF

#40713 / #4

Seit SS 2019
(Deaktivierung beantragt zum SoSe 2024)


Software Security for Autonomous Systems


Albayrak, Sahin




Fakultät IV

Institut für Wirtschaftsinformatik und Quantitative Methoden

34361200 FG Agententechnologien in betrieblichen Anwendungen und der Telekommunikation (AOT)

No information


TEL 14

Bsufka, Karsten


Learning Outcomes

Students learn how to develop secure software systems. They will gain knowledge of the basics of Security engineering. There will be focus on distributed (web) applications.


Secure software developed is not only focused on implementation aspects, like avoiding buffer overflows, but involves the whole the software life cycle from requirements gathering until operation. During lecture all phases will be addresses, with a special focus on the design phase and common security and misuse patterns. During the practical part students will realize smaller implementation tasks and present more details on practical aspects that had been covered in the lecture.

Module Components


All Courses are mandatory.

Course NameTypeNumberCycleLanguageSWSVZ
Software Security for Autonomous SystemsIVWiSeNo information4

Workload and Credit Points

Software Security for Autonomous Systems (IV):

Workload descriptionMultiplierHoursTotal
Pre/post processing15.08.0h120.0h
180.0h(~6 LP)
The Workload of the module sums up to 180.0 Hours. Therefore the module contains 6 Credits.

Description of Teaching and Learning Methods

Module consists of lectures, tutorials and students' inputs in the form of talks and system demonstrations. During the tutorials solutions will be worked on independently in small groups.

Requirements for participation and examination

Desirable prerequisites for participation in the courses:

- Basic knowledge in object oriented software development - Programming skills in Java - Basic XML knowledge

Mandatory requirements for the module test application:

This module has no requirements.

Module completion



Type of exam

Portfolio examination

Type of portfolio examination

100 Punkte insgesamt



Test elements

(Ergebnisprüfung) 9 Assignments25written9 x 2 hours (est.)
(Lernprozessprüfung) Oral consultation75oral3 x 15 min

Grading scale

Notenschlüssel »Notenschlüssel 2: Fak IV (2)«


Test description (Module completion)

Die Gesamtnote gemäß § 47 (2) AllgStuPO wird nach dem Notenschlüssel 2 der Fakultät IV ermittelt.

Duration of the Module

The following number of semesters is estimated for taking and completing the module:
1 Semester.

This module may be commenced in the following semesters:

Maximum Number of Participants

The maximum capacity of students is 20.

Registration Procedures

Qispos oder Prüfungsamt und zusätzlich durch Registrierung auf der ISIS-Kursseite.

Recommended reading, Lecture notes

Lecture notes

Availability:  unavailable


Electronical lecture notes

Availability:  available
Additional information:
Lehrmaterial (Folien mit Notizen) wird auf der ISIS-Seite bereitgestellt.



Recommended literature
Bruce Schneier: Applied Cryptographie, Wiley, 1996
Christopher Steel, Ramesh Nagappan and Ray Lai. Core Security Patterns, Prentice Hall, 2006
Gary McGraw. Software Security: Building Security. Addison-Wesley, 2006.
Matt Bishop. Computer Security – Art and Science. Addison-Wesly, 2003.
Ross Anderson: Security Engineering, Wiley, 2008.

Assigned Degree Programs

This module is used in the following Degree Programs (new System):

Studiengang / StuPOStuPOsVerwendungenErste VerwendungLetzte Verwendung
Computer Engineering (M. Sc.)144SS 2019SoSe 2024
Computer Science (Informatik) (M. Sc.)153SS 2019SoSe 2024
Elektrotechnik (M. Sc.)133SS 2019SoSe 2024
Information Systems Management (Wirtschaftsinformatik) (M. Sc.)248SS 2019SoSe 2024
Wirtschaftsingenieurwesen (M. Sc.)124SS 2019SoSe 2024


No information