Navigation To modulepage
Display language

Software Security for Autonomous Systems



#40713 / #4

Seit SS 2019

Fakultät IV

TEL 14

Institut für Wirtschaftsinformatik und Quantitative Methoden

34361200 FG Agententechnologien in betrieblichen Anwendungen und der Telekommunikation (AOT)

Albayrak, Sahin

Bsufka, Karsten

POS-Nummer PORD-Nummer Modultitel
70120 29932 Software Security
2348567 40684 Software Security for Autonomous Systems

Learning Outcomes

Students learn how to develop secure software systems. They will gain knowledge of the basics of Security engineering. There will be focus on distributed (web) applications.


Secure software developed is not only focused on implementation aspects, like avoiding buffer overflows, but involves the whole the software life cycle from requirements gathering until operation. During lecture all phases will be addresses, with a special focus on the design phase and common security and misuse patterns. During the practical part students will realize smaller implementation tasks and present more details on practical aspects that had been covered in the lecture.

Module Components


All Courses are mandatory.

Course Name Type Number Cycle Language SWS
Software Security for Autonomous Systems IV WS No information 4

Workload and Credit Points

Software Security for Autonomous Systems (IV):

Workload description Multiplier Hours Total
Attendance 15.0 4.0h 60.0h
Pre/post processing 15.0 8.0h 120.0h
180.0h(~6 LP)
The Workload of the module sums up to 180.0 Hours. Therefore the module contains 6 Credits.

Description of Teaching and Learning Methods

Module consists of lectures, tutorials and students' inputs in the form of talks and system demonstrations. During the tutorials solutions will be worked on independently in small groups.

Requirements for participation and examination

Desirable prerequisites for participation in the courses:

- Basic knowledge in object oriented software development - Programming skills in Java - Basic XML knowledge

Mandatory requirements for the module test application:

No information

Module completion



Type of exam

Portfolio examination

Type of portfolio examination

100 points in total



Test elements

Name Points Categorie Duration/Extent
(Ergebnisprüfung) 9 Assignments 25 written 9 x 2 hours (est.)
(Lernprozessprüfung) Oral consultation 75 oral 3 x 15 min

Grading scale

Test description (Module completion)

Die Gesamtnote gemäß § 47 (2) AllgStuPO wird nach dem Notenschlüssel 2 der Fakultät IV ermittelt.

Duration of the Module

This module can be completed in one semester.

Maximum Number of Participants

The maximum capacity of students is 20.

Registration Procedures

Qispos oder Prüfungsamt und zusätzlich durch Registrierung auf der ISIS-Kursseite.

Recommended reading, Lecture notes

Lecture notes

Availability:  unavailable

Electronical lecture notes

Availability:  available
Additional information:
Lehrmaterial (Folien mit Notizen) wird auf der ISIS-Seite bereitgestellt.


Recommended literature
Bruce Schneier: Applied Cryptographie, Wiley, 1996
Christopher Steel, Ramesh Nagappan and Ray Lai. Core Security Patterns, Prentice Hall, 2006
Gary McGraw. Software Security: Building Security. Addison-Wesley, 2006.
Matt Bishop. Computer Security – Art and Science. Addison-Wesly, 2003.
Ross Anderson: Security Engineering, Wiley, 2008.

Assigned Degree Programs

This module is used in the following Degree Programs (new System):

This moduleversion is used in the following modulelists:


No information