- Introduction to language-based security.
- Fundamental principles, models and concepts for computer security.
- Software security by information flow control.
- Web application and database security.
- Security for mobile applications.
- Hot topics in computer security.
- State-of-the-art in programming language for security.
DD2525 Language-Based Security 7.5 credits
Learn advanced software security at the esteemed KTH Campus. Combine hands-on experience with cutting-edge security research by exploring attacks and defences and focusing on programming languages and security methods to enforce software security principally.
About course offering
For course offering
Spring 2025 langsec25 programme students
Target group
Students admitted to a master's programme as long as it can be included in the programme.
Part of programme
Master of Science in Engineering and in Education, åk 4, TEDA, Conditionally Elective
Master of Science in Engineering and in Education, åk 5, TEDA, Conditionally Elective
Master's Programme, Communication Systems, åk 1, ITE, Recommended
Master's Programme, Communication Systems, åk 1, SMK, Recommended
Master's Programme, Communication Systems, åk 1, TRN, Recommended
Master's Programme, Computer Science, åk 1, CSST, Conditionally Elective
Master's Programme, Cybersecurity, åk 1, Conditionally Elective
Master's Programme, Cybersecurity, åk 2, Conditionally Elective
Master's Programme, Industrial Engineering and Management, åk 1, PUET, Conditionally Elective
Periods
P4 (7.5 hp)Duration
Pace of study
50%
Form of study
Normal Daytime
Language of instruction
English
Course location
KTH Campus
Number of places
Min: 15
Planned modular schedule
Course memo
Course memo is not publishedSchedule
Schedule is not publishedApplication
For course offering
Spring 2025 langsec25 programme students
Application code
60257
Contact
For course offering
Spring 2025 langsec25 programme students
Examiner
No information insertedCourse coordinator
No information insertedTeachers
No information insertedContent and learning outcomes
Course contents
Intended learning outcomes
After completing the course with a passing grade the student should be able to:
- explain and apply programming language-based concepts for computer security,
- identify strengths and weaknesses of language-based protection mechanisms in such domains as web applications, mobile applications and database systems,
- apply best practices of secure programming to design and implement more secure software,
- explain and apply principles of such language-based protection mechanisms as access control, capabilities, static analysis and runtime monitoring,
- explain differences between security policy specifications and security enforcement mechanisms,
- reflect upon security, functionality, usability and efficiency trade offs in the design of formal security requirements,
- use methods from state-of-the-art research in the area of programming languages and security
in order to:
- as security expert be able to identify security threats and propose countermeasures,
- independently design and implement software systems that embrace security from day one,
- contribute to the society by increasing the consumers' trust in software technologies.
Literature and preparations
Specific prerequisites
Completed course DD2395 Computer Security 6 credits, or equivalent course.
Course from Upper Secondary School equivalent to the Swedish upper secondary course English B/6.
Recommended prerequisites
Equipment
Literature
Examination and completion
If the course is discontinued, students may request to be examined during the following two academic years.
Grading scale
Examination
- LAB1 - Laboratory work, 4.5 credits, grading scale: A, B, C, D, E, FX, F
- PRO1 - Project, 3.0 credits, grading scale: A, B, C, D, E, FX, F
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.
The examiner may apply another examination format when re-examining individual students.
Opportunity to complete the requirements via supplementary examination
Opportunity to raise an approved grade via renewed examination
Examiner
Ethical approach
- All members of a group are responsible for the group's work.
- In any assessment, every student shall honestly disclose any help received and sources used.
- In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.
Further information
Course room in Canvas
Offered by
Main field of study
Education cycle
Add-on studies
Supplementary information
In this course, the EECS code of honor applies, see:
http://www.kth.se/en/eecs/utbildning/hederskodex