User Tools

Site Tools


Master Degree in Cyber Security at TU/e

Starting from 2021-2022 TU Eindhoven offers a fully local Information Security Technology master track where all lectures are offered on the TU/e campus. The IST track used to be part of the “TRU/e Master in Cyber Security” which was offered in collaboration with Radboud University (RU). The last intake of the TRU/e master was in 2020-2021. For more info, visit the website.

Courses offered by SEC

2IMS00: Seminar IST

In this course students train the skills required for doing independent research in security. The student has to be able to explore a new security topic on his/her own and present the results in oral and written form. The Seminar is a preparation for the masters thesis project. The students get a project assignment, consisting of a literature study and a practical assignment. They have to hand in a report and to present their results orally to their fellow students. The reports are subjected to peer review.

2IMS10: Physical Aspects of Digital Security

The course covers a number of subjects where digital security is heavily influenced by interaction with the physical world: Fuzzy extractors, true random number generation, distance bounding, physical unclonable functions, quantum computers, quantum key exchange. The emphasis lies on the adaptation of algorithms and protocols to cope with and maximally exploit, the properties of the physical world.

2IMS15: Verification of Security Protocols

The student will learn what are security protocols, which kind of flaws they can contain and how to detect and fix such flaws. The following topics are treated:

  • The Spi-calculus modeling language
  • Typing for Secrecy, Authenticity, Authentication
  • The Proverif protocol verification tool
  • Anonymity
  • Information flow

2IMS20: Cyberattacks, Crime and Defenses


  • Learn the principles of how IT systems can be exploited by cyberattackers.
  • Learn how cyber attackers actually operate,
  • Learn the principles of defense technologies and how they can be used,
  • Learn the basics of cybercrime, and the organization of the criminal markets.


We will start discussing the technical attack vectors (XSS, SQL Injections, XSRF, drive-by download) and how these vectors are embodied in complex attacks (malware, spyware, ransomware, botnets) Then, we will see how these attacks are used in cybercrime economy (spam, phishing, infections and money laundering). We will discuss the principles of defense technology. We will touch on the economic aspects of cyber criminality, and on the markets of cybercrime as a service. Finally, we will discuss attacks sophistication, state-sponsored attacks, and the emergence of a grey market. We will make use of case studies (e.g., Hacking Team, Stuxnet, Flame, etc).

2IMS25: Principles of Data Protection

This course focuses on data protection technologies designed to prevent the dissemination of sensitive information of individuals. The course will provide a solid introduction to the most important access control models (e.g., DAC, MAC, RBAC) and their extensions for distributed systems (e.g., RT) and usage control (e.g., UCON). The course also covers industry standards in the area of access control and privacy (e.g., XACML and EPAL). See the course website for more information.

Master Projects

The Security Group of TU/e offers a large variety of projects that can take place in an external company or within the TU/e:

External Projects:

Requirements and procedure for doing an external master thesis at the Security Group.

Projects listed here are proposed by companies and it is not guaranteed that these projects will be supervised by someone in the SEC group unless a prior agreement has been reached.

Internal Projects:

master.txt · Last modified: 2022/01/05 12:03 by ggankhuyag