Sorry! De informatie die je zoekt, is enkel beschikbaar in het Engels.

Build tomorrow’s hacker-proof computer systems

PDCS: Top Master in Computer Security

Research cutting-edge attacks and defenses in Cyberspace

Do you want to make global news headlines with groundbreaking Cybersecurity research or impact the security of billions of computers worldwide? Your first stop: our top Master's programme in Computer Security powered by world-class researchers (VUSec and other CompSys groups).

The programme addresses the most ambitious technical challenges in Cybersecurity, with a focus on computer systems and networks security and topics such as hacking, side channels, hardening, verification, malware, vulnerability analysis, and reverse engineering.

The emphasis on low-level systems security is unique: other programmes tend to favor breadth over depth or focus on more theoretical Cybersecurity aspects.

Discover your Computer Security study programme

Discover your Computer Security study programme

Modern computer systems have become increasingly complex and riddled with vulnerabilities in software, such as Heartbleed, and hardware, such as Rowhammer or side channels enabling sophisticated microarchitectural attacks like Spectre, Meltdown, and RIDL. All these vulnerabilities are exploited by hackers to compromise real-world systems, implant malware, mount DDOS attacks, etc. And these are all topics you will cover in this Master’s programme.

Explore the programme content

Change your world, study Computer Security

  • Security vulnerabilities fixed?

    In May 2019, when Intel released a patch for a group of security vulnerabilities researchers at VU Amsterdam had found in the company’s computer processors, Intel implied that all the problems were solved.
    Read the article
  • Impact on World Standards

    Our research on risk reduction for vulnerability assessment made its way to the world standard Common Vulnerability Scoring System (CVSS) v3.
    Read the full paper
  • While Linux is well known, its direct ancestor, MINIX, is now 30 and still quite spry for such aged software. Its story and how it and Linux got started is not well known, and there are perhaps some lessons to be learned from MINIX's development. Some of these lessons are specific to operating systems, some to software engineering, and some to other areas (such as project management). Neither MINIX nor Linux was developed in a vacuum. There was quite a bit of relevant history before either got started, so a brief introduction may put this material in perspective.

    Lessons Learned from 30 Years of MINIX

    An interview with Andrew S. Tanenbaum on the secure and reliable MINIX microkernel operating system, now running on all the Intel CPUs on the planet.
    Read the full story