# |
title
summary |
supervisor contact
students
|
R
P
|
1
/
2 |
4
N |
Traffic anomaly detection using a distributed measurement network.This
research focuses on the relationship between traffic anomalies and the
data collected by the RIPE Atlas measurement network. Two distinct
vectors of research are used: first, a ground-truth search which looks
to see in what degree real-life network events reflect in the RIPE Atlas
data, and second, the collected data is analyzed to find the time and
location where several probes' measurements in a certain network or
geographical area yield abnormal results. The ground-truth events
searched are not found with a good degree of confidence in the Atlas
data and the possible reasons are detailed in the paper. The data
analysis uses control charts to map the deviations from the mean of each
probe. Two methods for aggregating the results in a certain area are
then proposed.
|
Emile Aben <emile.aben=>ripe.net>
Razvan Oprea <Razvan.Oprea=>os3.nl>
|
R
P
|
1 |
6 N |
Advanced Metering Infrastructure.An
advanced metering infrastructure (AMI) is a system of networked
devices, e.g. smart (electrical) meters, and forms the basis of a
so-called Smart Grid. With a Smart Grid it is possible, e.g. to match
energy consumption to green energy production by, e.g., (externally)
managing domestic devices, provide personalized services to consumers
and even allow consumers to become suppliers of energy. For this to work
requires real-time, up-to a minute, bi-directional communication
between the networked devices and a robust and scalable communication
network.
This project consists of a literature study and
designing a advanced metering infrastructure. The aim of the literature
study is to explore the available smart metering technologies and to
determine which of these technologies allow to build a robust, scalable
and future proof Smart Grid. This is then followed by developing an
architectural network design of a Smart Grid for the chosen
technologies. Implementing the AMI design in a toy Monte Carlo
simulation is also a possibility.
|
Jan Amoraal <amoraal.jan=>kpmg.nl>
Vic Ding <vic.ding=>os3.nl>
|
R
P
|
2 |
8 SN |
Content Delivery Network InterconnectionResearch
on interconnect of two CDNs (Content Delivery Networks) at TNO. The
interconnection should feature at least pull-based content distribution
from the Upstream CDN to the Downstream CDN, and the inter-CDN request
routing to get a video file delivered from the Downstream CDN to a video
client. Architecture study of CDN's.
In order for two different Content Delivery Networks
to be able to connect to each other and exchange content, information
about the properties of those CDNs need to be exchanged between the
CDNs. Within the IETF there is currently development taking place on
defining standards on what information needs to be exchanged as well as
how this information needs to be exchanged. These developments focus on
standards in[2]:
- Exchange of metadata between CDNs,
- Exchange of transaction logs & monitoring information,
- Exchange of request-routing information,
- Exchange of policies & capabilities, and
- Content management/flushing
http://tools.ietf.org/html/draft-watson-cdni-use-cases-00
|
Ray van Brandenburg <ray.vanbrandenburg=>tno.nl>
Bastiaan Wissingh <Bastiaan.Wissingh=>os3.nl>
|
R
P
|
2 |
9 SN |
Automatic end-host configuration.In
most networks there is a DHCP server running to manage the
address-pool. Using DNS and registration it is possible to dynamically
use services.
In circuit-based networks this is different. Usually a
circuit spanning the globe is formed between two or more nodes that
need to transport a dataset, movie-files, or perform calculations
together. These nodes work together for a short period of time, and then
the circuit is torn down. These networks are separated from the
Internet, so there is no DHCP server, or DNS.
Many gadgets already support dynamic discovery in any
kind of network and service discovery is also possible in printers, or
applications such as iTunes. This research project is about examining
options to do address management and service discovery for end hosts in a
cross-platform way. A starting point could be http://staff.science.uva.nl/~fdijkstr/publications/Link_Local_Addressing.pdf
|
Jeroen van der Ham <vdham=>uva.nl>
Sebastian Dabkiewicz <sebastian.dabkiewicz=>os3.nl>
|
R
P
|
1 |
13 S |
Distributed Password Cracking Platform.Cracking
of password hashes has many reasons. During IT audits we crack to test
the effectiveness of a password policy, and during security tests we
crack to further penetrate into a network. KPMG IT Advisory performs
both assignments continuously and password cracking is a day-to-day
activity. In order to fulfill the demands of our team to crack passwords
we have a setup that consists of a CPU cluster and a GPU box. The
cluster consists of ~70 CPU?s (john-MPI) with an easy to use interface
for the pentesters to upload the hashes and get the results. The GPU box
(5 GPU cards, many different tools) is used for specific cracks when
GPU power is faster. This setup was created about 18 months ago, and has
served us good in that time.
However, we see opportunities that we are not using.
The current setup can be further optimized, but also we would like to
further integrate the GPU power into the cluster. We would like students
to research how we can further extend the current setup. Key components
in this research are:
- Cracking strategy: research cracking strategies
that combine CPU and GPU cracking, dictionary, brute force and rainbow
table cracking for a fixed set of hash types (to be defined)
- Extending cracking functionality: research ways
of extending the current john-mpi cluster with nodes and tools for GPU
and rainbow table cracking
- Integration of the two: research ways of
integrating the researched cracking strategy into the newly extended
cluster, in such a way that the cluster chooses the best strategy for
the current load of the cluster and on the amount and type of uploaded
hashes.
The research is an example of combining skills of system and network engineers and with the skills of security testers.
Research at KPMG IT Advisory can be challenging. We
strive for the best results and therefore invest a considerable amount
of time in you, to help you achieve the best. But to succeed together we
require fully determined students that would like to go the extra mile.
The RP topics as stated on the website are fixed but
we are open to changes in the exact research approach if the student
prefers. We encouraged students to come up with own ideas and
approaches. During the short intake interview your are invited to bring
your ideas and approaches to the table. We use the intake to select the
students who will get the opportunity to perform their research project
at KPMG.
|
Marc Smeets <smeets.marc=>kpmg.nl>
Dimitar Pavlov <dimitar.pavlov=>os3.nl>
Gerrie Veerman <Gerrie.Veerman=>os3.nl>
|
R
P
|
1 |
14 S |
Integrating DMA attacks in exploitation frameworks.It
has been several years since the first research and tooling on firewire
attacks; exploiting the use of direct memory access to read and write
memory on desktops and laptops. The vulnerability is still there and
several new technologies have come around that - in theory - may be
prone to the same type of attack. We want students to further research
this. Steps in the research can include:
1 Research the possibilities of this attacks on new
techniques, e.g. Thunderbolt, HDMI, eSATA. Take into account that having
DMA access in theory allows for the attack to happen. But there may be
several practical issues that prevent the attack from happening (OS
security measures, master-slave election in the bus unable to bypass,
secure signing of devices connecting, etc).
2 Research the extend of the attack. The most common
'exploit' has been bypassing the logon screen and searching the memory
for keys/passwords. But what kind of other attacks can you think of?
3 Create a Proof of Concept in one of the following ways:
- Design/create a software component that can be
used for such attacks. The proof of concept should be modular to allow
different I/O techniques to be included, and preferably should be
integrated in the Metasploit framework.
- Design/create an 'Evil Docking Station', a
docking station that - whilst looking normal - can attack an attached
laptop via these.
Research at KPMG IT Advisory can be challenging.
We strive for the best results and therefore invest a considerable
amount of time in you, to help you achieve the best. But to succeed
together we require fully determined students that would like to go the
extra mile.
The RP topics as stated on the website are fixed but
we are open to changes in the exact research approach if the student
prefers. We encouraged students to come up with own ideas and
approaches. During the short intake interview your are invited to bring
your ideas and approaches to the table. We use the intake to select the
students who will get the opportunity to perform their research project
at KPMG.
|
Marc Smeets <smeets.marc=>kpmg.nl>
Rory Breuk <rory.breuk=>os3.nl>
Albert Spruyt <Albert.Spruyt=>os3.nl>
|
R
P
|
1 |
18 N |
Performance Analysis of OpenFlow Hardware.OpenFlow
is a new network technology. it was developed at Stanford University,
but is now gaining support from companies like Cisco, Juniper,
Microsoft, Google and Facebook. OpenFlow is a form of software defined
networking where forwarding tables are programmed into switches by
applications. In this project you will define which OpenFlow feature(s)
you want to investigate. This can be done on a simulator and/or with
real OpenFlow hardware. Prerequisites are basic knowlegde of Ethernet
(forwarding tables, flooding, VLANs, spanning tree) and some programming
experience in Python or C++.
Research Question here is: look at the fundamentals, performance, security, features that may be attractive.
For more information see www.openflow.org and www.opennetworking.org.
|
Ronald van der Pol <rvdp=>sara.nl>
Michiel Appelman <michiel.appelman=>os3.nl>
Maikel de Boer <maikel.deboer=>os3.nl>
|
R
P
|
1 |
19 F |
Electromagnetic Fault Injection (EMFI) on System-on-a-Chips (SoC) / Smartcards.Fault
injection techniques actively manipulate a side channel on a chip by
applying short laser, voltage or clock cycle pulses. All of them are
commonly used by Riscure to attack secure SoCs or smartcards. However,
EMFI could be an interesting, unexplored and currently unused
alternative.
All hardware required for this project will be
provided by Riscure. However, the student will be asked to fine tune the
provided hardware and relevant parameters. Possible parameters are:
- Size of the coil used in the EM probe
- Placement of the EM probe on the surface of the chip (front / back)
- Distance of the EM probe to the surface of the chip
- Power applied to to the EM probe
- Decapsulated chip versus encapsulated chip
Questions that could be answered by the research:
- Is EMFI feasible on embedded systems / smartcards?
- What parts of the SoC are influenced with EMFI? (CPU/RAM/ROM/FLASH)
- What are the advantages of EMFI compared to other fault injection techniques on SoCs / smartcards?
- What are the disadvantages of EMFI compared to other fault injection techniques on SoCs / smartcards?
- What is the most efficient configuration of the used EM probe?
- What are the limitations of the used EM probe?
Useful information:
|
Niek Timmers <niek=>riscure.com>
Sebastian Carlier <sebastian.carlier=>os3.nl>
|
R
P
|
2 |
20 S |
l/O Load Scheduler for Grid Mass Storage.l/O Load Scheduling on a high performance mass storage system.
Investigating an l/O load problem and implementing a possible solution.
Short description:
SARA manages a high performance data storage system
used, among other things, to store data from the LHC (particle
accelerator in Switzerland). This system is comprised of a disk front
end and a tape back end. Data is copied from a remote host to the disc
cache and then stored on tape. Reading in data sets from tape to the
disc cache and then transporting it back to a remote host also occurs.
This process is referred to as data staging.
A performance characteristic appears to be that it is
either possible to read quickly from- or write quickly to the disc.
Doing both simultaneously results in a much lower performance than 50%. A
possible solution for this problem is the implementation of a
scheduling mechanism in the staging process.
The assignment is to investigate techniques for
improving performance of the over-all process and developing a
(prototype) solution for this problem.
The assignment involves:
- Conducting research into the improvement of the staging process
- Suggesting possible solutions
- Implementing and documenting a prototype solution
- Giving a final report
|
Walter de Jong <walter=>sara.nl>
Christos Tziortzios <Christos.Tziortzios=>os3.nl>
|
R
P
|
1 |
21 SN |
Bootstrapping the Internet of the Future.The
design of the Internet did not account for network evolution. But since
its existence, the Internet needed amendments to address problems or
new protocols for new uses. The explosive increase of network devices
and their increasing mobility currently threatens the stability of the
Internet. Solutions to these problems, larger address space and keeping
track of address locations, require changes to the network layer
protocol.
We developed an approach to simplify the development
and deployment of network layer protocols. Our solution encapsulates the
network layer protocol by a virtual machine: the NetApp. In this thesis
work, we will develop a few NetApps, IPv6 and OpenFlow, that can grow
with demand. We will show that NetApps can be deployed on many Clouds,
and that automatically the needed arrangements are made, e.g. creating a
VPN, configuring IP addresses. The student will show that IPv6
deployment, or any other network layer protocol for that matter, becomes
a trivial task with NetApps.
|
Rudolf Strijkers <rudolf=>strijkers.eu>
Mohammad Shafahi <mohammad.shafahi=>os3.nl>
|
R
P
|
1 |
22 N |
Resilient OpenDNSSEC.In
the OpenDNSSEC project, the Enforcer is the component performing
automatic DNSSEC key roll-overs. Rolling keys can be done in many ways.
The upcoming Enforcer will be able to roll to a new key in most of those
ways, independent of the state and amount of current keys. It makes
sure no validator could see its zone as bogus or insecure. In order to
do these any-to-any roll-overs we described the validity of a zone in a
formal way. We don't expect our users to grasp the mathematical
definition, but they want to know what will happen in the future.
We would like to have a program that, given a
configuration file, outputs a textual or graphical time line showing
which resource records are published in what order, and when. The
challenge is not limited to programming -contrary to the users- you will
have to grasp our formal definition (and DNSSEC).
|
Yuri Schaeffer <yuri=>nlnetlabs.nl>
Alex Kasabov <aleksandar.kasabov=>os3.nl>
|
R
P
|
2 |
23 F |
Camera Identification on YouTube.Identifying cameras used in YouTube videos by matching noise patterns.
Netherlands Forensics Institute.
|
Marcel Worring <m.worring=>uva.nl>
Zeno Geradts <zeno=>holmes.nl>
Yannick Scheelen <Yannick.Scheelen=>os3.nl>
Jop van der Lelie <jop.vanderlelie=>os3.nl>
|
R
P
|
1 |
24 F |
Ranking of manipulated images in a large set using error level analysis.One
form of image manipulation is particularly interesting to the NFI and
is called the copy & move [8] technique. The copy & move
technique applies to adding or removing objects to or from an image. The
error level analysis (ELA) [5] image manipulation detection technique
is particularly effective in detecting this kind of forgery. ELA makes
use of some of the properties of lossy image formats [4] to detect
differences in quality levels between the original image and potentially
modified parts within that image.
The research focuses on determining whether the ELA
technique can be used to, automatically, rank images in a large dataset
based upon the likelihood of manipulations being present. By ranking a
set of images, the dataset could potentially be reduced and in turn
reduce the total amount of work needed to process the images..
|
Marcel Worring <m.worring=>uva.nl>
Jeffrey Bosma <Jeffrey.Bosma=>os3.nl>
Daan Wagenaar <daan.wagenaar=>os3.nl>
|
R
P
|
1 |
25 N |
OpenFlow.OpenFlow
is a new network technology. it was developed at Stanford University,
but is now gaining support from companies like Cisco, Juniper,
Microsoft, Google and Facebook. OpenFlow is a form of software defined
networking where forwarding tables are programmed into switches by
applications. In this project you will define which OpenFlow feature(s)
you want to investigate. This can be done on a simulator and/or with
real OpenFlow hardware. Prerequisites are basic knowlegde of Ethernet
(forwarding tables, flooding, VLANs, spanning tree) and some programming
experience in Python or C++.
Research Question: implement spanning tree alike protocol in a network of switches.
For more information see www.openflow.org and www.opennetworking.org.
|
Ronald van der Pol <rvdp=>sara.nl>
Iwan Hoogendoorn <Iwan.Hoogendoorn=>os3.nl>
Joris Soeurt <joris.soeurt=>os3.nl>
|
R
P
|
1 |
26 FS |
Visualizing attacks on honeypots.The
National Cyber Security Centre (NCSC) constantly monitors the internet
for threats. To monitor and follow the trends on malware infections it
has deployed various honeypots in unused IP space. To gather all this
data in a central database they are using SURFcert IDS, an open-source
Distributed Intrusion Detection System based on passive sensors. The
sensors are placed in each network that needs to be monitored and sends
all data back to the logging server. The sensor is running honeypot
software, such as Nepenthes, which can simulate multiple known Windows
vulnerabilities. Whenever an attacker triggers the honeypot it will log
all details of the attack and the attacker.
All the data is stored in a database which is
accessible through a simple web-interface available at the logging
server. Although the server offers some kind of reporting functionality
it is not possible to easily browse the data and analyse it. Especially
when a large number of sensors is used as is the case with NCSC.
The project goal is to create an interactive
visualization that will help network security analysts to see patterns
and trends while analyzing these alerts and helps identify risks.
|
Bart Roos (GOVCERT.NL) <bart.roos=>govcert.nl>
Jop van der Lelie <jop.vanderlelie=>os3.nl>
Rory Breuk <Rory.Breuk=>os3.nl>
|
R
P
|
2 |
29 N |
DNS-Based Authentication of Named Entries (DANE).The
DNS-Based Authentication of Named Entries (DANE) extension for the
Domain Naming System (DNS) is currently being drafted by the IETF. This
allows for inserting Secure Sockets Layer (SSL) and Transport Layer
Security (TLS) certificates [1] (or their fingerprints or public key)
into DNS using so-called TLSA resource records. By using the existing
DNS Security Extentions (DNSSEC) chain, this data can be proven to come
only from the administrator of the DNS zone [2]. Thereby validating the
certificate.
This project aims to identify the amount of current
certificates that could experience problems, and how these could be
prevented or mitigated, when deploying DANE.
The Electronic Frontier Foundation (EFF) has a
collection of all certificates and certificate chains found on the
Internet. A subset of these will be used to create TLSA records with
different options set, these will then be validated. Another item that
could be researched is the implementation of the current specification
(version 12) in DNS authoritative and recursive servers and how they
handle certain situations, e.g. CNAME records (aliases) and multiple of
the same TLSA records.
|
Bert Hubert <bert.hubert=>netherlabs.nl>
Pieter Lexis <pieter.lexis=>os3.nl>
|
R
P
|
1 |
30 SN |
Securing an outsourced network: Detecting and preventing malware infections.With
the rise of outsourced IT service management, client security is
increasingly difficult to manage for IT security departments. Outsourced
IT may comply to internal security standards, but often there is a
mismatch between the security standards of the service provider and the
client. IT requirements may change quickly due to technical and business
evolution, but service level agreements and other contracts remain
static over time. This situation may result in a situation where clients
run old and insecure configurations.
Another upcoming trend with bigger security management
challenges is the 'bring your own device' concept. User's may bring and
use their own device to connect to the business IT network and use it
for work purposes. In these cases, the user is responsible of
maintaining the device and manage its security. In both cases, there is a
high risk of getting infected with malware. These infections can be
caused by various causes such as drive-by downloads and rogue
applications that are installed by users.
Can these malware infections be detected and prevented
from within the infrastructure of the business that has outsourced
their IT or that allows 'bring your own device'?
|
Ewout Meij <ewout.meij=>external.t-mobile.nl>
Dennis Cortjens <dennis.cortjens=>os3.nl>
Tarik El Yassem <Tarik.ElYassem=>os3.nl>
|
R
P
|
1 |
35 F |
Definition of business rules and BRMS specification for Hansken.The
seized material in a typical case consists of several PCs, mobile
(smart)phones and digital cameras. Bit-for-bit copies of the data stored
in the material are put in XIRAF. We currently lack a set of
bit-for-bit copies that we can use for demo and training. We ask the
student(s) to:
- Describe a (criminal) scenario that leaves a lot
of digital traces in multiple systems (e.g. timestamps, geo-locations,
interaction);
- Think of ways to hide some of the traces and apply those to the scenario;
- To make the material realistic, they have to contain a lot of traces that have nothing to do with the scenario.
- Execute the scenario, keeping a detailed log;
- Deliver the bit-for-bit copies of all systems used in the scenario.
|
Zeno Geradts (DT) <zeno=>holmes.nl>
Thomas Schermer Voest <schermer.thomas=>student.uva.nl>
|
R
P
|
2 |
40 SN |
Green computing in IEEE 802.3az enabled clustersEnergy
efficiency is an important requirement for computing and communication
systems. In order to construct a green computing system, we have to
understand the energy consumption behavior of both the low level
infrastructure and the application models. The Energy-Efficient Ethernet
[1] enhancements have led to the IEEE 802.3az [2] standard which has
now been adopted by several network/Telcom device vendors. However, how
to achieve the system level energy saving by using the 802.3az is still a
challenging issue. In this project, we will focus on the following two
questions:
- How does 802.3az standard affect the energy consumption in Ethernet?
- How to schedule the application execution with awareness of 802.3az?
The test bed will be a test cluster connected
using a S1700 switch [3] from Huawei. The student(s) should 1) measure
the energy consumption of the switch as well as the whole system using
different patterns of communication loads, 2) compare the energy
behavior of the communication loads between 802.3az compliant and normal
switches, and 3) discover how to integrate the 802.3az features in a
more general green scheduling strategy for computing.
- Energy Efficiency Ethernet: http://en.wikipedia.org/wiki/Energy-Efficient_Ethernet
- IEEE 802.3az: http://www.ieee802.org/3/az/index.html
- Device: http://market.huawei.com/hwgg/enterprise/u-channel/pdf/S1700.pdf
|
Zhiming Zhao <z.zhao=>uva.nl>
Paola Grosso <p.grosso=>uva.nl>
Joris Soeurt <joris.soeurt=>os3.nl>
Dimitar Pavlov <dimitar.pavlov=>os3.nl>
|
R
P
|
2 |
41 SN |
Torrent monitoring & statistics.During
the Easter weekend some SNE researchers performed measurements on
Bittorrent traffic, specifically to find out whether the blockage of The
Pirate Bay had any effect on specific ISPs. The result was a quick
report to show that there was no significant effect. See:
http://www.delaat.net/news/2012-04-13/dutchpirate.pdf
We would like to continue improving these measurements
and the statistics calculation. We would also like to try figure out a
way to perform measurements without uploading and downloading.
- Would it be possible to create a sort of live view?
- What other things should we look at when considering network transparency in the Netherlands?
- What tools are needed to monitor that?
|
Jeroen van der Ham <vdham=>uva.nl>
Hidde van der Heide <hidde.vanderheide=>os3.nl>
|
R
P
|
2 |
46 N |
Multipath TCP.Multipathing
can be done on L3 with Equal Cost Multipathing (ECMP) or on L2 with
TRILL or SPB. In these cases multipathing is usually done based on flows
by calculating a hash (including e.g. Ethernet addresses, IP addresses
and TCP/UDP port numbers) of the packets. Flows with the same source and
distination follow the same path.
This works well when the traffic has many different
flows. However, in large data e-science applications there are typically
only a few flows and hashing does not spread the load evenly along the
interfaces in those cases. In this project two alternative technologies
will be investigated: multipath TCP (MPTCP) and GridFTP. MPTCP works for
all applications by spreading the application byte stream over multiple
interfaces. GridFTP is an application that can use multiple interfaces
to FTP an file from A to B. Students will evaluate and compare the
performance of both technologies (separate and in combination) in a
local 10GE testbed (and possibly 40GE local and 10GE wide area testbed).
|
Ronald van der Pol <rvdp=>sara.nl>
Gerrie Veerman <gerrie.veerman=>os3.nl>
|
R
P
|
2 |
47 N |
Time Sensitive Application Transport.Time-sensitive
data transport, such as that required by e-medicine or real-time video
streaming, is dependent on minimal jitter and delays. There is an
ongoing discussion in the NREN community as to which base technology,
TDM or packet, is best suited for time-sensitive datatransfer. In
addition, all NSI demonstration networks have been stumbling over
Ethernet limitations in respect of switching and scaling. The community,
therefore, needs to look at better technologies such as OTN, PBB and
MPLS-TP for these services. Some of the typical transport vendors, such
as Ciena, Alcatel-Lucent, Nokia Siemens and Huawei, are beginning to
offer such services, and the main commercial service suppliers are also
adopting this path.
This sub-task will study which technology is best
suited to handling time-sensitive data transport in various conditions,
e.g. normal operation, during link failure and during high load
conditions.
|
Cees de Laat <delaat=>uva.nl>
Erik-Jan Bos <Erik-Jan.Bos=>UvA.nl>
Mohammad Shafahi <mohammad.shafahi=>os3.nl>
|
R
P
|
2 |
53 N |
Secure Internet Banking on Insecure Hosts.(combination of ABN Amro and Deloitte)
When you want to use the Online Banking application of
ABN Amro over the internet using an unknown or Internet caf� computer
you will never know how safe and secure the computer and network is.
Customers are interested in solutions that will allow them to perform
Online Banking safely in a hostile environment. Technologies and
concepts such as sandboxing could be an option to improve security, but
are not always considered user friendly or secure.
For this research ABN AMRO and Deloitte are interested
in user friendly online solution for insecure environments that allow
secure online banking. For example, how can we make sure that users can
perform secure online banking while using insecure systems and networks.
Investigating a scheme that would still use an one-time application,
but perform the transactions directly through a possibly insecure host.
|
Sander Vos
<Sander.Vos=>nl.abnamro.com>
Martijn Knuiman <MKnuiman=>deloitte.nl>
Christos Tziortzios <Tziortzios =>os3.nl>
|
R
P
|
2 |
57 N |
Discovering Path MTU black holes on the Internet using RIPE Atlas.With
World IPv6 Launch on June 6th this year, we (the network community)
consider the IPv6 protocol as mature and stable as IPv4 that served us
well the past 20+ years. Unfortunately, transition from IPv4 to IPv6 is
not as effortless as hoped for, and many smaller and larger glitches are
making a painless IPv6 deployment difficult.
The RIPE Atlas infrastructure offers a huge monitoring
infrastructure of about 1500 probes, see http://atlas.ripe.net/. With
these probes simple measurements can be instrumented to monitor the
network from many vantage points. Recently, user defined experiments can
also be executed on the Atlas infrastructure. In the project, student
can design and analyse a number of Atlas experiments to study IPv6
reachability and problems (the annoyances), for example MTU problems and
IPv6 fragments.
http://www.nlnetlabs.nl/
|
Benno Overeinder <benno=>nlnetlabs.nl>
Maikel Boer <maikel.deboer=>os3.nl>
Jeffrey Bosma <jeffrey.bosma=>os3.nl>
|
R
P
|
2 |
60 N |
Social media crawling.In
the last few years, much attention has been given to the public
exposure of individuals via social networks. This has lead to some
awareness with end users, who have started to limit the exposure of
their personal information to the (public) world wide web. However, the
social networks still contain a wealth of information for third parties.
A previous OS3 research project
(http://cees.delaat.net/rp/2010-2011/p13/report.pdf) about this subject
proved that it is possible to plot the mappings between users of
different social networks, and together reveal more info. It also
proofed that public data on social networks can be crawled on a large
scale. But within the topic of social networks there still is a lot more
to research.
In this project the candidate(s) should focus on
further harvesting of data from social networks via publicly available
sources. One of the possibilities to do this is by the creation of
zombie profiles, which are fake profiles created for the purpose of
information crawling. By automating the creation of these profiles and
becoming part of a friend-circle, a lot of personal information can be
crawled. Another approach would be to improve the profile matching
algorithm of the data crawlers created in the previous research. The
exact approach will be defined in the in the first week of the project.
Research at KPMG IT Advisory can be challenging. We
strive for the best results and therefore invest a considerable amount
of time in you, to help you achieve the best. But to succeed together we
require fully determined students that would like to go the extra mile.
The RP topics as stated on the website are fixed but
we are open to changes in the exact research approach if the student
prefers. We encouraged students to come up with own ideas and
approaches. During the short intake interview your are invited to bring
your ideas and approaches to the table. We use the intake to select the
students who will get the opportunity to perform their research project
at KPMG.
|
Marc Smeets <smeets.marc=>kpmg.nl>
Yannick Scheelen <yannick.scheelen=>os3.nl>
Daan Wagenaar <daan.wagenaar=>os3.nl>
|
R
P
|
2 |
61 FSN |
Fault injection model for the XMEGA64A3.Glitching
attacks can accomplish things that logically cannot be achieved while
attacking embedded systems. At the same time is it a pre-requisite for
many attacks to gain access to the code or obtain runtime control before
other attacks (such as side channel analysis) can be applied.
Most common microcontrollers these days include
features designed to protect the internal code from extraction, which
prevent access to the code for further analysis. It is expected that
through glitching these features can be circumvented. An example of such
a microcontroller is the MSP430, where the code can be accessed via the
JTAG or BSL interface, which both can be protected or disabled. The
projects focus will be on documenting exactly what the effects of
voltage glitching are on the chip. If there is time available, bypassing
the BSL will be attempted.
The goal of this project is to:
- create a voltage glitching setup aimed to bypass the code protection features of the MSP430
-
- the hardware setup will be provided by Riscure
- the "test application" will be mainly developed by the student
- influence of different types of voltage glitches on the code protection features, such as:
-
- spikes to low voltage
- spikes to high voltage
- long duration threshold voltage dips
- gain better understanding on how and when to apply different glitch techniques
- succesfully bypassing the BSL protection of the MSP430
The following deliverables are requested from the student:
- A clear and consise scope of the project
- A clear description of performed tests and their results
- Recommendations for future testing
Reference:
http://events.ccc.de/congress/2008/Fahrplan/attachments/1191_goodspeed_25c3_bslc.pdf
|
Niek Timmers <Timmers=>riscure.com>
Albert Spruyt <Albert.Spruyt=>os3.nl>
|
R
P
|
2 |