TimeLine
RP1 (January):
- Wednesday Sep 16 2015, 10h00: Introduction to the Research Projects.
- Nov 11, 2015, 13h00-16h00: Detailed discussion on chosen subjects for RP1.
- Monday Jan 4th - Friday Jan 29th 2016: Research Project 1.
- Friday Jan 8th: (updated) research plan due.
- Monday afternoon Feb 1th 2016 12h40-17h00: Presentations RP1 in B1.23 (OS3 lab) at SP 904.
- Tuesday Feb 2th 2016 9h35 - 16h35: Presentations RP1 in B1.23 (OS3 lab) at Science Park.
- Sunday Feb 7th 24h00: RP1 - reports due
|
RP2 (June):
- Wednesday May 11, 2016, 9h30-12h00, B1.23 Detailed discussion on chosen subjects for RP2.
- Monday May 30th - Jun 24 2016: Research Project 2.
- Friday Jun 3th: (updated) research plan due.
- Wednesday Jun 29 2016, 9h00-17h00: presentations in C0.110 @ SP904.
- Thursday Jun 30 2016, 9h00-17h00: presentations in C0.110 @ SP904.
- July 4th 09h00 2016: RP2 - reports due.
|
ProjectsHere is a list of student projects. Find here the left over projects this year: LeftOvers.
In a futile attempt to prevent spam "@" is replaced by "=>" in the table.
Color of cell background:
Project available |
Presentation received. |
Confidentiality was requested. |
Currently chosen project. |
Report received. |
Blocked, not available. |
Project plan received. |
Completed project. |
Report but no presentation |
Outside normal rp timeframe |
|
|
|
|
# |
title
summary |
supervisor contact
students
|
R
P
|
1
/
2 |
4 |
Portable RFID Bumping Device.In
regards to physical social engineering there are two main ways of
gaining entry to targeted premises either via tail-gating, that is to
follow a valid employee/visitor right behind them as they’ve opened a
door or via lock picking, which implies the use of specialised tools to
pick physical locks.
As more organisations are replacing traditional entry
systems with RFID card controlled entry points and even turnstiles, the
use of tail-gaiting and lockpicking is becoming increasingly more
difficult, especially when coupled with increased security awareness of
employees and security staff. It has long been discussed the ability to
read a target’s RFID access card and use that information to replicate
it onto a different card of similar make, thus effectively cloning it.
Although possible on many occasions this is a multiple step process
which requires both time and materials.
There are primarily two different types of cards;
cards which support security keys and cards which don’t. Many HID cards
or MIFARE Ultralight cards (such as the ones used in disposable
OV-chipkaart tickets) do not support a security handshake or encryption,
unlike Anonymous/Personal OV-chipkaart tickets that use the MIFARE
Classic 4K chips which use security keys. It is woth noting that MIFARE
Classic chips have also been cracked
(http://www.ru.nl/ds/research/rfid/) but these more elaborate systems
require offline analysis. Most organisations with recent RFID
implementations on their premises also use MIFARE Classic chips.
System have been designed since mid-2000 (http://www.wired.com/wired/archive/14.05/rfid.html)
for "bump" cloning basic/non-encrypted RFID cards but no serious
research has been made into designing a portable solution that can
on-the-spot 1) clone multiple technologies and 2) clone RFID cards that
support security keys. - Such a platform could also be potentially
programmed to also read and clone other NFC protocols such as ones used
in mobile phones and debit/credit cards and could warrant further
research.
|
Ari Davies <ADavies=>deloitte.nl>
Romke van Dijk <romke.vandijk=>os3.nl>
Loek Sangers <Loek.Sangers=>os3.nl>
|
R
P
|
1
|
13 |
Designing an open source DMARC aggregation tool.Email
is one of the oldest internet technologies in place, and in bad need of
some updates. DMARC is a new approach where a domain owner can make
policies about his or her domain visible to recipients. This allows a
domain owner to advertise that mail can safely be discarded under
certain conditions (such as when DKIM and SPF are not in place). Given
that the majority of spam and phishing involves sender address spoofing,
this approach can have a very real impact on both spam and security.
DMARC also defines a feedback mechanism from
recipients back to domain owners. That means you get an actual copy of
the mail sent by the attacker, with a detailed machine processable
report that will allow you to investigate what happened. The owner of a
domain may get reports from many different sources, depending on the
various domains emails are sent to. Of course this moves part of the
work load of handling spoofed mail from the original recipient (who no
longer sees the mail) to the faked sender that gets alerted.
Each mail triggers a separate report, and given that
the volume may be at typical spam levels it is hard to get an adequate
overview from a large amount of spoofing incidents. Currently, there is a
limited set of commercial tools that offer some insight but is not yet
an established standard nor are there good open source tools - which
makes users depend on commercial providers (often in another
jurisdiction) to parse significant volumes of DMARC data for them. Since
this involves sharing data and there might also be valid email that
ends up there erroneously (because of configuration error) this is not
ideal from a security and confidentiality point of view. In this project
you will investigate how to best handle the flows of DMARC data, and
design an open source prototype aggregation tool that can freely be used
by domain name owners to protect themselves.
|
Michiel Leenaars <michiel=>nlnet.nl>
Yadvir Singh <Yadvir.Singh=>os3.nl>
|
R
P
|
2
|
18 |
UsnJrnl Parsing for File System History.In
modern Windows versions, the NTFS filesystem keeps a log (the UsnJrnl
file) of all operations that take place on files and folders. This
journal is not often included in forensic investigations, and even if it
is, parsing and interpreting can be tedious and labour-intensive work.
In this project, you are asked to research the type of information that
is stored in the UsnJrnl that can be of value for forensic
investigations, and create a (PoC) tool that parses out this information
in a useable format. Examples of activity that you could identify in
the UsnJrnl are filename changes (what were previous filenames of a
file?), timestamp modifications (compare to MFT entries and find
anomalies), read/write operations (research is still required for a
better understanding of relevant traces), etc.
|
Kevin Jonkers <jonkers=>fox-it.com>
Frank Uitewaal <fuijtewaal=>os3.nl>
Jeroen van Prooijen <jeroen.vanprooijen=>os3.nl>
|
R
P
|
1
|
20 |
Design Exploration of Transparency Enhancing Technology for Government.SUMMARY
Perform a design exploration of transparency enhancing
technology, which consists of comparing advantages and disadvantages of
a couple different levels of distribution and encryption key management
systems that offers the right balance between transparency, privacy and
security. The (theoretical) technical solutions suggested in the report
should outline practical solutions to the Dutch government aim to allow
citizens easy online access to all their digital data as described
amongst others in "Visiebrief Digitale Overheid 2017" and
"Overheidsbrede Dienstverlening 2020", and is being worked on in
practice by the Manifestgroep. The proper balance between transparency
and privacy of all data the government gathers about citizens is still a
(technologically) unresolved question towards which this research
project will contribute part of a solution.
The key research questions posed is: "How could
transparency enhancing technology be designed for use by the government
without negatively impacting citizen privacy (for example by allowing
any single party access to all data on a citizen)?"
REQUIREMENTS FOCUS ON
- Auditable (log everything as part of the design)
- Authorization (grant/revoke access only to those while they need it)
- Authentication (credentials are inherently checked)
- Decentralized (less central control, and allow the network to grow)
- Empowering individuals (individual has the final say who can use their data)
- Encryption (future proof with strong encryption, allowing flexibility)
- Indexed (searchable without leaking data about the population)
- Privacy protecting (the system should foster privacy by design)
- Public/Private keys (with the ability to use hardware tokens)
- Scalable (to at least the size of a country, in the PiB range)
- Transparent (a user has complete insight in his/her data stored)
- User-centric (the user has control over which data is stored where and who can access it)
SPECIFIC DESIGN THOUGHTS
- OS3 (Open Standards, Open Software, Open
Security) design that should be tailored to local needs, but flexible to
be used for other purposes.
- Distributing both the access keys and the data
seems the best way to create a fully transparent system without
sacrificing privacy or security.
- Authorization should be given by the user. This
can be to a (sub)organization. This signed authorization should have an
expiration date (with system wide maximum time enforced by the servers).
- Encryption keys are made available to users by
encrypting them with their public key, more than one person can have
access to the same encryption keys.
- Data can safely be stored on any cloud storage
platform since it is strongly encrypted. The system should however be
agnostic to the type of storage to allow political decision to be made
to move the data. The system should be easily extendable to allow
storage of data on alternate platforms.
- Access logs should processed in a timely fashion
and stored in historical records in the tree with the relevant data.
When this part of the tree is removed the access logs are removed as
well preventing (partial) reconstruction of deleted data from access
logs.
- All queries to central servers are signed (some
twice for queries 'on behalf of') and must contain a token to prevent
replay attacks.
- Any smartcard capable of X.509 should be able to
be used, as long as the CS is on a trusted list. This can be 'PKI
overheid', or the future 'Identiteitsbewijs' with this capability.
- Data is segmented in the data structure which is
a NoSQL database containing metadata for the entire tree, and the
encrypted blob storage which is used to store vast quantities of data.
- The content of the distributed database should
be semi-public, and the encrypted blob storage should be fully public
without compromising the security of the system. As long as keys are
kept private the system functions as designed.
- Tree has list of 'servers', 'organizations',
'persons', 'keys', 'templates'. All data structures are stored in this
tree, which has an ACL on each folder. Small metadata can be stored
directly in this tree, but all large files are pointers to the encrypted
blobs. The min/max size is determined system wide.
- While it is impossible to prevent government
agencies from aggregating all citizen data into their own centralized
database (for the purpose of monitoring citizens) this system should be
designed to make it very hard to use for that purpose.
- The system should be practical to use both for
the users as well as the government agencies that need to aggregate data
into it. By offering a design for a practical solution that provides
transparency without a large cost in privacy and/or security
|
Guido van 't Noordende <g.j.vantNoordende=>uva.nl>
Mathijs Houtenbos <mathijs.houtenbos=>os3.nl>
|
R
P
|
2
|
21 |
Adding An Unusual Transport To The Serval Project.Recent
discussions on the guardian-dev mailing list have revealed the
possibility of using bluetooth device names and Wi-Fi direct directory
lists as low-bandwidth ad-hoc communications channels between nearby
smart-phones. The key advantages of these channels is that they require
no user intervention, such as peering or association. Adding such
transports to the Serval Project will provide further options for people
in disasters or facing oppression to communicate effectively and
securely.
This is a sub-project from the Serval project
For the rest see #25 below.
|
Paul Gardner-Stephen <paul.gardner-stephen=>flinders.edu.au>
Alexandros Tsiridis <Alexandros.Tsiridis=>os3.nl>
Joseph Hill <Joseph.Hill=>os3.nl>
|
R
P
|
2
|
22 |
Recursive InterNetwork Architecture; An Assessment of the IRATI Implementation.As
this is a broad research topic one or two groups of students can work
on this and focus on specific details or issues. This is group 1.
RINA[1], Recursive InterNet Architecture is a novel
architecture for computer networking that doesn't suffer from many of
the shortcomings we experience using TCP/IP and the current Internet
stack.
- "It is a new architecture that builds on the
fundamental principle that networking is Inter-Process Communication
(IPC) and only IPC."
- "RINA views the network as a collection of networks of processes, rather than a network of "boxes"€."
John Day gave a nice overview of RINA at TNC2015[2].
We would like someone to investigate this new approach
and to see if it's possible to build a small testbed from the
implementations that currently exists and report back on the issues they
encounter while doing this. There are several prototypes/open source
implementations to work with and test this new architecture.
[1] http://www.future-internet.eu/fileadmin/documents/fiarch23may2011/06-Grasa_DesignPrinciplesOTheRecursiveInterNetworkArchitecture.pdf
[2] http://geant.23video.com/tnc15-1a-opening-plenary?start=2105
|
Marijke Kaat <Marijke.Kaat=>surfnet.nl>
Ralph Koning <R.Koning=>uva.nl>
Jeroen van Leur <Jeroen.vanLeur=>os3.nl>
jeroen.klomp <jeroen.klomp=>os3.nl>
|
R
P
|
1
|
23 |
Taking a closer look at IRATI.As
this is a broad research topic one or two groups of students can work
on this and focus on specific details or issues. This is group 2.
RINA[1], Recursive InterNet Architecture is a novel
architecture for computer networking that doesn't suffer from many of
the shortcomings we experience using TCP/IP and the current Internet
stack.
- "It is a new architecture that builds on the
fundamental principle that networking is Inter-Process Communication
(IPC) and only IPC."
- "RINA views the network as a collection of networks of processes, rather than a network of "boxes"€."
John Day gave a nice overview of RINA at TNC2015[2].
We would like someone to investigate this new approach
and to see if it's possible to build a small testbed from the
implementations that currently exists and report back on the issues they
encounter while doing this. There are several prototypes/open source
implementations to work with and test this new architecture.
[1] http://www.future-internet.eu/fileadmin/documents/fiarch23may2011/06-Grasa_DesignPrinciplesOTheRecursiveInterNetworkArchitecture.pdf
[2] http://geant.23video.com/tnc15-1a-opening-plenary?start=2105
|
Marijke Kaat <Marijke.Kaat=>surfnet.nl>
Ralph Koning <R.Koning=>uva.nl>
Koen Veelenturf <koen.veelenturf=>os3.nl>
|
R
P
|
2
|
24 |
Machine Detectable Network Behavioural Commonalities for Exploits and Malware.Research
if there are any machine detectable (i.e. fingerprints) network
behavioral commonalities for exploits and malware generated by Armitage
(as provided by Kali Linux).
Goal:
- To determine whether the automated generation of malware by Armitage (http://www.fastandeasyhacking.com/)
produces code that has predictable network behavior (rhythm of packets,
size of packets, sequence of ports, payload sizes etc.) when used by
inexperienced hackers.
Approach:
- Set up a secure 'victim' environment (roll-back after each trial).
- Create an incremental feature plan to create malware using Armitage.
- When using more and more 'evasion' techniques, see if there are subtle or not-so-subtle fingerprints.
Result:
- Knowledge that may help implementation of a broad-spectrum detector for basic malware 'created' by hobbyists (i.e. anklebiters).
- Alternatively, the result may be that Armitage in it's current form is enough to create malware that can evade detection.
Explanation:
- A major part of ad-hoc created malware is
generated using Armitage. It is possible to generate a new virus /
trojan within a very limited amount of time, this virus is hardly
detectable by AV software. If there exist an option to detect Armitage
generated malware by using its network behavior characteristics, then
malware detection solutions will make a major step forward.
|
Adrianus Warmenhoven <adrianus.warmenhoven=>redsocks.nl>
Alexandros Stavroulakis <astavroulakis=>os3.nl>
|
R
P
|
2
|
26 |
On the feasibility of converting AMS-IX to an Industrial-Scale Software Defined Internet Exchange Point.A
Software Defined Internet Exchange (SDX) is an IXP consisting of a
programmable SDN fabric, coupled with a BGP route server and an SDN
controller. The SDX controller provides each participant AS with the
abstraction of a dedicated switch that it can program using match-action
policies to control traffic flows. Participants may express SDN
policies on both their inbound and out- bound traffic, thus allowing for
more granular policy definitions compared to solely using BGP for
traffic engineering. Examples of potential use cases for this technology
are application specific peering, load balancing over the IXP or
upstream DDoS prevention.
Recent developments on an 'Industrial Scale' SDX
controller (iSDX) have potentially made implementing a scalable SDX
environment feasible. This project aims to evaluate the practical
scalability of such an environment on the Brocade MLX platform of the
AMS-IX.
|
Joris Claassen <joris.claassen=>ams-ix.net>
Arien Vijnn <arien=>ams-ix.net>
Siem Hermans <siem.hermans=>os3.nl>
Jeroen Schutrup <jeroen.schutrup=>os3.nl>
|
R
P
|
2 |
29 |
Misusing Open Services on the Internet.Many
one-off servers on the internet are badly configured to allow
unauthenticated or default access to their services. Services like
MongoDB, Memcached, and others (used to) come with no or default
authentication out of the box, and are often inadvertently exposed to
the entire internet. While the majority of these servers are hopefully
forgotten and not business-critical, nor easy to exploit further than
possessing an open service, it might otherwise be possible to use these
services for other malicious purposes.
This research topic is about how open services can be
maliciously used as a command & control facility for botnets. The
impact of this research would be to show/publish another method that can
be used by cyber criminals, and show the consequences of lacking
security awareness and lacking good citizenship on the web.
|
Rick van Galen <vanGalen.Rick=>kpmg.nl>
Ben de Graaff <ben.degraaff=>os3.nl>
Jelte Fennema <jelte.fennema=>os3.nl>
|
R
P
|
1
|
30 |
Subverting Android 6.0 fingerprint authentication.The
main goal of this project is to assess the robustness of the Android
6.0 fingerprint verification chain. Mechanics behind the verification
chain consists of several hardware and software layers. The research
will solely focus on the software components:
- FingerprintService singleton
- Daemon process (fingerprintd)
- Hardware Abstraction Layer (HAL) library
Without having mapped all possible input channels, some potential attack vectors have already been identified:
- Replacing the fingerprint daemon with one that always provides positive answers to verification attempts
- Attempt to modify behaviour of the FingerprintService using Java reflection techniques
|
Rick van Galen <vanGalen.Rick=>kpmg.nl>
Thom Does <Thom.Does=>os3.nl>
Mike Maarse <Mike.Maarse=>os3.nl>
|
R
P
|
1
|
31 |
Exfiltrating Data from Managed Profiles in Android for Work.Android
for Work is a native implementation of segregation of (amongst others)
data on Android devices. The technology is based on native Linux user
segregation and was developed in part by Samsung, as part of their Knox
solution. Android for Work may be Android's killer move for
business/enterprise users, as it addresses various major security
concerns.
This research focuses on Android for Work's security
features. Points of interest include: data segregation, protection of
data at rest (encryption), local key management, AfW API's for Mobile
Device Management solutions, etcetera.
|
Paul van Iterson <vanIterson.Paul=>kpmg.nl>
Tom Curran <Tom.Curran=>os3.nl>
Ruben de Vries <Ruben.deVries=>os3.nl>
|
R
P
|
1
|
33 |
Power Efficiency of Hypervisor and Container-based Virtualization.In
the project 'Greening the Cloud', led by the HvA, we are interested in
the performance of different Hypervisors with respect to greennnes.
Hypervisors segment the physical machines into multiple virtual machines
and considering their performance greennnes is mostly not taken into
account. For equal benchmark/use
cases we will compare three hypervisors, two open
source hypervisors, KVM and XEN, and another hypervisor from VMware.
Performance issues with respect to green aspects must be defined for
hypervisors and be suited to incorporate in a checklist. This checklist
will be part of a larger framework to be developed by the collaboration
aimed to green labeling of clouds. The comparison should be a fair
comparison, i.e. the comparison should also take network functionality
and storage functionality into account. About non-green performance
aspects of hypervisors already studies are available, and part of the
work will be a literature study.
This work will be conducted in close collaboration
with two of the project participant, both cloud providers, Schuberg
Philis and Greenhost.
|
Arie Taal <A.Taal=>uva.nl>
Paola Grosso <p.grosso=>uva.nl>
Jeroen van Kessel <jkessel=>os3.nl>
|
R
P
|
2
|
34 |
De APT-catcher.
Organisaties treffen allerhande maatregelen om
inbrekers buiten hun infrastructuur te houden. Toch is niet ondenkbaar
dat hackers binnendringen en ongemerkt lange tijd een 'Advanced
Persistent Thread' (APT) vormen binnen het netwerk. Deze opdracht
bestaat eruit om een soort digitale 'vliegenvanger' te bouwen. Een
simpele honeypot op een eenvoudig stukje hardware. Deze "APT-catcher"
luistert alleen maar passief. Zodra hij 'geraakt' wordt, bijvoorbeeld
door middel van een portscan of pingsweep die de hacker uitvoert op het
betreffende netwerksegment, gaan er alarmbellen af. Dat kan bijvoorbeeld
een e-mail zijn, of een SNMP-trap. We denken aan een simpel kastje,
zoals een Gli-NET, met OpenWRT. De honeypot kan iets zoals PSAD zijn. De
opdracht bestaat eruit om een soepel, werkend geheel te bouwen, die
simpel ingeplugd en geconfigureerd kan worden, weinig/geen
false-positives genereert en niet ongemerkt stopt met werken.
|
"Marco Davids (SIDN)" <marco.davids=>sidn.nl>
Cristian Hesselman <cristian.hesselman=>sidn.nl>
Guido Kroon <guido.kroon=>os3.nl>
|
R
P
|
2
|
38 |
Namecoin as alternative to the Domain Name System.This
project involves the analysis of alternatives to the Domain Name System
(DNS), which has been the internet's de facto naming system since 1983.
Given its age, it is pertinent to ask how sustainable the DNS is and
what the protocol's future is. What is the potential of possible
alternatives such as NameCoin? Are any of them viable options? Can they
match the robustness of the DNS?
https://www.sidn.nl/a/about-sidn/research-into-new-naming-and-identification-systems-on-the-internet?language_id=2
|
"Marco Davids" <marco.davids=>sidn.nl>
Cristian Hesselman <cristian.hesselman=>sidn.nl>
Xander Lammertink <xander.lammertink=>os3.nl>
|
R
P
|
2
|
39 |
Performance measurement and tuning of remote acquisition.In
previous research a remote acquisition and storage solution was
designed and built that allowed sparse acquisition of disks over a VPN
using iSCSI. The performance of this solution (and any solution that
does random IO) depends on the tuning of the IO. The student is asked to
come up with strategies that find a reasonable optimum between
sequential io (full copy) and random io (sparse possibly incomplete
logical copy) and give advice on when to choose which method.
|
Ruud Schramp <schramp=>holmes.nl>
Zeno Geradts <zeno=>holmes.nl>
Erwin van Eijk <eijk=>holmes.nl>
Lukasz.Makowski <Lukasz.Makowski=>os3.nl>
|
R
P
|
1
|
41 |
Comparison of parallel and distributed implementation of the MST algorithm.There
are many graph algorithms that are tuned and modified to work on modern
architectures. In the same time, lots of effort is put into
implementing large scale systems for graph processing over clusters and
clouds.
In this project, we aim to compare the differences
between the algorithms and their performance when running on single-node
architectures and tunning on distributed systems. Specifically, by
selecting different types of graphs, we want to analyze the cases where
single-node platforms outperform multiple-node ones (i.e., clusters).
The basic implementations for different systems will be provided.
The following deliverables are requested from the student:
- a selection of 1-3 algorithms chosen for performance analysis.
- a comparative description of the algorithms and their implementation details for different platforms.
- a description of the selected datasets (at least 10) and their features.
- a detailed performance report covering all the platforms and graphs, with a focus on comparative analysis.
|
Ana Varbanescu <a.l.varbanescu=>uva.nl>
Alexis Sireta <Alexis.Sireta=>os3.nl>
|
R
P
|
1
|
43 |
Development of a new policy evaluation procedure for XACML.Definition
: eXtensible Access Control Markup Language (XACML) has become the de
facto standard for the policy specification access control policies on
various platforms including the Web. XACML does not only provide a
language to specify policies, but also an architecture for the
enforcement of policies. In this thesis, we will develop an efficient
policy evaluation procedure that is applied by the policy decision point
(PDP) component of the architecture. The state-of-the-art on this
research work is represented by XEngine [1] which employs decision
diagrams to produce access decisions. The problem with this approach is
it is memory hungry and may not scale in certain scenarios where memory
is limited.
The thesis will start with the analysis of decision
diagrams that will identify their strengths and weaknesses. For
instance, we should be able to answer the question at the end :
- For which kind of problems, canonical representation such as the one of decision diagrams, are good?
References:
[1] Alex X. Liu, Fei Chen, JeeHyun Hwang, Tao Xie,
"Designing Fast and Scalable XACML Policy Evaluation Engines". IEEE
Trans. Computers 60(12): 1802-1817 (2011)
[2] Santiago Pina Ros, Mario Lischka, Felix Gomez Marmol, "Graph-based XACML evaluation" SACMAT 2012: 83-92
|
Fatih Turkmen <F.Turkmen=>uva.nl>
Jorian van Oostenbrugge <jorian.vanoostenbrugge=>os3.nl>
|
R
P
|
1
|
47 |
Automated capability analysis in WordPress plugins.Background information.
Data drives business, and maybe even the world.
Businesses that make it their business to gather data are often
aggregators of clientside generated data. Clientside generated data,
however, is inherently untrustworthy. Malicious users can construct
their data to exploit careless, or naive, programming and use this
malicious, untrusted data to steal information or even take over
systems.
It is no surprise that large companies such as Google,
Facebook and Yahoo spend considerable resources in securing their own
systems against wouldbe attackers. Generally, many methods have been
developed to make untrusted data cross the trustboundary to trusted
data, and effectively make malicious data harmless. However, securing
your systems against malicious data often requires expertise beyond what
even skilled programmers might reasonably possess.
Problem description.
Ideally, tools that analyze code for vulnerabilities
would be used to detect common security issues. Such tools, or static
code analyzers, exist, but are either outdated (http://ripsscanner.sourceforge.net/) or part of very expensive commercial packages (https://www.checkmarx.com/ and http://armorize.com/).
Next to the need for an opensource alternative to the previously
mentioned tools, we also need to look at increasing our scope. Rather
than focusing on a single codebase, the tool would ideally be able to
scan many remote, largescale repositories and report the findings back
in an easily accessible way.
An interesting target for this research would be very
popular, opensource (at this stage) Content Management Systems (CMSs),
and specifically plugins created for these CMSs. CMS cores are held to a
very high coding standard and are often relatively secure. Plugins,
however, are necessarily less so, but are generally as popular as the
CMSs they’re created for. This is problematic, because an insecure
plugin is as dangerous as an insecure CMS. Experienced programmers and
security experts generally audit the most popular plugins, but this is:
a) very timeintensive, b) prone to errors and c) of limited scope, ie
not every plugin can be audited. For example, if it was feasible to
audit all aspects of a CMS repository (CMS core and plugins), the
DigiNotar debacle could have easily been avoided.
Research proposal.
Your research would consist of extending our proof
of concept static code analyzer written in Python and using it to scan
code repositories, possibly of some major CMSs and their plugins, for
security issues and finding innovative ways of reporting on the massive
amount of possible issues you are sure to find. Help others keep our
data that little bit more safe.
|
Patrick Jagusiak <patrick.jagusiak=>dongit.nl>
Frank Uitewaal <fuijtewaal=>os3.nl>
|
R
P
|
2
|
50 |
Docker Overlay Networks Performance analysis in high-latency environments.The GÉANT Testbeds Service (http://services.geant.net/GTS/Pages/Home.aspx)
provides an interesting experimentation platform for the study of novel
networking architectures. In this project we assess and usability of
GTS for Container (Docker) networking, with focus on the impact of
latency and geographical distribution of resources on the networked
application performance.
|
Paola Grosso <p.grosso=>uva.nl>
Siem Hermans <siem.hermans=>os3.nl>
Patrick de Niet <Patrick.deNiet=>os3.nl>
|
R
P
|
1
|
51 |
Jailbreak/Root Detection Evasion Study on iOS and Android.Description:
- Mobile applications may implement measures
against rooted devices. Frameworks exist for Android and iOS that
provide root detection and can be integrated into mobile applications.
We are looking for how these frameworks implement root detection and
what are possible workarounds.
|
Roel Bierens <rbierens=>deloitte.nl>
Dana Geist <Dana.Geist=>os3.nl>
Marat Nigmatullin <Marat.Nigmatullin=>os3.nl>
|
R
P
|
1
|
52 |
TLS Session Key Extraction from Memory on iOS Devices.Description:
On Android and iOS it may be possible to obtain the
SSL session keys by scanning and parsing the process memory of a running
application. We would like to investigate whether it is possible to
recover the keys to decode captured network traffic of SSL sessions.
This project focusses on IOS.
|
Cedric Van Bockhaven <cvanbockhaven=>deloitte.nl>
Tom Curran <Tom.Curran=>os3.nl>
Marat Nigmatullin <marat.nigmatullin=>os3.nl>
|
R
P
|
2
|
53 |
Developing an Ethereum Blockchain Application.Blockchain
technology is getting much attention triggered by the popularity of the
bitcoin cryptocurrency. However, blockchain technology has applications
beyond monetary. Examples are domain name registration (Namecoin,
.bit), notary functions and smart contracts. Also the health industry is
mentioned in this context: enforcing of insurance contracts and
privacy-preserving exchange of patient data.
Ethereum (https://ethereum.org/)
is a crowdfunded decentralized platform that runs smart contracts:
applications that run exactly as programmed without any possibility of
downtime, censorship, fraud or third party interference. It is based on
blockchain technology. The hypothesis is that Ethereum will make it easy
to launch blockchain-based applications without needing to start a new
blockchain or cryptocurrency.
In this project, you will investigate the hypothesis by
- Selecting a useful blockchain-based application
- Developing the selected application as smart contract on Ethereum
- Developing an associated client application
- Launching and using the developed application
- Evaluating the whole process
|
Oskar van Deventer <oskar.vandeventer=>tno.nl>
Erwin Middelesch <erwin.middelesch=>tno.nl>
Nikolaos Triantafyllidis <Nikolaos.Triantafyllidis=>os3.nl>
|
R
P
|
2
|
55 |
WIFI espionage using an UAV.Many
companies leak information to the outside world from their office
buildings. WiFi signals, sound waves, heat vision, even aerial photos
can reveal sensitive information about a company. A drone or UAV could
potentially detect all of these sources of information. But what exactly
should such a UAV be equipped with? What sensors can be used to obtain
sensitive information about a company, and how effective are they?
|
Rick van Galen <vanGalen.Rick=>kpmg.nl>
Yadvir Singh <Yadvir.Singh=>os3.nl>
|
R
P
|
1
|
56 |
Penetration Testing Auditability.During pentests, it is difficult to keep track of what actions exactly have been performed.
- Has this host been connected to?
- Where has this credential been found?
- When exactly was this command executed?
The goal of this research project is to identify
useful sources of audit information in a pentest, and develop automated
collecting of these in a unified database (e.g. ElasticSearch).
Evaluating performance overhead of real time data collecting can also be
a goal of this project.
|
Christopher Mills <Mills.Christopher=>kpmg.nl>
Stamatios Maritsas <Stamatios.Maritsas=>os3.nl>
Alexandros Tsiridis <Alexandros.Tsiridis=>os3.nl>
|
R
P
|
1
|
57 |
(Aster)-picking through the pieces of short URL services.In
this research we want to map the landscape of short url’s by brute
forcing well known providers and testing to see if the short urls are
pointing towards malicious sources. By checking the long urls with the
spamhaus and google safe browsing api we can gather information about
the reputation of these sites. By doing this research we can get a
picture of the landscape and find out how effective filtering is of
providers.
|
Ruud Verbij <Verbij.Ruud=>kpmg.nl>
Peter Boers <peter.boers=>os3.nl>
Robert Diepeveen <Robert.Diepeveen=>os3.nl>
|
R
P
|
1
|
58 |
Extremely Sensitive Communication; Secure, Secret, and Private e-mail.Literature study:
This project can be supported by Merel Koning from the RU Nijmegen, as she is a real fan of this topic.
|
Ruud Verbij <Verbij.Ruud=>kpmg.nl>
Loek Sangers <loek.sangers=>os3.nl>
|
R
P
|
2
|
60 |
Partition under disruption improves computer network delivery.Under
disruption, network protocols determines the agility to adjust routing
and propagate packets correctly thought network. Information propagation
from these routing protocols may cause packets to be dropped elsewhere
in the network. Changing routing protocols, under disruption, might be
beneficial for end to end communications. In this project, you are
simulating different routing protocols, and testing strategies to
increase the arrival rate of packets.
Requirements: knowledge of routing protocols and python programming.
|
Marc Makkes <m.x.makkes=>vu.nl>
Lukasz Makowski <Lukasz.Makowski=>os3.nl>
|
R
P
|
2
|
65 |
Malicious Domain Name Detection System.The
Domain Name System (DNS) - as defined in RFC 1034 and 1035 - is the
de-facto standard for translating domain names into their corresponding
numerical (IP) addresses. Due to the fact that DNS is so highly embedded
into the workings of the Internet, cybercriminals must also make use of
it to reach their malicious domains. These domains can, for instance,
be used for sending spam or function as bots within a larger botnet.
A dataset provided by the Stichting Internet
Domeinregistratie Nederland (SIDN), the highest authority for the Dutch
.nl Top-level domain (TLD), will be used to research whether it is
possible to detect malicious domains by looking at spatial
characteristics in the data. By combining existing data with data from
common Domain Name System Blacklists (DNSBLs), a probabilistic model
that tries to rank a domain on maliciousness will be made.
More info:
|
Marco Davids <marco.davids=>sidn.nl>
Cristian Hesselman <cristian.hesselman=>sidn.nl>
Maarten Wullink <maarten.wullink=>sidn.nl>
Auke Zwaan <Auke.Zwaan=>os3.nl>
|
R
P
|
1
|
66 |
BGP Hijack Alert System.BGP
hijacks are a common problem in the current architecture of the
internet. ASN and IP-range owners can take measures to detect them, but
often they do not. Recently, incidents like a BGP hijack on an IP-range
from the Dutch Ministry of Foreign affairs (https://tweakers.net/nieuws/104975/ip-adressen-buza-gekaapt-via-bgp-hijacking.html
) questions about detecting those incidents are being asked on a
national level. The NCSC would like to investigate whether it is
possible to detect hijacks within its constituency without disclosing
the information of constituents to third parties. There are third party
services, but they are often limited to a small number of IP-ranges and
you have to distribute your IP-ranges to them.
In this project the aim is to get more insight in the following questions:
- Is it possible to do early detection of BGP hijacks for a large number of IP-ranges and AS numbers with public resources?
- What is the number of hijacks in the +/- 830 ASN's registred in RIPE with country code NL?
- Is it possible to approximate this number with a low number amount of false positives?
A deliverable of this project can be a tool to do
BGP hijack detection (near-real-time if possible) for ranges if
IP-adresses and ASN's.
|
Jeroen van der Ham <jeroen.vanderham=>ncsc.nl>
Gert Vliek <Gert.Vliek=>ncsc.nl>
Jeroen Schutrup <Jeroen.Schutrup=>os3.nl>
Bram ter Borch <bram.terborch=>os3.nl>
|
R
P
|
1
|
67 |
Investigating the Potential for SCTP to be used as a VPN Transport Protocol.Introduction:
A Virtual Private Network (VPN) allows two endpoints to provide a
secure means of communication over an untrusted connection.
Conceptually, a tunnel through the unsecure network is created between
the endpoints. This is done by encapsulating and encrypting traffic as
it enters the tunnel, then decrypting and decapsulating the traffic as
it exits. One of the strengths of a VPN is the wide variety of traffic
that can be supported through the tunnel. Some of the challenges of
deploying a VPN are how best to encapsulate this wide variety of data
and how to transport it over the network. There are various technologies
that have been used to meet these challenges. OpenVPN can use either
TCP or UDP to transport data[8]. With IPSec the Encapsulating Security
Payload (ESP) protocol is used[4]. Cisco developed its own protocol for
encapsulation, Generic Routing Encapsulation (GRE)[3], which is also
used by the PointtoPoint Tunneling Protocol (PPTP)[2]. This research
will investigate the possibility of using the Stream Control
Transmission Protocol (SCTP). As a transport protocol SCTP is similar to
TCP in that it is a connection oriented protocol that provides reliable
delivery[11]. Unlike TCP, SCTP is message based[11]. It also has two
features in particular that may be useful for data encapsulation. The
first is that it supports multiple streams over a single connection with
independent ordering[7]. The second feature that may be useful is the
ability to selectively disable the ordering requirement for individual
messages[11]. For these reasons a further investigation into the
possibility of using SCTP to transport VPN traffic should be conducted.
Research Question:
The purpose of the research will be to determine under
what circumstances, if any, is SCTP a suitable choice of a transport
protocol for VPN traffic. This research will specifically focus on how
the SCTP multiple streams and selective unordered delivery features can
be used to improve performance as compared to TCP or UDP.
|
Ralph Koning <R.Koning=>uva.nl>
Junaid Chaudhry <Junaid.Chaudhry=>os3.nl>
Joseph Hill <Joseph.Hill=>os3.nl>
|
R
P
|
1
|
80 |
Restoring TCP sessions with a DHT.
Summary:Datacenters have been developing
applications that scale infinitely, but these same datacenters always
have choke points at the edges, the location of a firewall/loadbalancer
middleboxes. These middleboxes are dedicated hardware appliances. These
appliances have throughput limits and can’t be easily scaled without
replacing the existing appliance with a larger appliance. This is unlike
webscale applications today where more application instances can be
instantiated dynamically to increase scale.
What if we transition the middlebox appliance to an
x86 node providing a Network Function Virtualization? Is it possible to
use a combination of a fully routed network with a server based routing
application to create infinitely scaling middleboxes?
Problem statement:Currently a
high-availability FW/LB setup is dependent on a L2 network. A set of
devices share a MAC address to failover in case of network change.
Forwarding state is synchronised between the hosts to ensure a smooth
failover. This creates limits in physical scalability and location as
well as requires all middleboxes to exist in a single failure domain.
If the FW/LB was moved to the host to create a
topology with multiple active nodes, packets could be forwarded to
differents host by leveraging ECMP. How can this solve the FW/LB
limitation in a horizontal scalable concept?
If middleboxes can be moved to an entirely routed
model it would create greater scalability, resiliency and mobility,
however challenges on how to solve clustering and service advertisement
will need to be solved.
Scope:This project will have two phases
- Phase 1: The student will explore the
feasibility of layer 3 clustering with one or more software based
middlebox solution. Examples could be HAProxy, Nginx or Firewalld.
- Phase 2:
- Phase 2a: If it is deemed feasible, the
student would build a proof of concept using freely available software
to build a sample network combining the middle box application, Cumulus
VX for network nodes and Cumulus Networks Quagga to act as routing
software for the x86 nodes. Along with the sample lab, the student
should describe the advantages, challenges and potential pitfalls to
this solution.
- Phase 2b: If it is deemed infeasible, the
student would detail what are the current shortcomings of the existing
solutions that prevent layer three clustering and what options exist to
solve the problem. A proof of concept should be built showing a simple
application sharing state and clustering at layer 3. A highly motivated
individual could use these results to contribute to the open source
project of choice, but would not be required in the scope of this
project. Again, Cumulus Networks Quagga and Cumulus Vx network nodes can
be used for this simulation.
The supervisors from Cumulus Networks will be able
assist with issues related to Cumulus VX, Cumulus Networks Quagga
application, Vagrant, automation (Ansible) or any general networking or
network design questions.
|
Attilla de Groot <attilla=>cumulusnetworks.com>
Pete Lumbis <plumbis=>cumulusnetworks.com>
Rama Darbha <rama=>cumulusnetworks.com>
Peter Boers <Peter.Boers=>os3.nl>
|
R
P
|
2
|
86 |
On GSM Open Source Intelligence.SS7
is Signaling System no 7 a set of protocols for the 70's for phone
routing still in use today. With these protocols you can intercept
calls, ping mobile phones, etc. using this set of protocols can be
useful for OSINT (localization, gaining information about the SIM, maybe
other useful stuff). Recently it has been in the new to use it for
tapping phone calls. We would like to find out what information is sent
over the air by popular mobile devices that may be tapped by malicious
actors, and how to protect mobile users from this risk. Using a BladeRF
and a Faraday’s cage we can create a contained environment to set up an
own base station.
|
Cees de Laat <delaat=>uva.nl>
Kenneth van Rijsbergen <Kenneth.vanRijsbergen=>os3.nl>
|
R
P
|
1
|
87 |
Bypassing 802.1X in an IPv6 configured network.IEEE
802.1X is an IEEE Standard for port-based Network Access Control
(PNAC). There are a couple of tools to bypass 802.1X. "Nacker" is such a
tool, and there is also "Marvin". We would like to create a physical
implant device (based on a Raspberry Pi for example) with 2 ethernet
ports + 1 tap port (4g/wifi/Ethernet). To the NAC solution, the implant
device is the device which is being authenticated. However, the implant
NATs the actual device and is tapping the device without the need to
clone MACs and IPs. This prevents collisions which you get when you use a
low-tech hub solution.
|
Henri Hambartsumyan <HHambartsumyan=>deloitte.nl>
Arris Huijgen <ahuijgen=>deloitte.nl>
Ruben de Vries <Ruben.devries=>os3.nl>
Robert Diepeveen <Robert.Diepeveen=>os3.nl>
|
R
P
|
2
|
88 |
SDIO as a new peripheral attack vector.SDIO
is an extension of the SD specification to provide I/O operations. This
enables external modules (think of GPS, RFID reader, modems) to
communicate via the SD card slot. We would like to find out if it is
possible to create an automated I/O device that can trigger commands on
the host system via the SD card slot (similar to the USB rubber ducky).
|
Cedric Van Bockhaven <cvanbockhaven=>deloitte.nl>
Thom Does <thom.does=>os3.nl>
Dana Geist <Dana.Geist=>os3.nl>
|
R
P
|
2
|
89 |
The Design of Malware on Modern Hardware; Malware Inside Intel SGX Enclaves.Commodity
hardware typically contains multiple processing units. Some perform
generic tasks (e.g. CPU), others perform more specific tasks (e.g., disc
and network controllers). It has be shown that malware designs use
specific processing features to hide malicious operations. In this
project you are going to research the design space and architecture of
malware by looking at specific processor features.
|
Marc X. Makkes <m.x.makkes=>vu.nl>
Kaveh Razavi <kaveh=>cs.vu.nl>
Jeroen van Prooijen <Jeroen.vanProoijen=>os3.nl>
|
R
P
|
2
|
90 |
Supporting Internet of Things applications in Information-Centric Networks.Information-Centric
Networking (ICN) is an approach to evolve the internet infrastructure
towards a data-centric model by introducing uniquely named data as a
core Internet principle. This approach fits better with the current
Internet usage, where consumers seek to find the data they want and not
reach a particular Internet host. With ICN, data becomes independent
from location, application, storage, and means of transportation,
enabling in-network caching and replication. ICN also promises benefits
in terms of efficiency, scalability, bandwidth demand and robustness in
challenging communication scenarios. However, ICN is still in the
research phase and its promised benefits need to still be clearly
demonstrated.
In this research project, you will investigate the
feasibility of Internet-of-Things (IoT) applications within the ICN
paradigm, specifically focusing on remotely accessible mobile sensors:
as an example think of remotely accessing the speed of cars located in a
certain region or the temperature measured by aerial drones in
operation.
During your internship you will create a
proof-of-concept of one IoT applications built on top of the TNO ICN
testbed. The proof-of-concept will be using Raspberry Pi’s, so you
should also consider its limitations in the design and implementation of
the IoT application.
|
Lucia D’Acunto <lucia.dacunto=>tno.nl>
Ray van Brandenburg <ray.vanbrandenburg=>tno.nl>
Olaf Elzinga <olaf.elzinga=>os3.nl>
Jenda Brands <Jenda.Brands=>os3.nl>
|
R
P
|
1
|
91 |
Using Sensitive Information on Android 6 Based Smartphones.Smartphones
and today’s enterprises have become indispensable. Enterprises allow
users to bring their own smartphones inside the cooperate network,
distribute smartphones to their employees as business smartphones or
smartphones are used as a critical part of a business.
Smartphone can contain a lot of sensitive information
reaching from contact information to information that can harm
enterprises. Chief Security Officer are puzzled with the question how
such information can be protected. NIST and CESG have published
guidelines for deploying cell-phones and PDA’s, but those guidelines are
either to generic or do not offer sufficient protection. What if an
Android phone has to store information that can cause an enterprise to
lose millions?
|
Ruud Verbij <Verbij.Ruud=>kpmg.nl>
Romke van Dijk <romke.vandijk=>os3.nl>
|
R
P
|
2
|
92 |
A systematic approach towards GNSS receiver vulnerability analysis on Remotely Piloted Aircraft Systems.The
goal of this research is to identify and experiment with means to
influence aerospace systems through wireless communication. The target
system comprises a professional grade RPAS (Remotely Piloted Aircraft
System) with an on-board GNSS receiver.
Through the GNSS receiver the system acquires mission
critical operating parameters to determine speed, time and current
position in 3D space. Therefore, an adversary might be interested in
tampering with the GNSS data being transmitted which in term directly
influences the system's behaviour.
Within this research it is possible to investigate:
- Performing replay attacks (meaconing)
- Assembling and transmitting malicious/falsified GNSS packets
|
René Wiegers <rene.wiegers=>nlr.nl>
Judith van Bruggen <judith.van.bruggen=>nlr.nl>
Mike Maarse <mike.maarse=>os3.nl>
|
R
P
|
2
|
94 |
Modifying existing applications for 100 Gigabit Ethernet.In
the SURFnet test network we have an Inventec D7032Q28B switch running
in OpenFlow mode. Connected to the Inventec switch are two nodes with an
100GE link. The two nodes are:
- Supermicro 5018R-MR
- 1 x Intel Xeon E5-1630V3
- 4 x Certified 8GB DDR3 2133mhz ecc reg
- 1 x ConnectX-4, 2-port 100 Gbe, MCX416A-CCAT
The nodes are running the default perfSONAR ISO
with perfSONAR Toolkit v3.5.1.3. Tuning was done on the nodes using a.o.
the information on the ESnet site:
https://fasterdata.es.net/host-tuning/40g-tuning/.
The configured settings result in the following throughput using one single TCP stream:
$ iperf3 -c 10.0.0.1 -A 0,0
Connecting to host 10.0.0.1, port 5201
[ 4] local 10.0.0.2 port 43552 connected to 10.0.0.1 port 5201
[ ID] Interval Transfer Bandwidth Retr Cwnd
[ 4] 0.00-1.00 sec 5.23 GBytes 44.9 Gbits/sec 0 952 KBytes
[ 4] 1.00-2.00 sec 5.18 GBytes 44.5 Gbits/sec 0 970 KBytes
[ 4] 2.00-3.00 sec 5.18 GBytes 44.5 Gbits/sec 0 1022 KBytes
[ 4] 3.00-4.00 sec 5.18 GBytes 44.5 Gbits/sec 0 1.02 MBytes
[ 4] 4.00-5.00 sec 5.44 GBytes 46.7 Gbits/sec 0 1.06 MBytes
[ 4] 5.00-6.00 sec 5.30 GBytes 45.5 Gbits/sec 0 1.19 MBytes
[ 4] 6.00-7.00 sec 5.26 GBytes 45.2 Gbits/sec 0 1.22 MBytes
[ 4] 7.00-8.00 sec 5.21 GBytes 44.8 Gbits/sec 0 1.23 MBytes
[ 4] 8.00-9.00 sec 5.20 GBytes 44.7 Gbits/sec 0 1.25 MBytes
[ 4] 9.00-10.00 sec 5.18 GBytes 44.5 Gbits/sec 0 1.25 MBytes
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval Transfer Bandwidth Retr
[ 4] 0.00-10.00 sec 52.4 GBytes 45.0 Gbits/sec 0 sender
[ 4] 0.00-10.00 sec 52.4 GBytes 45.0 Gbits/sec receiver
iperf Done.
A nice result, but we think a higher throughput could
be possible over the 100GE connection using Intel's DPDK. The project:
Research possibilities to use iperf3 and DPDK to realize a much higher
throughput up to 100Gbit/s.
Another interesting thing to look at the performance
of separate flows on the switch and impact on certain types of traffic.
|
Migiel de Vos <migiel.deVos=>surfnet.nl>
Jelte Fennema <jelte.fennema=>os3.nl>
|
R
P
|
2
|
95 |
P4 VPN Authentication; Authentication of VPN Traffic on a Network Device with P4.In
order to facilitate research that spans multiple domains SURFnet has
created a VPN architecture that enables end users to create virtual
networks on demand.[1] This architecture uses OpenFlow to set-up and
tear-down virtual networks without needing the help of network
administrators to do manual configuration of the network switches.
Currently the VPN architecture is not able to authenticate its users
because of limitations inherent to the OpenFlow protocol.
The goal of this project is to find out whether and
how authentication of user-initiated VPNs can be done using the P4
(Programming Protocol- Independent Packet Processors) language. P4 is a
programming language designed to allow programming of packet forwarding
dataplanes.[2] P4 promises more flexibility than OpenFlow in that it not
only allows for making decisions on specific pre-defined packet formats
but also allows for defining how packets look like and making more
informed decisions locally one the networking devices.
The project consist of the following tasks:
- defining a protocol that is suitable for authentication of flows on the provider edge
- investigating how authentication can be done best using P4
- creating a proof of concept, probably involving a
simplified cryptography mechanism, to demonstrate the design or to
point out where P4 (or its targets) needs to improve upon to make it
possible
- possibly reasoning about the best way to incorporate the authentication in the VPN Architecture
[1] https://kirk.rvdp.org/publications/indis-coco-paper.pdf
[2] https://en.wikipedia.org/wiki/P4_%28programming_language%29
|
Ronald van der Pol <Ronald.vanderPol=>SURFnet.nl>
Marijke Kaat <marijke.kaat=>surfnet.nl>
Jeroen Klomp <jeroen.klomp=>os3.nl>
|
R
P
|
2
|
Presentations-rp2The event is stretched over two days: Wednesday-Thursday June 29-30 th, 2016.
Program (Printer friendly version: HTML, PDF)
Wednesday June 29, 2016, Auditorium C0.110, FNWI, Sciencepark 904, Amsterdam. |
Time |
#RP |
Title
|
Name(s)
|
Loc |
RP |
10h00 |
|
Welcome |
Cees de Laat |
|
|
10h00 |
35 |
Partitioning of big graphs.
|
Alexis Sireta
|
UvA |
2
|
10h20 |
60 |
The effects of network disruption on routing protocols and packet propagation.
|
Lukasz Makowski |
VU
|
2
|
10h40 |
89 |
The design of trojans on modern hardware.
|
Jeroen van Prooijen |
VU
|
2
|
11h00 |
|
Break |
|
|
|
11h20 |
80 |
Restoring TCP sessions with DHT.
|
Peter Boers
|
CumulusNetworks |
2
|
11h40 |
90 |
Supporting Internet of Things applications in Information-Centric Networks. |
Olaf Elzinga, Jenda Brands |
TNO |
1
|
12h05 |
|
Lunch |
|
|
|
13h00 |
95 |
P4 VPN Authentication; Authentication of VPN Traffic on a Network Device with P4. |
Jeroen Klomp |
SURFnet |
2
|
13h20 |
23 |
Taking a closer look at IRATI.
|
Koen Veelenturf
|
SURFnet/UvA
|
2
|
13h40 |
94 |
Modifying existing applications for 100 Gigabit Ethernet.
|
Jelte Fennema |
SURFnet
|
2
|
14h00 |
|
Closing |
Cees de Laat & OS3 team |
|
|
14h10
|
|
End
|
|
|
|
Thursday June 30, 2016, Auditorium C0.110, FNWI, Sciencepark 904, Amsterdam. |
Time
|
#RP |
Title
|
Name(s)
|
Loc |
RP |
10h00 |
|
Welcome |
Cees de Laat |
|
|
10h00 |
26 |
Evaluating the applicability of an Industrial-Scale Software Defined Internet Exchange Point at the AMS-IX.
|
Siem Hermans, Jeroen Schutrup |
AMS-IX
|
2 |
10h25 |
21 |
Adding unusual data transports to the Serval Project.
|
Alexandros Tsiridis, Joseph Hill |
Flinders |
2
|
11h50 |
|
Break |
|
|
|
11h30
|
13
|
Designing an open source DMARC aggregation tool. |
Yadvir Singh |
NLnet |
2
|
11h50 |
47 |
Automated access management analysis on WordPress plugins using machine learning.
|
Frank Uitewaal |
DONGIT
|
2
|
12h10 |
92 |
Assessing the likelihood of GNSS spoofing attacks on RPAS.
|
Mike Maarse |
NLR
|
2
|
12h30 |
|
Lunch
|
|
|
|
13h30 |
87 |
Bypassing 802.1X in an IPv6 environment.
|
Ruben de Vries, Robert Diepeveen |
Deloitte |
2
|
13h55 |
86 |
SS7/GSM OSINT.
|
Kenneth van Rijsbergen |
Deloitte |
1
|
14h15 |
88 |
SD card rubber ducky via SDIO.
|
Thom Does, Dana Geist |
Deloitte |
2
|
14h40 |
|
Break |
|
|
|
15h00 |
52 |
SSL session key extraction from memory on mobile devices (Android, iOS).
|
Tom Curran, Marat Nigmatullin |
Deloitte
|
2
|
15h25 |
58 |
Extremely sensitive communication; Secure, secret, and private e-mail.
|
Loek Sangers
|
KPMG
|
2
|
15h45 |
91 |
Using Extremely Sensitive Information in Android.
|
Romke van Dijk |
KPMG |
2
|
16h05 |
|
Closing |
Cees de Laat & OS3 team |
|
|
16h10
|
|
End
|
|
|
|
Presentations-rp1Program (Printer friendly version: HTML, PDF) :
Monday >feb 1th, in >B.1.23 >at Science Park 904 NL-1098XH Amsterdam. |
Time |
#RP |
Title |
Name(s) |
LOC |
RP |
12h35 |
|
Welcome, introduction. |
Cees de Laat |
|
|
12h40 |
67 |
Investigating the Potential for SCTP to be used as a VPN Transport Protocol. |
Joseph Hill |
SNE |
1 |
13h00 |
4 |
Portable RFID/NFC "Bumping" Device. |
Romke van Dijk, Loek Sangers |
DeLoitte |
1 |
13h25 |
53 |
Developing an Ethereum-blockchain application. |
Nikolaos Triantafyllidis |
TNO |
2 |
13h45 |
41 |
Empirical evaluation of parallel vs. distributed graph processing algorithms. |
Alexis Sireta, Lazar Petrov |
SNE |
1 |
14h10 |
|
Break |
|
|
|
14h25 |
24 |
Machine detectable network behavioral commonalities for exploits and malware. |
Alexandros Stavroulakis |
RedSocks |
2 |
14h45 |
18 |
UsnJrnl parsing for file system history. |
Frank Uitewaal, Jeroen van Prooijen |
Fox-IT |
1 |
15h10 |
19 |
UsnJrnl parsing for Microsoft Office activity. |
Kenneth van Rijsbergen |
Fox-IT |
1 |
15h30 |
|
Break |
|
|
|
15h50 |
22 |
RINA - Recursive InterNet Architecture (1). |
Jeroen van Leur, Jeroen Klomp |
SURFnet, SNE |
1 |
16h15 |
25 |
Combatting Phishing With Snort. |
Olaf Elzinga |
SNE-OS3 |
1 |
16h35 |
51 |
Root detection evasion (Android, iOS). |
Dana Geist, Marat Nigmatullin |
DeLoitte |
1 |
17h00 |
|
End |
|
|
|
Tuesday feb 2th, in room B1.23 >at Science Park 904 NL-1098XH Amsterdam. |
Time |
#RP |
Title |
Name(s) |
LOC |
RP |
9h35 |
|
Welcome, introduction. |
Cees de Laat |
|
|
9h40 |
26 |
Open source SOC demonstration. |
Jenda Brands |
OS3 |
1 |
10h00 |
38 |
Research into new naming and identification systems on the internet. |
Xander Lammertink |
SIDN |
2 |
10h20 |
65 |
Graph theory for domain name registries. |
Auke Zwaan |
SIDN |
1 |
10h40 |
|
Break |
|
|
|
11h00 |
39 |
Performance measurement and tuning of remote acquisition. |
Lukasz.Makowski |
NFI |
1 |
11h20 |
31 |
Security features of Android for Work. |
Tom Curran, Ruben de Vries |
KPMG |
1 |
11h45 |
66 |
Detecting BGP hijacks for a large number of Dutch networks. |
Jeroen Schutrup, Bram ter Borch |
NCSC |
1 |
12h10 |
|
Lunch |
|
|
|
13h00 |
30 |
Investigating the new Android 6.0 native fingerprint API. |
Thom Does, Mike Maarse |
KPMG |
1 |
13h25 |
33 |
Greening the Cloud. |
Jeroen van Kessel |
SNE |
2 |
14h45 |
29 |
Misusing open internet services on the Web. |
Ben de Graaff, Jelte Fennema |
KPMG |
1 |
14h10 |
|
Break |
|
|
|
14h25 |
55 |
Risk detection with a UAV. |
Yadvir Singh |
KPMG |
1 |
14h45 |
56 |
Penetration test auditibality. |
Stamatios Maritsas, Alexandros Tsiridis |
KPMG |
1 |
15h10 |
50 |
Container Networking in the GTS. |
Siem Hermans, Patrick de Niet |
SNE |
1 |
15h35 |
|
Break |
|
|
|
15h50 |
57 |
Investigation into the maliciousness of short url’s. |
Peter Boers, Robert Diepeveen |
KPMG |
1 |
16h15 |
20 |
Design exploration of transparency enhancing technology. |
Mathijs Houtenbos |
WhiteBox |
2 |
16h35 |
|
End |
|
|
|
Out of normal schedule presentations
Time |
Place |
#RP |
Title |
Name(s) |
LOC |
RP |
2016-08-11 13h00 |
B1.23 |
96 |
Leader election and logical organization in inter-cloud virtual machines. |
Andrey Afanasyev |
UvA |
1
|
2016-08-11 13h30 |
B1.23 |
34
|
Portable Passive Detection of Advanced Persistent Threats report
|
Guido Kroon
|
SIDN
|
2
|
2016-08-19 11h00 |
B1.23 |
43
|
Development of a new policy evaluation procedure for XACML.
|
Jorian Oostenbrugge
|
UvA
|
1
|
|
|
|
*
|
End |
|
|
|