home

SNE Master Research Projects Presentations RP1

http://uva.nl/

Program (Printer friendly version: HTML, PDF.
(
presentations are 20 min for single and 25 min for pairs of students)
Monday Feb 3 2020, 10h25 - 17h00 in room B1.23 at Science Park 904 NL-1098XH Amsterdam.
Time D #RP Title Name(s) LOC RP
10h25 0

Welcome, introduction. Cees de Laat

10h25
25 1
Zero Trust Network Security Model in containerized environments. Catherine de Weever, Marios Andreou on2it 1
10h50 20
bio/coffee break


11h10 25 4
The Current State of DNS Resolvers and RPKI Protection. Erik Dekker, Marius Brouwer nlnetlabs 1
11h35 25
42
A Design and Procedure for Digital Forensic Investigation on Data Theft on the Google Cloud Platform.
Frank Wiersma, Tjeerd Slokker pwc
1
12h00 60

Lunch


13h00 25 23
Detecting hidden data within APFS datastructures. Axel Koolhaas, Woudt van Steenbergen fox-it 1
13h25 20 30
Automated planning and adaptation of Named Data Networks in Cloud environments. Sean Liao UvA
1
13h50 25
bio/tea/coffee break


14h10 25 60
Fast Data Serialization and Networking for Apache Spark.
Dadepo Aderemi, Mathijs Visser UvA
1
14h35 25 43 Anomaly Detection on Log Files Based on Simplicity Theory. Giacomo Casoni, Mar Badias Simo UvA
1
15h00 20
bio/tea/coffee break


15h20 25 49 Creating a plugin for Ghidra to support RISC-V64, to analyze the security of embedded technologies. Patrick Spaans, Joris Jonkers Both riscure 1
15h45 25 65 Security Evaluation on Amazon Web Services’ REST API Authentication Protocol Signature Version 4. Hoang Huynh, Jason Kerssens kpmg 1
16h10 20 41 Generating probable password candidates for the offline assessment of Dutch domain password hashes. Tom Broumels secura 1
16h30 0

End




Tuesday feb 4th 2020, 10h00 - 17h00 in room B1.23 at Science Park 904 NL-1098XH Amsterdam.
Time D #RP Title Name(s) LOC RP
10h00 0

Welcome, introduction. Cees de Laat

10h00 25 52
Network Anomaly Detection in Modbus TCP Industrial Control Systems. Philipp Mieden, Rutger Beltman deloitte 1
10h25
25 13
Incorporating post-quantum cryptography signatures in digital certificates Daan Weller, Ronald van der Gaag deloitte 2
10h50 20
bio/coffee break


11h10 25 50 Large-scale automotive CAN data acquisition for IDS evaluation.
Silke Knossen, Vincent Kieberl deloitte 1
11h35 25 51 Security Evaluation of Automotive Networks. Arnold.Buntsma, Sebastian Wilczek deloitte 1
12h00 60

Lunch


13h00 25 40
Tunneling data over a Citrix virtual channel. Ward Bakker, Niels den Otter deloitte 1
13h25 25
61
Using Mimikatz’ Mimidrv driver to unhook antivirus callbacks in Windows. Bram Blaauwendraad, Thomas Ouddeken deloitte 1
13h50 20
bio/tea/coffee break


14h10 25 56 Detecting Malicious Behaviour of .NET C2 Agents using ETW. Alexander Bode, Niels Warnars kpn 1
14h35 25 55 Scoring model for IoCs by combining external resources to reduce false positives. Jelle Ermerins, Niek van Noort kpn 1
15h00 20
bio/tea/coffee break


15h20 20 53 Using BGP Flow-Spec for distributed micro-segmentation. Davide Pucci cumulusnetworks 1
15h40 20 8 APFS Checkpoint behaviour research in macOS. Maarten van der Slik NFI 1
16h00 20 67 Insight in Cyber Safety when Remotely Operating SCADA Systems of Dutch Critical Infrastructure Objects. Tina Tami datadigest 1
16h20 0

End