home

SNE Master Research Projects Presentations RP2

http://uva.nl/

Thursday July 2 2020, 10h05 - 16h55 online using bigbluebutton.
Time D #RP Title Name(s) LOC RP Req
10h00 5

Welcome, introduction, setup Cees de Laat


10h05
25 5
Server agnostic DNS augmentation. Tom Carpay nlnetlabs 2

10h30
25 78
Determining the optimal maximum UDP response size for DNS. Axel Koolhaas, Tjeerd Slokker nlnetlabs 2

10h55 10
bio/coffee break



11h05 25 95
An Evaluation of IPFS as a distribution mechanism for RPKI Repository. Dadepo Aderemi, Woudt van Steenbergen nlnetlabs 2

11h30 25 100
Investigative Research for an IP Peering Service Network for Netherlight. Arnold Buntsma, Mar Badias Simó SURFnet 2
*
11h55 70

Lunch



13h05 25 15
Malicious behavioral pattern recognition and prevention based on CyberArk PAS logs in Splunk. Mike Slotboom, Ivar Slotboom deloitte 2

13h30 25 72
Analysis of Triggers in a Microsoft Advanced Threat Analytics Environment. Edgar Bohte, Nick Offerman deloitte 2

13h55 10
bio/coffee break



14h05 25 86
Using TURN servers as Proxies. Sean Liao deloitte 2

14h30 25 19
Analysis on MX-record queries of non-existent domains. Jasper Hupkens, Siebe Hodzelmans sidn 2

14h55 10
bio/coffee break



15h05 25 20
Detecting Communication of Bots with their Command and Control Servers. Khanh Hoang Huynh, Mathijs Visser true.nl 2

15h30 25 77
Monitoring a EVPN-VxLAN fabric with BGP Monitoring Protocol. Giacomo Casoni, Davide Pucci cumulusnetwork  2
*
15h55 10
bio/coffee break



16h05 25 71
An in-depth performance comparison of the VPN protocols WireGuard, IPsec and TLS. Patrick Spaans, Erik Dekker KPMG 2

16h30 25 103
Automated reverse engineering of CAN bus messages with ODB-II using correlation function. Vincent Kieberl, Bram Blaauwendraad KPMG 2

16h55 0

End



Req * => Specific time requested, do not move

Friday July 3 2020, 10h05 - 16h55 online using bigbluebutton.
Time D #RP Title Name(s) LOC RP Req
10h00 5

Welcome, introduction, setup Cees de Laat


10h05
25 29
Analysis of Cobalt Strike network traffic obfuscation in C2 communication. Vincent van der Eijk, Coen Schuijt UvA 2

10h30
25 54
Comparing methods for collecting P4 telemetry data. Silke.Knossen, Rutger Beltman UvA 2

10h55 10
bio/coffee break



11h05 25 68
Secured and monitored data transport of smart (IoT) sensors. Niek van Noort, Jason Kerssens datadigest 2

11h30 25 104
Securely accessing remote sensors in critical infrastructures. Pavlos Lontorfos datadigest 2

11h55 70

Lunch



13h05 25 102
The effect of video properties on the likelihood of correctly timestamping a video using ENF. Thomas Ouddeken, Niels den Otter NFI 2

13h30 25 73
Iris recognition using low resolution photographs from commodity sensors. Roy Vermeulen NFI 2

13h55 10
bio/coffee break



14h05 25 74
Deepfake detection through PRNU and artifact analysis. Catherine de Weever, Sebastian Wilczek NFI 2

14h30 25 21
Advanced Persistent Threats detection framework for Industrial Control Systems. Dominika Rusek, Steffan Roobol howest.be 2

14h55 10
bio/coffee break



15h05 25 99
Security of WPA3 transitional mode. Raoul Dijksman, Erik Lamers libertyglobal 2

15h30 25 6
Collaborative work with Augmented and Virtual Reality - Unity based network infrastructure. Lars Tijsmans tudelft 1

15h55 10
bio/coffee break



16h05 25 101
Automatic Dependent Surveillance-Broadcast (ADS-B). Tim de Boer NLR 2

16h30 0

Closing words Staff