| 
            
              
                | Contact | 
                    
                      
                        | Course Codes: 
 | 
 |  
                        | Research Project 1 | 53841REP6Y 
 |  
                        | Research Project 2 | 53842REP6Y |  |  
                | TimeLine | 
 |  
                | RP1 (January): 
                    Wednesday Sept 16, 10h00-11h30: Introduction to the Research Projects.
                    Wednesday Dec 2, 13h00-16h00: Detailed discussion on selections for RP1.Monday Jan 4th - Friday Jan 29th 2021: Research Project 1.Friday Jan 8th, 24h00: (updated) research plan due.Monday Feb 1, 11h00-16h00: Presentations RP1 - online.Tuesday Feb 2, 10h00 - 15h00: Presentations RP1 - online.Sunday Feb 7, 24h00: RP - reports due | RP2 (June): 
                    Wednesday May 12,13h00-16h00, Detailed discussion on selections for RP2.Monday May 31th - Friday Jun 25: Research Project 2.Friday Jun 4th, 24h00: (updated) research plan due.Monday May 14, 16h00, discussion on progress (voluntarily)
Tuesday June 29, 10h00-17h00: presentations.Monday Jul 5, 24h00: RP - reports due. |  
                | ProjectsHere is a list of student projects. New ones added at the end. Old and unavailable rp's will be removed including the number, hence the gaps. Remaining rp's carry over to next year. They can be found here. In a futile attempt to prevent spam "@" is replaced by "=>" in the table. Color of cell background:
                    
                      
                        | Project available | Presentation received. | Confidentiality was requested. |  
                        | Currently chosen project. | Report received. | Blocked, not available. |  
                        | Project plan received. | Completed project. | Report but no presentation |  
                        | Outside normal rp timeframe | project will be done in next block 
 | 
 |  |   |  
 
            
              
                | 
 | title summary
 | supervisor contact 
 students
 | R 
 P
 | 1 /
 2
 |  
                | 6 | Designing structured metadata for CVE reports.Vulnerability
 reports such as MITRE's CVE are currently free format text, without 
much structure in them. This makes it hard to machine process reports 
and automatically extract useful information and combine it with other 
information sources. With tens of thousands of such reports published 
each year, it is increasingly hard to keep a holistic overview and see 
patterns. With our open source Binary Analysis Tool we aim to correlate 
data with firmware databases.
 Your task is to analyse how we can use the information
 from these reports, what metadata is relevant and propose a useful 
metadata format for CVE reports. In your research you make an inventory 
of tools that can be used to convert existing CVE reports with minimal 
effort.
 
 Armijn Hemel - Tjaldur Software Governance Solutions
 | Armijn Hemel <armijn=>tjaldur.nl> 
 Bart van Dongen <bdongen=>os3.nl>
 
 | R 
 P
 | 1 
 |  
                | 10 | Defeating the Fakes: Vocal Fake Detection using Discrete Fourier Transform in Neural Networks.The detection of manipulation of broadcasting videostreams with facial morphing on the internet. Examples are provided from https://dl.acm.org/citation.cfm?id=2818122 and other on line sources.
 | Zeno Geradts <zeno=>holmes.nl> Tina Tami <Tina.Tami=>os3.nl>
 Lars Tijsmans <lars.tijsmans=>os3.nl>
 
 | R 
 P
 | 2 
 |  
                | 14 | Using a verifiable and decentralized ledger as a basis for trusting hospital endpoints.Currently,
 the Whitebox provides a means for doctors (General Practitioner GPs) to
 establish static trusted connections with parties they know personally.
 These connections (essentially, authenticated TLS connections with 
known, validated keys), once established, can subsequently be used by 
the GP to authorize the party in question to access particular patient 
information. Examples are static connections to the GP post which takes 
care of evening/night and weekend shifts, or to a specific pharmacist. 
In this model, trust management is intuïtive and direct. However, with 
dynamic authorizations established by patients (see general description 
above), a question comes up on whether the underlying (trust) 
connections between the GP practice (i.e., the Whitebox) and the 
authorized organization (e.g,. hospital or pharmacist) may be re-usable 
as a 'trusted' connection by the GP in the future.
 The basis question is:
 
 
                    More in general:what is the degree of trust a doctor can place 
in (trust) relations that are established by this doctor's patients, 
when they authorize another healthcare professional? 
 
                    Perhaps the problem can be raised to a higher 
level also: can (public) auditing mechanisms -- for example, using block
 chains -- be used to help establish and validate trust in organizations
 (technically: keys of such organizations), in systems that implement 
decentralized trust-base transactions, like the Whitebox system does? In
 this project, the student(s) may either implement part of a solution or
 design, or model the behavior of a system inspired by the decentralized
 authorization model of the Whitebox. As an example: reputation based 
trust management based on decentralized authorization actions by 
patients of multiple doctors may be an effective way to establish trust 
in organization keys, over time. Modeling trust networks may be an 
interesting contribution to understanding the problem at hand, and could
 thus be an interesting student project in this context.what degree of trust that can be placed in 
relations/connections established by a patient, also in view of possible
 theft of authorization tokens held by patients?What kind of validation methods can exist for a 
GP to increase or validate a given trust relation implied by an 
authorization action of a patient? 
 NB: this project is a rather advanced/involved design 
and/or modelling project. Students should be confident on their ability 
to understand and design/model a complex system in the relatively short 
timeframe provided by an RP2 project -- this project is not for the 
faint of heart. Once completed, an excellent implementation or 
evaluation may become the basis for a research paper.
 
 See also (in Dutch): https://whiteboxsystems.nl/sne-projecten/#project-2-ontwerp-van-een-decentraal-vertrouwensmodel
 
 General introductionWhitebox Systems is a UvA
 spin-off company working on a decentralized system for health 
information exchange. Security and privacy protection are key concerns 
for the products and standards provided by the company. The main product
 is the Whitebox, a system owned by doctors (GPs) that is used by the GP
 to authorize other healthcare professionals so that they - and only 
they - can retrieve information about a patient when needed. Any data 
transfer is protected end-to-end; central components and central trust 
are avoided as much as possible. The system will use a published source 
model, meaning that although we do not give away copyright, the code can
 be inspected and validated externally.The Whitebox is currently transitioning from an 
authorization model that started with doctor-initiated static 
connections/authorizations, to a model that includes patient-initiated 
authorizations. Essentially, patients can use an authorization code (a 
kind of token) that is generated by the Whitebox, to authorize a 
healthcare professional at any point of care (e.g., a pharmacist or a 
hospital). Such a code may become part of a referral letter or a 
prescription. This transition gives rise to a number of interesting 
questions, and thus to possible research projects related to the 
Whitebox design, implementation and use. Two of these projects are 
described below. If you are interested in these project or have 
questions about other possibilities, please contact 
<guido=>whiteboxsystems.nl>.
 
 For a more in-depth description of the projects below (in Dutch), please see https://whiteboxsystems.nl/sne-projecten/
 | Guido van 't Noordende <guido=>whiteboxsystems.nl> 
 Matthijs Bartelink <Matthijs.Bartelink=>os3.nl>
 
 | R 
 P
 | 1 
 |  
                | 27 | Detection of false frame attacks in video systems.A
 smart attack was investigated which can be performed at the time of 
recording video only against smart VSS (Video Surveillance System). The 
main feature of smart VSS is its ability to capture a scene immediately 
on the detection of particular activity or object. This new design has 
been made target by attackers who trigger the injection of false frames 
(false frame injection attack).
 The RQ is if how we can detect that this happened afterwards if challenged in court.
 
 Reference:
 D. Nagothu, J. Schwell, Y. Chen, E. Blasch, S. Zhu, A 
study on smart online frame forging attacks against video surveillance 
system, in: Sensors and Systems for Space Applications XII, Vol. 11017, 
International Society for Optics and Photonics, 2019, p. 110170 (2019)
 
 | Zeno Geradts <zeno=>holmes.nl> 
 Joris Janssen <Joris.Janssen=>os3.nl>
 | R 
 P
 | 1 
 |  
                | 31 | Profiling the abuse of exposed secrets in public repositories.Appropriate
 secret management during software development is important as such 
secrets are often high privileged accounts, private keys or tokens which
 can grant access to the system being developed or any of its 
dependencies. Systems here could entail virtual machines or other 
software/infrastructure/platform services exposing a service for remote 
management. To combat mismanagement of secrets during development time, 
software projects such as HachiCorp Vault or CyberArk Conjure are 
introduced to provide a structured solution to this problem and to 
ensure secrets are not exposed by removing them from the source code.
 Unfortunately, secrets are still frequently committed 
to software repositories which has the effect of accidentally ending up 
in either packages being released or in publicly accessible 
repositories, such as on Github. The fact that these secrets are then 
easily accessed (and potentially abused) in an automated fashion has 
been recently demonstrated by POC projects like shhgit [1].
 
 This research would entail the study and profiling of 
the behavior of the abuser of such secrets by first setting up a 
monitoring environment and a restricted execution environment before 
intentionally leaking secrets online through different channels.
 
 Especially, the research focuses on answering the following questions:
 
                    Prior experience with security monitoring and or 
cloud environments such as AWS / Azure is recommended in order to timely
 scope the research to a more feasible proposal.Can abuse as a result of leaked credentials be profiled?Can profiles be used to predict abuser behavior?Are there different abusers / patterns / motives for different types of leaked credentials?Are there different abusers / patterns / motives for different sources of leaked credentials?Can profiles be used to attribute attacks to different attacker groups? 
 [1] https://github.com/eth0izzle/shhgit
 | Fons Mijnen <fmijnen=>deloitte.nl> Mick Cox <mcox=>deloitte.nl>
 
 Maurice Mouw <Maurice.Mouw=>os3.nl>
 | R 
 P
 | 1 
 |  
                | 33 | Cloud Access Security Brokers (CASBs); Characterization of the CASB market and its alignment with corporate expectations.CASB
 are often referred to as the new firewall of the Cloud era; they 
provide a middleman layer between a company network and a set of web 
services. However, many companies have been disappointed by their 
capabilities after implementation.
 The objective of this research is to provide an 
detailed comparison of the current capabilities of the market leaders 
against the capabilities expected by corporate IT executives. You will 
have to address the following point:
 
 
                    NB: The challenge of this subject is to find 
reliable information. You can start with contacting providers’ sales 
department and request a demonstration, crossing the references of 
research publications or interacting on cybersecurity web forums.Give an accurate definition of the CASB technologyIdentify the risks related to Shadow IT and potential mitigation for each of themList the capabilities of the Leaders and 
Visionaries in the Gartner Quadrant and verify they address the risks 
related to Shadow ITGive your conclusion on the maturity of this market 
 Reference: https://www.bsigroup.com/globalassets/localfiles/en-ie/csir/resources/whitepaper/1810-magic_quadrant_for_casb.pdf
 | Ruud Couwenberg <Couwenberg.Ruud=>kpmg.nl> 
 Anand Groenewegen <Anand.Groenewegen=>os3.nl>
 Marius Brouwer <mbrouwer=>os3.nl>
 
 | R 
 P
 | 2 
 |  
                | 34 | Analysis of a rarely implemented security feature: signing container images with a Notary server.Notary
 is Docker's platform to provide trusted delivery of content by signing 
images that are published. A content publisher can then provide the 
corresponding signing keys that allow users to verify that content when 
it is consumed. Signing Docker images is considered as a best security 
practice, but is little implemented in practice.
 The goal of this project is to provide guidelines for safe service implementation. A starting point could be:
 
 
                    Reference:Get familiar with the service Architecture and Threat Model [1]Deploy a production like service [2]Test the compromise scenarios from the Threat ModelConclude and release a secure production-ready manual and docker-compose template 
 
                    Demo from the presentation: https://www.youtube.com/watch?v=jcgkMYyzeYY
                      https://docs.docker.com/notary/service_architecture/
                    
                      https://docs.docker.com/notary/running_a_service/
                     
 | Aristide Bouix <Bouix.Aristide=>kpmg.nl> Tim Dijkhuizen <Dijkhuizen.Tim=>kpmg.nl>
 Ruben Koeze <Koeze.Ruben=>kpmg.nl>
 
 Mohanad Elamin <melamin=>os3.nl>
 Rio Kierkels <Rio.Kierkels=>os3.nl>
 
 | R 
 P
 | 1 
 |  
                | 36 | Transparent malicious traffic detection and mitigation using the Nvidia BlueField DPU.Developing
 a transparent high-speed Intrusion detection and Firewall/ACL mechanism
 (a plus would be if it can be based on AI/Machine learning algorithms).We have some experimental Mellanox Networking technology that needs to be used in this RP.
 The goal of this project is figure out how to build a 
transparent automated IDS and Firewall/ACL mechanism that can handle 
large amounts of traffic (100Gbit/s or more).
 Some starting points are:
 
 
                    Get to know things like OVS, DPDK and VPPTest different technologies for high speed IDSTest different technologies for high speed Firewalling/ACL's and offloading into hardware (Mellanox Based)Figure out a way how to use AI/Machine learning algorithms to speed up the process. | Cedric Both <cedric=>datadigest.nl> 
 Jelle Ermerins <jermerins=>os3.nl>
 Ward Bakker <wbakker@os3.nl>
 
 | R 
 P
 | 2 
 |  
                | 37 | DPU implementation of a scalable and transparent security solution for numerous VPN connections.We
 would like to figure out a scalable security solution with IDS, 
antivirus and other mechanisms on monitoring incoming and outgoing 
traffic of different VPN connections. We have VPN servers running based 
on Open Source software (e.g. OpenVPN and IPSec) with lots of users and 
troughput and we would like to have a automated way in transparently 
monitoring all user traffic, detection of anomalies when a user for 
example access a malicious website or downloaded something that they 
shouldn't have and per user reporting.The goal of this project is to give security 
information back to the user that is using the VPN connection to know if
 the data that is going over the VPN connection is "Safe and Clean".
 Some starting points of this RP are:
 
 
                    Research how VPN traffic flows can be scanned based on individual usersTest different technologies for high traffic and high user IDS/antivirus scanning etc.Figure out what the most secure way is in giving back the security information to each user. | Cedric Both <cedric=>datadigest.nl> 
 Ilyas Rahimi <irahimi=>os3.nl>
 Mounir Kirafi <mkirafi=>os3.nl>
 
 | R 
 P
 | 1 
 |  
                | 41 | Real time asset inventory in ICS.Research
 in Industrial Control Systems: We know how to do passive asset 
inventory within ICS and can create an "as-is" network diagram.
 
                    ICS is more static than IT environment, but a real time asset discovery tooling could be very interesting in some cases.But how do you keep it updated while new assets are being added to the network? | Michel van Veen <mvanveen=>deloitte.nl> Pavlos Lontorfos <plontorfos=>deloitte.nl>
 
 Artemis Mytilinaios <amytilinaios=>os3.nl>
 
 | R 
 P
 | 1 
 |  
                | 42 | Improving availability in Industrial Control Systems using Software-Defined Networking.Research in Industrial Control Systems: Splitting the automation data plane from the network management plane,
 
                    Is it possible in ICS?What are the limitations?What are the benefits? | Dominika Rusek <DRusek=>deloitte.nl> Pavlos Lontorfos <plontorfos=>deloitte.nl>
 
 Marios Andreou <Marios.Andreou=>os3.nl>
 Joris Jonkers Both <Joris.JonkersBoth=>os3.nl>
 | R 
 P
 | 2 
 |  
                | 44 | Involuntary browser based torrenting (WebRTC).WebRTC research: WebRTC allows for browser-based P2P torrenting.
 
                    Possible addition can also be a look into how such attacks be performed and a Proof-of-Concept.Can this function be misused to let visitors of webpages involuntarily participate in P2P networks?For example to share illegal or protected media?If so, is this an already established and (widely) used tactic? | Cedric van Bockhaven <CvanBockhaven=>deloitte.nl> Jan Freudenreich <jfreudenreich=>deloitte.nl>
 
 Alexander Bode <alexander.bode=>os3.nl>
 
 | R 
 P
 | 2 
 |  
                | 54 | Hunting for malicious infrastructure using big data.Malicious
 actors want to keep their command & control infrastructure away 
from prying eyes. Fake error messages, web redirects or dropped 
connections are some of the signs that something fishy is going on. In 
this research project students develop a framework to do anomaly 
detection on HTTP responses. Digging through gigabytes of data to find 
the malicious infrastructure that doesn't want to be found.
 Students can use the scan data provided Rapid7. These 
are JSON-files containing the raw bytes response to an IPv4 wide scan 
for a "HTTP GET /"-command on specific ports. Students need to parse 
these JSON files and be able to query them (maybe use the ELK-stack?). 
Considering the size of the dataset any experience with Elasticsearch 
(or similar) solutions is advised.
 
 There is room for another project using the SSL 
certificates from Rapid7 and/or certificate transparency log. Ideas are 
welcome.
 
 | Jop van der Lelie <Jop.vanderLelie=>ncsc.nl> Daniel Sierat <Daniel.Sierat=>ncsc.nl>
 
 Shadi Alhakimi <shadi.alhakimi=>os3.nl>
 Freek Bax <freek.bax=>os3.nl>
 
 | R 
 P
 | 1 
 |  
                | 56 | An exploration of the suitability of Fawkes for practical applications.The
 last decade has seen the rise of new image recognition technologies 
that, combined with the rise of IoT and the miniaturization of digital 
cameras, potentially endanger our traditional notion of personal 
privacy. In this context, a team of researchers from the SAND laboratory
 at the University of Chicago released a python tool called Fawkes, 
intending to disrupt how facial recognition algorithms relate between 
multiple images.
 Limiting this technology's use to only a few 
tech-savvy individuals would not impact the current trend. Also, it is 
crucial to make sure that the technology work and can be deployed at 
scale. The goal of this project is to pave the way to broader adoption 
of such technologies on online uploading platforms. A proposed 
scientific demarche could be:
 
 
                    Optimize the configuration of the cloaking feature to get a seamless experience or proposed architectural workaroundsVerify a few results from the research paper, to confirm the code work as intendedBuild a Proof of Concept photo website where uploaded face pictures would be cloaked on-the-fly using Fawkes 
 Reference:
 
 Demo shown during presentation: https://www.youtube.com/watch?v=omG-5dqeTVA
 | Aristide Bouix <Bouix.Aristide=>kpmg.nl> Huub van Wieren <vanwieren.huub=>kpmg.nl>
 
 Simon Carton <Simon.Carton=>os3.nl>
 Danny Janssen <Danny.Janssen=>os3.nl>
 
 | R 
 P
 | 1 
 |  
                | 57 | Cloud Certificate Authorities; The security considerations of moving your Public Key Infrastructure to the cloud.Certification
 authorities (CA) provide the backbone of trust for people, systems 
applications etc. Setting up an internal CA can be a complex endeavor 
that many organization struggle with. A recent development in this field
 is that all large cloud providers are now offering CA functionality for
 their clients.
 This research will focus on what it takes to setup a 
cloud CA and how it impacts the security posture of the organization. As
 much as time permits, they students will design and implement a cloud 
CA in our sandbox environment.
 
 | Itan Barmes <ibarmes=>deloitte.nl> 
 Anand Groenewegen <agroenewegen=>os3.nl>
 Maurits Maas <Maurits.Maas=>os3.nl>
 | R 
 P
 | 1 
 |  
                | 58 | Large scale DNS hijacking detection using HTTPS scan data.In
 recent years, several DNS hijacking / Man-in-the-Middle attacks have 
been documented in which attackers gained access to the DNS settings of a
 victim’s domain at the domain registrar and redirected traffic 
through an attacker-controlled MitM proxy.Detecting DNS changes for individual domains only 
requires periodic lookups and comparisons with a set of expected DNS 
records. This approach is not very scalable though. Instead, in this 
research, the student will investigate the feasibility of a potential 
different approach to (indirectly) detect DNS hijacking attacks, by 
attempting to identify the attacker-controlled MitM servers.
 The student should design, build and test different 
filter algorithms that can possibly identify the MitM servers in 
internet-wide scan / crawl data. For this research, the student can make
 use of SSL / HTTPS scan data provided by Rapid7.
 | Christian Veenman <c.veenman=>minjenv.nl> 
 Niels Warnars <nwarnars=>os3.nl>
 | R 
 P
 | 2 
 |  
                | 59 | The current state of DNS Lame delegations; An analysis of the current state of lame delegations within the Swedish .se tld.The
 Domain Name System (DNS), described by Paul Mockapetris in rfc1034 [1],
 provides a mechanism for naming resources in such a way that the 
human-readable host names are usable on different hosts and networks as 
to machine-interpretable addresses. The DNS system was designed by 
engineers with a focus on scalability rather than security. The security
 requirement came with the availability of the internet to the general 
public in the 1990’s. At that time, DNS already acquired an 
indispensable position within the internet information structure.
 This DNS system is used within email to locate the 
mail agent which belongs to the hostname used in the email address. This
 is done by mail exchange resource record (MX) within the DNS zone. This
 MX record specifies which host has the mail agent for the domain and 
this agent should accept mail for forwarding to the domain, possibly 
together with other delegations like SRV records for IMAP, POP and VoIP.
 David Barr[2] describes errors often found within the operation of DNS in rfc1912.
 
 One of the errors which have been described are lame 
delegations. Lame delegation are delegations like the MX record which 
delegate functionality to another entity without the other entity in 
place to serve this request. Some of them which are based on 
mis-configuration others on configuration changes or legacy. In this 
paper, we will study the impact of this lame delegations on the DNS 
system related to internet services like e-mail delivery.
 
 | Arris Huijgen <AHuijgen=>deloitte.nl> 
 Alexander Blaauwgeers <alexander.blaauwgeers=>os3.nl>
 
 | R 
 P
 | 2 
 |  
                | 60 | Scaling Stack Trace Fingerprinting.Stack
 traces contain information about the source code which can be matched 
against the original code. If you have two versions of the source code 
and the stack trace matches only one of them, then you know which 
version is running on the server, and you can look into known 
vulnerabilities for that version. Tools like: https://beanstack.io/
 can match Java stack traces against a corpus of indexed libraries. A 
similar technique (PoC available) is possible for JavaScript web 
applications which are becoming more popular (using Node.js and npm). An
 issue is that the database quickly grows to many millions of rows and 
lookups become ever slower despite indexing. This limits how many 
libraries one can reasonably import or how big a stack trace one wants 
to lookup. This issue is even more relevant for JavaScript than Java, 
since the ecosystem grows fast.
 The goal of this project is to create a fingerprint 
database for JavaScript, with focus on research and design of a more 
efficient search and storage method for matching JavaScript stack traces
 against known source code. The applicant should evaluate different 
methods for indexing, storing, and querying data that allow to 
fingerprint a given stack trace against a database. Algorithms should be
 benchmarked for performance.
 
 | Luc Gommans <luc.gommans=>x41-dsec.de> 
 Mounir ElKirafi <Mounir.ElKirafi=>os3.nl>
 
 | R 
 P
 | 2 
 |  
                | 65 | Node to node communication in Vantage6Vantage6
 is a python framework for federated learning and used in medical 
research. What is important to know is that vantage6 is based on the 
Personal Health Train principle, where the algorithms (trains) are sent 
to the data (stations) instead of the other way around.
 In the vantage6 implementation a user sends a task to a
 central server, which directs the task to the appropriate nodes 
(datastations). Some algorithms need some coordination between nodes. 
Right now the communication between the nodes goes through the central 
server. However, this is not very efficient. The plan is to create a new
 server which handles the node-to node communication. This will enable 
us to use secure multiparty computation libraries like pysyft and mpyc 
within the vantage6 framework. An "algorithm" within the vantage6 
framework is simply a docker image that is made to work with the 
infrastructure, so it is very flexible. You will create a proof of 
concept to build this service for the vantage6 framework.
 
 | Djura Smits <D.Smits=>esciencecenter.nl> 
 Renee Witsenburg <Renee.Witsenburg=>os3.nl>
 
 | R 
 P
 | 2 
 |  
                | 66 | Containerized deployment of SURFnet8 service layer network.At
 SURF we have a virtual test-bed that runs on an OpenStack cluster. With
 WiStar we are able to deploy virtual network environments with 
instances of the physical Juniper MX hardware (and some controller 
software) that we also have available in the production network. Each 
virtual instance and network environment however requires loads of 
memory and CPU and therefore it is currently impossible to mimic our 
complete network. Another drawback of the current setup is that the 
internal network setup is not completely transparent. Q-in-Q on the 
vMX's for example does not work out of the box. We would like to 
investigate what could be a solution to completely mimic our SURFnet8 
service layer network. This investigation should include deploying 
lightweight containers (with the required functionality) in a suggested 
topology. It it also preferred to have a working/transparent internal 
network setup.
 More information on the SURFnet8 network:
 Other useful info:
 
 
                    
                      https://github.com/networkop/k8s-topo
                    
                      https://www.juniper.net/documentation/en_US/crpd/information-products/topic-collections/release-notes/19.2/jd0e26.html
                     | Migiel de Vos <migiel.devos=>surf.nl> Marijke Kaat <marijke.kaat=>surf.nl>
 Peter Boers <peter.boers=>surf.nl>
 
 Pim Paardekooper <Pim.Paardekooper=>os3.nl>
 Inigo Gonzalez de Galdeano <Inigo.GonzalezdeGaldeano=>os3.nl>
 
 | R 
 P
 | 1 
 |  
                | 67 | Tipsy: How to Correct Password Typos Safely.Summary:
 Instead of denying a login attempt with an incorrect password, our 
typo-tolerant authentication system tries to correct common 
typographical errors on behalf of the user.Some forms of this have been seen in the industry but 
there is limited research & open source development. We will explore
 the tension between the security and usability of passwords.
 
 | Zeno Geradts <zeno=>holmes.nl> Philippe Partarrieu <philippe.partarrieu=>os3.nl>
 
 | R 
 P
 | 1 
 |  
                | 68 | Antivirus evasion by user mode unhooking on Windows 10.Endpoint
 Detection & Response (EDR) software aims to detect and mitigate 
security threats by responding to malicious program activity. EDR 
software for Windows typically monitors activity through hooking of 
Windows APIs. Attackers, in turn, abuse this fact by unhooking the APIs 
to hide a malicious program from the EDR's view.
 Goal of this research is to support security assessments by:
 
 
                    Gaining insight in detectability of current EDR unhooking techniques by specific EDRs running on Windows 10Finding a practical way to apply these unhooking techniques during red teaming exercises | Sander Ubink <Ubink.Sander=>kpmg.nl> 
 Tom Broumels <tom.broumels=>os3.nl>
 
 | R 
 P
 | 2 
 |  
                | 70 | Scaling of containerized network functions.Utilizing
 programmable infrastructures is a promising approach to address the 
challenges of supporting secure data sharing across domains of different
 capabilities (in terms of network and security). In order to 
dynamically set up a collaborative environment, we aim to containerize 
network functions, ship out, and instantiate at the edge of a network. 
Subsequently, we aim to ensure un-degraded security, reachability, and 
performance during a data-sharing session. These functions might be, 
e.g., applying packet encryption, deep packet inspection, segmentation. 
These network functions should then be chainable in any order. There are
 already two designs available to effectively intercept and redirect 
traffic. One based on the combination of IP multiplexing and a reverse 
proxy. The other one is partially based on the SOCKS protocol.
 The focus of this work is placed on the scaling and 
load-balancing of containerized network functions. Different network 
functions might require different scaling strategies, e.g., horizontal 
or vertical. Ideally, the scaling is done on-demand based on real-time 
metrics (auto-scaling 1). Furthermore, in-transit network traffic should
 not be affected by scaling. The student will extend one of the two 
designs available (see above) with such a scaling mechanism and evaluate
 the solution under different load scenarios. The questions to be 
answered include:
 
 
                    Reference medium.com - Autoscaling in Kubernetes:
 A Primer on Autoscaling | by Sasidhar Sekar | Expedia Group Technology |
 MediumWhat metrics should trigger the scaling?What are the characteristics that result in either horizontal or vertical scaling?How to ensure that the reconfiguration does not affect in-transit traffic? 
 
                    
                      https://medium.com/expedia-group-tech/autoscaling-in-kubernetes-a-primer-on-autoscaling-7b8f0f95a928
                     | Jamila Alsayed Kassem <j.alsayedkassem=>uva.nl> 
 Mohanad Elamin <melamin=>os3.nl>
 ppaardekooper <Pim.Paardekooper=>os3.nl>
 
 | R 
 P
 | 2 
 |  
                | 75 | Good || evil: defending infrastructure at scale with anomaly- and classification-based network intrusion detection.Computer
 networks are frequently attacked with new or previously unseen malware 
in order to steal information or cause financial damage. Defending 
against these has become a difficult task because the current signature 
based detection mechanism only detects known malicious programs or 
behaviors. Even if a signature exists for a known strain of malware, 
obfuscation techniques can be used to avoid detection. Anomaly detection
 attempts to solve this problem by modeling the normal behavior of 
clients on a computer network and alerting an analyst of any deviations 
from these patterns.
 In order to achieve this, Machine Learning (ML) 
algorithms are used, that range from classical fingerprinting and 
frequency based observations, to Artificial Intelligence (AI) algorithms
 and the use of Deep Neural Networks (DNN). A core challenge for this 
approach is the selection, collection and extraction of feature vectors 
that are fed into the classification algorithms.
 
 We are interested in evaluating state of the art open 
source solutions to classify malicious behavior in computer networks on a
 modern large scale dataset, and compare the performance of the trained 
model against a set of attacks in our own testbed. During this research 
project, we intend to answer the following questions:
 
 
                    How does a model perform that has been trained on a modern dataset, when deployed in a real world scenario?Which features prove the most useful for the detection task, and why?What performance can be achieved with the proposed imple- mentation with regard to throughput and hardware require- ments?Which algorithms are best suited for the task of anomaly detec- tion in computer networks and why? Experiment and log files: https://mega.nz/file/MuY3BCaS#6E4ZBddcn4xxtbmeU4Ae6xEWJoE-lMR4uIuE15qppS0
 | Joao Novaismarques <joao.novaismarques=>kpn.com> Jordi Scharloo <jordi.scharloo=>kpn.com>
 Giovanni Sileno <G.Sileno=>uva.nl>
 
 Philipp Mieden <Philipp.Mieden=>os3.nl>
 Philippe Partarrieu <philippe.partarrieu=>os3.nl>
 
 | R 
 P
 | 2 
 |  
                | 76 
 | Validating the replacement filtering features of popular alternative admission controllers for Pod Security Policies.Kubernetes is the de facto container orchestration 
system which is introduced in 2015. The open source project, supported 
by the Cloud Native Computing Foundation, introduced a new security 
feature in version 1.4 (2016) called Pod Security Policies (PSP). This 
feature is implemented as admission controller and allows cluster 
administrators to enforce a security configuration baseline across a 
namespace and therefore limiting the amount of pod capabilities that 
users and groups can configure. The research question we defined is:
 
                    How to mitigate the security deficiencies that the removal of Pod Security Policy leave behind? First, we will compare the different capabilities 
of PSP and the alternative controllers named Gatekeeper, K-Rail and 
Kyverno. The comparison will be based on literature, and the 
documentation of the admission controllers and technical experiments in 
Kubernetes testing clusters. The results should give insight to whatever
 extend the controllers can replace PSP and possible remaining gaps that
 they leave behind. Secondly, we investigate the remaining gaps and 
explore if other solutions cover these. If needed and time permits, we 
will write examples of admission controllers that will close these gaps 
and test it on a so-called kube-apiserver. The solutions will be tested 
in the Kubernetes testing environments. Lastly, we want to discuss the shortcomings of PSP and whether or not they exist in the evaluated controllers.
 | Wouter Otterspeer <wouter.otterspeer=>nl.pwc.com> 
 Maarten van der Slik <maarten.vanderslik=>os3.nl>
 Frank Wiersma <frank.wiersma=>os3.nl>
 
 | R 
 P
 | 2 
 |  
                | 77 
 | Active Queue Management on Tofino programmable Dataplanes.Centralization
 of the network’s intelligence, though Software Defined Networking, is
 an advantage for applications where changes in the forwarding state do 
not have strict real time requirements and depend upon global network 
state. However, in cases where there delivered service depends upon 
local state information, e.g., to support QoS constraints, the support 
of programmable stateful data planes, can minimize the impact of latency
 and overhead imposed by the intervention of a controller. Additional 
functionalities provided by legacy switching equipment, such as rate 
control and Active Queue Management to reduce network congestion and/or 
scheduling, to provide QoS and fairness etc., require state information 
maintained in the switch. Making stateful data plane algorithms 
programmable, complementing the current programmable forwarding plane 
solutions, can provide significant benefits in terms of meeting QoS 
requirements/constraints (e.g. low latency communications), reduce the 
control load on the SDN controller(s) and corresponding network overhead
 while at the same time enhance network flexibility by enabling 
customized traffic management. Towards the support of programmable 
data-planes, P4 is a high-level declarative language for describing how 
packets are processed in data paths. While the P4 language provide an 
excellent way to define the packet processing behavior of network 
devices, most programmable targets still typically have significant 
non-programmable pieces.
 The student will implement and evaluate a low latency,
 low loss and scalable throughput (L4S) Active Queue Management scheme 
in P4 using OpenLab’s P4 infrastructure (Edge-core Wedge 100BF-32X 
switches with Barefoot Tofino P4 programmable ASIC).
 
 | Chrysa Papagianni <c.papagianni=>uva.nl> 
 Maurice Mouw <Maurice.Mouw=>os3.nl>
 
 | R 
 P
 | 2 
 |  Due
 to the pandemic situation only the presenting students and staff will 
be in the SNE-lab B1.23, everyone else is asked to attend online.
 Program (Printer friendly version: HTML).
 
 
 
            
              
                | Tuesday June 29 2021, online using bigbluebutton => bbb2.os3.nl , user rp2-guest , for pw contact us. |  
                | Time | #RP | Title | Name(s) | LOC | RP |  
                | 10h00 | 
 | Introduction | Cees de Laat | 
 | 
 |  
                | 10h05 
 | 10 
 | Defeating the Fakes: Vocal Fake Detection using Discrete Fourier Transform in Neural Networks. 
 | Tina Tami, Lars Tijsmans 
 | NFI 
 | 2 
 |  
                | 10h30 
 | 60 | Scaling Stack Trace Fingerprinting. | Mounir ElKirafi | x41-dsec | 2 
 |  
                | 10h55 | 
 | Break 
 | 
 | 
 | 
 |  
                | 11h05 | 68 | Endpoint Detection and Response evasion by unhooking. | Tom Broumels | KPMG | 2 
 |  
                | 11h30 | 33 | Cloud Access Security Brokers (CASBs); Characterization of the CASB market and its alignment with corporate expectations. | Anand Groenewegen, Marius Brouwer | KPMG | 2 
 |  
                | 11h55 | 
 | Lunch 
 | 
 | 
 | 
 |  
                | 13h05 | 76 | Validating replacement filtering features of popular alternative admission controllers for Pod Security Policies. | Maarten van der Slik, Frank Wiersma | PWC | 2 
 |  
                | 13h30 | 36 | Transparent malicious traffic detection using a BlueField DPU. 
 | Jelle Ermerins, Ward Bakker | DataDigest | 2 
 |  
                | 13h55 | 
 | Break | 
 | 
 | 
 |  
                | 14h05 | 70 | Scaling of containerized network functions | Mohanad Elamin, Pim Paardekooper | UvA | 2 
 |  
                | 14h30 | 75 | Anomaly Based Network Intrusion Detection. 
 | Philipp Mieden, Philippe Partarrieu | KPN | 2 
 |  
                | 14h55 | 
 | Break | 
 | 
 | 
 |  
                | 15h05 | 77 | Active Queue Management on Tofino programmable Dataplanes. 
 | Maurice Mouw | UvA | 2 
 |  
                | 15h30 | 
 | Close 
 | Cees de Laat | 
 | 
 |  
 Program (Printer friendly version: HTML).
 
 
 
            
              
                | Monday Feb 1, 2021, online using bigbluebutton 
 |  
                | Time | #RP | Title | Name(s) | LOC | RP |  
                | 10h25 | 
 | Introduction | Cees de Laat | 
 | 
 |  
                | 10h30 
 | 66 | Containerized deployment of SURFnet8 service layer network. | Pim Paardekooper, Inigo Gonzalez de Galdeano | SURF | 1 
 |  
                | 10h55 
 | 
 | Break 
 | 
 | 
 | 
 |  
                | 11h05 | 34 | Analysis of a rarely implemented security feature: signing Docker images with a Notary server. 
 | Mohanad Elamin, Rio Kierkels | KPMG 
 | 1 
 |  
                | 11h30 | 56 | Analysis of a new privacy technology and its implementation: Image Cloaking. 
 | Simon Carton, Danny Janssen | KPMG | 1 
 |  
                | 11h55 | 
 | Lunch 
 | 
 | 
 | 
 |  
                | 13h05 
 | 14 
 | Using a verifiable and decentralized ledger as a basis for trusting hospital endpoints. 
 | Matthijs Bartelink | WhiteBox 
 | 1 
 |  
                | 13h30 
 | 6 
 | Designing structured metadata for CVE reports. 
 | Bart van Dongen | Tjaldur | 1 
 |  
                | 13h55 | 
 | Break | 
 | 
 | 
 |  
                | 14h05 | 41 
 | Real time asset inventory in ICS. | Artemis Mytilinaios | Deloitte | 1 
 |  
                | 14h30 | 42 
 | Improving availability in Industrial Control Systems using Software-Defined Networking. | Marios Andreou, Joris Jonkers Both | Deloitte | 2 
 |  
                | 14h55 | 
 | Break | 
 | 
 | 
 |  
                | 15h05 | 57 
 | Certificate Authorities as a Service in the Cloud: Is It Secure? | Anand Groenewegen, Maurits Maas | Deloitte | 1 
 |  
                | 15h30 | 31 
 | Profiling (ab)user behavior of leaked credentials. 
 | Maurice Mouw | Deloitte | 1 
 |  
                | 15h55 | 
 | Break | 
 | 
 | 
 |  
                | 16h05 | 27 
 | Detection Real time video attack. | Joris Janssen | NFI | 1 
 |  
                | 16h30 | 67 
 | Typo-tolerant authentication systems. 
 | Philippe Partarrieu | NFI | 1 
 |  
                | 16h55 | 
 | Close 
 | Cees de Laat | 
 | 
 |  
 
            
              
                | Tuesday Feb 2, 2021, online using bigbluebutton. |  
                | Time | #RP | Title | Name(s) | LOC | RP |  
                | 10h00 | 
 | Introduction 
 | Cees de Laat | 
 | 
 |  
                | 10h05 
 | 37 
 | Bluefield. 
 | Ilyas Rahimi, Mounir Kirafi | DataDigest | 1 
 |  
                | 10h30 | 65 
 | Node to node communication in Vantage6 | Renee Witsenburg | eScienceCenter | 2 
 |  
                | 10h55 | 
 | Break | 
 | 
 | 
 |  
                | 11h05 | 54 
 | Hunting for malicious infrastructure using big data. 
 | Shadi Alhakimi, Freek Bax | NCSC 
 | 1 
 |  
                | 11h30 
 | 
 | Close | Cees de Laat | 
 | 
 |  
 Out of normal schedule presentations
            
              
                | Room B1.23 at Science Park 904 NL-1098XH Amsterdam. 
 |  
                | Date | Time | Place | #RP | Title | Name(s) | LOC | RP |  
                | 2020-09-16 
 | 10h00 
 | online 
 | 59 
 | The current state of DNS Lame delegations; An analysis of the current state of lame delegations within the Swedish .se tld. | Alexander Blaauwgeers | Deloitte 
 | 2 
 |  
                | 2020-12-17 
 | 11h00 
 | online 
 | 58 
 | Large scale DNS hijacking detection using HTTPS scan data. 
 | Niels Warnars | NCSC 
 | 2 
 |  |