SNE Master Research Projects Web Page

Home Previous years

This page reports the list of student projects with the type (long or short), the contact person for each project ("@" is replaced by "=>"), the status (available or assigned) the warning level (low, medium or high; where high means that is strongly suggested to submit the project proposal head of time to not incur in delays). New projects will be added at the end. All other information related with the projects are available on the course pages on Canvas.

Number and Type Title and Abstract Supervisor Status Warning
2 - short or long
AutoML for Side-Channel Analysis

Description: Side-channel analysis (SCA) is an important aspect of modern hardware security and cryptography. It consists of acquiring physical measurements and analyzing them using machine learning. Any machine-learning processing pipeline can quickly get very large and complex: as a result, the hardware hacker may not be able to pick the optimal attack parameters. To that end, we have developed a framework that automates ML in the context of hardware security (called MetaHive), using heuristics like particle swarm optimization (PSO).

-learn the basics of SCA and PSO
-implement PSO in an existing python framework for automated ML
-potential extensions: measure the effectiveness of PSO in optimizing the the parameters of a side-channel attack
Kostas Papagiannopoulos k.papagiannopoulos=> available low
3 - long
Investigating Parsing Differentials in micro services

Environments that use micro services often have a wide variety of programming languages and frameworks. Therefore, we suspect that parser differentials vulnerabilities are common in micro service architectures. For example how two libraries parse (malformed) JSON, HTTP requests etc. This could lead to interesting vulnerabilities that are hard to find. The goal of this project is to find such parser differentials in commonly used libraries (first period) and see if this could lead to real vulnerabilities (second period). Reference:
Matthijs Melissen mmelissen=> and Daan Keuper dkeuper=>
available low
4 - short
Detecting DDoS

DDoS attacks are still a large problem for internet-connected applications. In DDoS attacks, an attacker often abuses software of third parties without these third parties awareness. The goal of this project is to be able to test whether an organisation's internet-exposed network can be exploited to cause a DDoS. To do so, the student will first find out which amplification factor is in use for common software. Then the student will build a tool to verify if this software is running within the organisaton.
Matthijs Melissen mmelissen=> and Daan Keuper dkeuper=> available low
6 - short
Interpreting automated tool output for cloud security testing

There exist a lot of automated security tools for cloud environments (Azure, AWS and Google Cloud). An example of such a tool is Defender for Cloud. We notice that the results of these tools are often hard to interpret. During this project, the student will look for a tool that is able to map the technical findings originating from the automated tool to the customer's risk assessment.
Matthijs Melissen mmelissen=> and Daan Keuper dkeuper=> available low
7 - short
Hardware dropper

In redteaming, we often try to get access to network ports at the customer location. These network ports might be in use, so in this case we would like to introduce a piece of hardware that acts as a transparent proxy for the existing user, and also allows the security tester to access the network. The device probably should have wifi and/or 5G, so that data can be exfiltrated invisible to the tested organisation. During this project, the student will create such a hardware dropper (perhaps using existing hardware), and implements the correct software to use the device.
Matthijs Melissen mmelissen=> and Daan Keuper dkeuper=> available low
11 - short or long
(CSA CAIQ or European Cybersecurity Compliance framework)  into the DevSecOps pipeline for security improvement and risk assessment of applications

Analise the structure of the selected (one of) compliance frameworks and map it to the typical (cloud-based) application architecture, suggest architecture design patterns. Identify what security controls can be used and how they can be applied to different CI/CD stages.
Yuri Demchenko Y.Demschenko=> available low
13 - short
Malicious G-Code Detection in Additive Manufacturing

Abstract: After how G-code can be abused by malicious users, a detection tool needs to be developed to prevent attackers from downloading/executing malicious G-code on a protected additive manufacturing machine/ 3d printer. Ideally, the detection needs to be efficient and robust.
Chenglu Jin Chenglu.Jin=> available low
XX - short

Supervisor available low

Below the Presentation Schedule (Final)

Room: B1.23

BBB: ask if you need

Username: ask if you need
Password: ask if you need

Monday 5 February 2024

Time Slot RP Number Title
9:00-9:25 40 Improving Fingerprinting Protections in Web Browsers
9:25-9:50 39 Implementing Attention For Autoencoders In Side-Channel Attacks
9:50-10:15 38 A Broad Survey and Replication of ML-Based Side-Channel Attack Research
10:15-10:40 26 - long Side channel attacks on remote FPGAs
Short Break
11:00-11:25 28 - long Empowering Cybersecurity: Modifiable Environment for Analyzing and Monitoring Ransomware Behavior
11:25-11:50 10 - long Honeypots in the cloud
11:50-12:15 5 - long Browser-Powered Desync Attack: Obfuscating Content-Length in HTTP Protocol
Lunch Break
13:00-13:25 37 - long Evaluating vulnerabilities in TCP stack and developing a white box fuzzer for the common vulnerabilities in the TCP stack of operating systems
13:25-13:50 42 Blockchain technologies comparison and selection for decentralised application development
13:50-14:15 9 Automatic evidence processing and analysis in the cloud
14:15-14:40 1 Pipeline of Mass Disclosure
Short Break
15:00-15:25 33 Feature Selection on a Differentially Private Dataset
15:25-15:50 32 Breaching the isolation layer through Inter-Partition Communication in Hyper-V


14 - RP2

Autoencoder for Detecting Malicious Model Updates in Differentially Private Federated Learning

16:15-16:40 35 - RP2 Energy Cost of PETs - Differential Privacy
16:40-17:05 36 - RP2 Introducing Cryptographic Agility in Mobile Banking Application



Tuesday 6 February 2024

Time Slot RP Number Title
9:00-9:25 34 Implementing and Testing SCION in the FABRIC Infrastructure
9:25-9:50 31 Mitigating layer 7-based DDoS attacks in the SURF network
9:50-10:15 30 Analysis in Deepfake
10:15-10:40 16 Local Differential Privacy for Data Clustering
Short Break
11:00-11:25 29 Payload tracking
11:25-11:50 27 XDP-based DNS hot cache
11:50-12:15 23 P2P VPN solution for eduVPN using WireGuard
Lunch Break
13:00-13:25 22 Comparing approaches to Multi-Party Computation and Synthetic data in terms of energy consumption and privacy
13:25-13:50 19 Secret sharing based electronic voting for IoT
13:50-14:15 18 Using ZIP files to smuggle malware through scanners undetected
14:15-14:40 15 Secure Collaborative Data Sharing for Enhanced Machine Learning Insights
Short Break
15:00-15:25 25 Classifying Web-Based Attacks
15:25-15:50 24 State of the art of log collection methods for security and application monitoring purposes
15:50-16:15 12 Malicious G-Code characterisation in Additive Manufacturing
16:15-16:40 8 Static Code Analysis using Large Language Models


Date to be defined

Time Slot RP Number Title
TO BE DEFINED 41 - RP2 Creating, Detecting and Preventing Malicious IaC Packages
TO BE DEFINED 17 Evaluating Fairness in k-Anonymized Datasets