TDDD17 Information Security, Second Course
Projects List
Project id | Project name | Supervisor | Assigned students |
001 | Attacks against Smartphones | Anna Vapen | Adnan Waheed Muzammil Zareen Khan |
002 | Analysis of a Smartphone worm | Anna Vapen | Kayhan Ozturk Qaiser Munir |
003 | Online banking security | Anna Vapen | Faheem Ramzan Tehman Pervaiz |
004 | Managing digital identities | Anna Vapen | Roohul Halim Syed Atif Shahryar |
005 | Penetration testing | Anna Vapen | Michele Fiocca |
006 | Handwritten signature recognition | Viiveke Fåk | Syed Faraz Ali Zaidi Shahzaan Mohammed |
007 | "Cyber warfare", the truth in a real case | Viiveke Fåk | Muhammad Saleem Jawad Hassan |
008 | Deeper study of face recognition | Viiveke Fåk | Usman Dastgeer Hassam Nadeem |
009 | Defence against DoS, flooding attacks | Viiveke Fåk | Natalia Wieczorek Pawel Suwala |
010 | Network anonymity | David Byers | Charlotta Westberg Joel Paulsson |
011 | Mandatory access control and SELinux | David Byers | Daniel Estor Muteer Arshad |
012-1 | Firewall implementation and testing | David Byers | Mohamed Amer Qamar Nazir |
012-2 | Firewall implementation and testing | David Byers | Niclas Gustafsson Patrik Ragnarsson |
013 | DNS security | David Byers | Imran Khan Muhammad Rizwan Ullah |
014 | Practical WLAN security | David Byers | Jon Eldeklint Johannes Gunnbäck |
016 | Risk assessment for Product-Oriented and Knowledge-Based Companies | Shanai Ardi | Gang Luo Liang Zhang |
017 | An example hazard analysis | Shanai Ardi | Muhammad Aamir khan Ahmad Rabay'a |
019 | Architectural risk analysis of a web application | Shanai Ardi | Mansoor Munib Mati Ullah Khan |
022 | Evaluation of physical security attacks | Juha Takkinen | Muhammad Salman Khan |
023 | Penetration via Google search | Juha Takkinen | Azam Zia Muhammad Ayaz |
024 | Evaluation of physical security in a Movie | Juha Takkinen | Pierre Emmanuel Galisson Rhys Moyne |
025 | Testing BCP | Juha Takkinen | Asif Ali Yasir Ali |
*026 | Intrusion detection for embedded systems | Nahid Shahmehri | Christian Vestlund |
* 028 | Studying IDS signatures using botnet infected honeypots | Nahid Shahmehri | Johannes Hassmund |
* This topic is part of an IDA research project.
Page responsible: Ulf Kargén
Last updated: 2023-01-15