TDDD17 Information Security, Second Course
Projects List
| Project id | Project name | Supervisor | Assigned students |
| 001 | Attacks against Smartphones | Anna Vapen | Adnan Waheed Muzammil Zareen Khan |
| 002 | Analysis of a Smartphone worm | Anna Vapen | Kayhan Ozturk Qaiser Munir |
| 003 | Online banking security | Anna Vapen | Faheem Ramzan Tehman Pervaiz |
| 004 | Managing digital identities | Anna Vapen | Roohul Halim Syed Atif Shahryar |
| 005 | Penetration testing | Anna Vapen | Michele Fiocca |
| 006 | Handwritten signature recognition | Viiveke Fåk | Syed Faraz Ali Zaidi Shahzaan Mohammed |
| 007 | "Cyber warfare", the truth in a real case | Viiveke Fåk | Muhammad Saleem Jawad Hassan |
| 008 | Deeper study of face recognition | Viiveke Fåk | Usman Dastgeer Hassam Nadeem |
| 009 | Defence against DoS, flooding attacks | Viiveke Fåk | Natalia Wieczorek Pawel Suwala |
| 010 | Network anonymity | David Byers | Charlotta Westberg Joel Paulsson |
| 011 | Mandatory access control and SELinux | David Byers | Daniel Estor Muteer Arshad |
| 012-1 | Firewall implementation and testing | David Byers | Mohamed Amer Qamar Nazir |
| 012-2 | Firewall implementation and testing | David Byers | Niclas Gustafsson Patrik Ragnarsson |
| 013 | DNS security | David Byers | Imran Khan Muhammad Rizwan Ullah |
| 014 | Practical WLAN security | David Byers | Jon Eldeklint Johannes Gunnbäck |
| 016 | Risk assessment for Product-Oriented and Knowledge-Based Companies | Shanai Ardi | Gang Luo Liang Zhang |
| 017 | An example hazard analysis | Shanai Ardi | Muhammad Aamir khan Ahmad Rabay'a |
| 019 | Architectural risk analysis of a web application | Shanai Ardi | Mansoor Munib Mati Ullah Khan |
| 022 | Evaluation of physical security attacks | Juha Takkinen | Muhammad Salman Khan |
| 023 | Penetration via Google search | Juha Takkinen | Azam Zia Muhammad Ayaz |
| 024 | Evaluation of physical security in a Movie | Juha Takkinen | Pierre Emmanuel Galisson Rhys Moyne |
| 025 | Testing BCP | Juha Takkinen | Asif Ali Yasir Ali |
| *026 | Intrusion detection for embedded systems | Nahid Shahmehri | Christian Vestlund |
| * 028 | Studying IDS signatures using botnet infected honeypots | Nahid Shahmehri | Johannes Hassmund |
* This topic is part of an IDA research project.
Page responsible: Ulf Kargén
Last updated: 2023-01-15
