University of Padua - MSc in Computer Science
Computer and Network Security
Academic Year: 2014/2015

Lecturer: Mauro Conti



Topics

Topic selection starts on April 3 at 9am
(see more info on the course Google group)


Topic 1: RFID Security
Topic 2: Captcha
Topic 3: Untrusted Storage
Topic 4: SmartPhone Security
Topic 5: Attacks on SmartPhone
Topic 6: Password Protection
Topic 7: Distributed Denial of Service Attacks
Topic 8: Sybil Attacks
Topic 9: Behavioural Biometrics
Topic 10: VoIP Security
Topic 11: Secure Content Delivery
Topic 12: Anonymous Communications
Topic 13: Keyloggers Detection
Topic 14: Anonymity in WSN
Topic 15: Botnet Detection
Topic 16: Trusted HW
Topic 17: Security of RFID ePassports
Topic 18: Node Replication Attack in WSN
Topic 19: Secure Data Aggregation in WSN
Topic 20: Privacy issues in Social Networks
Topic 21: Google Android smartphone security
Topic 22: Electronic Voting
Topic 23: P2P BotNet Detection
Topic 24: Taint Mechanisms
Topic 25: Browser Security
Topic 26: Privacy of Location Based Services
Topic 27: Named Data Networking Security
Topic 28: Named Data Networking Privacy
Topic 29: Cloud Security
Topic 30: Anonymity in Wireless Network
Topic 31: Smartphone User Profiling
Topic 32: SSL security issues in Android
Topic 33: Circumvent censorship



Topic 1: RFID Security
Primary:
Secondary:

Topic 2: Captcha
Primary:
Secondary:

Topic 3: Untrusted Storage
Primary:
  • P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish Depot: Cloud Storage with Minimal Trust, In the proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI 2010).
Secondary:

Topic 4: SmartPhone Security
Primary:
Secondary:

Topic 5: Attacks on SmartPhone
Primary:
Secondary:

Topic 6: Password Protection
Primary:
Secondary:

Topic 7: Distributed Denial of Service Attacks
Primary:
Secondary:

Topic 8: Sybil Attacks
Primary:
Secondary:
Additional Reading:
  • J. R. Douceur, The Sybil Attack, First International Workshop on Peer-to-Peer Systems 2002.

Topic 9: Behavioural Biometrics
Primary:
Secondary:

Topic 10: VoIP Security
Primary:
Secondary:

Topic 11: Secure Content Delivery
Primary:
Secondary:

Topic 12: Anonymous Communications
Primary:
Secondary:

Topic 13: Keyloggers Detection
Primary:
Secondary:

Topic 14: Anonymity in WSN
Primary:
Secondary:

Topic 15: Botnet Detection
Primary:
Secondary:

Topic 16: Trusted HW
Primary:
Secondary:

Topic 17: Security of RFID ePassports
Primary:
Secondary:

Topic 18: Node Replication Attack in WSN
Primary:
Secondary:

Topic 19: Secure Data Aggregation in WSN
Primary:
Secondary:

Topic 20: Privacy issues in Social Networks
Primary:
Secondary:

Topic 21: Google Android smartphone security
Primary:
Secondary:

Topic 22: Electronic Voting
Primary:
Secondary:

Topic 23: P2P BotNet Detection
Primary:
Secondary:

Topic 24: Taint Mechanisms
Primary:
Secondary:

Topic 25: Browser Security
Primary:
Secondary:

Topic 26: Privacy of Location Based Services
Primary:
Secondary:

Topic 27: Named Data Networking Security
Primary:
Secondary:

Topic 28: Named Data Networking Privacy
Primary:
Secondary:

Topic 29: Cloud Security
Primary:
Secondary:

Topic 30: Anonymity in Wireless Network
Primary:
Secondary:

Topic 31: Smartphone User Profiling
Primary:
Secondary:

Topic 32: SSL security issues in Android
Primary:
Secondary:

Topic 33: Circumvent censorship
Primary:
Secondary:




Last update: 2015-04-09
website hit counter