University of Padua - MSc in Computer Science
Computer and Network Security
Academic Year: 2015/2016

Lecturer: Mauro Conti



Topics



Topic 1: RFID Security
Topic 2: Captcha
Topic 3: Untrusted Storage
Topic 4: SmartPhone Security
Topic 5: Attacks on SmartPhone
Topic 6: Password Protection
Topic 7: Distributed Denial of Service Attacks
Topic 8: Sybil Attacks
Topic 9: Behavioural Biometrics
Topic 10: VoIP Security
Topic 11: Secure Content Delivery
Topic 12: Anonymous Communications
Topic 13: Keyloggers Detection
Topic 14: Anonymity in WSN
Topic 15: Botnet Detection
Topic 16: Trusted HW
Topic 17: Security of RFID ePassports
Topic 18: Node Replication Attack in WSN
Topic 19: Secure Data Aggregation in WSN
Topic 20: Privacy issues in Social Networks
Topic 21: Google Android smartphone security
Topic 22: Electronic Voting
Topic 23: P2P BotNet Detection
Topic 24: Taint Mechanisms
Topic 25: Browser Security
Topic 26: Privacy of Location Based Services
Topic 27: Named Data Networking Security
Topic 28: Named Data Networking Privacy
Topic 29: Cloud Security
Topic 30: Anonymity in Wireless Network
Topic 31: Smartphone User Profiling
Topic 32: SSL security issues in Android
Topic 33: Circumvent censorship
Topic 34: Secure Messaging



Topic 1: RFID Security
Primary:
Secondary:

Topic 2: Captcha
Primary:
Secondary:

Topic 3: Untrusted Storage
Primary:
  • P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish Depot: Cloud Storage with Minimal Trust, In the proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI 2010).
Secondary:

Topic 4: SmartPhone Security
Primary:
Secondary:

Topic 5: Attacks on SmartPhone
Primary:
Secondary:

Topic 6: Password Protection
Primary:
Secondary:

Topic 7: Distributed Denial of Service Attacks
Primary:
Secondary:

Topic 8: Sybil Attacks
Primary:
Secondary:
Additional Reading:
  • J. R. Douceur, The Sybil Attack, First International Workshop on Peer-to-Peer Systems 2002.

Topic 9: Behavioural Biometrics
Primary:
Secondary:

Topic 10: VoIP Security
Primary:
Secondary:

Topic 11: Secure Content Delivery
Primary:
Secondary:

Topic 12: Anonymous Communications
Primary:
Secondary:

Topic 13: Keyloggers Detection
Primary:
Secondary:

Topic 14: Anonymity in WSN
Primary:
Secondary:

Topic 15: Botnet Detection
Primary:
Secondary:

Topic 16: Trusted HW
Primary:
Secondary:

Topic 17: Security of RFID ePassports
Primary:
Secondary:

Topic 18: Node Replication Attack in WSN
Primary:
Secondary:

Topic 19: Secure Data Aggregation in WSN
Primary:
Secondary:

Topic 20: Privacy issues in Social Networks
Primary:
Secondary:

Topic 21: Google Android smartphone security
Primary:
Secondary:

Topic 22: Electronic Voting
Primary:
Secondary:

Topic 23: P2P BotNet Detection
Primary:
Secondary:

Topic 24: Taint Mechanisms
Primary:
Secondary:

Topic 25: Browser Security
Primary:
Secondary:

Topic 26: Privacy of Location Based Services
Primary:
Secondary:

Topic 27: Named Data Networking Security
Primary:
Secondary:

Topic 28: Named Data Networking Privacy
Primary:
Secondary:

Topic 29: Cloud Security
Primary:
Secondary:

Topic 30: Anonymity in Wireless Network
Primary:
Secondary:

Topic 31: Smartphone User Profiling
Primary:
Secondary:

Topic 32: SSL security issues in Android
Primary:
Secondary:

Topic 33: Circumvent censorship
Primary:
Secondary:

Topic 34: Secure Messaging
Primary:
  • N. Unger, S. Dechand, J. Bonneau, S. Fahl, H. Perl, I. Goldberg, M. Smith, SoK: Secure Messaging, Proceedings of the 2015 IEEE Symposium on Security and Privacy (SP 2015).
Secondary:




Last update: 2016-04-20
website hit counter