University of Padua - MSc in Computer Science
Computer and Network Security
Academic Year: 2021/2022

Lecturer: Mauro Conti



Topics


You can download the papers automatically from the university if you are connected to eduroam, or from your home by setting up the university proxy.
You can found the guide to install and setup the proxy here (eng) and here (ita).
For any issues, you can contact the teaching assistants.

The topic covers the following macro areas:


Topic 1 (Android): Android Virtualization Technique
Topic 2 (Android): Security and Privacy Vulnerabilities Detection in Android Apps
Topic 3 (Android): Taint Analysis
Topic 4 (Blockchain): Distributed key management systems in blockchains
Topic 5 (Blockchain): Isogeny-based crytography for PKI in blockchains
Topic 6 (Blockchain): Task offloading in mobile blockchains
Topic 7 (Blockchain): Distributed oralce networks truth discovery
Topic 8 (Blockchain): Intergration of Federated learning and Blockchain for data sharing
Topic 9 (CPS): Anomaly Detection in Industrial Systems
Topic 10 (CPS): Security challenges in Industrial Control Systems
Topic 11 (CPS): Industrial Honeypot
Topic 12 (CPS): Air - Ground communication
Topic 13 (CPS): NFC Security - SDR receiver-transmitter
Topic 14 (CPS): IoT security
Topic 15 (CPS): Identity of Things
Topic 16 (CPS): Cyber-Physical Anomaly Detection
Topic 17 (CPS): Advanced security on Industrial Control System
Topic 18 (CPS): Private Information Retrieval (PIR) for healthcare
Topic 19 (CPS): Privacy for Vehicular Networks - Ride-Hailing Service
Topic 20 (CPS): Privacy for Vehicular Networks - Traffic Monitoring
Topic 21 (CPS): Privacy for Vehicular Networks - Smart Parking
Topic 22 (CPS): Vehicular Security - Automotive Keyless Entry
Topic 23 (CPS): Vehicular Security - Charging-While-Driving
Topic 24 (CPS): Vehicular Security - CAN Security
Topic 25 (CPS): Privacy protection of Electric Vehicles Owners
Topic 26 (CPS): Machine learning techniques for lightweight continuous authentication
Topic 27 (CPS): Vehicular Security - CAN Attacks to error handling
Topic 28 (ICN): Cache Privacy Attacks
Topic 29 (ICN): Content Popularity Prediction
Topic 30 (ICN): Interest Flooding Attacks
Topic 31 (ICN): Coexistence of TCP/IP and ICN/NDN
Topic 32 (Malware Detection): Malware Analysis and Detection Methods
Topic 33 (Malware Detection): Ransomware Detection using Deception Models
Topic 34 (Malware Detection): Adversarial Machine Learning on Malaware
Topic 35 (MLS): Behavioural Biometrics
Topic 36 (MLS): Deauthentication
Topic 37 (MLS): Security of Machine Learning Implementations
Topic 38 (MLS): Hate Speech Detection on Online Platforms
Topic 39 (MLS): The role of generative models in Cybersecurity
Topic 40 (MLS): Continuous Authentication
Topic 41 (MLS): Evaluation of Adversarial Attacks on Privacy Preserving Machine Learning Models
Topic 42 (MLS): Adversarial Machine Learning: Evasion Attacks
Topic 43 (Multimedia Forensics): Adversarial Multimedia Forensics
Topic 44 (Multimedia Forensics): Adversarial Multimedia Forensics - Security
Topic 45 (Multimedia Forensics): Video forensics
Topic 46 (Multimedia Forensics): DeepFake Detection
Topic 47 (Social Networks): Fake Account Detection on Instagram
Topic 48 (Social Networks): Social Network Analysis
Topic 49 (Social Networks): Fake Engagement on Instagram
Topic 50 (Social Networks): Private data inference from Social Networks
Topic 51 (MISC): Security in Logic-Locking (Logic-Obfuscation)
Topic 52 (MISC): Secure key generation in PUF-based Logic-Locking
Topic 53 (MISC): Misuses in Wearable Devices
Topic 54 (MISC): Cyber-Threat Intelligence
Topic 55 (MISC): Lie Detection
Topic 56 (MISC): Security and Privacy in Online Video Games
Topic 57 (MISC): 5G new radio Handover Security
Topic 58 (MISC): Securing microservices architectures during SDLC
Topic 59 (MISC): Detecting Wireless Sensors
Topic 60 (MISC): Textual Captchas
Topic 61 (MISC): Covert channel for security and privacy
Topic 62 (MISC): PIN and Password security
Topic 63 (MISC): Security and privacy of keyboard



Topic 1 (Android): Android Virtualization Technique
Primary:
Secondary:

Topic 2 (Android): Security and Privacy Vulnerabilities Detection in Android Apps
Primary:
Secondary:

Topic 3 (Android): Taint Analysis
Primary:
Secondary:

Topic 4 (Blockchain): Distributed key management systems in blockchains
Primary:
Secondary:

Topic 5 (Blockchain): Isogeny-based crytography for PKI in blockchains
Primary:
Secondary:

Topic 6 (Blockchain): Task offloading in mobile blockchains
Primary:
Secondary:

Topic 7 (Blockchain): Distributed oralce networks truth discovery
Primary:
Secondary:

Topic 8 (Blockchain): Intergration of Federated learning and Blockchain for data sharing
Primary:
Secondary:

Topic 9 (CPS): Anomaly Detection in Industrial Systems
Primary:
Secondary:

Topic 10 (CPS): Security challenges in Industrial Control Systems
Primary:
Secondary:

Topic 11 (CPS): Industrial Honeypot
Primary:
Secondary:

Topic 12 (CPS): Air - Ground communication
Primary:
Secondary:

Topic 13 (CPS): NFC Security - SDR receiver-transmitter
Primary:
Secondary:

Topic 14 (CPS): IoT security
Primary:
Secondary:

Topic 15 (CPS): Identity of Things
Primary:
Secondary:

Topic 16 (CPS): Cyber-Physical Anomaly Detection
Primary:
Secondary:

Topic 17 (CPS): Advanced security on Industrial Control System
Primary:
Secondary:

Topic 18 (CPS): Private Information Retrieval (PIR) for healthcare
Primary:
Secondary:

Topic 19 (CPS): Privacy for Vehicular Networks - Ride-Hailing Service
Primary:
Secondary:

Topic 20 (CPS): Privacy for Vehicular Networks - Traffic Monitoring
Primary:
Secondary:

Topic 21 (CPS): Privacy for Vehicular Networks - Smart Parking
Primary:
Secondary:

Topic 22 (CPS): Vehicular Security - Automotive Keyless Entry
Primary:
Secondary:

Topic 23 (CPS): Vehicular Security - Charging-While-Driving
Primary:
Secondary:

Topic 24 (CPS): Vehicular Security - CAN Security
Primary:
Secondary:

Topic 25 (CPS): Privacy protection of Electric Vehicles Owners
Primary:
Secondary:

Topic 26 (CPS): Machine learning techniques for lightweight continuous authentication
Primary:
Secondary:

Topic 27 (CPS): Vehicular Security - CAN Attacks to error handling
Primary:
Secondary:

Topic 28 (ICN): Cache Privacy Attacks
Primary:
Secondary:

Topic 29 (ICN): Content Popularity Prediction
Primary:
Secondary:

Topic 30 (ICN): Interest Flooding Attacks
Primary:
Secondary:

Topic 31 (ICN): Coexistence of TCP/IP and ICN/NDN
Primary:
Secondary:

Topic 32 (Malware Detection): Malware Analysis and Detection Methods
Primary:
Secondary:

Topic 33 (Malware Detection): Ransomware Detection using Deception Models
Primary:
Secondary:

Topic 34 (Malware Detection): Adversarial Machine Learning on Malaware
Primary:
Secondary:

Topic 35 (MLS): Behavioural Biometrics
Primary:
Secondary:

Topic 36 (MLS): Deauthentication
Primary:
Secondary:

Topic 37 (MLS): Security of Machine Learning Implementations
Primary:
Secondary:

Topic 38 (MLS): Hate Speech Detection on Online Platforms
Primary:
Secondary:

Topic 39 (MLS): The role of generative models in Cybersecurity
Primary:
Secondary:

Topic 40 (MLS): Continuous Authentication
Primary:
Secondary:

Topic 41 (MLS): Evaluation of Adversarial Attacks on Privacy Preserving Machine Learning Models
Primary:
Secondary:

Topic 42 (MLS): Adversarial Machine Learning: Evasion Attacks
Primary:
Secondary:

Topic 43 (Multimedia Forensics): Adversarial Multimedia Forensics
Primary:
Secondary:

Topic 44 (Multimedia Forensics): Adversarial Multimedia Forensics - Security
Primary:
Secondary:

Topic 45 (Multimedia Forensics): Video forensics
Primary:
Secondary:

Topic 46 (Multimedia Forensics): DeepFake Detection
Primary:
Secondary:

Topic 47 (Social Networks): Fake Account Detection on Instagram
Primary:
Secondary:

Topic 48 (Social Networks): Social Network Analysis
Primary:
Secondary:

Topic 49 (Social Networks): Fake Engagement on Instagram
Primary:
Secondary:

Topic 50 (Social Networks): Private data inference from Social Networks
Primary:
Secondary:

Topic 51 (MISC): Security in Logic-Locking (Logic-Obfuscation)
Primary:
Secondary:

Topic 52 (MISC): Secure key generation in PUF-based Logic-Locking
Primary:
Secondary:

Topic 53 (MISC): Misuses in Wearable Devices
Primary:
Secondary:

Topic 54 (MISC): Cyber-Threat Intelligence
Primary:
Secondary:

Topic 55 (MISC): Lie Detection
Primary:
Secondary:

Topic 56 (MISC): Security and Privacy in Online Video Games
Primary:
Secondary:

Topic 57 (MISC): 5G new radio Handover Security
Primary:
Secondary:

Topic 58 (MISC): Securing microservices architectures during SDLC
Primary:
Secondary:

Topic 59 (MISC): Detecting Wireless Sensors
Primary:
Secondary:

Topic 60 (MISC): Textual Captchas
Primary:
Secondary:

Topic 61 (MISC): Covert channel for security and privacy
Primary:
Secondary:

Topic 62 (MISC): PIN and Password security
Primary:
Secondary:

Topic 63 (MISC): Security and privacy of keyboard
Primary:
Secondary: