University of Padua - MSc in Cybersecurity
Advanced Topics in Computer and Network Security
Academic Year: 2023/2024

Lecturer: Mauro Conti



Topics


You can download the papers automatically from the university if you are connected to eduroam, or from your home by setting up the university proxy.
You can found the guide to install and setup the proxy here (eng) and here (ita).
For any issues, you can contact the teaching assistants.

The topic covers the following macro areas:


Topic 1 (Android): Android Virtualization Technique
Topic 2 (Android): Security and Privacy Vulnerabilities Detection in Android Apps
Topic 3 (Android): Taint Analysis
Topic 4 (Blockchain): Distributed key management systems in blockchains
Topic 5 (Blockchain): Isogeny-based crytography for PKI in blockchains
Topic 6 (Blockchain): Task offloading in mobile blockchains
Topic 7 (Blockchain): Distributed oralce networks truth discovery
Topic 8 (Blockchain): Intergration of Federated learning and Blockchain for data sharing
Topic 9 (CPS): Anomaly Detection in Industrial Systems
Topic 10 (CPS): Industrial Honeypot
Topic 11 (CPS): Air - Ground communication
Topic 12 (CPS): IoT security
Topic 13 (CPS): Identity of Things
Topic 14 (CPS): Cyber-Physical Anomaly Detection
Topic 15 (CPS): Advanced security on Industrial Control System
Topic 16 (CPS): Private Information Retrieval (PIR) for healthcare
Topic 17 (CPS): Privacy for Vehicular Networks - Ride-Hailing Service
Topic 18 (CPS): Privacy for Vehicular Networks - Traffic Monitoring
Topic 19 (CPS): Privacy for Vehicular Networks - Smart Parking
Topic 20 (CPS): Vehicular Security - Automotive Keyless Entry
Topic 21 (CPS): Vehicular Security - Charging-While-Driving
Topic 22 (CPS): Vehicular Security - CAN Security
Topic 23 (CPS): Privacy protection of Electric Vehicles Owners
Topic 24 (CPS): Machine learning techniques for lightweight continuous authentication
Topic 25 (CPS): Vehicular Security - CAN Attacks to error handling
Topic 26 (CPS): Physical side-channel attacks in mobile charging
Topic 27 (CPS): Hyperloop: a cybersecuirty challenge
Topic 28 (CPS): Maritime Security
Topic 29 (ICN): Cache Privacy Attacks
Topic 30 (ICN): Content Popularity Prediction
Topic 31 (ICN): Interest Flooding Attacks
Topic 32 (ICN): Coexistence of TCP/IP and ICN/NDN
Topic 33 (Malware Detection): Malware Analysis and Detection Methods
Topic 34 (Malware Detection): Ransomware Detection using Deception Models
Topic 35 (Malware Detection): Adversarial Machine Learning on Malaware
Topic 36 (Malware Detection): PDF Malware Detection
Topic 37 (MLS): Behavioural Biometrics
Topic 38 (MLS): Deauthentication
Topic 39 (MLS): Security of Machine Learning Implementations
Topic 40 (MLS): Hate Speech Detection on Online Platforms
Topic 41 (MLS): The role of generative models in Cybersecurity
Topic 42 (MLS): Continuous Authentication
Topic 43 (MLS): Evaluation of Adversarial Attacks on Privacy Preserving Machine Learning Models
Topic 44 (MLS): Adversarial Machine Learning: Evasion Attacks
Topic 45 (MLS): GANs for Attack Sample Generation
Topic 46 (MLS): Machine Learning in Intrusion Detection Systems
Topic 47 (Social Networks): Fake Account Detection on Instagram
Topic 48 (Social Networks): Social Network Analysis
Topic 49 (Social Networks): Fake Engagement on Instagram
Topic 50 (Social Networks): Private data inference from Social Networks
Topic 51 (Software Security): Understand humans approach to Reverse Engineering
Topic 52 (Software Security): Find and exploit vulnerabilities
Topic 53 (Software Security): Fuzzing
Topic 54 (5G Security): 5G new radio Handover Security
Topic 55 (5G Security): Open Radio Access Network
Topic 56 (5G Security): Physical layer authentication
Topic 57 (5G Security): Smart Jamming attacks
Topic 58 (MISC): Video forensics
Topic 59 (MISC): Security in Logic-Locking (Logic-Obfuscation)
Topic 60 (MISC): Secure key generation in PUF-based Logic-Locking
Topic 61 (MISC): Misuses in Wearable Devices
Topic 62 (MISC): Cyber-Threat Intelligence
Topic 63 (MISC): Lie Detection
Topic 64 (MISC): Security and Privacy in Online Video Games
Topic 65 (MISC): Securing microservices architectures during SDLC
Topic 66 (MISC): Detecting Wireless Sensors
Topic 67 (MISC): Textual Captchas
Topic 68 (MISC): Covert channel for security and privacy
Topic 69 (MISC): PIN and Password security
Topic 70 (MISC): Security and privacy of keyboard
Topic 71 (MISC): Adversarial attacks on text classification models
Topic 72 (MISC): Document Anonymization
Topic 73 (MISC): Metaverse Security
Topic 74 (MISC): Side-Channel Attacks in PaaS Clouds



Topic 1 (Android): Android Virtualization Technique
Primary:
Secondary:

Topic 2 (Android): Security and Privacy Vulnerabilities Detection in Android Apps
Primary:
Secondary:

Topic 3 (Android): Taint Analysis
Primary:
Secondary:

Topic 4 (Blockchain): Distributed key management systems in blockchains
Primary:
Secondary:

Topic 5 (Blockchain): Isogeny-based crytography for PKI in blockchains
Primary:
Secondary:

Topic 6 (Blockchain): Task offloading in mobile blockchains
Primary:
Secondary:

Topic 7 (Blockchain): Distributed oralce networks truth discovery
Primary:
Secondary:

Topic 8 (Blockchain): Intergration of Federated learning and Blockchain for data sharing
Primary:
Secondary:

Topic 9 (CPS): Anomaly Detection in Industrial Systems
Primary:
Secondary:

Topic 10 (CPS): Industrial Honeypot
Primary:
Secondary:

Topic 11 (CPS): Air - Ground communication
Primary:
Secondary:

Topic 12 (CPS): IoT security
Primary:
Secondary:

Topic 13 (CPS): Identity of Things
Primary:
Secondary:

Topic 14 (CPS): Cyber-Physical Anomaly Detection
Primary:
Secondary:

Topic 15 (CPS): Advanced security on Industrial Control System
Primary:
Secondary:

Topic 16 (CPS): Private Information Retrieval (PIR) for healthcare
Primary:
Secondary:

Topic 17 (CPS): Privacy for Vehicular Networks - Ride-Hailing Service
Primary:
Secondary:

Topic 18 (CPS): Privacy for Vehicular Networks - Traffic Monitoring
Primary:
Secondary:

Topic 19 (CPS): Privacy for Vehicular Networks - Smart Parking
Primary:
Secondary:

Topic 20 (CPS): Vehicular Security - Automotive Keyless Entry
Primary:
Secondary:

Topic 21 (CPS): Vehicular Security - Charging-While-Driving
Primary:
Secondary:

Topic 22 (CPS): Vehicular Security - CAN Security
Primary:
Secondary:

Topic 23 (CPS): Privacy protection of Electric Vehicles Owners
Primary:
Secondary:

Topic 24 (CPS): Machine learning techniques for lightweight continuous authentication
Primary:
Secondary:

Topic 25 (CPS): Vehicular Security - CAN Attacks to error handling
Primary:
Secondary:

Topic 26 (CPS): Physical side-channel attacks in mobile charging
Primary:
Secondary:

Topic 27 (CPS): Hyperloop: a cybersecuirty challenge
Primary:
Secondary:

Topic 28 (CPS): Maritime Security
Primary:
Secondary:

Topic 29 (ICN): Cache Privacy Attacks
Primary:
Secondary:

Topic 30 (ICN): Content Popularity Prediction
Primary:
Secondary:

Topic 31 (ICN): Interest Flooding Attacks
Primary:
Secondary:

Topic 32 (ICN): Coexistence of TCP/IP and ICN/NDN
Primary:
Secondary:

Topic 33 (Malware Detection): Malware Analysis and Detection Methods
Primary:
Secondary:

Topic 34 (Malware Detection): Ransomware Detection using Deception Models
Primary:
Secondary:

Topic 35 (Malware Detection): Adversarial Machine Learning on Malaware
Primary:
Secondary:

Topic 36 (Malware Detection): PDF Malware Detection
Primary:
Secondary:

Topic 37 (MLS): Behavioural Biometrics
Primary:
Secondary:

Topic 38 (MLS): Deauthentication
Primary:
Secondary:

Topic 39 (MLS): Security of Machine Learning Implementations
Primary:
Secondary:

Topic 40 (MLS): Hate Speech Detection on Online Platforms
Primary:
Secondary:

Topic 41 (MLS): The role of generative models in Cybersecurity
Primary:
Secondary:

Topic 42 (MLS): Continuous Authentication
Primary:
Secondary:

Topic 43 (MLS): Evaluation of Adversarial Attacks on Privacy Preserving Machine Learning Models
Primary:
Secondary:

Topic 44 (MLS): Adversarial Machine Learning: Evasion Attacks
Primary:
Secondary:

Topic 45 (MLS): GANs for Attack Sample Generation
Primary:
Secondary:

Topic 46 (MLS): Machine Learning in Intrusion Detection Systems
Primary:
Secondary:

Topic 47 (Social Networks): Fake Account Detection on Instagram
Primary:
Secondary:

Topic 48 (Social Networks): Social Network Analysis
Primary:
Secondary:

Topic 49 (Social Networks): Fake Engagement on Instagram
Primary:
Secondary:

Topic 50 (Social Networks): Private data inference from Social Networks
Primary:
Secondary:

Topic 51 (Software Security): Understand humans approach to Reverse Engineering
Primary:
Secondary:

Topic 52 (Software Security): Find and exploit vulnerabilities
Primary:
Secondary:

Topic 53 (Software Security): Fuzzing
Primary:
Secondary:

Topic 54 (5G Security): 5G new radio Handover Security
Primary:
Secondary:

Topic 55 (5G Security): Open Radio Access Network
Primary:
Secondary:

Topic 56 (5G Security): Physical layer authentication
Primary:
Secondary:

Topic 57 (5G Security): Smart Jamming attacks
Primary:
Secondary:

Topic 58 (MISC): Video forensics
Primary:
Secondary:

Topic 59 (MISC): Security in Logic-Locking (Logic-Obfuscation)
Primary:
Secondary:

Topic 60 (MISC): Secure key generation in PUF-based Logic-Locking
Primary:
Secondary:

Topic 61 (MISC): Misuses in Wearable Devices
Primary:
Secondary:

Topic 62 (MISC): Cyber-Threat Intelligence
Primary:
Secondary:

Topic 63 (MISC): Lie Detection
Primary:
Secondary:

Topic 64 (MISC): Security and Privacy in Online Video Games
Primary:
Secondary:

Topic 65 (MISC): Securing microservices architectures during SDLC
Primary:
Secondary:

Topic 66 (MISC): Detecting Wireless Sensors
Primary:
Secondary:

Topic 67 (MISC): Textual Captchas
Primary:
Secondary:

Topic 68 (MISC): Covert channel for security and privacy
Primary:
Secondary:

Topic 69 (MISC): PIN and Password security
Primary:
Secondary:

Topic 70 (MISC): Security and privacy of keyboard
Primary:
Secondary:

Topic 71 (MISC): Adversarial attacks on text classification models
Primary:
Secondary:

Topic 72 (MISC): Document Anonymization
Primary:
Secondary:

Topic 73 (MISC): Metaverse Security
Primary:
Secondary:

Topic 74 (MISC): Side-Channel Attacks in PaaS Clouds
Primary:
Secondary: