Term Project List

download Term Project List

of 3

Transcript of Term Project List

  • 8/4/2019 Term Project List

    1/3

    CS549 Computer and Network Security

    Class Project

    The class project is a 10 to 15-page research paper. The paper should be in postscript or pdf orhtml along with presentation slides. The paper should examine issues or technologies in

    computer or network security. Typically, your report might be organized as follows:

    1. Abstract

    2. Introduction -- background information, literature search, scope and limitations of

    project

    3. Body-- methods used

    4. Analysis and conclusions

    5. Recommendations -- future work, unsolved problems

    6. References -- journals, WWW references

    The paper will be graded on quality of research, quality of presentation, and strength of

    references. Original research counts more than a critical review which counts more than a mere

    survey paper. Actually implementing and testing things counts more than reporting on someone

    else's experiments/results.

    A list of possible topics follows, but you may suggest your own. A good topic would be one where

    you could contrast various solutions to a common problem. It is possible to propose an

    implementation project, and a few are listed below, but a 5 to 10 page paper is still required along

    with your software/hardware deliverable, and you must schedule a demo (out of class). It is

    expected that students will workin groups of 2 or alone on their project. The instructor must

    approve your topic.

    Project milestones

    Submit project title: 23rd Jan 2007

    Project due: 20th March 2007

    Possible projects

    trust analysis: PGP web of trust vs. trust hierarchy

    techniques for generating crypto random numbers and survey of what various crypto

    packages use to generate random numbers

  • 8/4/2019 Term Project List

    2/3

    vulnerabilities of Java, javascript, ActiveX, CGI

    techniques/algorithms for hi-speed crypto (parallel)

    Public-key for authentication: ssh, globus, kerberos, safetp

    IPsec key mgt: photuris, skip, isakmp, skeme, IKE

    key distribution for multicast sessions

    wireless security (wap's wtls), 802.11 WEP, mobile IP

    cell phone security (gsm, cdpd, ...)

    win2000 security (kerberos, efs, pki)

    compare firewall products

    authorization models (capabilities, ACLs)

    contrast various tests for primality

    compare secure file transfers (scp, sftp, ?)

    security in distributed computing (DCE, DCOM, CORBA, RMI)

    crypto API's (GSS, CAPI, Java JCE, others ?)

    web based electronic voting

    setup secure Apache web server and certificates

    SEC: SSH like client

    A Secure Media Distribution Framework

    Blinded Distributed Computing

    Security of Wireless Networks and Mobile Devices

    User Authentication in Cryptographic File Systems Cookie authentication

    Threshold Signatures and Open Source

    Security and Privacy Issues of Microsoft Passport

    Payment via GSM Mobile phones

    Digital Multimedia Copyright Protection

    Security Analysis of Electronic Postage Systems

    Security of Network Attached Storage

    Copyright Protection Mechanisms in DVD + DIVx

    Cryp: An All-or-Nothing Encryption Scheme for Secure Multi-user Information

    Distribution

    Cartemis: Secure Electronic Wallet Technology

    A Study of SSH

    Secure Mobile Code Framework

    Quantum Cryptography and Key Distribution

  • 8/4/2019 Term Project List

    3/3

    Security Evaluation of the OpenBSD Operating System

    A Study Of Smart Card And Its Security Features

    Authentication Methods for Wireless Electronic Micropayments.

    Digital Certificate Vulnerabilities

    Security Evaluation of the Linux Operating System

    Evaluating the Security of Windows XP

    Router security and traffic modification

    Code Obfuscation for prevention of malicious reverse engineering attacks.

    Security analysis of Palm OS

    Vulnerabilities in web browsers (Internet Explorer, Netscape Navigators etc).

    SSL Security Weakness.

    DSL and Cable Modems: The dangers of having a static IP address.

    Vulnerabilities of e-mail services.

    Mobile Agent Security.

    A study of security problems associated with the telephone network

    Modulo Multiplication: A Hardware Design.

    Cryptography & Security Issues in JAVA CARD.

    Message Authentication Schemes for Secure Multicasting.

    Testing True Random Number Generators

    Detection of Computer Viruses using Hidden Markov Model

    Security issues in the satellite communications.

    Report on commercial Certification Authorities.

    Survey of stream ciphers

    Attacks against stream ciphers.

    Differential cryptanalysis

    Linear cryptanalysis.

    Security for Web Applications/Portals

    DDoS Attacks and prevention

    Bluetooth Security & Its Flaws

    Resource: http://www.cs.auckland.ac.nz/~pgut001/links.html

    Send your response to :[email protected]

    mailto:[email protected]:[email protected]