Term Project List
-
Upload
saket-verma -
Category
Documents
-
view
213 -
download
0
Transcript of Term Project List
-
8/4/2019 Term Project List
1/3
CS549 Computer and Network Security
Class Project
The class project is a 10 to 15-page research paper. The paper should be in postscript or pdf orhtml along with presentation slides. The paper should examine issues or technologies in
computer or network security. Typically, your report might be organized as follows:
1. Abstract
2. Introduction -- background information, literature search, scope and limitations of
project
3. Body-- methods used
4. Analysis and conclusions
5. Recommendations -- future work, unsolved problems
6. References -- journals, WWW references
The paper will be graded on quality of research, quality of presentation, and strength of
references. Original research counts more than a critical review which counts more than a mere
survey paper. Actually implementing and testing things counts more than reporting on someone
else's experiments/results.
A list of possible topics follows, but you may suggest your own. A good topic would be one where
you could contrast various solutions to a common problem. It is possible to propose an
implementation project, and a few are listed below, but a 5 to 10 page paper is still required along
with your software/hardware deliverable, and you must schedule a demo (out of class). It is
expected that students will workin groups of 2 or alone on their project. The instructor must
approve your topic.
Project milestones
Submit project title: 23rd Jan 2007
Project due: 20th March 2007
Possible projects
trust analysis: PGP web of trust vs. trust hierarchy
techniques for generating crypto random numbers and survey of what various crypto
packages use to generate random numbers
-
8/4/2019 Term Project List
2/3
vulnerabilities of Java, javascript, ActiveX, CGI
techniques/algorithms for hi-speed crypto (parallel)
Public-key for authentication: ssh, globus, kerberos, safetp
IPsec key mgt: photuris, skip, isakmp, skeme, IKE
key distribution for multicast sessions
wireless security (wap's wtls), 802.11 WEP, mobile IP
cell phone security (gsm, cdpd, ...)
win2000 security (kerberos, efs, pki)
compare firewall products
authorization models (capabilities, ACLs)
contrast various tests for primality
compare secure file transfers (scp, sftp, ?)
security in distributed computing (DCE, DCOM, CORBA, RMI)
crypto API's (GSS, CAPI, Java JCE, others ?)
web based electronic voting
setup secure Apache web server and certificates
SEC: SSH like client
A Secure Media Distribution Framework
Blinded Distributed Computing
Security of Wireless Networks and Mobile Devices
User Authentication in Cryptographic File Systems Cookie authentication
Threshold Signatures and Open Source
Security and Privacy Issues of Microsoft Passport
Payment via GSM Mobile phones
Digital Multimedia Copyright Protection
Security Analysis of Electronic Postage Systems
Security of Network Attached Storage
Copyright Protection Mechanisms in DVD + DIVx
Cryp: An All-or-Nothing Encryption Scheme for Secure Multi-user Information
Distribution
Cartemis: Secure Electronic Wallet Technology
A Study of SSH
Secure Mobile Code Framework
Quantum Cryptography and Key Distribution
-
8/4/2019 Term Project List
3/3
Security Evaluation of the OpenBSD Operating System
A Study Of Smart Card And Its Security Features
Authentication Methods for Wireless Electronic Micropayments.
Digital Certificate Vulnerabilities
Security Evaluation of the Linux Operating System
Evaluating the Security of Windows XP
Router security and traffic modification
Code Obfuscation for prevention of malicious reverse engineering attacks.
Security analysis of Palm OS
Vulnerabilities in web browsers (Internet Explorer, Netscape Navigators etc).
SSL Security Weakness.
DSL and Cable Modems: The dangers of having a static IP address.
Vulnerabilities of e-mail services.
Mobile Agent Security.
A study of security problems associated with the telephone network
Modulo Multiplication: A Hardware Design.
Cryptography & Security Issues in JAVA CARD.
Message Authentication Schemes for Secure Multicasting.
Testing True Random Number Generators
Detection of Computer Viruses using Hidden Markov Model
Security issues in the satellite communications.
Report on commercial Certification Authorities.
Survey of stream ciphers
Attacks against stream ciphers.
Differential cryptanalysis
Linear cryptanalysis.
Security for Web Applications/Portals
DDoS Attacks and prevention
Bluetooth Security & Its Flaws
Resource: http://www.cs.auckland.ac.nz/~pgut001/links.html
Send your response to :[email protected]
mailto:[email protected]:[email protected]