Project Ideas 2010
Taken: Information theory for measuring information leaks.
This project involves using mathematics to model how much security information may leak out of a system. The project will involve a high level of mathematics and learning some information theory.
Alice and Bob protocol translator for ProVerif.
ProVerif is a security tool for checking protocols; unfortunately it has a very difficult syntax. For this project you will design a program that translates protocols in the Alice and Bob protocol notion into ProVerif syntax.
Checking traceablity in the applied pi-calculus.
Traceability attacks let you trace someone's movements without necessarily learning their identity. This Project will involve modeling and analysing known traceability attacks in the applied pi-calculus.
Student proposed security project
If you have very good marks in your course so far, I am happy to supervise any project that you propose yourself, as long as it has some links to computer security.
A survey of buffer overflow attacks
Buffer overflows are the most common kinds of security vulnerability. This project would involve performing a comprehensive survey of how such attacks work and what methods can be used to stop them. It would be suitable for a good undergrad student.
Taken: Mobile Phone app. development for Blackberry, iPhone, iPad or Android.
If you have a good idea for a mobile app. then I will be happy to supervise its development (you can learn Android and Blackberry development with a basic knowledge of Java, for iPhones and iPads you will need to know C).
Other project ideas include:
Improving the security of the Android mobile phone OS.
Finger printing Tor traffic
Taken: Adding simple static security checking to eclipse.
Taken: Smart card security.
Last modified: Tue May 4 12:20:09 BST 2010