Project Ideas 2010

  • Taken: Information theory for measuring information leaks.
    This project involves using mathematics to model how much security information may leak out of a system. The project will involve a high level of mathematics and learning some information theory.

  • Alice and Bob protocol translator for ProVerif.
    ProVerif is a security tool for checking protocols; unfortunately it has a very difficult syntax. For this project you will design a program that translates protocols in the Alice and Bob protocol notion into ProVerif syntax.

  • Checking traceablity in the applied pi-calculus.
    Traceability attacks let you trace someone's movements without necessarily learning their identity. This Project will involve modeling and analysing known traceability attacks in the applied pi-calculus.

  • Student proposed security project
    If you have very good marks in your course so far, I am happy to supervise any project that you propose yourself, as long as it has some links to computer security.

  • A survey of buffer overflow attacks
    Buffer overflows are the most common kinds of security vulnerability. This project would involve performing a comprehensive survey of how such attacks work and what methods can be used to stop them. It would be suitable for a good undergrad student.

  • Taken: Mobile Phone app. development for Blackberry, iPhone, iPad or Android. If you have a good idea for a mobile app. then I will be happy to supervise its development (you can learn Android and Blackberry development with a basic knowledge of Java, for iPhones and iPads you will need to know C).
  • Other project ideas include:
  • Improving the security of the Android mobile phone OS.
  • Finger printing Tor traffic
  • Taken: Adding simple static security checking to eclipse.
  • Taken: Smart card security.



  • Last modified: Tue May 4 12:20:09 BST 2010