Description of course project

The course project will allow the student to do some independent study in the area of computer security. The list of possible project topics, together with up 2-3 starting references is below. Please feel free to add papers to this list with my approval.

Each project team will consist of 2 students. Students are responsible for finding their project partner, selecting TWO project topics (indicate first choice and second choice), and then sending both (group and topic) to me before Nov 8 (by e-mail). The final allocation of project topics will be done on the 'first-come-first-served' basis. If there is a lot of interest I may break up a topic into more specialized subtopics and assign them to groups.

The project work will be assessed through:

The project assessment will be based on the following criteria:

Presentation times (that I have received so far):

List of projects

  1. Internet Worms - Maria A. M, and Angela G.
  2. Virtual Private Networks - Moksh K, Shamas C.
  3. Honeypots and Honeynets
  4. Botnets - Aimen K., Paul K.
  5. Application level attacks: DNS Spoofing/Poisoning
  6. Application level attacks: Session Hijacking- Heba I. AND Ankit A.
  7. Smart Cards Technology (Security and Attacks) - Alex N., Boze Z.
  8. Security: Authentication Tokensa - Frank W., Ivan D.
  9. Spyware
  10. Octave Risk Management framework
  11. Steganography - Osman A., Rehema M, Nivedita M.
  12. SQL Injection - Amir S.
  13. Cloud Computing Security