Description of course project
The course project will allow the student to do some independent study in the area of computer security. The list of possible project topics, together with up 2-3 starting references is below. Please feel free to add papers to this list with my approval.
Each project team will consist of 2 students. Students are responsible for
finding their project partner, selecting TWO project topics (indicate first choice and second choice), and then sending both (group and topic) to me before Nov 8 (by e-mail). The final allocation of project topics will be done on the 'first-come-first-served' basis. If there is a lot of interest I may break up a topic into more specialized subtopics and assign them to groups.
The project work will be assessed through:
- 8-page long written report submitted no later than December 7 (single spacing, 11 point font size),
- 15-min oral presentation on date TBA.
The project assessment will be based on the following criteria:
- written report : content (coverage, depth of understanding reflected) - 5%
- written report : quality of writing (structure, syntax, proper citations, reference section, etc.) - 5%
- oral presentation (clarity and general understanding) - 5%
Presentation times (that I have received so far):
-
Maria and Angela: Mon Dec 19, 1 pm.
-
Osman, Rehema, Nivedita Dec 19, 6 pm.
-
Heba and Ankit : Mon Dec 19, 7 pm.
-
Paul, Aimen : Sun Dec 18, 3 pm.
-
Amir : Mon Dec 19, 7:30 pm.
-
Mokhsh and Shamas: Dec 21, noon
-
Alex and Boze Dec 21 12:30.
-
Ivan, Frank, Dec 21 1 pm.
-
Yong Wang, Dec 21, 1:30 pm.
List of projects
- Internet Worms - Maria A. M, and Angela G.
- Virtual Private Networks - Moksh K, Shamas C.
- Honeypots and Honeynets
- Botnets - Aimen K., Paul K.
- Application level attacks: DNS Spoofing/Poisoning
- Application level attacks: Session Hijacking- Heba I. AND Ankit A.
- Smart Cards Technology (Security and Attacks) - Alex N., Boze Z.
- Security: Authentication Tokensa - Frank W., Ivan D.
- Spyware
- Octave Risk Management framework
- Steganography - Osman A., Rehema M, Nivedita M.
- SQL Injection - Amir S.
- Cloud Computing Security