This seminar covers several topics in the area of system security with the focus on platform and communication security aspects of embedded and IoT devices. There will be interdisciplinary topics as well. The students should gain detailed knowledge on the security and privacy aspects of hardware platforms, operating systems, network communication, infrastructures, and end-user applications. Moreover, they should examine current research in this area, learn how to dive into a scientific topic, and present their results in a short paper and an oral presentation.
Procedure
Each student will be given a number of scientific papers related to a specific topic in the area of embedded/IoT security. The student has to summarize, compare, and validate these publications in the form of a seminar work (paper). In addition, we will reserve 1 to 3 days (depending on the number of participants) where each student will present his seminar work in an oral presentation. Both the paper and the final presentation will be in English.
# | Title | Supervisor | Root Paper |
---|---|---|---|
1 | Static Analysis and Formal Verification of OS Kernels | David Gens | link |
2 | Synthesizable Open-Source Hardware Design | Ghada Dessouky | [1] (chapters 3 and 6) [2][3][4] |
3 | Data Mining and Machine Learning in Mobile/Cybersecurity | Ghada Dessouky / Markus Miettinen | [1][2] |
4 | Towards Provably Secure Hardware Design | Ghada Dessouky | [1][2] |
5 | Tools for Verifying Security Properties of Software | David Gens / Ghada Dessouky | link |
6 | State-of-the art in malicious software targeted at IoT devices | Markus Miettinen | link |
7 | Security analysis of Smart City environments: attacks and defences | Markus Miettinen | link |
8 | Intrusion detection and attack mitigation in IoT frameworks | Markus Miettinen | link |
9 | The rise of IoT malware and telnet attacks | Thien Nguyen | [1][2] |
10 | Samsung: “SmartThings is the easy way to turn your home into a smart home”. Or the simple way to make your home insecure! | Thien Nguyen | [1][2][3] |
11 | Stuxnet and Friends: Attacks on Industrial Control Systems | Ferdinand Brasser | link |
12 | (Cache) Side-Channel Attacks on Intel SGX | Ferdinand Brasser | link |
13 | Security features of Real-Time Operating Systems | Raad Bahmani | link |
14 | Survey on DRAM PUFs: Construction and Attacks | Shaza Zeitouni | link |
15 | Survey on Invasive/semi invasive attacks on PUFs | Shaza Zeitouni | link |
16 | Malware analysis based on machine learning | Tigist Abera | link |
17 | Android Platform Security Architecture | Tigist Abera | link |
18 | Automatic Vulnerability Discovery using Fuzzing | Tommaso Frassetto | link |