The development of new digital services is changing our lives and, at the same time, making us more vulnerable to malicious activities. Online services, mobile devices, and ubiquitous computing are all connected to each other and the open communication networks. This exposes them to hackers, cyber criminals, terrorism and even warfare. The topic of this year’ seminar is security solutions that can make everyday services and infrastructure safer and more reliable.
Potential research topics for the seminar include, for example, the security of network infrastructure, cloud computing, mobile applications, ubiquitous computing platforms, and machine-to-machine communication. We invite the students and tutors to think about the new security threats created by our increasing dependence on technology in both work and personal life, as well as about how to increase the security of everyday technologies and protect the privacy of their users.
A sample scenario:
Think of a conference room or a coffee shop where access (credentials)
to the WiFi is controlled so that only valid facility users can use the
WiFi access point.
How it can work:
In our system, there is a physical device which is responsible for sharing credentials.
The physical device (e.g., a device with NFC capability but not limited to) within the facility
securely shares the information (e.g., credentials, SSID etc. for WiFi access) to another
NFC (not limited to NFC technology) enabled device ( e.g., to a mobile phone of an attendee).
When a person enters the area, he/she will touch (e.g., it can be other kind of gesture or
technique) his mobile device with the physical device to receive credentials for WiFi access.
The person may or may not be registered earlier with the system.
Expected output:
The goal of this paper is to identify vulnerabilities and define a threat model for such a system.
An initial starting point can be a threat model of NFC technology. However the paper should focus
on the situational context of a conference room or a Coffee shop.
References: provided after the topic is assigned.
Tutor: Ahmed Abu Shohel
Information centric networking is a new vision for the future internet. There were some discussions on the technology and it was considered to be safer, more secure and more mobile. The studies of these however are always limited and different aspects of the technology are not well understood. While leading scientists in the field, discuss the problems of defining good identifiers (human readable, self-certifying and/or hierarchical). The topic is to understand and conduct study on usage of ICN in everyday environments (at home connecting different devices together, in public place receiving data from the environment, delay-tolerant network communications). The topic is primary focuses mobile usage and security.
References: provided after the topic is assigned
Tutor: Andrey Lukyanenko
TCP is a standard. It is used every day on almost every machine (except some restricted sensors, RFIDS, etc). While it is standard, there are plenty versions of TCP in the wild – each optimized for own environment (e.g. TCP New Reno, Vegas, Cubic, DCTCP). However, now as we have such a big scope of TCP to use, the question is what exactly form of TCP to use, and based on what conditions. Here we assume we use some generic TCP protocol that may adapt to environment conditions in order to form a best version of TCP in the environment. The question here is how this theoretical protocol can be misused in order to achieve higher throughput, or any other benefits. For example we may use more aggressive versions of the protocol in Wireless environment, and receive higher share of the medium to us. (This work can also be done together with some coding if the student is interested).
References: provided after the topic is assigned
Tutor: Andrey Lukyanenko
There are a few forms of reputations for P2P infrastructure exists. One of them is very famous EigenTrust algorithm. This however provides a global unique reputation, which does not make any sense for individuals in P2P system. For example in network can come 2 nodes and locally give high reputation to each another (Sybil attack) while they do not have high reputation for any other node. This mutual increase in local reputation will increase their global reputation in EigenTrust mechanism, and thus breaks the whole idea of reputation. During this summer we developed a local reputation mechanism with globalizing view which provides for each peer in network unique reputation for any other node, however those are local, meaning that two different peers may easily have different reputation of common third peer. The task here depends on the student skills and will to study. It is either literature survey, where the student has to take a look on different reputation systems (EigenTrust, web-of-trust, etc) and find similar mechanism to ours and try to understand security aspects of those studies. Or if the student is willing to program, then the student should take our code in C++ written on OmNet++) and simulate Sybil attacks (or any other attack) and test/modify the suggested solution.
References: provided after the topic is assigned
Tutor: Andrey Lukyanenko
Google's business model is collecting internet users' usage information (e.g., through search behaviors and web usage behaviors) in order to grasp their preference, habits, willingness, etc., thus it can provide suitable advertisements. By losing somehow their private information (e.g., disclosing "what I want to find"), the users gain free Google services.
In addition, when an internet user interacts/access internet (e.g., social networking, VoIP, Blogging, instant messaging), his/her activities or personal information can be automatically collected by the third party, how to enhance the future internet user' privacy as his/her preference is an interesting topic worth our study.
I hope the candidate can discuss the privacy issue of future internet, how serious it is, how do users think about it (especially the Google and Facebook's business model). What kind of solution could be needed and expected by future internet users. What are innovated ideas related to this?
References: provided after the topic is assigned
Tutor: Yan Zheng
Cloud computing offers a new way of IT services by re-arranging various resources (e.g., storage, computing and services) and providing them to users based on their demand. Cloud computing provide a big resource pool by linking network resources together. It has desirable properties, such as scalability, elasticity, fault-tolerance, and pay-per-use. Thus, it becomes a promising service platform, rearranging the structure of Information Technology (IT). Meanwhile, with the rapid growth of mobile communications networking, and computing, as well as wide usage of mobile devices, cloud computing is moved to mobile domain. People nowadays use their mobile devices to perform various activities. Cloud computing provides a most rational way for mobile devices to access services and resources. The same as the Internet based cloud computing, one important issue in mobile cloud computing is trust, security and privacy. For example, personal data should be securely accessed at the data center of the cloud service provider (CSP). Personal access of some data should not be tracked by unauthorized users. Furthermore, whether it is reasonable to provide cloud services in a pervasive manner in mobile domain? What is the concern and challenges with regard to trust management in mobile cloud computing, focusing on security assurance, privacy preservation and trust establishment.
I hope the candidate studies the background and principle of MCC, characteristics, recent research work, and future research trends, then analyses the features and infrastructure of mobile cloud computing. It is expected that the candidate analyses the challenges of mobile cloud computing with regard to trust management, summary of some research projects related to this area, and points out promising future research directions.
References: provided after the topic is assigned
Tutor: Yan Zheng
Internet of Things is uniquely identifiable objects (things) and their virtual representations in an Internet-like structure. Equipping all objects in the world with minuscule identifying devices could be transformative of daily life. The smart objects in IoT are most likely human-carried or human-operated devices. The Internet of Things (IoT) integrates a large amount of everyday life devices from heterogeneous network environments, bringing a great challenge into security and reliability management. I hope the candidate studies the trust, security and privacy issue of IoT, the current research status in this area, and points out promising future research trends.
References: provided after the topic is assigned
Tutor: Yan Zheng
Many computer –based devices have nowadays good level of protection on the network (IP) interfaces. For example home-based devices such as PC computers, set-top boxes for TV viewing, ADSL modems, digi boxes etc., as well as public infrastructure components, such as web servers, WLAN APs etc. typically have a properly protected IP interface with firewalls and encryption. However, the devices might have some physical weaknesses, such as local serial cable connection, which could be used for bypassing logical protection. ATM machines, public ticketing machines etc. that are exposed to the public typically have heavy set of physical protection applied – in addition to guarding surveillance cameras and other external protection. Devices at home, however, are fully exposed to persistent hackers – who have unlimited time and depending on motivation varying resources to hack the device.
The goal of this assignment is to survey typical physical security weaknesses and related hacking techniques in home devices, as well as consider countermeasures for these.
References: provided after the topic is assigned
Tutor: Juha Sääskilahti
Quantum computation has been touted as the holy grail for security as it comes with a promise to replace traditional cryptography [1]. For this reason, it might replace VPNs [2] or be used to improve privacy in cloud networking [3,4,5] that is troubled by multi-tenancy issues.
In this topic, the student learns how quantum cryptography works in practice [6] at least superficially. The main goal of this work is to separate the realistic networking-related applications from the hype [7,8,9] instead of deep analysis of the underlying physics [10]. The students surveys also other references and writes a high-level overview of the present state and especially applications of quantum computation and cryptography.
References:
Tutor: Miika Komu
High-speed proximity radios are constantly evolving - NFC [1] is an established technology for pairing, bootstrapping and (with NFC smart cards - payment). Similar radios are emerging [2] that enable several decades of improvement for the speed of the radio communication between a Reader/Mobile phone/PC and a passive tag or another active device.
Based on internal user studies, one of the more promising use cases of these radio technologies going forward is one where a payment - like transaction is combined with a rights-protected data transaction. E.g. when you board a bus and pay with your bus card (or mobile phone), you may have the option to receive rights-protected data - say an afternoon tabloid e.g. for consumption during the bus ride.
The assignment targets this use case but can take many forms. The student may explore security protocols that combine payment/ticketing-like transactions with DRM to enable business models like discounts (if both services are consumed in parallel). Another alternative is to design DRM systems that could be applicable to a passive wireless tag with access control but limited computation capabilites. A third could be a system design around this use case - possibly replacing the high-speed proximity transfer with a localized WLAN service constrained to the moving vehicle (as the high-speed radios are not yet readily available).
References:
Tutor: Jan-Erik Ekberg
In order for smart cards and security devices to be used for services with high risk - like smart cards used as credit cards, network routers used in military installations or mobile phones used in government networks there typically is a requirement by the receiving business entity for third-party certification. The traditional setting for this is Common Criteria certification (Europe) and NIST accreditation for U.S. government use. These system validate a device consisting of hardware and software against a (security) profile to a certain "level of assurance", e.g. smart cards are typically certified to CC EAL 4+. The level accounts for the depth of testing and process validation deployed. Certification is as a rule carried out by independent third-party laboratories at a cost to the certifier. Higher levels of certification typically also require process validation, i.e. the certification work must be conducted in parallel with the development work.
Common criticism against the current certification process is that it is costly, slow and does not apply well to updates during the lifecycle of the device - e.g. a software patch might even require a completely new certification round. All of these properties are starkly in conflict with "the internet way of thinking" i.e. release early - release often".
As a response to this, The National Technical Authority for Information Assurance - i.e. the British authority responsible for nationial information security has introduced a completely new assurance scheme, the Commercial Product Assurance (CPA).
The student assigment is to review well-established compliance methodologies, public evidence about their success in the marketplace and e.g. trends of usage / deployment, and from this background especially evaluate the relative strengths of the new CPA process.
References:
Tutor: Jan-Erik Ekberg
Traditionally, individuals who sells handfull of goods ocasionally accepts cash or cheques in exchanges of the goods they sell. For example, Sunday market sellers, food sellers during restaurant days. Today, cash and cheques are disappearing from major cities around the world and the use of electronic payment system such as Debit card and Credit cards are becoming popular. The point-of-sales terminals used to accept these debit / credit cards requires a dedicated card reader hardwares and these devices comes at a price. Also, these terminals requires subscription fees and service charges for its use. Therefore, POS terminals are not an attractive solution for occasional sellers.
Now with the ubiquitously available wireless Internet and Internet-enabled person devices such as mobile phones, new methods of mobile based payments systems are emerging. For example, square service provides a small magnetic card reader that can be attached to a smart phone and use the phone as a POS terminal that accepts payments from magnetic cards [1]. Similarly Paypal is bringing mobile payment solutions [2]. The goal of this work is to survey different mobile based payment solutions and study the possibility of using mobile phone as POS terminals which could be easy to use and cost effective.
References:
Tutor: Sandeep Tamrakar
The concept of mobile phone based payment and mobile wallet is not new. However, the widespread integration of Near Field Communication (NFC) on a mobile phone has once again brought the concept into the highlight. Different companies are proposing their own solutions to this concept. For example Google wallet: In short, the second version of the Google Wallet allows user to store different types of payment card information on the cloud which can be then linked to a virtual card ID stored on the embedded secure element on the mobile phone for the NFC payment [1]. Similarly, Nokia has completed trials on NFC phone based public transport ticketing system in Long Island Railway Road New York [2]. Also HTC has announced NFC and microSD card based mobile banking [3].
The goal of this work is to study different mobile wallet system that are being trialed, identify and understand the important issues such as key constrains, maturity of the systems, user acceptance, interoperability, standardization and the future of the mobile wallet.
References:
Tutor: Sandeep Tamrakar
In the last few years, the explosive growth in the number of mobile devices, including smartphones and tablets, has been followed by a tremendous increase in the number of mobile applications. Most of current systems adopts a marketplace model for the delivery of applications to mobile devices. They include Apple's App Store, Google Play, and Windows Phone Marketplace. Each solution offers some security features to protect users from malicious applications. However, this has not prevented malware to spread on mobile devices with a very high rate.
The student involved in this topic is expected to: learn the basic security mechanisms provided by the major mobile device platforms; review the approaches for mobile application security from a marketplace perspective; characterize the pitfalls of current systems and propose solutions to improve their security.
References:
Tutor: Mario Di Francesco
Online social networks (OSNs) have recently become extremely popular. As a consequence, several web applications are exploiting social features made available by OSNs. Among those features, delegated authorization is the most widely used, wherein a third-party website exploits OSN user credentials to provide its own services. Currently, most of OSNs use OAuth for authorization purposes. However, delegated authorization poses some risks to security and privacy. Specifically, the original version (1.0) of OAuth had a security flaw, and there is still ongoing debate about the security of the most recent (2.0) version of the specifications.
The student involved in this topic is expected to: learn about authentication and authorization mechanisms used by OSNs; understand the security features of the OAuth specifications; review the weaknesses of the OAuth delegate authorization mechanism and propose solutions to overcome them.
References:
Tutor: Mario Di Francesco
Summary:
HTML5 is a new set of standards that brings exciting new features to
web programming. Also mobile browsers will support HTML5 and this will
bring new opportunities for innovations. For example, HTML5 supports
multimedia (audio and video) without 3rd party plug-ins, data storage
to browser in offline-mode, networking features enabling push and
efficient data transfer capabilities.
Research target:
HTML5 security is a huge research area. You should select a subtopic
that is relevant in the mobile space. For example, you may research
Push-technologies, Web Socket, data storage or Device APIs in security
wise. Review the existing literature, summarize the challenges and
highlight the main concerns and possible solutions.
References:
Tutor: Yrjö Raivio
One of the key new features in HTML5 is the Web Sockets protocol. In comparison to the current http requests, We Sockets enables bidirectional real-time communication between a web client and server, or any two nodes. For example, it can be used for streaming and asynchronous messaging to a web client. One exciting possibility is direct communication between clients. The goal of this seminar project is to understand the security policies and authentication and confidentiality mechanisms related to web sockets.
References:
Tutor: Jukka K. Nurminen
Security of web browsers and applications is traditionally based on session identifiers and the same-origin policy. Attackers have found ways around these protection measures, for example the CSRF and XSS attacks, and additional security features have consequently been implemented in the web browsers. Confusion has also arisen from subtle differences between the ways in which the protection mechanisms are implemented in different browsers and web application frameworks. HTML5 promises to standardize many of the advanced HTML features so that it is easier to build rich, interoperable web applications. But what about the security model; has it been standardized? The goal of this seminar project is to write an up-to-date overview of the web browser and application security at the time of HTML5.
References:
Tutor: Jukka K. Nurminen / Tuomas Aura
Recently the environmental impact of ICT sector has received a lot of attention. It is estimated that the environmental footprint of the whole ICT sector is at the same level as the airline industry. This is both an environmental concern and a major cost for many players in the ICT sector that spend a lot of electricity. Another new trend is that electricity pricing will be increasingly dynamic. In this way it might be possible to create major savings by delaying activities to time points when cheap and plentiful energy is available. In this task the goal is to understand the electricity consumption of the security solutions. How much of an average PC power is spent on antivirus, firewall and other similar software? How much a typical enterprise with dedicated boxes for firewalls, intrusion detection, etc. is spending? On the other hand it could also be studied how much electricity could be saved by a proper timing of the activities. Which security tasks can be delayed without major harm? In addition to performing a literature review, a simple calculation could be done to derive a rough estimate of electricity consumption of security solutions in some sample environment.
References:
Tutor: Jukka K. Nurminen
Bitcoin is an anonymous electronic currency that is independent of national banks and, in fact, has no single issuer. Instead, its security is based on distributed bookkeeping in a P2P network. A limited number of coins is issued over time as rewards for solving brute-force computing puzzles. The current size of the Bitcoint economy is in tens or hundreds of thousands dollars, and coins can be exchanged for other currencies.
Bitcoin topic A: The goal of this seminar project is to provide a technical introduction to Bitcoin and to its technical design principles and weaknesses.
Bitcoin topic B: The goal of this seminar project is to perform a high-level analysis of the economic and social aspects of Bitcoin. The analysis will require understanding of the technology but should be kept as independent of the technical implementation of Bitcoin as possible.
References:
Tutor: Tuomas Aura / Miika Komu
Connecting billions of sensors and actuators to the Internet is an exciting prospect which would make many new applications possible but first has to overcome several challenges. One of them is finding suitable security and privacy mechanisms whose computational and energy consumption requirements are not excessive for IoT devices -- not all IoT devices will be able to run full-fledged, standard cryptographic protocols that are widely used today. The goal of this topic is to survey the problem area and currently proposed solutions. An advanced and motivated student could also try to develop new techniques or adapt existing ones.
Pre-requisites: the student must have taken a basic course in cryptography and data security; familiarity with cryptographic algorithms and protocols.
References: provided after the topic is assigned.
Tutor: N. Asokan
Social networks thrive on user-generated content and applications. Mobile device platforms are designed to encourage ordinary users to become "developers". While this triggers creativity and expands end user choice, it comes with the problem of how to enable ordinary users to detect and prevent running into inappropriate content/applications. There have been two ways to address this issue: one is to have centralized screening by experts and the other is to rely on crowd-sourcing, which is also, in effect centralized. In some cases, like deciding what is potentially "offensive", centralized vetting is not the best choice. A middle-ground is to investigate "clique-sourcing": i.e., gathering and accumulating feedback about an object from a user's own social graph (rather than from the entire social network). The goal of this topic is to quickly survey current proposals and to complete the implementation of a Facebook application that would let Facebook users to learn what their social network has to say about an app or any other piece of content before trying to use them.
Pre-requisites:the student must be familiar with and eager to do software development (Facebook app, backend server); familiarity with basic concepts of security and interest in data analytics would be useful.
References: provided after the topic is assigned.
Tutor: N. Asokan
Botnets are currently the main source of spam, DDoS attacks and other malicious activity. There are (at least) hundreds of botnets with varying number of bots, with largest botnets having hundreds of thousand or millions of bots. Still, gaining information about real-life botnets is difficult, as they typically seek to avoid detection.
The partial purpose of this topic is to survey the current global botnet situation, form a view of the botnet capabilities and methods/expenses of gaining access to botnet capabilities. In addition to analysing the end-user point of view to botnets the topic also looks into means of defeating botnets. For this purpose the takedown mechanisms and the surrounding legal issues need to be covered. Perhaps a generalized mechanism for botnet detection and takedown can be derived from the analysis.
References: provided after the topic is assigned.
Tutor: Aapo Kalliola
While huge amounts of data travel through the internet every second our understanding of the topology of the internet is quite limited and not always up to date.
The purpose of this topic is to analyse existing research concerning the structure of the internet and available network topology datasets. A successful analysis could result in an understanding of what blind spots our current understanding may still contain, and observe the skewing limitations of available datasets.
In addition the security implications of increased interconnectivity have not been exhaustively discussed. New routing attack problems may have risen while the increased redundancy should improve the network.
References: provided after the topic is assigned.
Tutor: Aapo Kalliola
Strong authentication can be integrated to mobile devices. In the seminar work you should outline few mobile authentication solutions and describe and evaluate what kinds of new threat scenarios emerge when authentication is integrated in the mobile device where the service requiring authentication is running on. You can assume that the strong authentication is used mainly for banking services.
References: provided after the topic is assigned.
Tutor: Matias Seppovaara
Will be provided after the topic is assigned.
References: provided after the topic is assigned.
Tutor: Andrei Gurtov
Will be provided after the topic is assigned.
References: provided after the topic is assigned.
Tutor: Andrei Gurtov