Nettsider med emneord «security»

Publisert 14. apr. 2015 12:54

Dat Tien Le is a PhD student in the ConSeRNS group under the supervision of Audun Jøsang, Einar Broch Johnsen, and Frank Eliassen.

In this talk, we will about the concept of design patterns but applied to security problems. Just think of how popular the concept of design pattern has become, i.e., look at the classic GOF book that won the Dahl-Nygaard prize. Now we see this applied to security problems. (See Abstrat in the long description.)

Publisert 13. nov. 2017 12:10

Compiler security is an important field. This thesis wants to do groundwork to reproduce a known technique known as{Diverse Double-Compiling (DDC) in an new environment. Potentially with a secondary focus on writing a compiler for a mainstream language.


Publisert 16. feb. 2018 14:40

Evaluation of added energy requirements for network security protocols (e.g. TLS).

Publisert 10. mars 2011 08:02
Publisert 7. okt. 2020 14:36

The task is to design and implement a radmomization concept for Rust compilation

Publisert 14. okt. 2020 15:40

The task is to dependently typed programming for certification (especially in the area of security)

Publisert 7. sep. 2016 21:40

This project aims at developing models and tools for automated or semi-automated classification and discovery of cyberthreats based on ontologies and semantic reasoning.

Image may contain: text, font.
Publisert 26. aug. 2019 07:13

The paper "Language-based mechanisms for Security-by-Design'' by Shukun Tokas, Olaf Owe, and Toktam Ramenzanifarkhani got the award for the "Best Paper" of the IFIP IFIP Summer School on Privacy and Identity Management.


Publisert 22. okt. 2021 08:19
Publisert 19. aug. 2018 13:07

This projects involves a cases study and analysis of human users of a security ceremony; i.e., security protocol or procedure where the human is part of the protocol. The current on-line banking is an example, or the recent electronic voting procedure used in Norway. This topic is at the border of security and psychology. Your work will start from a recent paper [28] originating from the group of Ann Blandford.

See project link. Ask for discussions with one of the supervisors, for more information or variations of the project. See also general concerns.

Publisert 20. juli 2020 10:49

Semantic Attribute Based Access Control (SABAC) – Developing an Access Control solution for IoT Gateways applied to Smart Home Care

Publisert 1. feb. 2017 09:12

The electric grid is undergoing changes. Natural resources like sun and wind contribute to the production of energy.

Publisert 1. feb. 2017 09:12

Embedded Systems (ES) becomes increasingly popular in modern times. This popularity increases the importance of the security for these systems. The reliable evaluation of the ES`s security is considered as a crucial requirement for the enhancement of its security.

Publisert 1. feb. 2017 09:12

In this thesis, we are interested in the human aspect in security and privacy concerns in Internet of Things for smart grids. More precise, we will use case studies to find out exactly how humans can influence the security of the smart grid, and how humans perceive the privacy aspects.

Publisert 1. feb. 2017 09:12

We have seen a variety of cities providing free wifi for their inhabitants. However, when providing the full Internet without authentication, you run the risk of criminal activities to happen using that free Wifi. When you run authentication, it makes access cumbersome. Thus, the idea is to provide free low-capacity Internet without authentication, which would allow you to only consume information (no file download, no gaming, no streaming/video). With the knowledge of risk assessment, the candidate should be able to evaluate the security of such an open access.

Publisert 1. feb. 2017 09:12

Previous work has established a Multi-Metrics (MM) Method for the analysis of measurable security and privacy. This MM approach is used in a.o. UNIK4750, and described more in IoTSec:T1.2. Some challenges of the method are related to the choice of metrics describing security functionality and their impact of the system. A further potential weakness is the dependency of system components, called "interconnection".