Nettsider med emneord «security»

Publisert 14. apr. 2015 12:54

Dat Tien Le is a PhD student in the ConSeRNS group under the supervision of Audun Jøsang, Einar Broch Johnsen, and Frank Eliassen.

In this talk, we will about the concept of design patterns but applied to security problems. Just think of how popular the concept of design pattern has become, i.e., look at the classic GOF book that won the Dahl-Nygaard prize. Now we see this applied to security problems. (See Abstrat in the long description.)

Publisert 13. nov. 2017 12:10

Compiler security is an important field. This thesis wants to do groundwork to reproduce a known technique known as{Diverse Double-Compiling (DDC) in an new environment. Potentially with a secondary focus on writing a compiler for a mainstream language.

 

Publisert 16. feb. 2018 14:40

Evaluation of added energy requirements for network security protocols (e.g. TLS).

Publisert 15. okt. 2020 12:54

Most of security protocols fail to achieve an acceptable level of security as their security properties are not verified using formal methods. In other words, they are validated using some case studies or test cases, which do not necessarily consider all the possible scenarios by which an attacker can attack a system. Therefore, they need to be verified using formal methods, which are mathematically-based approaches. 

Publisert 4. okt. 2016 11:55

In this thesis, the author attempt to design a process that will help web application development companies produce more secure services. This is achieved by using a security standard relevant to the services these applications provide. Throughout the course of this thesis, the author attempts to highlight why this is needed, and how it will be achieved.

Publisert 7. okt. 2020 14:36

The task is to design and implement a radmomization concept for Rust compilation

Publisert 7. sep. 2016 21:40

This project aims at developing models and tools for automated or semi-automated classification and discovery of cyberthreats based on ontologies and semantic reasoning.

Image may contain: text, font.
Publisert 26. aug. 2019 07:13

The paper "Language-based mechanisms for Security-by-Design'' by Shukun Tokas, Olaf Owe, and Toktam Ramenzanifarkhani got the award for the "Best Paper" of the IFIP IFIP Summer School on Privacy and Identity Management.

 

Publisert 14. okt. 2020 15:40

The task is to dependently typed programming for certification (especially in the area of security)

Publisert 19. aug. 2018 13:07

This projects involves a cases study and analysis of human users of a security ceremony; i.e., security protocol or procedure where the human is part of the protocol. The current on-line banking is an example, or the recent electronic voting procedure used in Norway. This topic is at the border of security and psychology. Your work will start from a recent paper [28] originating from the group of Ann Blandford.

See project link. Ask for discussions with one of the supervisors, for more information or variations of the project. See also general concerns.

Publisert 1. feb. 2017 09:12

The electric grid is undergoing changes. Natural resources like sun and wind contribute to the production of energy.

Publisert 1. feb. 2017 09:12

Embedded Systems (ES) becomes increasingly popular in modern times. This popularity increases the importance of the security for these systems. The reliable evaluation of the ES`s security is considered as a crucial requirement for the enhancement of its security.

Publisert 1. feb. 2017 09:12

In this thesis, we are interested in the human aspect in security and privacy concerns in Internet of Things for smart grids. More precise, we will use case studies to find out exactly how humans can influence the security of the smart grid, and how humans perceive the privacy aspects.

Publisert 1. feb. 2017 09:12

We have seen a variety of cities providing free wifi for their inhabitants. However, when providing the full Internet without authentication, you run the risk of criminal activities to happen using that free Wifi. When you run authentication, it makes access cumbersome. Thus, the idea is to provide free low-capacity Internet without authentication, which would allow you to only consume information (no file download, no gaming, no streaming/video). With the knowledge of risk assessment, the candidate should be able to evaluate the security of such an open access.

Publisert 1. feb. 2017 09:12

Previous work has established a Multi-Metrics (MM) Method for the analysis of measurable security and privacy. This MM approach is used in a.o. UNIK4750, and described more in IoTSec:T1.2. Some challenges of the method are related to the choice of metrics describing security functionality and their impact of the system. A further potential weakness is the dependency of system components, called "interconnection".

Publisert 1. feb. 2017 09:12

Within January 2019 all electricity customers in Norway will have to use smart meters. These smart meters will become part of the ”Avanserte Måle- og Styringssystemer” (Automatic Meter Systems - AMS), and include that users can have a better information on their electricity usage, a more accurate billing of their consumption and the opportunity for automatic controlling of the power consumption. Pilots have already been running at several places in Norway. Academia, Grid distributors, Industry, and Consumer Organisations have joined through the IoTSec.no initiative to discuss security and privacy related to the services and infrastructures in an AMS.

Publisert 1. feb. 2017 09:12

The Consumer Services of Norway (Forbrukerrådet) have established a report on privacy in Apps "App-Fail". In there they have found breach of privacy by apps. They identified a lack of "understandable privacy" as the main challenge.

Publisert 1. feb. 2017 09:12

The future electricity network is based on components, which are state-of-the-art from some years back in time. As an example, the SCADA system consists of network interfaces, browser sessions..., which all can be hacked using standard vulnerabilities.

Publisert 30. juli 2019 16:31

This project involves working together with the Nokia Bell Labs in Finland on verifying the security properties of applications that they build using TPM (Trusted Platform Module) or Intel SGX (Software Guard Extenssions).