Master's Theses in Informatics: Information Security

The Digital Security Group (SEC) at IFI and security researchers at the ITS department offer master's projects in information and cyber security.

A list of proposed projects is provided below. (Please consider that most 60 ECTS topics can also be done as 30 ECTS (short) thesis.)

Please get in touch with the relevant supervisor(s) if you are interested in a specific project. You are also welcome to discuss your own ideas for a master's project with any of the supervisors in SEC or ITS.

Sidetittel Publisert Veileder(e)
Anomaly Detection using Advanced Data Analytics in 5G-IoT 17. jan. 2024
Digital Twin-based Anomaly Detection for e-Health Infrastructures 17. jan. 2024
A NIS2 pan-European registry for identifying and classifying essential and important entities 18. okt. 2023
Mapping and analyzing the Norwegian cybersecurity incident reporting ecosystem 18. okt. 2023
Beste praksis for sikkerhetsstyring av informasjonssikkerhet 17. okt. 2023
A Survey of Windows' Data Protection API (DPAPI) 9. okt. 2023
Investigating anti-forensic techniques and their detection 9. okt. 2023
Forensic Analysis of Secure Messaging Applications on Android Devices 9. okt. 2023
Automated Reverse Engineering of Malware Binaries 9. okt. 2023
Automated malware classification systems using machine learning 9. okt. 2023
Behavior analysis of emerging malware strains 9. okt. 2023
Memory Forensics: Techniques and tools for analysing volatile memory 9. okt. 2023
Identification and analysis of forensic artifacs in operating systems 9. okt. 2023
LLM for loggdata 8. okt. 2023
Cybersikkerhet for småkraft 7. okt. 2023
Cybersikkerhet i fornybar energiproduksjon 7. okt. 2023
Vurdering av sikkerhet for sikkerhetsprodukter 7. okt. 2023
Cybersikkerhet i elbilladere 7. okt. 2023
Security and Privacy of eIDAS 2.0 Compliant Apps 28. sep. 2023
Sikkerhet i maskinlæringsmodeller 28. sep. 2023
Threat Indication Using Web Search Engine Trends 20. aug. 2023
An Application for Graphically Representing Cybersecurity Operations Playbooks: the CACAO use case 29. okt. 2022
Integrated Defense with OASIS Open Command and Control (OpenC2) 17. okt. 2022
Open-Source Vulnerabilities in Software Supply Chains 30. sep. 2022
Kvalitetsvurdering av setninger som passord 30. sep. 2022
Using cryptography insecurely: Don’t do this at home! – But why? 21. sep. 2022
Smart contract for an investment and trading platform 19. sep. 2022
Deteksjon av sjelden angrepstrafikk med Fourier-analyse 8. sep. 2022
Deteksjon av gammel/utdatert programvare 7. sep. 2022
Applied Cyber Security 7. sep. 2022
Measurement of Censorship in Norway 1. sep. 2022
Cybersikkerhet i infrastruktur for elbillading 27. aug. 2022
Analysis of Multi-Party Relays 17. juni 2022
Security of Digital Signatures for PDF 29. mars 2022
Post-quantum kryptografi: Lattice med struktur 22. okt. 2021
Post-quantum kryptografi: CSIDH 22. okt. 2021
Security and Privacy of Media Capturing 21. okt. 2021
From VLAN separation to microsegmentation and NSX in a large-scale environment 21. okt. 2021
Utilizing Sentiment Analysis and Large Language Models for Identifying and Understanding Disinformation Campaigns 20. okt. 2021
Server-side JavaScript vulnerabilities 20. okt. 2021
Skystrategi i samsvar med GDPR 12. sep. 2021
Visualization of Threat Intelligence 31. aug. 2021
Developing a Tool for Annotating Threat Reports 31. aug. 2021
Security Analysis Methods and Tools 23. aug. 2021
Classifying Rogue Access Points with Semantic Graph Artificial Intelligence 14. nov. 2020
Beskyttelse mot sidekanalsangrep i implementering av kryptoalgoritmer 10. aug. 2020
Analyse av Secure Multi-party Computation (MPC) 10. aug. 2020
Analyse av lettvektsalgoritmer for postkvantekrypto 10. aug. 2020
The usability of NIST post-quantum competition candidates as replacements in existing systems and protocols 30. sep. 2019
Intermediate solutions for quantum resistant key exchange 30. sep. 2019
The UiO SecurityLab Robot 26. sep. 2019
Cybersecurity 4. sep. 2019
Machine-Readable Security Playbooks and Orchestration 20. aug. 2019