In this seminar, each seminar participants writes a seminar paper on an individually assigned topic during the semester and gives a presentation on the seminar day at the end of the semester. The paper can be a small research project, report of experiments, or literature survey.
Previously we have always focused on the topic areas related to network security. This year, however we are not limiting our seminar topics to the specific area of Network Security but in various research areas of Information technology in general (e.g. Software technologies, mobile computing, cloud, security and more).
In 2014-2015, three seminars will be organized together both in the autumn and spring semesters:
The topics will be published in Noppa by the start of the course. The emphasis in the autumn seminar will be security, but some topics on the other themes will be available. Doctoral students who want to write a seminar paper should propose their own topics and suopervisors.
Bitcoin a widely adopted online payment system, which uses peer-to-peer technology to operate with no central authority or banks. As a result, users can enjoy many benefits by using Bitcoin, such as no third-party seizure, no (or low) transaction costs and no tracking. However, it has significant limitations regarding privacy. For example, payment transactions are recorded in a public decentralized ledger, which potentially leaks important information. This topic is about using cryptographic technologies to enhance the privacy of Bitcoin.
Students who select this topic should survey the technologies that are currently used in BitCoin, their limitations, and state of the art cryptographic solutions.
References:
Tutor: Jian Liu
Unlike topic A, this topic focuses on how Bitcoin is inspiring the development of cryptography. For example, Bitcoin can be used to incentivize players to perform correct computation in a cryptographic protocol.
This is a more advanced topic. Students who select this topic should be familiar with cryptographic protocols such as multiparty computation and verifiable computation.
Students who select this topic should survey the technologies that are currently used in BitCoin and how they can be applied to cryptographic protocols such as multiparty computation and verifiable computation.
References:
Tutor: Jian Liu
As people tend to shift more of their daily activities online, the issue of online privacy becomes increasingly popular. Anonymous channels (e.g., TOR) enable a user to perform online activities without revealing her identity (IP address). TOR is a widely deployed network consisting of 2000 relays and currently serves hundreds of thousands of users a day. However, it still faces some challenges such as traffic analysis attacks, disruption attacks and how to collect statistics without violating users' privacy
The student who select this topic should survey the technologies that are currently used in TOR, their limitations, and state of the art cryptographic solutions.
References:
Tutor: Jian Liu
Bluetooth Low Energy (BLE) is an emerging short range radio technology that is supported by many smartphone platforms and low-power, low-cost System-On-Chip solutions. The topology of Bluetooth Low Energy is a star, where a central device controls all communication to/from leaf nodes; the leaf nodes may not communicate directly with each other. There are however proprietary solutions available which enable daisy-chaining leaf nodes so that leaf-to-leaf node communication is possible. The student’s task is to review the current and upcoming BLE standards, their networking architectures, as well as proprietary solutions which enable mesh networking or daisy-chaining of leaf nodes. As part of the assignment, the student is also expected to build simulation models and/or implementations to analyse latency, reliability or other key performance indicators of such daisy-chaining solutions.
References:
Tutor: Jukka Nurminen
Drones or low-cost micro air vehicles have emerged in recent years. In some scenarios the drones would be used to deliver pizza or books. More active they are used in surveillance tasks e.g. in agriculture. There is also some concern about air traffic control of the drones if their number explodes. In this, rather loosely defined, topic the idea is to explore the software, middleware and communication of the drones. To be useful the drones typically need to receive control commands from the ground and send video or other data streams back. Drones may also want to communicate with other drones directly.
References:
Tutor: Jukka Nurminen
Online Social Networks (OSNs) play a key role in today's computing ecosystem, as social interactions/connections are increasingly used to enhance trust in, and usability of, a growing number of applications. Popular OSNs have become de-facto providers of online identities and are often used to enforce verification of personas and information.
In many realistic scenarios, users need to make access control decisions involving other (possibly stranger) users, e.g., for sharing rides or cabs, to construct distributed computing platform, or to base routing decisions for anonymous communications. One important trust-enhancing factor, potentially guiding such decisions, is the existence of previously established social relationships. For instance, an intuitive access control policy may be to only carpool with one's friends or friends-of-friends, or to base routing decisions on social proximity. However, the process of discovering social proximity may harm the privacy of the two parties and that of their friends. At least one party needs to disclose the identity of his contacts and, depending on the application scenario, this could reveal the identity of the user, and possibly even information about his lifestyle and social attitudes.
The objective of this work is to make an extensive study and literature review on existing solutions for discovering social relationships between two users with a strong emphasis on user's privacy and mobile scenario application. In addition, new ideas for enhancements to existing solutions are very welcome.
References: provided after the topic is assigned.
Tutor: Marcin Nagy
Service level agreement (SLA) is a contract between service providers and consumers. SLA has couple of main characteristics 1) enforceable, 2) measurable, and 3) violation causes penalties. Traditionally, in the cloud context, SLA's are defined for QoS metrics such as availability, and average response time. The core of any SLA is to find suitable metrics, which are measurable and easy to collect from the system. Accordingly to measure security, we need to identify measurable security metrics. Shirlei et.al. [6] has presented metrics for security management services. In their work, they have defined metrics based on security objective (SO) of a particular service. Yan Sun et.al. [4] has presented a mechanism for quantifying quality of protection parameters (QoP) of a system. They have used normalized weighted tree to measure the quality of protection. Common Criteria [5], a standard for computer security certification of a product, defines a process for assurance of product security. Despite all these efforts, there are still challenges to define reliable and measurable security metrics. For example, are service specific security parameters such as 'password ageing' or generic parameters such as 'high security', 'medium security' are meaningful in the cloud context.
Intelligent transportation systems and autonomous vehicles have the potential to make driving a task no longer demanded to human beings. A critical aspect, however, is represented by intersections, where several vehicles need to coordinate their actions in order to avoid collisions (accidents). Such a coordination involves both agreeing the policies to be followed and scheduling the movements of the vehicles.
The student involved in this topic is expected to: learn the basics of intelligent transportation systems with emphasis on smart intersections; analyze the existing literature by focusing on protocol-related aspects; evaluate the reliability of the proposed solutions in realistic scenarios.
References:
Tutor: Mario Di Francesco
Cognitive radio networks (CRNs) are able to sense a wide range of the spectrum and the agility to make use of the available resources dynamically. Accordingly, they can reclaim unused frequencies (i.e., whitespace) for wireless communications while avoiding interferences with between licensed and unlicensed users. One of the most promising applications of CRNs is represented by bandwidth-intensive multimedia services for mobile devices, such as video streaming, that are already facing a shortage of resources in the cellular networks.
The student involved in this topic is expected to: learn the basics of CRNs; understand the different regulations in different countries; analyze the impact of the features peculiar to CRNs on streaming multimedia content.
References:
Tutor: Mario Di Francesco
Molecular communications have been recently proposed for building networks of nano-scale elements. A promising direction consists in exploiting bacteria as mobile carriers of messages that can be encoded as DNA fragments. Such messages can be then exchanged between bacteria when they are in close proximity through the process known as conjugation. Environmental factors such as the concentration of chemicals affect the motion of the bacteria and eventually the chance that a message can be successfully delivered from a source to a destination.
The student involved in this topic is expected to: learn the basics of nano-scale bacterial communications; analyze the mobility pattern of bacteria and the conjugation process; develop mechanisms that affect the motion of bacteria so as to increase the chance of successful message delivery.
References:
Tutor: Mario Di Francesco
A prototype of a cloud-based pedestrian safety application has been developed and tested on smartphones. This system monitors pedestrians and vehicles in urban areas and alerts the drivers in case a collision risk is detected. Vehicles and pedestrians are connected to cloud via cellular network (e.g. 3G, LTE).
The goal of this research is to examine scalability of such system when a large number of vehicles and pedestrians are connected and a geographical area as large as a whole city is monitored. The main problem is how to develop a scalable cloud platform so that it can handle our collision avoidance scenarios and satisfy critical requirements such as limited message delivery delay. Furthermore, processing tasks should be properly divided according to city subsections.
References:
Tutor: Mehrdad Bagheri
Vehicular networks (ad hoc or cloud-based) is a promising paradigm which improves road-safety and traffic efficiency. We have developed a prototype of a cloud-based pedestrian road safety application deployed on smartphones. This system monitors pedestrians and vehicles in urban areas and alerts the drivers in case a collision risk is detected.
The goal of this research is to investigate the most important security threats for road-safety scenarios, and furthermore explain the methods and technologies to prevent it. Network attacks and intrusion may break down the system, cause traffic jams or even cause collisions. Hackers may get wireless access to vehicle or even the cloud-based system. For example one possible hack is that the network nodes start sending incorrect geo-location to cloud servers. How can our system detect such intrusion and false information? How to design a secure vehicular network?
References:
Tutor: Di Francesco Mario
Linux Containers [1] allow building more dense virtual machine populations than in traditional hypervisor-based approaches because they do not incure the overhead of a hypervisor. However, security of containers [2] has been under scrutiny lately [3,4].
In this topic, the student is expected to make a technical overview and analysis on container security based on e.g. docker [5] containers. The instructor expects that the student is familiar with Linux and is interested on technical details on Linux namespaces, cgroups, SElinux etc.
References:
Tutor: Miika Komu
Revelations from Edward Snowden about the mass surveillance on the Internet by various governmental bodies (particularly NSA and GCHQ) resulted in extensive media coverage. While the media coverage has slowly died down, various companies and standardization bodies are still actively pursuing various methods to reduce pervasive monitoring attacks. The aim of this seminar paper would be to provide a holistic overview of the all the efforts that have been proposed and/or are already implemented. Some examples include:
Tutor: Mohit Sethi
QUIC is an experimental transport layer network protocol developed by Google and implemented in 2013. QUIC supports a set of multiplexed connections between two endpoints over User Datagram Protocol (UDP), and was designed to provide security protection equivalent to TLS/SSL, along with reduced connection and transport latency, and bandwidth estimation in each direction to avoid congestion. QUIC's main goal is to optimize connection-oriented web applications currently using TCP.
While SPDY (the base for HTTP/2.0) worked at the application layer (modifying HTTP by multiplexing multiple requests over one connection), QUIC works at the transport layer. QUIC is designed to address a number of pain points uncovered in the implementation of SPDY (which ran over TCP). A detailed design document goes into the specifics. First, the delay of a single TCP packet introduces "head of line" blocking in TCP, which undercuts the benefits of SPDY's application-level multiplexing by holding up all of the multiplexed streams. Second, TCP's congestion-handling throttles back the entire TCP connection when there is a lost packet-again, punishing multiple streams in the application layer above. The aim of this paper would be to provide a thorough overview of the QUIC protocol and compare it with the current HTTP/TCP/TLS model.
References: provided after the topic is assigned.
Tutor: Mohit Sethi
iBeacons are a new class of low-powered, low-cost transmitters that can notify nearby iOS 7 devices of their presence. The technology enables a smart phone or other device to perform actions when in close proximity to an iBeacon. One application is to help smart phones determine their precise position or context. With the help of an iBeacon, a smartphone's software can pinpoint its own location in a store. iBeacons can help a phone show notifications of items nearby that are on sale, and it can enable payments at the point of sale (POS) where customers don't need to remove their wallets or cards to make payments. One of the problems for marketers has been that they could only use this technology if the customer had the app actively running while they shopped. With the iOS7.1 upgrade, Apple made it possible to have all this happen just by having the app installed. It does not even have to be running. Now the phone's operating system keeps listening for the iBeacon signal and tracks the customer even if the app is turned off and the device locked. By design, the iBeacon advertisement frame is plainly visible. This leaves the door open for interested parties to capture, copy and reproduce the iBeacon advertisement frames at different physical locations. This can be done simply by issuing the right sequence of commands to compatible Bluetooth 4.0 USB dongles. This can have several consequences from spoofing location beacons to starting apps or tracking. The aim of this seminar paper is to determine the plausible threats and propose mechanisms to counter such threats. One example is the paypal iBeacon where the beacon is purely the start of a complex security negotiation.
References:
Tutor: Mohit Sethi
Instant messaging (IM) is the most widely used communication over the Internet generally used for sending short messages. Popular IMs communicates over TLS to protect against eavesdropping yet the TLS does not guarantee against eavesdropping at the server end. There are number of IM services that provides end-to-end secure messaging such as TextSecure. Similarly BitTorrent recently released decentralized private chat application known as Bleep. Off-the-record messaging protocol developed by Goldberg et. al. [1] describe secure messaging protocol with deniability, which ensures the authenticity of the message during communication yet it allows anyone to forge messages after the conversation that look like they were real communication between the participants.
The goal of this work is to look at different secure IM services and protocols, and make a survey based on the security features that these IM offers.
References:
Tutor: Sandeep Tamrakar
Lately, compressive sensing, has gained a lot of research interests as it suggests that it may be possible to surpass the traditional limits of sampling theory, through sparse codebook learning. Recovery of signals is possible through nonlinear optimization, which requires very few data samples. This has important implications to solve some of the shortcomings of traditional supervised machine learning algorithms. Developments in compressive sensing has opened up new possibilities in understanding patterns present within large datasets.
The assigned student should perform a survey on the most salient techniques used in compressive sensing, especially on images and time-series data. Focus should be given on how compressive sensing can be effectively used in automatic representation of sensor data.
References:
Tutor: Sourav Bhattacharya
Android has proven to be a prominent platform for research in mobile security. Numerous security frameworks enhancing Android security have been, and continue to be proposed.
Mainline Android itself has recently seen a significant change in it security model with the introduction of the Security-Enhanced Linux (SELinux) Mandatory Access Control (MAC) framework in version 4.3. Android version 4.4 saw SELinux enabled in enforcing mode by default.
The purpose of this topic is to examine the current state of platform security mechanisms in mainline Android, and survey the current state-of-the-art in academic (platform) security research being done on Android. Ambitious students should aim for identifying potential gaps in the current research and open research problems in the area.
Prior skills required:Basic knowledge of Linux Discretionary Access Control (DAC) mechanisms.
References:
Tutor: Thomas Nyman
Cloud computing has risen as a new framework for doing highly scalable web based applications. One of the central building blocks are new database technologies developed to implement massively parallel database systems, called cloud datastores aka NoSQL databases. In this topic the main aim is to survey this new class of datastores, discuss their design principles, categorize and compare them against each other and traditional relational database systems.
References:
[1] Rick Cattell: Scalable SQL and no-SQL Data Stores, SIGMOD Record, Volume 39, Number 4, December 2010.
Tutor: Keijo Heljanko
Big data is one of the currently highly discussed topics in cloud computing applications. In this topic you get to survey the most widely used big data platforms e.g., such as Apache Hadoop, Apache Spark, and Facebook Presto. In this topic the main aim is to survey this new class of big data platforms, discuss their design principles, categorize and compare them against each other. Some of the issues in selecting the right tools and platforms for the big data application at hand need to be discussed.
References:
[1] Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin
Ma, Murphy McCauley, Michael J. Franklin, Scott Shenker, and Ion Stoica. 2012. Resilient distributed datasets: a fault-tolerant abstraction for in-memory cluster computing. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation (NSDI'12). USENIX Association, Berkeley, CA, USA, 2-2.
[2] Jeffrey Dean and Sanjay Ghemawat. 2004. MapReduce: simplified data processing on large clusters. In Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6 (OSDI'04), Vol. 6. USENIX Association, Berkeley, CA, USA, 10-10.
Tutor: Keijo Heljanko
Many lock and building-access-control-system manufacturers are combining electronic and mechanical features their locks and keys. This enables flexible online and offline operation and integration to other enterprise information systems. The goal of this seminar topic is to investigate the existing access-control solutions that combine information technology and physical locks or keys. Like all new applications of information technology, this gives raise to new security threats and vulnerabilities. Moreover, locks are particularly security critical components and attractive targets for attackers. On one hand, there is a centuries-long tradition in lock design and the threats are well understood; on the other hand, the information security approach may lead to both new threat scenarios and to new product opportunities. The seminar paper should analyze the security threats and potential solutions in electronic locks and/or access control systems.
References:
http://www.abloy.com/en/abloy/abloycom/products/access-control/
http://www.tux.org/pub/security/mk.pdf
Tutor: Tuomas Aura
Visible-light communication is used in some consumer goods because of its simplicity and perceived harmlessness to human health. The implementations typically use a light-emitting and light-sensitive LEDs. The visible-light communication channels can also be used as an offline channel for bootstrapping security associations. In both cases, there are medium-specific threats and design opportunities that can to be analyzed and exploited. The seminar paper can focus either on the robustness of visible-light communication under environmental factors or malicious interference, or on the security applications of visible-light offline channels. The student should implement an experimental system or perform security analysis based on ideas from the literature and, therefore, needs to be proficient in at least one of the following areas: embedded device programming (e.g. Arduino), mobile device programming, electronics design, or signal or image analysis with Matlab.
References:
http://www.disneyresearch.com/project/visible-light-communication/
http://visiblelightcomm.com/links/
Tutor: Tuomas Aura
Software defined networking (SDN) and OpenFlow as one of its key technologies have received a lot of attention from the networking community. While SDN enables complex network applications and easier network management, the paradigm change comes along with new security threats. In particular, the introduction of the logically centralized controller may create new denial-of-service (DoS) vulnerabilities to the network.
The goal of the seminar work is twofold. Firstly, the student is expected to survey the existing literature on DoS vulnerabilities that may be present in networks utilizing Openflow. Secondly, the student is encouraged to test some of the known DoS attacks in a emulated SDN-environment.
This topic requires basic understanding on computer networks and Python programming.
References:
1. Openflow: A security analysis. NPSec 2013, Eighth Workshop on Secure Network Protocols. Available at http://www.tik.ee.ethz.ch/file/11a1fdc453fd9a0e2f789fcf582ed38f/Presentation-OpenFlow-A-Security-Analysis.pdf
2. Attacking software-defined networks: a first feasibility study. Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. Available at http://dl.acm.org/citation.cfm?id=2491220
Reducing energy consumption of computing infrastructure is one of the key issues in research lately. Energy used for computing infrastructure in scientific clusters and distributed computing systems is a key attributer in overall power consumption in this aspect. The motivation behind energy efficient computing is twofold - to reduce the overall consumption of the infrastructure and also to reduce the electricity cost associated with computing. In this research we aim to investigate the later case with CERN computing grid as a testbed. A few of the previous research has already investigated the effect of electricity-cost aware scheduling/routing of tasks based on real-time electricity prices from multiple regional markets. Qureshi et. al. present a very interesting aspect of reducing the cost of energy consumption. This research points out to the imperfectly correlated electricity prices of large geographical area and suggests that servers or computations can be transferred to those areas where electricity cost is minimal. Their results show that it is possible to lessen the energy consumption in such a way. We want to investigate the effect of the such with CERN computing grid which has 179 computing centers in 40 countries. The main goals are as follows:
References:
Tutor: Kashif Khan