|
Spring 2007 |
Cracking Advanced Access Content System (AACS), Winner of: Best Presentation! and Best Analysis Project!
Daniel Dmytriw, Neale Genereux, Michael Gujral, Abhishek Valaboju |
Software Cracks
Ankit Jain, Jason Kuo, Jordan Soet, Brian Tse |
Security Analysis of Online Bibliography System - iBib
Owen Yang, Alice Ho Yu Au-Yeung, Hootan Ziyaeimatin, Florence Tabamo |
An Analysis of Vulnerabilities of Iris Scanning Personal Authentication
Michael Kang, Oscar Plag |
Mobile Code Security
Jason Kwan, Justine Lu, Safinaaz Rawji, Sophie Ke |
Gnutella Peer-to-Peer Security, Winner of: Most Holistic Approach to Security Engineering!
Gurpreet Dosanjh, Brody Lodmell, Alexander Van Der Star, Shane Wang |
Risk Analysis of MacLeod and Kaiser Buildings
Andre Gagne, Raymond (Kinwai) Lo, Ireti Fakinlede, Gary Tu |
Analysis of SMS Spamming Solutions
Jue Ni, Vincy Tang, Wynne Lui |
Security Enhancements to Distributed Directory
Tik Ning Cheung, Jeannie Li, Henry Ng |
Design of a Data Hiding Application Using Steganography, Winner of: Best Design Project!
Armin Bahramshahry, Hesam Ghasemi, Anish Mitra, Vinayak Morada |
The Analysis of the Security of the Octopus Smart-Card E-Cash System
Andrew Lee, Timothy Lui, Bryon Leung |
Key Logging of a Wireless Keyboard
Willian Ha, Eric Ma, Antony Mbugua, Dickson Poon
|
Fall 2005 |
Analysis of Bluetooth Security, Stefanie Ho, Brian Ng, Frank Wu, Justin Kwong |
PC Security using Biometrics, Kit Mun Chan, Ana Pop, Shadi Safarkhah, Gurpreet Virdi
Best Analysis Project |
Analysis of FairPlay Digital Rights Management Scheme in Apple’s iTunes Music Store, Aaron Franks, Stephen LaRoy, Michael Wood, Michael Worth |
Access Control List in Operating Systems, Edmund Law, Spencer Shek, Kevin Wong, Cindy Zhu |
Digital Watermarking, Orion Winkelmeyer, Abbas Mehdi, Patrick Lam, Nima Kamoosi |
Improvement of Steganography in TCP Timestamp, Patrick Lee, Dan Anderson |
Security Analysis of FOB installation at ECE and CS, Justin Fu, Steven Tse, Gavin Yip, Christina Young |
Analysis of FOB Access Control Management System, Gregory Mason, Nikolay Nikiforov, Rupert To, Kevin White |
Analysis and Design of a Smartcard Transit Security System, Tim Kinisky, Colleen Qin, Mike Hewitt, Derek Kwei
Best Presentation |
Simulation of Secondary and Approximate Authorization Recycling, Kyle Zeeuwen |
TOR-Anonymous Internet Communication System, Miljan Cabrilo, Gordon Jesso, Katayon Radkhah, Ivan Tsui |
Design and Analysis of a Noise-Based Random Oracle, Albert Wang, Jeff Gebert, Paul Davis
Best Design Project & Most Holistic Approach to Security Engineering |
Fall 2004 |
Analysis of Wireless Key Management and Proposal, Michael Kwan, Andrew Ong and Derrick Yeung |
Security Analysis of the UBC Wireless Network,
Li-Heng Lin, Chun Yue Gordon Wong, and Jeanette Sin Mei Tsang |
Implementation of Low Cost Security for WLAN Router Networks, Larix J. Lee, Jason C. Kan, Johnson C. Lee and Michael K. Leung |
Security Analysis of Public Wireless Internet Access Points, Steven Chang, Ben Huang, Victor Lam, Horng Yen |
A Security Analysis of UBC Wireless Network, Wing-Keong Woo, Qiang Wei, Joyce Hsien-Yin Chiang, and Johnson Ming-Che Tsai
Best Analyisis Project, Best Project Report |
An Analysis on Spyware Law SB 1436, Claudia Fong, Wallace Hung, Kartik Markandan |
Audio Voice Authentication, Jacqueline Chow, Janet Tse, and Jeff Tung |
Biometric Passports using Facial Recognition, Ryan Chan, Jason Cheung, and Amy Ha
Best Presentation
Most holistic approach to security engineering |
An Analysis and Recommendations for an E-Voting System, Jeffrey Kler, Ivan Lau,
Aleksandar Milojkovic, Samson Zhao |
Development and Implementation of a Secure Instant Messenger for Public Use, Wesam Darwish, Wing Leung, and Megan Tiedje
Best Design Project |
Security for a Two-Way Text Messaging Application, Kevin Lai, Handika Handoko, Tuan Vo, John Li |
|