! 

Term Project Ideas

Project Ideas

You are highly encouraged to come up with your own ideas and topics for the term project. Here's a list of some term project ideas for your inspiration. Your specific project proposal still requires specific details about what exactly you will do before it can be approved by the course staff. Also, we prefer that groups work on somewhat distinct topics.

Attention: Look for models and inspiration but make sure you do not repeat exact topic of one of the previous 412 projects.

  • Security analysis of anti-theft engine immobilizers for cars.
  • Security analysis of Vancouver's pay-by-phone metered parking.
  • Usability and security
  • Law and security
  • Economics and security
  • Implement a Program to Measure the Amount of Randomness Available in a System
    Many systems assume a source of randomness to generate cryptographic keys. Without a source of good randomness, keys are extremely easy to guess. The default Linux® random number generator gathers randomness from IDE disk events and mouse/keyboard I/O. On headless server machines with SCSI disks locked in hosting centers, there may be little or no randomness. Can you measure the effectiveness of random number generation? Develop a suite of tests to determine how fast randomness is exhausted?
  • Peer-to-Peer security
  • Anti-Spam techniques
  • Anti-phishing techniques
  • A Secure media distribution framework
  • How to Make the User Authentication Process in MS Passport More Secure
  • Security of Wireless Networks and Mobile Devices
  • Security analysis of digital satellite TV system
  • User Authentication in Cryptographic File Systems
  • Security analysis of ECE IT infrastructure
  • Steganography in Spam
  • Proactive Cryptography Applications in Smart Cards
  • Execution-Based Software Protection
  • Steganography in TCP timestamps
  • Rethinking Software Piracy: Active Software Rights Verification for Effective Control of Piracy
  • Reputation-Based Certificate Authorities
  • Cookie authentication
  • Analyzing the Security of 802.11 Wireless Networks
  • Analyzing the Security of 802.16 Wireless Networks
  • Analyzing security of the UBC wireless network
  • Threshold Signatures and Open Source
  • Honeypots
  • Security and Privacy Issues of Microsoft Passport
  • Security Aspects of Unicode
  • Digital Signatures for Physical Mail
  • Secure Instant Messengers
  • Purple: Japanese Ciphers in WWII
  • Identity Theft
  • SmartCards security
  • Payment via GSM Mobile phones
  • Digital Multimedia Copyright Protection
  • Security Analysis of Electronic Postage Systems
  • Security of Network Attached Storage
  • Software security
  • Design of a Secure Pilot-based Authentication System
  • Intrusion Detection Systems
  • Cellular Telephone Security
  • A Computer Testing System
  • Copyright Protection Mechanisms in DVD + DIVx
  • Network Access Controls
  • Digital Money—Fault Tolerant Multibank System
  • Security Policy Models
  • An Overview of Biometric Technologies and their Real World Applications
  • Secure Sockets Layer 3.0: Overiew and Analysis
  • Secure Perfectly Forward Secure Email Wizard
  • A Random Number Generator
  • Impact of Quantum Theory on Cryptography
  • Secure Electronic Wallet Technology
  • Preventing Media Piracy
  • Netscape®'s "What's Related" Service and Privacy/Security Issues
  • Secure Electronic Poker
  • PGP vs S/MIME
  • A Study of SSH
  • ATM: A Trusted Machine?
  • Secure Mobile Code Framework
  • Pseudonyms and Credential Transfer
  • Electronic Payment Schemes
  • Computing with Encrypted Data
  • Receipt-Free Secure Elections
  • The feasibility of Quantum Computation
  • Network Security for Chat Programs
  • Electronic Voting

Copyright © 2003-2007 Konstantin Beznosov