! 

Term Project Ideas

Project Ideas

You are highly encouraged to come up with your own ideas and topics for the term project. Here's a list of some term project ideas for your inspiration. Your specific project proposal still requires specific details about what exactly you will do before it can be approved by the course staff. Also, we prefer that groups work on somewhat distinct topics.

Attention: Look for models and inspiration but make sure you do not repeat exact topic of one of the previous 412 projects.

Specific project Ideas

  • Study why users use accounts with admin priveleges to perform daily work on their PCs (talk to Kosta for details)
  • Security analysis of anti-theft engine immobilizers for cars.
  • Security analysis of Vancouver's pay-by-phone metered parking.
  • Implement a Program to Measure the Amount of Randomness Available in a System
    Many systems assume a source of randomness to generate cryptographic keys. Without a source of good randomness, keys are extremely easy to guess. The default Linux® random number generator gathers randomness from IDE disk events and mouse/keyboard I/O. On headless server machines with SCSI disks locked in hosting centers, there may be little or no randomness. Can you measure the effectiveness of random number generation? Develop a suite of tests to determine how fast randomness is exhausted?
  • Security analysis of digital satellite TV system
  • Security analysis of ECE IT infrastructure
  • Analyzing the Security of 802.11 Wireless Networks
  • Analyzing the Security of 802.16 Wireless Networks
  • Security Analysis of Electronic Postage Systems

General themes that need to be narrowed down into a very specific idea

  • Usable security
  • Law and security
  • Economics of security
  • Economics and security
  • Peer-to-Peer security
  • Anti-Spam techniques
  • Anti-phishing techniques
  • A Secure media distribution framework
  • Security of Wireless Networks and Mobile Devices
  • User Authentication in Cryptographic File Systems
  • Steganography in Spam
  • Proactive Cryptography Applications in Smart Cards
  • Execution-Based Software Protection
  • Steganography in TCP timestamps
  • Rethinking Software Piracy: Active Software Rights Verification for Effective Control of Piracy
  • Reputation-Based Certificate Authorities
  • Cookie authentication
  • Analyzing security of the UBC wireless network
  • Threshold Signatures and Open Source
  • Honeypots
  • Identity Theft
  • SmartCards security
  • Payment via GSM Mobile phones
  • Digital Multimedia Copyright Protection
  • Security of Network Attached Storage
  • Software security
  • Intrusion Detection Systems
  • Cellular Telephone Security
  • A Computer Testing System
  • Copyright Protection Mechanisms in DVD + DIVx
  • Network Access Controls
  • Digital Money—Fault Tolerant Multibank System
  • Security Policy Models
  • A Random Number Generator
  • Impact of Quantum Theory on Cryptography
  • Secure Electronic Wallet Technology
  • Preventing Media Piracy
  • Secure Electronic Poker
  • A Study of SSH
  • ATM: A Trusted Machine?
  • Secure Mobile Code Framework
  • Pseudonyms and Credential Transfer
  • Electronic Payment Schemes
  • Computing with Encrypted Data
  • Receipt-Free Secure Elections

Copyright © 2003-2007 Konstantin Beznosov