Potential 598-4 Projects
 
 

A term project is required in the course. The following are the deadlines:

Projects may or may not have an implementation component. A really good design paper, along with good discussion related work, is preferred compared to a weak implementation project. The best way to learn about the security area is to work with a real problem. One example area that is worth looking at, for example, is to model the security in the DCO environment and to analyze vulnerabilities in a network such as EECS itself. You could go further and and design or experiment with deployment of tools to stop any identified vulnerabilities. Below are other project ideas to get you thinking.

Examples of projects from last offering:

  • Modification of inode structure in Linux to support detection of tampering of file integrity and to ensure confidentiality.
  • A solution to the 802.11 wireless ethernet security that fixes the vulnerability in WEP, while maintaining compatibility.
  • A service to establish ad-hoc VPNs among mobile machines.
  • Analysis of security vulnerabilities in a Linux-based virtual machine.
  • Analysis of vulnerablities in DCO and a feasibility analsis for deploying security-related tools for deployment within EECS (this project actually led to lots of changes within EECS).