You are on page 1of 3

CS-3801 Computer Security Project

General Information
Your project should address a research issue in computer security and consist of the design
of some computer security system or technique, or the analysis of some existing system or
technique. The main goal of the project is to do original research collaboratively on a
problem of interest in computer security. Also, it aims to practice your critical thinking skills,
presentation and public-speaking skills. Your project team should have TWO or THREE
student members. Projects will be evaluated on the quality of your research in computer
security. At the end of the semester, you will write a conference-style paper on your work.

I expect that most projects will fall (more or less) into one of two categories:
1. Design. Design projects will usually attempt to solve some interesting problem by
proposing a design; implementing a prototype; and using the implementation as a
basis for evaluating the proposed system architecture (Check the topic list below).

(OR)

2. Analysis. Analysis projects might, for example, study some previously proposed
implementation technique, existing system, or class of systems; evaluate its security
properties; find flaws, or strengths, in it; and provide new insight into how to build
secure systems (Check the topic list below).

If you're at a loss for a project topic, I have prepared a list of possible project topics that you
can pick a suitable project topic. See below. But don't feel limited to these suggestions! You
can pick any topic out of the list that is related to computer security. A final suggestion: Aim
high! The top projects could lead to publication.

The Project Report


You are expected to write a project report, in the style of a conference submission, on the
research you have done. State the problem you're solving, motivate why it is an important
or interesting problem, present your research thoroughly and clearly, compare to any
related work that may exist, summarize your research issues, and draw whatever
conclusions may be appropriate. (There is page limit in conference style papers
minimum 3 pages and maximum 6 pages, equivalent to minimum 6 pages and
maximum 12 pages in Word style, excluding cover page and references).
The project report should not exceed 40% in the plagiarism percentage report and
please do not use quotation symbol “ ”, otherwise you will loss many points.
If you are not familiar with writing conference-style papers in computer sciences, the
following resource may help (please follow this format in your report):
https://www.ieee.org/content/dam/ieee-org/ieee/web/org/conferences/Conferencetemplate-A4.doc

The Project Submission Details


You should submit your project report on blackboard in Word Format on or before 30th
November 2021. (No exceptions or extensions will be granted, so get it in on time!)

Example Project Topics


Note: Some examples are very specific. Others are quite generic; for the generic suggestions,
be sure to narrow down the topic substantially and propose something concrete and focused.
• IoT security issues
• Defenses against phishing in social networks
• Virtual machines for security
• Privilege separation
• Tools for vulnerability detection
• Enforcing resource bounds on malicious code
• Side channel attacks meet mobile code
• Security of peer-to-peer systems
• Secure coding
• Distributed firewalls
• Attack based on the birthday paradox (for symmetric and asymmetric cryptosystems)
• Dictionary attack and password meter
• Attacks on transposition ciphers
• Cybersecurity of biometric authentication
• Cookies, privacy and security issues
• Identity theft in the Internet
• Social engineering attack
• Biometrics and cyber security
• SQL Injection Prevention System
• Android video encryption & sharing
• Secure file sharing using access control
• Image authentication based on watermarking approach
• Digital watermarking to hide text messages
• Matrix based shoulder surfing security system
• Improved session password-based security system
• Android text encryption using various algorithms
• RFID security issues
• Secure online auction system
• Authentication system using QR code & OTP
• Secure text transfer using Diffie Hellman key exchange based on cloud
• Detecting phishing websites using machine learning
• Secure electronic fund transfer over internet using DES
• Card payment security using RSA
• Payment system security and privacy issues
• Secure file storage on cloud using hybrid cryptography
• ATM detail security using image steganography
• Implementing triple DES with OTP
• Fingerprint authenticated secure android notes
• Detecting data leaks via SQL injection prevention on an e-commerce
• Cloud based improved file handling and duplication removal using md5
• Cloud based student information chatbot project
• Secure file storage on cloud using hybrid cryptography
• A new hybrid technique for data encryption
• Image encryption using AES algorithm
• Graphical password to avoid shoulder surfing
• Secure remote communications system
• Secure ATM using card scanning and OTP
• Secure lab access using card scanner and face recognition
• Credit card fraud detection
• Remote user recognition and access provision
• Detecting data leaks

Hint: This website might help you on your project report and presentation skills:
http://www.cs.cmu.edu/afs/cs.cmu.edu/user/mleone/web/how-to.html

You might also like