Difference between revisions of "Available Master Projects"

From CryptoLUX
Jump to: navigation, search
 
Line 3: Line 3:
 
We are looking for capable students who would like to do their master/bachelor thesis or a semester project.
 
We are looking for capable students who would like to do their master/bachelor thesis or a semester project.
 
Below is the list of open topics. Student jobs related to these projects are also available upon request. These projects can be done also in collaboration with external university. Foreign students may look for financial support from [http://ec.europa.eu/education/external-relation-programmes/doc72_en.htm Erasmus Mundus] programme.
 
Below is the list of open topics. Student jobs related to these projects are also available upon request. These projects can be done also in collaboration with external university. Foreign students may look for financial support from [http://ec.europa.eu/education/external-relation-programmes/doc72_en.htm Erasmus Mundus] programme.
 
 
* '''Proof-of-Work as Anonymous Micropayment '''
 
 
This project is to implement Proof-of-Work as a way for micropayment.
 
This can be done on example of Tor relays providing extended services to clients who mine alt-currencies.
 
This can be also done for news-websites and other cases. In case of Tor, clients do not pay Tor relays with
 
electronic cash directly but submit proof of work shares which the relays can either resubmit to a crypto-currency mining pool or become
 
mining pools by themselves. Relays credit users who submit shares with tickets that can later be used to purchase improved service.
 
 
This is a followup project for our work, which is to appear at Financial Crypto 2015 conference.
 
 
Contact: [[Alex Biryukov]] and [[Ivan Pustogarov]]
 
 
 
'''De-obfuscator toolkit'''
 
 
Obfuscation is the deliberate act of making source code or machine code  difficult for humans to understand. Programmers may deliberately obfuscate code to conceal its purpose or its logic, in order to prevent tampering and  reverse engineering difficult.  Programs known as obfuscators transform readable code into obfuscated code using various techniques.
 
 
Recently an open source obfuscator based on LLVM was released (see @ollvm) and with this new development we believe that obfuscation will become mainstream.  Conversely to what many people believe, good obfuscation is not easy to achieve.
 
When analyzing security of a software application understanding the complexity of the obfuscator used is of the essence.
 
 
Research question: Can you build a tool to remove obfuscation applied by state-of-the-art tools?
 
 
Expected outcome
 
 
- Toolkit that can be used to de-obfuscate:
 
 
- Code flattening
 
 
- Opaque predicates
 
 
- Bogus control flow
 
 
 
 
Skills
 
 
- SW Reverse Engineering
 
- Program analysis
 
- Compiler design
 
 
Contact:  [[Ileana Buhan]] and [[Alex Biryukov]]
 
This is an internship project in a Dutch company [http://www.riscure.com/ Riscure].
 
  
  
Line 74: Line 30:
 
- Cryptographic attacks
 
- Cryptographic attacks
  
Contact: [[Ileana Buhan]] and [[Alex Biryukov]]
+
Contact: [[Alex Biryukov]]
This is an internship project in a Dutch company [http://www.riscure.com/ Riscure].
+
 
 +
 
  
  
 +
<!--
 
'''Evaluation of state-of-the-art side channel techniques on real-life targets'''
 
'''Evaluation of state-of-the-art side channel techniques on real-life targets'''
  
Line 112: Line 70:
 
- scientific programming (Python, MATLAB, Java)
 
- scientific programming (Python, MATLAB, Java)
  
Contact: [[Ilya Kizhvatov]] and [[Alex Biryukov]]
+
Contact: [[Alex Biryukov]]
This is an internship project in a Dutch company [http://www.riscure.com/ Riscure].
 
 
 
 
 
 
  
 
* '''Pebbling games and their applications in cryptography '''
 
* '''Pebbling games and their applications in cryptography '''
Line 123: Line 77:
  
 
Contact: [[Alex Biryukov]] and [[Dmitry Khovratovich]] for more details.
 
Contact: [[Alex Biryukov]] and [[Dmitry Khovratovich]] for more details.
 +
 +
'''De-obfuscator toolkit'''
 +
 +
Obfuscation is the deliberate act of making source code or machine code  difficult for humans to understand. Programmers may deliberately obfuscate code to conceal its purpose or its logic, in order to prevent tampering and  reverse engineering difficult.  Programs known as obfuscators transform readable code into obfuscated code using various techniques.
 +
 +
Recently an open source obfuscator based on LLVM was released (see @ollvm) and with this new development we believe that obfuscation will become mainstream.  Conversely to what many people believe, good obfuscation is not easy to achieve.
 +
When analyzing security of a software application understanding the complexity of the obfuscator used is of the essence.
 +
 +
Research question: Can you build a tool to remove obfuscation applied by state-of-the-art tools?
 +
 +
Expected outcome
 +
 +
- Toolkit that can be used to de-obfuscate:
 +
 +
- Code flattening
 +
 +
- Opaque predicates
 +
 +
- Bogus control flow
 +
 +
Skills
 +
 +
- SW Reverse Engineering
 +
- Program analysis
 +
- Compiler design
 +
 +
Contact:  [[Ileana Buhan]] and [[Alex Biryukov]]
 +
This is an internship project in a Dutch company [http://www.riscure.com/ Riscure].
  
  
Line 140: Line 122:
 
Contact: [[Alex Biryukov]] and [http://lacs.uni.lu/members/johann_groszschaedl Johann Gro&szlig;sch&auml;dl].
 
Contact: [[Alex Biryukov]] and [http://lacs.uni.lu/members/johann_groszschaedl Johann Gro&szlig;sch&auml;dl].
  
 +
* '''Proof-of-Work as Anonymous Micropayment '''
 +
 +
This project is to implement Proof-of-Work as a way for micropayment.
 +
This can be done on example of Tor relays providing extended services to clients who mine alt-currencies.
 +
This can be also done for news-websites and other cases. In case of Tor, clients do not pay Tor relays with
 +
electronic cash directly but submit proof of work shares which the relays can either resubmit to a crypto-currency mining pool or become
 +
mining pools by themselves. Relays credit users who submit shares with tickets that can later be used to purchase improved service.
 +
 +
This is a followup project for our work, which is to appear at Financial Crypto 2015 conference.
 +
 +
Contact: [[Alex Biryukov]] and [[Ivan Pustogarov]]
  
<!--
 
 
* '''Lightweight Cryptography for Wireless Sensor Networks'''
 
* '''Lightweight Cryptography for Wireless Sensor Networks'''
 
A Wireless Sensor Network (WSN) is a network consisting of a (potentially very large) number of autonomous devices, so-called motes, which are deployed in the environment to cooperatively monitor [http://www.nsf.gov/news/special_reports/sensor/overview.jsp physical conditions]. In fact, WSNs are a prime example of what is often referred to by such buzz phrases like "pervasive computing," "smart dust," or the "internet of things". The magazine Technology Review listed WSNs among [http://www.gap-optique.unige.ch/HomeExtras/MIT/10%20Emerging%20Technologies%20That%20Will%20Change%20the%20World.htm 10 emerging technologies that will change the world]. Today, WSNs play a vital role in a multitude of applications ranging from environmental surveillance over medical monitoring to home automation.
 
A Wireless Sensor Network (WSN) is a network consisting of a (potentially very large) number of autonomous devices, so-called motes, which are deployed in the environment to cooperatively monitor [http://www.nsf.gov/news/special_reports/sensor/overview.jsp physical conditions]. In fact, WSNs are a prime example of what is often referred to by such buzz phrases like "pervasive computing," "smart dust," or the "internet of things". The magazine Technology Review listed WSNs among [http://www.gap-optique.unige.ch/HomeExtras/MIT/10%20Emerging%20Technologies%20That%20Will%20Change%20the%20World.htm 10 emerging technologies that will change the world]. Today, WSNs play a vital role in a multitude of applications ranging from environmental surveillance over medical monitoring to home automation.

Latest revision as of 15:18, 11 December 2017

Master Project topics for Uni.lu and Erasmus students

We are looking for capable students who would like to do their master/bachelor thesis or a semester project. Below is the list of open topics. Student jobs related to these projects are also available upon request. These projects can be done also in collaboration with external university. Foreign students may look for financial support from Erasmus Mundus programme.


WhiteBox attacks toolkit

Whitebox cryptography is an implementation of a cryptographic algorithms in software, in such a way that an attacker with full access to the software is not able to gain any advantage compared to a black box attacker. For example, it should not be possible to obtain key information directly from memory, or intermediate results from the cryptographic algorithm. This research focuses on attempting to recover key information by performing side channel analysis (e.g. MIA or similar attacks) on whitebox implementations.

Research question: Can you build a toolkit to extract keys from white-box crypto implementations?

Expected outcome

- state-of-the-art study

- implement well-known attacks

- research new WBC attack methods

- feasibility study

- prototype attack code

Skills:

- SW Reverse Engineering - Program analysis - Cryptographic attacks

Contact: Alex Biryukov