In the final project of this course, you are allowed to explore a security-related project of your own interest as a team. Each team can have up to three students. You would need to get my approval if you want to perform a solo project. Please feel free to meet with me about potential project ideas during my office hours.
Some example project ideas are listed as follows:
Web security hardening
IoT device hacking
Malware analysis
Rootkit
Bootkit
Memory forensics
ROP (return-oriented programming) attacks
Meltdown and Spectre attacks
Malware obfuscation
Heartbleed attacks
Shellshock attacks
Android malware
Blockchain security
Cellular network security
Keyloggers
Browser security
The evaluation part of this project will consist of three parts:
Presentation: Each team will present its project on December 4 or 6. All the presentations will be evaluated by your classmates. Your presentation scores will become 10% of your final grade.
Technical report: Each team will need to write a technical report of at least five pages excluding bibliography. You can use screenshots or plots in your report. Although you can use references in your report, its main body should describe what you have achieved in this project.
Demo: Each team will need to demonstrate its results in the week of December 10 in my office.
The technical report and the demo session together will be evaluated as 10% of your final grade.