CYD Master Thesis Topics

The available Master thesis topics are listed below by category. This list is not exhaustive and Master students can also propose their own topic.


Wireless Security
  • Signal injection attacks on satellite communication systems
  • Passive localization of satellite ground stations
  • Automated wireless signal decoding on software-defined radios
  • Building a Smartphone App for Defence against Hidden Microphones
  • Building a Smartphone App for Drone Detection
  • Security Analysis and Practical Attacks on Aircraft Avionics
  • Distance Bounding in Aircraft Collision Avoidance Sytems
Network Security
  • Development of a WAN traffic obfuscation system on programmable network switches
  • Implementation of Routing in SCION based hardware and software properties
  • Honeypots: Relation between attack vectors, types of honeypots and threat actors
  • IoT Honeypots
  • Robustness of the DNS system to novel DNS attack types
  • Traffic-analysis attacks in real-world conditions
  • Automated testing of network security policies
  • Detecting proxy servers based on their network traffic
Data science
  • Synthetic Faces: Exploration of recent Text-to-Image Models for Creation of Fake Online Profiles
  • Understanding Video Content of Disinformation Campaigns
  • Malware mitigation through machine learning on IoT devices
  • Automated Satellite Imaging and OSINT Data Pipelines Design for Event Detection
  • Automated Ingestion Pipelines and ML for Deceptive Behaviors in Networks
  • Community Embeddings to Predict Content Dissemination on Social Media
  • Automated Anonymization Pipelines for Privacy-Preserving ML
  • Detection and characterization of structural changes in network topologies
Natural language processing
  • Language detection on short texts and how to distinguish closely related languages
  • Quantifying the impact of source language similarity in multilingual neural machine translation?
  • Benchmarking prompt generation for generative language models
Data Analytics
  • Causality models in time series analysis
  • Predictive analysis of disruptive events (tipping points)
  • Automation of model-agnostic Machine Learning robustness evaluation – Data Science.
  • Topological data analysis for attack detection in energy systems
Mobile security
  • Secure container virtualization for smartphone OS based on Linux and Android
  • Smartphone secure element integration in Linux to encrypt Android containers and other cryptographic operations
  • Driver virtualisation multiplexing for a secure mobile operating system
  • Automation of security analysis of firmware images
Vulnerability Research
  • Framework for automated vulnerability collection (crawl vulnerability databases, analyze software changes, categorize vulnerability)
  • Security analysis of IoT systems (methodology, attack vectors, weaknesses)
  • Automated COM/DCOM security testing
  • ALPC Fuzzing and Security Testing Framework
Machine learning
  • Analysis of the effect of trust information on deep learning
  • Developing models for trust computing based on sensor behavior
  • Machine-Learning Based Localization Algorithms
  • Adversarial Machine Learning in Real-World Systems
  • Assessing the robustness and intelligence of Machine Learning based attack detection solutions
  • Generating large network traffic datasets for machine-learning models
  • Privacy preserving data analytics workflows in hybrid cloud environments
  • Assessment and classification of data sensitivity throughout MLOps workflows
Technology Forecasting
  • Quantification of adoption processes in cyber-security technologies: an evolutionary-selection approach
  • It’s time to update your updates: formalizing the optimization of technology-performance metrics to avoid obsolete market indicators
  • Development of a computational model to predict indirect impact of new technologies on cyber-defence
  • The technological landscape as a complex system: capturing technological change through cascading processes of innovation forking mechanisms
  • Forecasting the development of cybersecurity technologies: a causality study using time-series analysis
  • Your solution is obsolete: forecasting de deprecation of cybersecurity technologies by capturing the lag between patents and novel research proposals
  • Assessing the lack of security-by-design in information technologies:  a delay-function approach between technology development and security engineering
  • Technological convergence: a network-analytics approach for capturing common attributes of innovations
  • Told you so: Formalizing and quantifying technological forecasts formulated in natural language to better evaluate their accuracy through NLP and controlled vocabularies
  • Extracting the price of cybersecurity risk for the Swiss and global environment: a factor model approach
  • Modeling latent cash-flows and firm performance for private equity using alternative data and machine learning
  • Modeling the probability of success of early-stage cybersecurity firms using corporate-level and macroeconomic variables
  • 7 whys of cyber-incidents: automated reasoning for cyber-technologies vulnerabilities entailment
Penetration Testing
  • Small footprint datalink over audio interfaces for pentesting purposes (Microphone, Line.Out)
  • Modular micro c2 framework for penetration testing
  • Prediction and Analysis of Crowdsourced Network Dynamics

Topics last updated on 15.12.2022