CYD Master Thesis Topics
The available Master thesis topics are listed below by category. This list is not exhaustive and Master students can also propose their own topic.

markus-spiske-hvSr_CVecVI-unsplash

Wireless Security
- Signal injection attacks on satellite communication systems
- Passive localization of satellite ground stations
- Automated wireless signal decoding on software-defined radios
- Building a Smartphone App for Defence against Hidden Microphones
- Building a Smartphone App for Drone Detection
- Security Analysis and Practical Attacks on Aircraft Avionics
- Distance Bounding in Aircraft Collision Avoidance Sytems

Network Security
- Development of a WAN traffic obfuscation system on programmable network switches
- Implementation of Routing in SCION based hardware and software properties
- Honeypots: Relation between attack vectors, types of honeypots and threat actors
- IoT Honeypots
- Robustness of the DNS system to novel DNS attack types
- Traffic-analysis attacks in real-world conditions
- Automated testing of network security policies
- Detecting proxy servers based on their network traffic

Data science
- Synthetic Faces: Exploration of recent Text-to-Image Models for Creation of Fake Online Profiles
- Understanding Video Content of Disinformation Campaigns
- Malware mitigation through machine learning on IoT devices
- Automated Satellite Imaging and OSINT Data Pipelines Design for Event Detection
- Automated Ingestion Pipelines and ML for Deceptive Behaviors in Networks
- Community Embeddings to Predict Content Dissemination on Social Media
- Automated Anonymization Pipelines for Privacy-Preserving ML
- Detection and characterization of structural changes in network topologies

Natural language processing
- Language detection on short texts and how to distinguish closely related languages
- Quantifying the impact of source language similarity in multilingual neural machine translation?
- Benchmarking prompt generation for generative language models

Data Analytics
- Causality models in time series analysis
- Predictive analysis of disruptive events (tipping points)
- Automation of model-agnostic Machine Learning robustness evaluation – Data Science.
- Topological data analysis for attack detection in energy systems

Mobile security
- Secure container virtualization for smartphone OS based on Linux and Android
- Smartphone secure element integration in Linux to encrypt Android containers and other cryptographic operations
- Driver virtualisation multiplexing for a secure mobile operating system
- Automation of security analysis of firmware images

Vulnerability Research
- Framework for automated vulnerability collection (crawl vulnerability databases, analyze software changes, categorize vulnerability)
- Security analysis of IoT systems (methodology, attack vectors, weaknesses)
- Automated COM/DCOM security testing
- ALPC Fuzzing and Security Testing Framework

Machine learning
- Analysis of the effect of trust information on deep learning
- Developing models for trust computing based on sensor behavior
- Machine-Learning Based Localization Algorithms
- Adversarial Machine Learning in Real-World Systems
- Assessing the robustness and intelligence of Machine Learning based attack detection solutions
- Generating large network traffic datasets for machine-learning models
- Privacy preserving data analytics workflows in hybrid cloud environments
- Assessment and classification of data sensitivity throughout MLOps workflows

Technology Forecasting
- Quantification of adoption processes in cyber-security technologies: an evolutionary-selection approach
- It’s time to update your updates: formalizing the optimization of technology-performance metrics to avoid obsolete market indicators
- Development of a computational model to predict indirect impact of new technologies on cyber-defence
- The technological landscape as a complex system: capturing technological change through cascading processes of innovation forking mechanisms
- Forecasting the development of cybersecurity technologies: a causality study using time-series analysis
- Your solution is obsolete: forecasting de deprecation of cybersecurity technologies by capturing the lag between patents and novel research proposals
- Assessing the lack of security-by-design in information technologies: a delay-function approach between technology development and security engineering
- Technological convergence: a network-analytics approach for capturing common attributes of innovations
- Told you so: Formalizing and quantifying technological forecasts formulated in natural language to better evaluate their accuracy through NLP and controlled vocabularies
- Extracting the price of cybersecurity risk for the Swiss and global environment: a factor model approach
- Modeling latent cash-flows and firm performance for private equity using alternative data and machine learning
- Modeling the probability of success of early-stage cybersecurity firms using corporate-level and macroeconomic variables
- 7 whys of cyber-incidents: automated reasoning for cyber-technologies vulnerabilities entailment

Penetration Testing
- Small footprint datalink over audio interfaces for pentesting purposes (Microphone, Line.Out)
- Modular micro c2 framework for penetration testing

Crowdsensing
- Prediction and Analysis of Crowdsourced Network Dynamics
Topics last updated on 15.12.2022