CYD Master Thesis Topics

1

Isolation-based automated network hardening

2

Distance Bounding in Aircraft Collision Avoidance Sytems

3

Synthetic media disinformation: exploration and mitigation of deepfaked video content

4

Building a tool for rapid image retrieval and annotation of internet memes

5

An evaluation of machine learning methods for automated detection of hateful social media content

6

NLP and Sentiment analysis applied to the technological landscape: capturing development risks, investment trends, technological emergence and adoption

7

The technological landscape as a socio-technical complex system: capturing technological change through cascading processes of forking mechanisms

8

A stochastic approach to technological development: applying Markov chains to the path dependency of cybersecurity-related technologies

9

A network-analytics approach to technological development: centrality measures for capturing cascading processes of collective intelligence

10

Link prediction as a survivability indicator of cybersecurity-related technologies and companies

11

Follow the money: machine-learning approaches for identifying emerging cybersecurity-related technologies

12

Longitudinal studies and causality testing: forecasting the development of cybersecurity-related technologies using a time series

13

Technological landscape indicators for measuring the development of cybersecurity-related technologies: modelling the time gap between research and patents

14

Assessing the lack of security-by-design of technology clusters: a delay-function approach applied to technological development and security considerations

15

Technological convergence: a network-analytics approach for capturing common attributes of technological innovation

16

Language detection on short texts and how to distinguish closely related languages

17

Quantifying the impact of source language similarity in multilingual neural machine translation?

18

Causality in social media analysis

19

Tipping points: the cause of disruptive mega-trends?

20

Attestation-based routing implementation

21

Secure container virtualization for smartphone OS based on Linux and Android

22

Smartphone secure element integration in Linux to encrypt Android containers and other cryptographic operations

23

Driver virtualisation multiplexing for a secure mobile operating system

24

Framework for automated vulnerability collection (crawl vulnerability databases, analyze software changes, categorize vulnerability)

25

Security analysis of IoT systems (methodology, attack vectors, weaknesses)

26

Deep learning computation speed-up using in-memory computing

27

Evaluating privacy risks of wearable device data

28

Data obfuscation for privacy-preserving machine learning

29

Machine learning for security and privacy analysis

30

Analysis of the effect of trust information on deep learning

31

Developing models for trust computing based on sensor behavior

32

Troll identification on social networks

33

Sensor localization identification through ADS-B and LTE broadcasting

34

Advanced GPS Attacks

35

Micro UAV Security

36

Security and Privacy of Satellite Communications

37

Machine-Learning Based Localization Algorithms

38

Security Analysis and Practical Attacks on Aircraft Avionics

39

Adversarial Machine Learning in Real-World Systems

40

Network traffic classification and continual learning in a real monitoring environment

41

Intelligent decoys: dynamic containers for medium interacion decoys

42

Cyber red team automation: automated reconnaissance, choice of attack path and system exploitation

43

A software ciphering implementation for voice calls and voice conferences

44

Automated COM/DCOM security testing

45

ALPC Fuzzing and Security Testing Framework

46

Small footprint datalink over audio interfaces for pentesting purposes (Microphone, Line.Out)

47

Modular micro c2 framework for penetration testing

48

Real-time application classification on encrypted traffic

49

Automated network advertising protocol for privacy leakage

50

Automatic decoding of unknown wireless signals with machine learning

51

Privacy risks in mobile applications

Contact

Research Office

Av. Auguste-Piccard 1
CH – 1015 Lausanne


Contact: [email protected]