CYD Master Thesis Topics

The available Master thesis topics are listed below by category. This list is not exhaustive and Master students can also propose their own topic. See more information here.


Wireless Security
  • Signal injection attacks on satellite communication systems
  • Passive localization of satellite ground stations
  • Automated wireless signal decoding on software-defined radios
  • Building a Smartphone App for Defence against Hidden Microphones
  • Building a Smartphone App for Drone Detection
  • Security Analysis and Practical Attacks on Aircraft Avionics
  • Distance Bounding in Aircraft Collision Avoidance Sytems
Network Security
  • Development of a WAN traffic obfuscation system on programmable network switches
  • Implementation of Routing in SCION based hardware and software properties
  • Honeypots: Relation between attack vectors, types of honeypots and threat actors
  • IoT Honeypots
  • Robustness of the DNS system to novel DNS attack types
  • Traffic-analysis attacks in real-world conditions
  • Automated testing of network security policies
  • Detecting proxy servers based on their network traffic
Data science
  • Synthetic Faces: Exploration of recent Text-to-Image Models for Creation of Fake Online Profiles
  • Understanding Video Content of Disinformation Campaigns
  • Malware mitigation through machine learning on IoT devices
  • Automated Satellite Imaging and OSINT Data Pipelines Design for Event Detection
  • Automated Ingestion Pipelines and ML for Deceptive Behaviors in Networks
  • Community Embeddings to Predict Content Dissemination on Social Media
  • Automated Anonymization Pipelines for Privacy-Preserving ML
  • Detection and characterization of structural changes in network topologies
Natural language processing
  • Language detection on short texts and how to distinguish closely related languages
  • Quantifying the impact of source language similarity in multilingual neural machine translation?
  • Benchmarking prompt generation for generative language models
Data Analytics
  • Causality models in time series analysis
  • Predictive analysis of disruptive events (tipping points)
  • Automation of model-agnostic Machine Learning robustness evaluation – Data Science.
  • Topological data analysis for attack detection in energy systems
Mobile security
  • Secure container virtualization for smartphone OS based on Linux and Android
  • Smartphone secure element integration in Linux to encrypt Android containers and other cryptographic operations
  • Driver virtualisation multiplexing for a secure mobile operating system
  • Automation of security analysis of firmware images
Vulnerability Research
  • Framework for automated vulnerability collection (crawl vulnerability databases, analyze software changes, categorize vulnerability)
  • Security analysis of IoT systems (methodology, attack vectors, weaknesses)
  • Automated COM/DCOM security testing
  • ALPC Fuzzing and Security Testing Framework
Machine learning
  • Analysis of the effect of trust information on deep learning
  • Developing models for trust computing based on sensor behavior
  • Machine-Learning Based Localization Algorithms
  • Adversarial Machine Learning in Real-World Systems
  • Assessing the robustness and intelligence of Machine Learning based attack detection solutions
  • Generating large network traffic datasets for machine-learning models
  • Privacy preserving data analytics workflows in hybrid cloud environments
  • Assessment and classification of data sensitivity throughout MLOps workflows
Technology Forecasting
  • Quantification of adoption processes in cyber-security technologies: an evolutionary-selection approach
  • It’s time to update your updates: formalizing the optimization of technology-performance metrics to avoid obsolete market indicators
  • Development of a computational model to predict indirect impact of new technologies on cyber-defence
  • The technological landscape as a complex system: capturing technological change through cascading processes of innovation forking mechanisms
  • Forecasting the development of cybersecurity technologies: a causality study using time-series analysis
  • Your solution is obsolete: forecasting de deprecation of cybersecurity technologies by capturing the lag between patents and novel research proposals
  • Assessing the lack of security-by-design in information technologies:  a delay-function approach between technology development and security engineering
  • Technological convergence: a network-analytics approach for capturing common attributes of innovations
  • Told you so: Formalizing and quantifying technological forecasts formulated in natural language to better evaluate their accuracy through NLP and controlled vocabularies
  • Extracting the price of cybersecurity risk for the Swiss and global environment: a factor model approach
  • Modeling latent cash-flows and firm performance for private equity using alternative data and machine learning
  • Modeling the probability of success of early-stage cybersecurity firms using corporate-level and macroeconomic variables
  • 7 whys of cyber-incidents: automated reasoning for cyber-technologies vulnerabilities entailment
Penetration Testing
  • Small footprint datalink over audio interfaces for pentesting purposes (Microphone, Line.Out)
  • Modular micro c2 framework for penetration testing
  • Prediction and Analysis of Crowdsourced Network Dynamics

Topics last updated on 15.12.2022