Subject:Security/Privacy
Source: https://projects.scss.tcd.ie/subject_area/security-privacy/ Parent: https://projects.scss.tcd.ie
Due to the potential damage a cryptrographically relevant quantum computer could do to uses of widely used asymmetric cryptographic algorithms, a range of new “post-quantum” algorithms have been developed and are being widely deployed, e.g. in TLS in web browsers. This project is to investigate potential timing issues with implementations of such algorithms, likely reproducing … Read more
I am happy to supervise a project in all the areas of computer networking that I am interested in — wireless networking, Machine Learning, Artificial Intelligence and in their application to a wide range of real world settings (healthcare, IoT, structural health monitoring). I am particularly interested in exploring some aspects of quantum computing; for … Read more
Background I’m happy to consider compelling project proposals that involve hardware, networking, security or wireless technologies. Ideally they will be well aligned with my research interests. In recent years students have worked on projects in security and crypto, VPNs, homomorphic encryption, Vehicular Networking, Distributed online control, Underwater communications, music visualisation and some fundamental Quantum Communication … Read more
Background I’m happy to consider compelling project proposals that involve hardware, networking, security or wireless technologies. Ideally they will be well aligned with my research interests. In recent years students have worked on projects in security and crypto, VPNs, homomorphic encryption, Vehicular Networking, Distributed online control, Underwater communications, music visualisation and some fundamental Quantum Communication … Read more
Background I’m happy to consider compelling project proposals that involve hardware, networking, security or wireless technologies. Ideally they will be well aligned with my research interests. Please get in touch In recent years students have worked on projects in security and crypto, VPNs, homomorphic encryption, Vehicular Networking, Distributed online control, Underwater communications, music visualisation and … Read more
The advent of IoT devices led to the creation of many different, distributed machine learning techniques to identify patterns and make logical decisions based on the large volumes of data generated. Traditionally, these devices readily shared their raw data with a centralised server. However, this sharing of raw data is not conducive to maintaining the … Read more
Scanning public-facing Internet services in order to detect security- and privacy-relevant patterns and problems is becomming well-trodden ground. Typical studies attempt Internet-scale IPv4 scans, e.g., to detect uses of outdated ciphers in uses of the Transport Layer Security (TLS) protocol. More local scans (e.g., https://eprint.iacr.org/2018/299) could however produce results that are easier to translate into … Read more
The project is to survey censorship measurement tools and data sets (e.g. https://ooni.org/ and similar), to compare and contrast those, and then use some subset of the identified tooling and data to compare the censorship situation for Internet users based in Ireland against the position of users based in some other country, to be agreed … Read more
Biometric authentication refers to systems that verify the identity of a user by unique traits such us fingerprints, voices or particular physiological features (such as ECG which will be the focus of the project). After having developed such a system based on publicly available data, this project will investigate the possibility of bypassing it using … Read more