<html<head</head<body<pre style="word-wrap: break-word; white-space: pre-wrap;"Programming 4 In the final project of this course, you are allowed to explore a security-related project of your own interest as a team. Each team can have up to three students. You would need to get my approval if you want to perform a solo project. Please feel free to meet with me about potential project ideas during my office hours. Some example project ideas are listed as follows: 1: Web security hardening 2: IoT device hacking 3: Malware analysis 4: Rootkit 5: Bootkit 6: Memory forensics 7: ROP (return-oriented programming) attacks 8: Meltdown and Spectre attacks 9: Malware obfuscation 10: Heartbleed attacks 11: Shellshock attacks 12: Android malware 13: Blockchain security 14: Cellular network security 15: Keyloggers 16: Browser security The evaluation part of this project will consist of three parts: (1) Presentation: Each team will present its project on December 4 or 6. All the presentations will be evaluated by your classmates. Your presentation scores will become 10% of your final grade. (2) Technical report: Each team will need to write a technical report of at least five pages excluding bibliography. You can use screenshots or plots in your report. Although you can use references in your report, its main body should describe what you have achieved in this project. (3) Demo: Each team will need to demonstrate its results in the week of December 10 in my office. The technical report and the demo session together will be evaluated as 10% of your final grade. </pre</body</html