Starting from:

$30

Programming 4

<html<head</head<body<pre style="word-wrap: break-word; white-space: pre-wrap;"Programming
4
In the final project of this course, you are allowed to explore a
security-related project of your own interest as a team. Each team can
have up to three students. You would need to get my approval if you
want to perform a solo project. Please feel free to meet with me about
potential project ideas during my office hours.
Some example project ideas are listed as follows:
1: Web security hardening
2: IoT device hacking
3: Malware analysis
4: Rootkit
5: Bootkit
6: Memory forensics
7: ROP (return-oriented programming) attacks
8: Meltdown and Spectre attacks
9: Malware obfuscation
10: Heartbleed attacks
11: Shellshock attacks
12: Android malware
13: Blockchain security
14: Cellular network security
15: Keyloggers
16: Browser security
The evaluation part of this project will consist of three parts:
(1) Presentation: Each team will present its project on December 4 or
6. All the presentations will be evaluated by your classmates. Your
presentation scores will become 10% of your final grade.
(2) Technical report: Each team will need to write a technical report
of at least five pages excluding bibliography. You can use screenshots
or plots in your report. Although you can use references in your
report, its main body should describe what you have achieved in this
project.
(3) Demo: Each team will need to demonstrate its results in the week
of December 10 in my office.
The technical report and the demo session together will be evaluated
as 10% of your final grade.
</pre</body</html

More products