Catégorie:4MMSR-mini research project

De Ensiwiki
Aller à : navigation, rechercher

Mycomputer.png  Deuxième Année  CDROM.png  Informatique  Security logo.png  Sécurité  4MMSR-mini research logo.jpg  4MMSR-mini research project 

4MMSR-2012-2013-Network_Security - Mini Research Project

This is the mini-research project page for the course 4MMSR-Network_Security 2012-2013


Project list

Below is a list of projects I thought about. Of course, in case you have something interesting to present, I will be more than happy to discuss about the possibilities of going on with your idea.

Other random ideas


If the students are willing to, best presentations will be presented by themseleves at SecurIMAG (no bonus point granted, but interesting for you and securimag members)


  • 2013-03-30 11pm59 GMT+1: slides introducing your topic:
    • ~7 slides (english) including:
      • title
      • summary
      • introduction
      • problem statement (and formalization)
      • approach flow (what are the inputs? what are the transformations? what are the outputs?)
      • tool architecture
        • what is already existing?
        • what parts will you develop that do not exist now?
      • planning (workload(hours for 1 person) to develop features, experiments) including milestones
    • be concise
    • put references about read papers and presentations (bottom of slide)
    • powerpoint/beamer: be efficient. do not loose time, just to be geeky by attempting to do a latex beamer presentation if you are not used to. content is more important!
    • send the slides on teide (PDF), and commit the source and PDF and push them on the git repository
    • read and apply following basics for creating a research presentation
  • 1st code milestone: Saturday 6th April, 2013, 11pm59 GMT+1
    • meet the objectives we defined together.
    • I will execute your tool, following the instructions you wrote in README.TXT, and will likely fill some bugs in the bugs folder.
    • put your code in the code folder, your slides in the talk folder
    • also commit the UPDATES.txt diary of your work
    • in the UPDATES.txt file, also include a section: FUTURE WORK and PENDING PROBLEMS, if there are still some technical or scientific problems
  • 2nd code milestone: Wednesday 24th April, 2013, 11pm59 GMT+1
    • implementation: 70%
    • UPDATES.txt
  • 3rd code milestone: Saturday, 4th May 2013, 11pm59 GMT+1
    • implémentation: 100%
    • UPDATES.txt
    • list of experiments for next week
    • should have started experiments and got even basic results. please commit them.
  • 1st experiments milestone: Thursday, 9th May 2013, 11pm59 GMT+1
    • experimental results presented in an excel file
    • raw measures, and a graphical representation of your choice
    • TEIDE: UPATES.txt + experiments.xls
  • talk milestone: Saturday 11th may 2013, 11pm59 GMT+1
    • FORMAT:
      • keep in mind: talk duration is (AT MOST 20 minutes) + 5 min questions
      • slides in english ; speech in english or french
      • ~ 15 slides
    • additional content:
        • architecture (graphic showing what already did exist, what you adapted or created, use different colors), used languages, lines of codes (use to measure)
        • main challenges, difficulties + how you overcome those
      • TOOL DEMONSTRATION (~2 min max)
      • EXPERIMENTS: include at least 1 slide of experiments (ideally 1 describing WHAT you want to know, HOW you did measure it, and 1 showing the results). Formulate the WHAT as a Research Question, e.g., does this heuristic reduce the number of tests to find the same vulnerabilities? what is the precision of this classification method?(false positive, false negative)...
      • Conclusion & future work (including additional idea you may have)
    • TEIDE: talk.pdf
  • talk corrections: Monday, May, 13, 2013, 1pm GMT+1
    • perform the correction
    • TEIDE: talk.pdf
    • as usual, slides in english (British or American)
  • presentation to class: Monday may 13th 2013, 2pm GMT+1

SOUTENANCE Following lecturers will be present: Jean-Louis Roch, Cedric Lauradoux, Karim Hossen, and Fabien Duchene. SCHEDULE:

    • Evolutionary PDF file fuzzing in a blackbox harnessing
    • Classification and Inference of SSL Encrypted Traffic
    • Taint-assisted DOM-XSS Fuzzing
    • Android Malware Detection Using Run-Time Properties Monitoring
    • web socket fuzzer
    • VBScript fuzzer