* [[#2019-2020|2019-2020]] * [[#2018-2019|2018-2019]] * [[#2017-2018|2017-2018]] * [[#2016-2017|2016-2017]] * [[#2015-2016|2015-2016]] * [[#2014-2015|2014-2015]] * [[#2013-2014|2013-2014]] * [[#2012-2013|2012-2013]] * [[#2011-2012|2011-2012]] * [[#2010-2011|2010-2011]] * [[#2009-2010|2009-2010]] * [[#2008-2009|2008-2009]] * [[#2007-2008|2007-2008]] * [[#2006-2007|2006-2007]] * [[#2005-2006|2005-2006]] * [[#2004-2005|2004-2005]] * [[#2003-2004|2003-2004]] ====== Archive of OS3 Master's Theses ====== Below is a list of research projects per academic year. Each year has two research project periods of one month each, called Research Project 1 and 2. Research project 2 is the equivalent of the Master's Thesis. Not all papers or presentations are represented since some are confidential. ===== 2020-2021 ===== See [[https://rp.os3.nl|RP site]] ===== 2019-2020 ===== ===== Research Project 2 ===== | {{2019-2020:courses:rp2:p05_report.pdf|Report}}{{2019-2020:courses:rp2:p05_presentation.pdf|Presentation}} ^Server agnostic DNS augmentation using eBPF|| | | //Author//: Tom Carpaij |//Supervisors//: Willem Toorop, Luuk Hendriks | | || | {{2019-2020:courses:rp2:p13_report.pdf|Report}}{{2019-2020:courses:rp2:p13_presentation.pdf|Presentation}} ^Incorporating post-quantum cryptography in a microservice environment|| | | //Author//: Daan Weller, Ronald van der Gaag |//Supervisors//: Cedric Van Bockhaven, Itan Barmes, Vincent van Mieghem | | || | {{2019-2020:courses:rp2:p15_report.pdf|Report}}{{2019-2020:courses:rp2:p15_presentation.pdf|Presentation}} ^Malicious behavior detection based on CyberArk PAS logs through string matching and genetic neural networks|| | | //Author//: Mike Slotboom, Ivar Slotboom |//Supervisors//: Roel Bierens, Bartosz Czaszynski | | || | {{2019-2020:courses:rp2:p20_report.pdf|Report}}{{2019-2020:courses:rp2:p20_presentation.pdf|Presentation}} ^Detecting Botnets Communicating with Command and Control Servers with DNS and NetFlow Data|| | | //Author//: Hoang Huynh, Mathijs Visser |//Supervisors//: Eddie Bijnen | | || | {{2019-2020:courses:rp2:p21_report.pdf|Report}}{{2019-2020:courses:rp2:p21_presentation.pdf|Presentation}} ^Advanced Persistent Threat detection for Industrial Control Systems|| | | //Author//: Dominika Rusek, Steffan Roobol |//Supervisors//: Derre Hendrik, Deneut Tijl | | || | {{2019-2020:courses:rp2:p25_report.pdf|Report}}{{2019-2020:courses:rp2:p25_presentation.pdf|Presentation}} ^Incentivize decentralized WiFi roaming through VPN on home routers|| | | //Author//: |//Supervisors//: Peter Boers | | || | {{2019-2020:courses:rp2:p29_report.pdf|Report}}{{2019-2020:courses:rp2:p29_presentation.pdf|Presentation}} ^Detecting Cobalt Strike beacons in NetFlow data|| | | //Author//: Vincent van der Eijk, Coen Schuijt |//Supervisors//: Ralph Koning | | || | {{2019-2020:courses:rp2:p54_report.pdf|Report}}{{2019-2020:courses:rp2:p54_presentation.pdf|Presentation}} ^Collecting telemetry data using P4 and RDMA|| | | //Author//: Silke Knossen, Rutger Beltman |//Supervisors//: Joseph Hill, Paola Grosso | | || | {{2019-2020:courses:rp2:p58_report.pdf|Report}}{{2019-2020:courses:rp2:p58_presentation.pdf|Presentation}} ^The integration of Ethernet Virtual Private Network in Kubernetes|| | | //Author//: Frank Potter |//Supervisors//: Attilla de Groot | | || | {{2019-2020:courses:rp2:p68_report.pdf|Report}}{{2019-2020:courses:rp2:p68_presentation.pdf|Presentation}} ^End-to-end security in LoRa and NB-IoT sensor networks.|| | | //Author//: Niek van Noort, Jason Kerssens |//Supervisors//: Cedric Both | | || | {{2019-2020:courses:rp2:p71_report.pdf|Report}}{{2019-2020:courses:rp2:p71_presentation.pdf|Presentation}} ^Performance comparison of VPN implementations WireGuard, strongSwan, and OpenVPN in a 1 Gbit/s environment|| | | //Author//: Patrick Spaans, Erik Dekker |//Supervisors//: Aristide Bouix, Mohammad Al Najar | | || | {{2019-2020:courses:rp2:p72_report.pdf|Report}}{{2019-2020:courses:rp2:p72_presentation.pdf|Presentation}} ^Analysis of Bypassing Detection by Microsoft Advanced Threat Analytics|| | | //Author//: Edgar Bohte, Nick Offerman |//Supervisors//: Cedric Van Bockhaven | | || | {{2019-2020:courses:rp2:p73_report.pdf|Report}}{{2019-2020:courses:rp2:p73_presentation.pdf|Presentation}} ^Iris recognition using low resolution photographs from commodity sensors|| | | //Author//: Roy Vermeulen |//Supervisors//: Zeno Geradts | | || | {{2019-2020:courses:rp2:p74_report.pdf|Report}}{{2019-2020:courses:rp2:p74_presentation.pdf|Presentation}} ^Deepfake detection through PRNU and logistic regression analyses|| | | //Author//: Catherine de Weever, Sebastian Wilczek |//Supervisors//: Zeno Geradts | | || | {{2019-2020:courses:rp2:p77_report.pdf|Report}}{{2019-2020:courses:rp2:p77_presentation.pdf|Presentation}} ^Monitoring an EVPN-VxLAN fabric with BGP Monitoring Protocol|| | | //Author//: Giacomo Casoni, Davide Pucci |//Supervisors//: Vivek Venkatraman, Donald Sharp, Attilla de Groot | | || | {{2019-2020:courses:rp2:p78_report.pdf|Report}}{{2019-2020:courses:rp2:p78_presentation.pdf|Presentation}} ^Defragmenting DNS: Determining the optimal maximum UDP response size for DNS|| | | //Author//: Axel Koolhaas, Tjeerd Slokker |//Supervisors//: Willem Toorop, Roland van Rijswijk-Deij | | || | {{2019-2020:courses:rp2:p86_report.pdf|Report}}{{2019-2020:courses:rp2:p86_presentation.pdf|Presentation}} ^Using TURN Servers as Proxies|| | | //Author//: Sean Liao |//Supervisors//: Cedric van Bockhaven, Jan Freudenreich | | || | {{2019-2020:courses:rp2:p95_report.pdf|Report}}{{2019-2020:courses:rp2:p95_presentation.pdf|Presentation}} ^An Evaluation of IPFS as a Distribution Mechanism for RPKI Repository|| | | //Author//: Dadepo Aderemi, Woudt van Steenbergen |//Supervisors//: Luuk Hendriks | | || | {{2019-2020:courses:rp2:p99_report.pdf|Report}}{{2019-2020:courses:rp2:p99_presentation.pdf|Presentation}} ^Securing home Wi-Fi with WPA3 personal|| | | //Author//: Raoul Dijksman, Erik Lamers |//Supervisors//: Arjan van der Vegt | | || | {{2019-2020:courses:rp2:p100_report.pdf|Report}}{{2019-2020:courses:rp2:p100_presentation.pdf|Presentation}} ^Investigative Research of an IP Peering Service for NetherLight|| | | //Author//: Arnold Buntsma, Mar Badias Simó |//Supervisors//: Gerben van Malenstein, Migiel de Vos, Max Mudde | | || | {{2019-2020:courses:rp2:p101_report.pdf|Report}}{{2019-2020:courses:rp2:p101_presentation.pdf|Presentation}} ^Securing the Automatic Dependent Surveillance-Broadcast (ADS-B) protocol against spoofing|| | | //Author//: Tim de Boer |//Supervisors//: Jan-Joris van Es, Nico de Gelder | | || | {{2019-2020:courses:rp2:p102_report.pdf|Report}}{{2019-2020:courses:rp2:p102_presentation.pdf|Presentation}} ^Requirements for extracting ENF data to correctly timestamp a video|| | | //Author//: Thomas Ouddeken, Niels den Otter |//Supervisors//: Zeno Geradts | | || | {{2019-2020:courses:rp2:p103_report.pdf|Report}}{{2019-2020:courses:rp2:p103_presentation.pdf|Presentation}} ^Automated reverse-engineering of CAN messages using OBD-II and correlation coefficients|| | | //Author//: Vincent Kieberl, Bram Blaauwendraad |//Supervisors//: Sander Ubink, Ruben Koeze | | || | {{2019-2020:courses:rp2:p104_report.pdf|Report}}{{2019-2020:courses:rp2:p104_presentation.pdf|Presentation}} ^Securely accessing remote sensors in critical infrastructures.|| | | //Author//: Pavlos Lontorfos |//Supervisors//: Cedric Both | | || ===== Research Project 1 ===== | {{2019-2020:courses:rp1:p01_report.pdf|Report}}{{2019-2020:courses:rp1:p01_presentation.pdf|Presentation}} ^Zero Trust Network Security Model in containerized environments|| | | //Author//: Catherine de Weever, Marios Andreou |//Supervisors//: Jeroen Scheerder | | || | {{2019-2020:courses:rp1:p04_report.pdf|Report}}{{2019-2020:courses:rp1:p04_presentation.pdf|Presentation}} ^The Current State of DNS Resolversand RPKI Protection|| | | //Author//: Erik Dekker, Marius Brouwer |//Supervisors//: Willem Toorop | | || | {{2019-2020:courses:rp1:p42_report.pdf|Report}}{{2019-2020:courses:rp1:p42_presentation.pdf|Presentation}} ^Digital Forensic Investigation of Data Theft on the Google Cloud Platform|| | | //Author//: Frank Wiersma, Tjeerd Slokker |//Supervisors//: Korstiaan Stam | | || | {{2019-2020:courses:rp1:p23_report.pdf|Report}}{{2019-2020:courses:rp1:p23_presentation.pdf|Presentation}} ^APFS Slack Analysis and Detection of Hidden Data|| | | //Author//: Axel Koolhaas, Woudt van Steenbergen |//Supervisors//: Danny Kielman | | || | {{2019-2020:courses:rp1:p30_report.pdf|Report}}{{2019-2020:courses:rp1:p30_presentation.pdf|Presentation}} ^Elastic Named Data Network (NDN) for data centric application in cloud environments|| | | //Author//: Sean Liao |//Supervisors//: Zhiming Zhao | | || | {{2019-2020:courses:rp1:p60_report.pdf|Report}}{{2019-2020:courses:rp1:p60_presentation.pdf|Presentation}} ^Ibis Data Serialization in Apache Spark|| | | //Author//: Dadepo Aderemi, Mathijs Visser |//Supervisors//: Jason Maassen, Adam Belloum | | || | {{2019-2020:courses:rp1:p43_report.pdf|Report}}{{2019-2020:courses:rp1:p43_presentation.pdf|Presentation}} ^Anomaly Detection on Log Files Based on Simplicity Theory|| | | //Author//: Giacomo Casoni, Mar Badias Simó |//Supervisors//: Giovanni Sileno | | || | {{2019-2020:courses:rp1:p49_report.pdf|Report}}{{2019-2020:courses:rp1:p49_presentation.pdf|Presentation}} ^Analyzing and enhancing embedded software technologies on RISC-V64 using the Ghidra framework|| | | //Author//: Patrick Spaans, Joris Jonkers Both |//Supervisors//: Alexandru Geana, Karolina Mrozek, Dana Geist | | || | {{2019-2020:courses:rp1:p65_report.pdf|Report}}{{2019-2020:courses:rp1:p65_presentation.pdf|Presentation}} ^Security Evaluation on Amazon Web Services’ REST API Authentication Protocol Signature Version 4|| | | //Author//: Hoang Huynh, Jason Kerssens |//Supervisors//: Alex Stavroulakis, Aristide Bouix | | || | {{2019-2020:courses:rp1:p41_report.pdf|Report}}{{2019-2020:courses:rp1:p41_presentation.pdf|Presentation}} ^Generating probable password candidates for the assessment of Dutch domain password hashes|| | | //Author//: Tom Broumels |//Supervisors//: Pim Campers | | || | {{2019-2020:courses:rp1:p52_report.pdf|Report}}{{2019-2020:courses:rp1:p52_presentation.pdf|Presentation}} ^Network Anomaly Detection in Modbus TCP Industrial Control Systems|| | | //Author//: Philipp Mieden, Rutger Beltman |//Supervisors//: Bartosz Czaszynski | | || | {{2019-2020:courses:rp1:p50_report.pdf|Report}}{{2019-2020:courses:rp1:p50_presentation.pdf|Presentation}} ^The influence of the training set size on the performance of the Robust Covariance Estimator as an anomaly detection algorithm on automotive CAN data|| | | //Author//: Silke Knossen, Vincent Kieberl |//Supervisors//: Colin Schappin | | || | {{2019-2020:courses:rp1:p51_report.pdf|Report}}{{2019-2020:courses:rp1:p51_presentation.pdf|Presentation}} ^Cybersecurity in Automotive Networks|| | | //Author//: Arnold Buntsma, Sebastian Wilczek |//Supervisors//: Colin Schappin | | || | {{2019-2020:courses:rp1:p40_report.pdf|Report}}{{2019-2020:courses:rp1:p40_presentation.pdf|Presentation}} ^Tunneling data over a Citrix virtual channel|| | | //Author//: Ward Bakker, Niels den Otter |//Supervisors//: Cedric Van Bockhaven | | || | {{2019-2020:courses:rp1:p61_report.pdf|Report}}{{2019-2020:courses:rp1:p61_presentation.pdf|Presentation}} ^Using Mimikatz’ driver, Mimidrv, to disable Windows Defender in Windows|| | | //Author//: Bram Blaauwendraad, Thomas Ouddeken |//Supervisors//: Cedric Van Bockhaven | | || | {{2019-2020:courses:rp1:p56_report.pdf|Report}}{{2019-2020:courses:rp1:p56_presentation.pdf|Presentation}} ^Detecting Fileless Malicious Behaviour of .NET C2 Agents using ETW|| | | //Author//: Alexander Bode, Niels Warnars |//Supervisors//: Leandro Velasco, Jeroen Klaver | | || | {{2019-2020:courses:rp1:p55_report.pdf|Report}}{{2019-2020:courses:rp1:p55_presentation.pdf|Presentation}} ^Scoring model for IoCs by combining open intelligence feeds to reduce false positives|| | | //Author//: Jelle Ermerins, Niek van Noort |//Supervisors//: Leandro Velasco, João Carlos De Novais Marques | | || | {{2019-2020:courses:rp1:p53_report.pdf|Report}}{{2019-2020:courses:rp1:p53_presentation.pdf|Presentation}} ^Using BGP Flow-Spec for distributed micro-segmentation|| | | //Author//: Davide Pucci |//Supervisors//: Attilla de Groot | | || | {{2019-2020:courses:rp1:p08_report.pdf|Report}}{{2019-2020:courses:rp1:p08_presentation.pdf|Presentation}} ^APFS checkpoint management behaviour in macOS|| | | //Author//: Maarten van der Slik |//Supervisors//: Zeno Geradts, Ruud Schramp | | || | {{2019-2020:courses:rp1:p67_report.pdf|Report}}{{2019-2020:courses:rp1:p67_presentation.pdf|Presentation}} ^Insight in Cyber Safety when Remotely Operating SCADA Systems of Dutch Critical Infrastructure Objects|| | | //Author//: Tina Tami |//Supervisors//: Cedric Both | | || | {{2019-2020:courses:rp1:p02_report.pdf|Report}}{{2019-2020:courses:rp1:p02_presentation.pdf|Presentation}} ^Mobility as a Service(MaaS) and Privacy|| | | //Author//: Alexander Blaauwgeers |//Supervisors//: Alex Stavroulakis | | || ===== 2018-2019 ===== ===== Research Project 2 ===== | {{2018-2019:courses:rp2:p01_report.pdf|Report}}{{2018-2019:courses:rp2:p01_presentation.pdf|Presentation}} ^Automated end-to-end e-mail component testing|| | | //Author//: Isaac Klop, Kevin Csuka |//Supervisors//: Michiel Leenaars | | || | {{2018-2019:courses:rp2:p29_report.pdf|Report}}{{2018-2019:courses:rp2:p29_presentation.pdf|Presentation}} ^Availability analysis of SURFwireless|| | | //Author//: Kasper van Brakel |//Supervisors//: Frans Panken | | || | {{2018-2019:courses:rp2:p31_report.pdf|Report}}{{2018-2019:courses:rp2:p31_presentation.pdf|Presentation}} ^Scaling AMS-IX Route Servers|| | | //Author//: David Garay |//Supervisors//: Stavros Konstantaras | | || | {{2018-2019:courses:rp2:p38_report.pdf|Report}}{{2018-2019:courses:rp2:p38_presentation.pdf|Presentation}} ^IoT (D)DoS prevention and corporate responsibility: A model to prevent polluting the internet|| | | //Author//: Swann Scholtes |//Supervisors//: Alex Stavroulakis | | || | {{2018-2019:courses:rp2:p44_report.pdf|Report}}{{2018-2019:courses:rp2:p44_presentation.pdf|Presentation}} ^Pairing attacks on the Bluetooth Low Energy Protocol|| | | //Author//: Vincent Breider, Marko Spithoff |//Supervisors//: Hidde-Jan Jongsma | | || | {{2018-2019:courses:rp2:p55_report.pdf|Report}}{{2018-2019:courses:rp2:p55_presentation.pdf|Presentation}} ^Planning and Scaling a Named Data Network with Persistent Identifier Interoperability|| | | //Author//: Kees de Jong, Anas Younis |//Supervisors//: Zhiming Zhao | | || | {{2018-2019:courses:rp2:p61_report.pdf|Report}}{{2018-2019:courses:rp2:p61_presentation.pdf|Presentation}} ^Bypassing phishing protections with email authentication|| | | //Author//: Adrien Raulot |//Supervisors//: Alex Stavroulakis, Marat Nigmatullin | | || | {{2018-2019:courses:rp2:p76_report.pdf|Report}}{{2018-2019:courses:rp2:p76_presentation.pdf|Presentation}} ^Practical Implications of Graphene-SGX|| | | //Author//: Robin Klusman, Derk Barten |//Supervisors//: Gijs Hollestelle | | || ===== Research Project 1 ===== | {{2018-2019:courses:rp1:p12_report.pdf|Report}}{{2018-2019:courses:rp1:p12_presentation.pdf|Presentation}} ^Technical feasibility of Segment Routing Traffic Engineering to steer traffic through VNFs|| | | //Author//: Ronald van der Gaag, Mike Slotboom |//Supervisors//: Marijke Kaat, Eyle Brinkhuis | | || | {{2018-2019:courses:rp1:p20_report.pdf|Report}}{{2018-2019:courses:rp1:p20_presentation.pdf|Presentation}} ^Network Peering Dashboard for SURFnet|| | | //Author//: David Garay |//Supervisors//: Jac Kloots, Marijke Kaat | | || | {{2018-2019:courses:rp1:p24_report.pdf|Report}}{{2018-2019:courses:rp1:p24_presentation.pdf|Presentation}} ^Investigation of security on Chinese smartwatches|| | | //Author//: Kasper van Brakel, Renee Witsenburg |//Supervisors//: Alex Stavroulakis | | || | {{2018-2019:courses:rp1:p25_report.pdf|Report}}{{2018-2019:courses:rp1:p25_presentation.pdf|Presentation}} ^WhatsApp End-to-End Encryption: Are Our Messages Private?|| | | //Author//: Pavlos Lontorfos, Tom Carpaij |//Supervisors//: Alex Stavroulakis | | || | {{2018-2019:courses:rp1:p27_report.pdf|Report}}{{2018-2019:courses:rp1:p27_presentation.pdf|Presentation}} ^Probabilistic password recognition|| | | //Author//: Tiko Huizinga |//Supervisors//: Zeno Geradts | | || | {{2018-2019:courses:rp1:p28_report.pdf|Report}}{{2018-2019:courses:rp1:p28_presentation.pdf|Presentation}} ^Developing a contained and user emulated malware assessment platform|| | | //Author//: Siebe Hodzelmans, Frank Potter |//Supervisors//: Vincent van Mieghem, Henri Hambartsumyan | | || | {{2018-2019:courses:rp1:p41_report.pdf|Report}}{{2018-2019:courses:rp1:p41_presentation.pdf|Presentation}} ^Security evaluation of glucose monitoring applications for Android smartphones|| | | //Author//: Roy Vermeulen, Edgar Bohte |//Supervisors//: Ruud Verbij | | || | {{2018-2019:courses:rp1:p57_report.pdf|Report}}{{2018-2019:courses:rp1:p57_presentation.pdf|Presentation}} ^A Deep Dive into the Dark Web|| | | //Author//: Coen Schuijt |//Supervisors//: Stijn van Winsen, Soufiane el Aissaoui | | || | {{2018-2019:courses:rp1:p59_report.pdf|Report}}{{2018-2019:courses:rp1:p59_presentation.pdf|Presentation}} ^Client-side Attacks on the LastPass Browser Extension|| | | //Author//: Derk Barten |//Supervisors//: Cedric Van Bockhaven | | || | {{2018-2019:courses:rp1:p62_report.pdf|Report}}{{2018-2019:courses:rp1:p62_presentation.pdf|Presentation}} ^Characterization of a Cortex-M4 based microcontroller using optical fault injection|| | | //Author//: Jasper Hupkens, Dominika Rusek |//Supervisors//: Niek Timmers | | || | {{2018-2019:courses:rp1:p63_report.pdf|Report}}{{2018-2019:courses:rp1:p63_presentation.pdf|Presentation}} ^Invisible Internet Project (I2P)|| | | //Author//: Vincent Breider, Tim de Boer |//Supervisors//: Henri Hambartsumyan, Vincent van Mieghem, Fons Mijnen | | || | {{2018-2019:courses:rp1:p64_report.pdf|Report}}{{2018-2019:courses:rp1:p64_presentation.pdf|Presentation}} ^A Comparative Security Evaluation for IPv4 and Ipv6 Addresses|| | | //Author//: Erik Lamers, Vincent van der Eijk |//Supervisors//: Tobias Fiebig | | || | {{2018-2019:courses:rp1:p79_report.pdf|Report}}{{2018-2019:courses:rp1:p79_presentation.pdf|Presentation}} ^Development of Techniques to Remove Kerberos Credentials from Windows Systems|| | | //Author//: Nick Offerman, Steffan Roobol |//Supervisors//: Dima van de Wouw | | || ===== 2017-2018 ===== ===== Research Project 2 ===== | {{2017-2018:courses:rp2:p01_report.pdf|Report}}{{2017-2018:courses:rp2:p01_presentation.pdf|Presentation}} ^Security By Default: A Comparative Security Evaluation of Default Configurations|| | | //Author//: Bernardus Jansen |//Supervisors//: Tobias Fiebig, Ralph Koning | | || | {{2017-2018:courses:rp2:p05_report.pdf|Report}}{{2017-2018:courses:rp2:p05_presentation.pdf|Presentation}} ^Low-level writing to NTFS file systems|| | | //Author//: Rick van Gorp |//Supervisors//: Cedric Van Bockhaven | | || | {{2017-2018:courses:rp2:p08_report.pdf|Report}}{{2017-2018:courses:rp2:p08_presentation.pdf|Presentation}} ^A Blockchain based Data Production Traceability System|| | | //Author//: Sandino Moeniralam |//Supervisors//: Sjaak Koot | | || | {{2017-2018:courses:rp2:p19_report.pdf|Report}}{{2017-2018:courses:rp2:p19_presentation.pdf|Presentation}} ^An analysis of the scale-invariance of graph algorithms: A case study.|| | | //Author//: Tim van Zalingen |//Supervisors//: Merijn Verstraaten | | || | {{2017-2018:courses:rp2:p20_report.pdf|Report}}{{2017-2018:courses:rp2:p20_presentation.pdf|Presentation}} ^Opcode statistics for detecting compiler settings|| | | //Author//: Kenneth van Rijsbergen |//Supervisors//: Armijn Hemel | | || | {{2017-2018:courses:rp2:p22_report.pdf|Report}}{{2017-2018:courses:rp2:p22_presentation.pdf|Presentation}} ^Optimal network design of SURFnet8, using TI-LFA and Segment Routing|| | | //Author//: Péter Prjevara, Fouad Makioui |//Supervisors//: Marijke Kaat, Wouter Huisman | | || | {{2017-2018:courses:rp2:p23_report.pdf|Report}}{{2017-2018:courses:rp2:p23_presentation.pdf|Presentation}} ^DDoS Defense Mechanisms for IXP Infrastructures|| | | //Author//: Lennart van Gijtenbeek, Tim Dijkhuizen |//Supervisors//: Stavros Konstantaras | | || | {{2017-2018:courses:rp2:p30_report.pdf|Report}}{{2017-2018:courses:rp2:p30_presentation.pdf|Presentation}} ^Content-based Classification of Fraudulent Webshops|| | | //Author//: Sjors Haanen, Mick Cox |//Supervisors//: Marco Davids, Maarten Wullink | | || | {{2017-2018:courses:rp2:p35_report.pdf|Report}}{{2017-2018:courses:rp2:p35_presentation.pdf|Presentation}} ^Bypassing Phishing Filters|| | | //Author//: Shahrukh Zaidi |//Supervisors//: Rick van Galen, Alex Stavroulakis | | || | {{2017-2018:courses:rp2:p76_report.pdf|Report}}{{2017-2018:courses:rp2:p76_presentation.pdf|Presentation}} ^Improving Semantic Quality of Topic Models for Forensic Investigations|| | | //Author//: Henri Trenquier |//Supervisors//: Rob van Nieuwpoort, Carlos Martinez Ortiz | | || | {{2017-2018:courses:rp2:p84_report.pdf|Report}}{{2017-2018:courses:rp2:p84_presentation.pdf|Presentation}} ^Using Fault Injection to weaken RSA public key verification|| | | //Author//: Ivo van der Elzen |//Supervisors//: Ronan Loftus | | || | {{2017-2018:courses:rp2:p88_report.pdf|Report}}{{2017-2018:courses:rp2:p88_presentation.pdf|Presentation}} ^Automated analysis of AWS infrastructures|| | | //Author//: Peter Bennink |//Supervisors//: Cedric Van Bockhaven | | || | {{2017-2018:courses:rp2:p89_report.pdf|Report}}{{2017-2018:courses:rp2:p89_presentation.pdf|Presentation}} ^How to Spot the Blue Team|| | | //Author//: Rick Lahaye |//Supervisors//: Marc Smeets | | || | {{2017-2018:courses:rp2:p91_report.pdf|Report}}{{2017-2018:courses:rp2:p91_presentation.pdf|Presentation}} ^Towards predicting network device failures: An analysis of time-series and syslog data|| | | //Author//: Henk van Doorn, Chris Kuipers |//Supervisors//: Marijke Kaat, Peter Boers | | || | {{2017-2018:courses:rp2:p92_report.pdf|Report}}{{2017-2018:courses:rp2:p92_presentation.pdf|Presentation}} ^DoS on a Bitcoin Lightning Network channel.|| | | //Author//: Willem Rens |//Supervisors//: Oskar van Deventer, Maarten Everts | | || | {{2017-2018:courses:rp2:p93_report.pdf|Report}}{{2017-2018:courses:rp2:p93_presentation.pdf|Presentation}} ^Privacy analysis of DNS resolver solutions|| | | //Author//: Jeroen van Heugten |//Supervisors//: Martin Hoffmann, Ralph Dolmans | | || | {{2017-2018:courses:rp2:p95_report.pdf|Report}}{{2017-2018:courses:rp2:p95_presentation.pdf|Presentation}} ^Targeted GPS spoofing|| | | //Author//: Luc Gommans, Bart Hermans |//Supervisors//: Ralph Moonen | | || | {{2017-2018:courses:rp2:p96_report.pdf|Report}}{{2017-2018:courses:rp2:p96_presentation.pdf|Presentation}} ^Verifying email security techniques for Dutch organizations|| | | //Author//: Vincent van Dongen |//Supervisors//: George Thessalonikefs, Ralph Dolmans | | || | {{2017-2018:courses:rp2:p97_report.pdf|Report}}{{2017-2018:courses:rp2:p97_presentation.pdf|Presentation}} ^Blockchain-based Sybil Attack Mitigation: A Case Study of the I2P Network|| | | //Author//: Dirk Gaastra, Kotaiba Alachkar |//Supervisors//: Henri Hambartsumyan, Vincent van Mieghem | | || | {{2017-2018:courses:rp2:p98_report.pdf|Report}}{{2017-2018:courses:rp2:p98_presentation.pdf|Presentation}} ^Tor: Hidden Service Intelligence Extraction|| | | //Author//: João Carlos De Novais Marques |//Supervisors//: Rik van Duijn, Leandro Velasco | | || ===== Research Project 1 ===== | {{2017-2018:courses:rp1:p14_report.pdf|Report}}{{2017-2018:courses:rp1:p14_presentation.pdf|Presentation}} ^Microsoft Office Upload Center Cache Files in Forensic Investigations|| | | //Author//: Rick van Gorp, Kotaiba Alachkar |//Supervisors//: Yonne de Bruijn | | || | {{2017-2018:courses:rp1:p16_report.pdf|Report}}{{2017-2018:courses:rp1:p16_presentation.pdf|Presentation}} ^Network Functions Virtualization|| | | //Author//: Bernardus Jansen |//Supervisors//: Marijke Kaat | | || | {{2017-2018:courses:rp1:p37_report.pdf|Report}}{{2017-2018:courses:rp1:p37_presentation.pdf|Presentation}} ^Pentest Accountability By Analyzing Network Traffic & Network Traffic Metadata|| | | //Author//: Marko Spithoff, Henk van Doorn |//Supervisors//: Rick van Galen | | || | {{2017-2018:courses:rp1:p42_report.pdf|Report}}{{2017-2018:courses:rp1:p42_presentation.pdf|Presentation}} ^An Analysis of Atomic Swaps on and between Ethereum Blockchains using Smart Contracts|| | | //Author//: Peter Bennink, Lennart van Gijtenbeek |//Supervisors//: Oskar van Deventer, Maarten Everts | | || | {{2017-2018:courses:rp1:p50_report.pdf|Report}}{{2017-2018:courses:rp1:p50_presentation.pdf|Presentation}} ^Virtual infrastructure partitioning and provisioning under nearly real-time constraints|| | | //Author//: Andrey Afanas'yev |//Supervisors//: Zhiming Zhao, Arie Taal | | || | {{2017-2018:courses:rp1:p53_report.pdf|Report}}{{2017-2018:courses:rp1:p53_presentation.pdf|Presentation}} ^Feasibility of Cryptocurrency on Mobile devices|| | | //Author//: Sander Lentink, Anas Younis |//Supervisors//: Rick van Galen | | || | {{2017-2018:courses:rp1:p57_report.pdf|Report}}{{2017-2018:courses:rp1:p57_presentation.pdf|Presentation}} ^Capability analyses of mdtmFTP|| | | //Author//: Kees de Jong |//Supervisors//: Leon Gommans | | || | {{2017-2018:courses:rp1:p61_report.pdf|Report}}{{2017-2018:courses:rp1:p61_presentation.pdf|Presentation}} ^Deanonymisation in Ethereum Using Existing Methods for Bitcoin|| | | //Author//: Tim Dijkhuizen, Robin Klusman |//Supervisors//: Arno Bakker | | || | {{2017-2018:courses:rp1:p62_report.pdf|Report}}{{2017-2018:courses:rp1:p62_presentation.pdf|Presentation}} ^Breaking CAPTCHAs on the Dark Web|| | | //Author//: Dirk Gaastra, Kevin Csuka |//Supervisors//: Yonne de Bruijn | | || | {{2017-2018:courses:rp1:p64_report.pdf|Report}}{{2017-2018:courses:rp1:p64_presentation.pdf|Presentation}} ^Improving Machine Learning based Intrusion and Anomaly Detection on SCADA and DCS using Case Specific Information|| | | //Author//: Péter Prjevara |//Supervisors//: Dima van de Wouw | | || | {{2017-2018:courses:rp1:p66_report.pdf|Report}}{{2017-2018:courses:rp1:p66_presentation.pdf|Presentation}} ^Framework for profiling critical pathrelated algorithms|| | | //Author//: Henri Trenquier |//Supervisors//: Zhiming Zhao | | || | {{2017-2018:courses:rp1:p71_report.pdf|Report}}{{2017-2018:courses:rp1:p71_presentation.pdf|Presentation}} ^Containerized Workflow Scheduling|| | | //Author//: Isaac Klop |//Supervisors//: Zhiming Zhao | | || | {{2017-2018:courses:rp1:p80_report.pdf|Report}}{{2017-2018:courses:rp1:p80_presentation.pdf|Presentation}} ^Categorizing container escape methodologies in multi-tenant environments|| | | //Author//: Rik Janssen |//Supervisors//: Rick van Galen | | || | {{2017-2018:courses:rp1:p82_report.pdf|Report}}{{2017-2018:courses:rp1:p82_presentation.pdf|Presentation}} ^Detection of Browser Fingerprinting by Static JavaScript Code Classification|| | | //Author//: Sjors Haanen, Tim van Zalingen |//Supervisors//: Aidan Barrington | | || | {{2017-2018:courses:rp1:p83_report.pdf|Report}}{{2017-2018:courses:rp1:p83_presentation.pdf|Presentation}} ^Large-scale Netflow Information Management|| | | //Author//: Shahrukh Zaidi, Adrien Raulot |//Supervisors//: Marijke Kaat, Wim Biemolt | | || | {{2017-2018:courses:rp1:p85_report.pdf|Report}}{{2017-2018:courses:rp1:p85_presentation.pdf|Presentation}} ^Plug-and-play Raspberry Pi-based video filtration system: A novel approach to real-time on the wire reversible PII anonymization in video streams using commodity hardware|| | | //Author//: Swann Scholtes, Chris Kuipers |//Supervisors//: Junaid Chaudhry | | || | {{2017-2018:courses:rp1:p86_report.pdf|Report}}{{2017-2018:courses:rp1:p86_presentation.pdf|Presentation}} ^Probabilistic Passphrase Cracking|| | | //Author//: Luc Gommans |//Supervisors//: Melanie Rieback | | || ===== 2016-2017 ===== ===== Research Project 2 ===== | {{2016-2017:courses:rp2:p12_report.pdf|Report}}{{2016-2017:courses:rp2:p12_presentation.pdf|Presentation}} ^Measuring Performance Overhead of Trans-encrypting HTTP Adaptive Streaming|| | | //Author//: Abe Wiersma |//Supervisors//: Oskar van Deventer | | || | {{2016-2017:courses:rp2:p42_report.pdf|Report}}{{2016-2017:courses:rp2:p42_presentation.pdf|Presentation}} ^Formal verification of the implementation of the MQTT protocol in IoT devices|| | | //Author//: Kris Mladenov |//Supervisors//: Rick van Galen | | || | {{2016-2017:courses:rp2:p50_report.pdf|Report}}{{2016-2017:courses:rp2:p50_presentation.pdf|Presentation}} ^Automated embedding of dynamic libraries into iOS applications from GNU/Linux|| | | //Author//: Marwin Baumann, Leandro Velasco |//Supervisors//: Cedric Van Bockhaven | | || | {{2016-2017:courses:rp2:p53_report.pdf|Report}}{{2016-2017:courses:rp2:p53_presentation.pdf|Presentation}} ^Security considerations in Docker Swarm networking|| | | //Author//: Marcel Brouwers |//Supervisors//: Esan Wit | | || | {{2016-2017:courses:rp2:p58_report.pdf|Report}}{{2016-2017:courses:rp2:p58_presentation.pdf|Presentation}} ^Calculating the Energy Consumption of a Website|| | | //Author//: Anouk Boukema |//Supervisors//: Maarten de Waard | | || | {{2016-2017:courses:rp2:p60_report.pdf|Report}}{{2016-2017:courses:rp2:p60_presentation.pdf|Presentation}} ^A hybrid system for automatic exchanges of routing information|| | | //Author//: Stamatios Maritsas |//Supervisors//: Stavros Konstantaras | | || | {{2016-2017:courses:rp2:p66_report.pdf|Report}}{{2016-2017:courses:rp2:p66_presentation.pdf|Presentation}} ^Improving the Energy Efficiency of SURFwireless|| | | //Author//: Jeroen van Leur |//Supervisors//: Frans Panken, Marijke Kaat | | || | {{2016-2017:courses:rp2:p70_report.pdf|Report}}{{2016-2017:courses:rp2:p70_presentation.pdf|Presentation}} ^Application aware digital objects access and distribution using Named Data Networking (NDN)|| | | //Author//: Rahaf Mousa |//Supervisors//: Zhiming Zhao, Lucia D'Acunto, Paul Martin | | || | {{2016-2017:courses:rp2:p71_report.pdf|Report}}{{2016-2017:courses:rp2:p71_presentation.pdf|Presentation}} ^Collecting, cataloguing and searching performance information of Cloud resources|| | | //Author//: Olaf Elzinga |//Supervisors//: Zhiming Zhao, Arie Taal | | || | {{2016-2017:courses:rp2:p82_report.pdf|Report}}{{2016-2017:courses:rp2:p82_presentation.pdf|Presentation}} ^Feasibility of ILA as Network Virtualization Overlay in multi-tenant, multi-domain Cloud|| | | //Author//: Tako Marks |//Supervisors//: Lukasz Makowski, Paola Grosso | | || | {{2016-2017:courses:rp2:p83_report.pdf|Report}}{{2016-2017:courses:rp2:p83_presentation.pdf|Presentation}} ^Parallelization of BGP for route server functionality: A protocol and implementation study|| | | //Author//: Jenda Brands, Patrick de Niet |//Supervisors//: Stavros Konstantaras, Aris Lambrianidis | | || | {{2016-2017:courses:rp2:p84_report.pdf|Report}}{{2016-2017:courses:rp2:p84_presentation.pdf|Presentation}} ^eBPF Based Networking|| | | //Author//: Nick de Bruijn |//Supervisors//: Lukasz Makowski, Paola Grosso | | || | {{2016-2017:courses:rp2:p85_report.pdf|Report}}{{2016-2017:courses:rp2:p85_presentation.pdf|Presentation}} ^Session based high bandwidth throughput testin|| | | //Author//: Bram ter Borch |//Supervisors//: David Groep, Tristan Suerink | | || | {{2016-2017:courses:rp2:p86_report.pdf|Report}}{{2016-2017:courses:rp2:p86_presentation.pdf|Presentation}} ^Freenet Darknet Mapping|| | | //Author//: Kees Halvemaan |//Supervisors//: Yonne de Bruijn, Lennart Haagsma | | || | {{2016-2017:courses:rp2:p90_report.pdf|Report}}{{2016-2017:courses:rp2:p90_presentation.pdf|Presentation}} ^Discriminating reflective (D)DoS attack tools at the reflector|| | | //Author//: Fons Mijnen, Max Grim |//Supervisors//: Lennart Haagsma | | || | {{2016-2017:courses:rp2:p95_report.pdf|Report}}{{2016-2017:courses:rp2:p95_presentation.pdf|Presentation}} ^Segment Routing in Container Networks|| | | //Author//: Ben de Graaff |//Supervisors//: Marijke Kaat | | || | {{2016-2017:courses:rp2:p96_report.pdf|Report}}{{2016-2017:courses:rp2:p96_presentation.pdf|Presentation}} ^Unintended metadata leakage at the Dutch Government|| | | //Author//: Auke Zwaan |//Supervisors//: Alex Stavroulakis, Sukalp Bhople | | || | {{2016-2017:courses:rp2:p97_report.pdf|Report}}{{2016-2017:courses:rp2:p97_presentation.pdf|Presentation}} ^Kerberos Credential Thievery (GNU/Linux)|| | | //Author//: Arne Zismer, Ronan Loftus |//Supervisors//: Cedric van Bockhaven | | || ===== Research Project 1 ===== | {{2016-2017:courses:rp1:p07_report.pdf|Report}}{{2016-2017:courses:rp1:p07_presentation.pdf|Presentation}} ^Thinking in possibilities for federated log out.|| | | //Author//: Marcel den Reijer, Fouad Makioui |//Supervisors//: Thijs Kinkhorst, Joost van Dijk | | || | {{2016-2017:courses:rp1:p19_report.pdf|Report}}{{2016-2017:courses:rp1:p19_presentation.pdf|Presentation}} ^Extending the range of NFC capable devices|| | | //Author//: Sandino Moeniralam, Bart Hermans |//Supervisors//: Jordi van den Breekel, Jarno van de Moosdijk | | || | {{2016-2017:courses:rp1:p24_report.pdf|Report}}{{2016-2017:courses:rp1:p24_presentation.pdf|Presentation}} ^Automatic comparison of photo response non uniformity (PRNU) on Youtube|| | | //Author//: Marcel Brouwers, Rahaf Mousa |//Supervisors//: Zeno Geradts | | || | {{2016-2017:courses:rp1:p33_report.pdf|Report}}{{2016-2017:courses:rp1:p33_presentation.pdf|Presentation}} ^Repurposing defensive technologies for offensive Red Team operation|| | | //Author//: Arne Zismer, Kris Mladenov |//Supervisors//: Ari Davies | | || | {{2016-2017:courses:rp1:p37_report.pdf|Report}}{{2016-2017:courses:rp1:p37_presentation.pdf|Presentation}} ^Security and Performance Analysis of Encrypted NoSQL Database|| | | //Author//: Abe Wiersma, Max Grim |//Supervisors//: Fatih Turkmen | | || | {{2016-2017:courses:rp1:p45_report.pdf|Report}}{{2016-2017:courses:rp1:p45_presentation.pdf|Presentation}} ^Android 7 File Based Encryption and the Attacks Against It|| | | //Author//: Marwin Baumann, Ronan Loftus |//Supervisors//: Rick van Galen | | || | {{2016-2017:courses:rp1:p51_report.pdf|Report}}{{2016-2017:courses:rp1:p51_presentation.pdf|Presentation}} ^Advantages of Anomaly Detection Between the Controlling Unit and the Process Devices of an Industrial Control System|| | | //Author//: Rick Lahaye, Anouk Boukema |//Supervisors//: Coen Steenbeek, Dima van de Wouw | | || | {{2016-2017:courses:rp1:p52_report.pdf|Report}}{{2016-2017:courses:rp1:p52_presentation.pdf|Presentation}} ^Hiding in open sight: Dynamic profiles for malware communication|| | | //Author//: João Carlos De Novais Marques, Mick Cox |//Supervisors//: Cedric van Bockhaven, Ari Davies | | || | {{2016-2017:courses:rp1:p55_report.pdf|Report}}{{2016-2017:courses:rp1:p55_presentation.pdf|Presentation}} ^Website fingerprinting attacks against Tor Browser Bundle: a comparison between HTTP/1.1 and HTTP/2|| | | //Author//: Kees Halvemaan, Tako Marks |//Supervisors//: David Vaartjes, Jurgen Kloosterman | | || | {{2016-2017:courses:rp1:p59_report.pdf|Report}}{{2016-2017:courses:rp1:p59_presentation.pdf|Presentation}} ^Techniques for detecting compromised IoT devices|| | | //Author//: Ivo van der Elzen, Jeroen van Heugten |//Supervisors//: Rogier Spoor | | || | {{2016-2017:courses:rp1:p63_report.pdf|Report}}{{2016-2017:courses:rp1:p63_presentation.pdf|Presentation}} ^Automated Windows lab Deployment|| | | //Author//: Vincent van Dongen, Fons Mijnen |//Supervisors//: Marc Smeets | | || | {{2016-2017:courses:rp1:p64_report.pdf|Report}}{{2016-2017:courses:rp1:p64_presentation.pdf|Presentation}} ^Reliable Library Identification Using VMI Techniques|| | | //Author//: Leandro Velasco, Nick de Bruijn |//Supervisors//: Ralph Koning, Ben de Graaff | | || | {{2016-2017:courses:rp1:p67_report.pdf|Report}}{{2016-2017:courses:rp1:p67_presentation.pdf|Presentation}} ^Browser forensics: adblocker extensions.|| | | //Author//: Willem Rens |//Supervisors//: Johannes de Vries | | || ===== 2015-2016 ===== ===== Research Project 2 ===== | {{2015-2016:courses:rp2:p13_report.pdf|Report}}{{2015-2016:courses:rp2:p13_presentation.pdf|Presentation}} ^Designing an open source DMARC aggregation tool|| | | //Author//: Yadvir Singh |//Supervisors//: Michiel Leenaars | | || | {{2015-2016:courses:rp2:p20_report.pdf|Report}}{{2015-2016:courses:rp2:p20_presentation.pdf|Presentation}} ^Design Exploration of Transparency Enhancing Technology for Government|| | | //Author//: Thijs Houtenbos |//Supervisors//: Guido van 't Noordende | | || | {{2015-2016:courses:rp2:p21_report.pdf|Report}}{{2015-2016:courses:rp2:p21_presentation.pdf|Presentation}} ^Adding An Unusual Transport To The Serval Project|| | | //Author//: Alexandros Tsiridis, Joseph Hill |//Supervisors//: Paul Gardner-Stephen | | || | {{2015-2016:courses:rp2:p23_report.pdf|Report}}{{2015-2016:courses:rp2:p23_presentation.pdf|Presentation}} ^Taking a closer look at IRATI|| | | //Author//: Koen Veelenturf |//Supervisors//: Marijke Kaat, Ralph Koning | | || | {{2015-2016:courses:rp2:p24_report.pdf|Report}}{{2015-2016:courses:rp2:p24_presentation.pdf|Presentation}} ^Machine Detectable Network Behavioural Commonalities for Exploits and Malware|| | | //Author//: Alexandros Stavroulakis |//Supervisors//: Adrianus Warmenhoven | | || | {{2015-2016:courses:rp2:p26_report.pdf|Report}}{{2015-2016:courses:rp2:p26_presentation.pdf|Presentation}} ^On the feasibility of converting AMS-IX to an Industrial-Scale Software Defined Internet Exchange Point|| | | //Author//: Siem Hermans, Jeroen Schutrup |//Supervisors//: Joris Claassen, Arien Vijnn | | || | {{2015-2016:courses:rp2:p33_report.pdf|Report}}{{2015-2016:courses:rp2:p33_presentation.pdf|Presentation}} ^Power Efficiency of Hypervisor-based Virtualization versus Container-based Virtualization|| | | //Author//: Jeroen van Kessel |//Supervisors//: Arie Taal, Paola Grosso | | || | {{2015-2016:courses:rp2:p34_report.pdf|Report}}{{2015-2016:courses:rp2:p34_presentation.pdf|Presentation}} ^Analysing the feasibility of portable passive detection of Advanced Persistent Threats|| | | //Author//: Guido Kroon |//Supervisors//: Marco Davids, Cristian Hesselman | | || | {{2015-2016:courses:rp2:p38_report.pdf|Report}}{{2015-2016:courses:rp2:p38_presentation.pdf|Presentation}} ^Namecoin as alternative to the Domain Name System|| | | //Author//: Xander Lammertink |//Supervisors//: Marco Davids, Cristian Hesselman | | || | {{2015-2016:courses:rp2:p47_report.pdf|Report}}{{2015-2016:courses:rp2:p47_presentation.pdf|Presentation}} ^Dynamic access control analysis in WordPress plugins|| | | //Author//: Frank Uijtewaal |//Supervisors//: Patrick Jagusiak | | || | {{2015-2016:courses:rp2:p52_report.pdf|Report}}{{2015-2016:courses:rp2:p52_presentation.pdf|Presentation}} ^TLS Session Key Extraction from Memory on iOS Devices|| | | //Author//: Thomas Curran, Marat Nigmatullin |//Supervisors//: Cedric Van Bockhaven | | || | {{2015-2016:courses:rp2:p53_report.pdf|Report}}{{2015-2016:courses:rp2:p53_presentation.pdf|Presentation}} ^Developing an Ethereum Blockchain Application|| | | //Author//: Nikolaos Triantafyllidis |//Supervisors//: Oskar van Deventer, Erwin Middelesch | | || | {{2015-2016:courses:rp2:p58_report.pdf|Report}}{{2015-2016:courses:rp2:p58_presentation.pdf|Presentation}} ^Extremely Sensitive Communication: secure, secret, and private e-mail|| | | //Author//: Loek Sangers |//Supervisors//: Ruud Verbij | | || | {{2015-2016:courses:rp2:p60_report.pdf|Report}}{{2015-2016:courses:rp2:p60_presentation.pdf|Presentation}} ^Partition under disruption improves computer network delivery|| | | //Author//: Lukasz Makowski |//Supervisors//: Marc Makkes | | || | {{2015-2016:courses:rp2:p80_report.pdf|Report}}{{2015-2016:courses:rp2:p80_presentation.pdf|Presentation}} ^Restoring TCP sessions with a DHT|| | | //Author//: Peter Boers |//Supervisors//: Attilla de Groot, Pete Lumbis, Rama Darbha | | || | {{2015-2016:courses:rp2:p87_report.pdf|Report}}{{2015-2016:courses:rp2:p87_presentation.pdf|Presentation}} ^Bypassing 802.1X in an IPv6 configured network|| | | //Author//: Ruben de Vries, Robert Diepeveen |//Supervisors//: Henri Hambartsumyan, Arris Huijgen | | || | {{2015-2016:courses:rp2:p88_report.pdf|Report}}{{2015-2016:courses:rp2:p88_presentation.pdf|Presentation}} ^SDIO as a new peripheral attack vector|| | | //Author//: Thom Does, Dana Geist |//Supervisors//: Cedric Van Bockhaven | | || | {{2015-2016:courses:rp2:p89_report.pdf|Report}}{{2015-2016:courses:rp2:p89_presentation.pdf|Presentation}} ^The Design of Malware on Modern Hardware: Malware Inside Intel SGX Enclaves|| | | //Author//: Jeroen van Prooijen |//Supervisors//: Marc X. Makkes, Kaveh Razavi | | || | {{2015-2016:courses:rp2:p91_report.pdf|Report}}{{2015-2016:courses:rp2:p91_presentation.pdf|Presentation}} ^Using Sensitive Information on Android 6 Based Smartphones|| | | //Author//: Romke van Dijk |//Supervisors//: Ruud Verbij | | || | {{2015-2016:courses:rp2:p92_report.pdf|Report}}{{2015-2016:courses:rp2:p92_presentation.pdf|Presentation}} ^A systematic approach towards GNSS receiver vulnerability analysis on Remotely Piloted Aircraft Systems|| | | //Author//: Mike Maarse |//Supervisors//: René Wiegers, Judith van Bruggen | | || | {{2015-2016:courses:rp2:p94_report.pdf|Report}}{{2015-2016:courses:rp2:p94_presentation.pdf|Presentation}} ^Modifying existing applications for 100 Gigabit Ethernet|| | | //Author//: Jelte Fennema |//Supervisors//: Migiel de Vos | | || | {{2015-2016:courses:rp2:p95_report.pdf|Report}}{{2015-2016:courses:rp2:p95_presentation.pdf|Presentation}} ^P4 VPN Authentication: Authentication of VPN Traffic on a Network Device with P4|| | | //Author//: Jeroen Klomp |//Supervisors//: Ronald van der Pol, Marijke Kaat | | || ===== Research Project 1 ===== | {{2015-2016:courses:rp1:p57_report.pdf|Report}}{{2015-2016:courses:rp1:p57_presentation.pdf|Presentation}} ^(Aster)-picking through the pieces of short URL services|| | | //Author//: Peter Boers |//Supervisors//: Ruud Verbij | | || | {{2015-2016:courses:rp1:p66_report.pdf|Report}}{{2015-2016:courses:rp1:p66_presentation.pdf|Presentation}} ^BGP Hijack Alert System|| | | //Author//: Bram ter Borch |//Supervisors//: Jeroen van der Ham, Gert Vliek | | || | {{2015-2016:courses:rp1:p31_report.pdf|Report}}{{2015-2016:courses:rp1:p31_presentation.pdf|Presentation}} ^Exfiltrating Data from Managed Profiles in Android for Work|| | | //Author//: Thomas Curran |//Supervisors//: Paul van Iterson | | || | {{2015-2016:courses:rp1:p57_report.pdf|Report}}{{2015-2016:courses:rp1:p57_presentation.pdf|Presentation}} ^(Aster)-picking through the pieces of short URL services|| | | //Author//: Robert Diepeveen |//Supervisors//: Ruud Verbij | | || | {{2015-2016:courses:rp1:p04_report.pdf|Report}}{{2015-2016:courses:rp1:p04_presentation.pdf|Presentation}} ^Portable RFID Bumping Device|| | | //Author//: Romke van Dijk |//Supervisors//: Ari Davies | | || | {{2015-2016:courses:rp1:p30_report.pdf|Report}}{{2015-2016:courses:rp1:p30_presentation.pdf|Presentation}} ^Subverting Android 6.0 fingerprint authentication|| | | //Author//: Thom Does |//Supervisors//: Rick van Galen | | || | {{2015-2016:courses:rp1:p29_report.pdf|Report}}{{2015-2016:courses:rp1:p29_presentation.pdf|Presentation}} ^Misusing Open Services on the Internet|| | | //Author//: Jelte Fennema |//Supervisors//: Rick van Galen | | || | {{2015-2016:courses:rp1:p51_report.pdf|Report}}{{2015-2016:courses:rp1:p51_presentation.pdf|Presentation}} ^Jailbreak/Root Detection Evasion Study on iOS and Android|| | | //Author//: Dana Geist |//Supervisors//: Roel Bierens | | || | {{2015-2016:courses:rp1:p29_report.pdf|Report}}{{2015-2016:courses:rp1:p29_presentation.pdf|Presentation}} ^Misusing Open Services on the Internet|| | | //Author//: Ben de Graaff |//Supervisors//: Rick van Galen | | || | {{2015-2016:courses:rp1:p50_report.pdf|Report}}{{2015-2016:courses:rp1:p50_presentation.pdf|Presentation}} ^Docker Overlay Network|| | | //Author//: Siem Hermans |//Supervisors//: Paola Grosso | | || | {{2015-2016:courses:rp1:p67_report.pdf|Report}}{{2015-2016:courses:rp1:p67_presentation.pdf|Presentation}} ^Investigating the Potential for SCTP to be used as a VPN Transport Protocol|| | | //Author//: Joseph Hill |//Supervisors//: Ralph Koning, Junaid Chaudhry | | || | {{2015-2016:courses:rp1:p22_report.pdf|Report}}{{2015-2016:courses:rp1:p22_presentation.pdf|Presentation}} ^Recursive InterNetwork Architecture|| | | //Author//: Jeroen Klomp |//Supervisors//: Marijke Kaat, Ralph Koning | | || | {{2015-2016:courses:rp1:p22_report.pdf|Report}}{{2015-2016:courses:rp1:p22_presentation.pdf|Presentation}} ^Recursive InterNetwork Architecture|| | | //Author//: Jeroen van Leur |//Supervisors//: Marijke Kaat, Ralph Koning | | || | {{2015-2016:courses:rp1:p30_report.pdf|Report}}{{2015-2016:courses:rp1:p30_presentation.pdf|Presentation}} ^Subverting Android 6.0 fingerprint authentication|| | | //Author//: Mike Maarse |//Supervisors//: Rick van Galen | | || | {{2015-2016:courses:rp1:p39_report.pdf|Report}}{{2015-2016:courses:rp1:p39_presentation.pdf|Presentation}} ^Performance measurement and tuning of remote acquisition|| | | //Author//: Lukasz Makowski |//Supervisors//: Ruud Schramp, Zeno Geradts, Erwin van Eijk | | || | {{2015-2016:courses:rp1:p56_report.pdf|Report}}{{2015-2016:courses:rp1:p56_presentation.pdf|Presentation}} ^Penetration Testing Auditability|| | | //Author//: Stamatios Maritsas |//Supervisors//: Christopher Mills | | || | {{2015-2016:courses:rp1:p50_report.pdf|Report}}{{2015-2016:courses:rp1:p50_presentation.pdf|Presentation}} ^Docker Overlay Network|| | | //Author//: Patrick de Niet |//Supervisors//: Paola Grosso | | || | {{2015-2016:courses:rp1:p51_report.pdf|Report}}{{2015-2016:courses:rp1:p51_presentation.pdf|Presentation}} ^Jailbreak/Root Detection Evasion Study on iOS and Android|| | | //Author//: Marat Nigmatullin |//Supervisors//: Roel Bierens | | || | {{2015-2016:courses:rp1:p18_report.pdf|Report}}{{2015-2016:courses:rp1:p18_presentation.pdf|Presentation}} ^UsnJrnl Parsing for File System History|| | | //Author//: Jeroen van Prooijen |//Supervisors//: Kevin Jonkers | | || | {{2015-2016:courses:rp1:p04_report.pdf|Report}}{{2015-2016:courses:rp1:p04_presentation.pdf|Presentation}} ^Portable RFID Bumping Device|| | | //Author//: Loek Sangers |//Supervisors//: Ari Davies | | || | {{2015-2016:courses:rp1:p66_report.pdf|Report}}{{2015-2016:courses:rp1:p66_presentation.pdf|Presentation}} ^BGP Hijack Alert System|| | | //Author//: Jeroen Schutrup |//Supervisors//: Jeroen van der Ham, Gert Vliek | | || | {{2015-2016:courses:rp1:p55_report.pdf|Report}}{{2015-2016:courses:rp1:p55_presentation.pdf|Presentation}} ^WIFI espionage using a UAV|| | | //Author//: Yadvir Singh |//Supervisors//: Rick van Galen | | || | {{2015-2016:courses:rp1:p41_report.pdf|Report}}{{2015-2016:courses:rp1:p41_presentation.pdf|Presentation}} ^Comparison of parallel and distributed implementation of the MST algorithm|| | | //Author//: Alexis Sireta |//Supervisors//: Ana Varbanescu | | || | {{2015-2016:courses:rp1:p56_report.pdf|Report}}{{2015-2016:courses:rp1:p56_presentation.pdf|Presentation}} ^Penetration Testing Auditability|| | | //Author//: Alexandros Tsiridis |//Supervisors//: Christopher Mills | | || | {{2015-2016:courses:rp1:p18_report.pdf|Report}}{{2015-2016:courses:rp1:p18_presentation.pdf|Presentation}} ^UsnJrnl Parsing for File System History|| | | //Author//: Frank Uijtewaal |//Supervisors//: Kevin Jonkers | | || | {{2015-2016:courses:rp1:p31_report.pdf|Report}}{{2015-2016:courses:rp1:p31_presentation.pdf|Presentation}} ^Exfiltrating Data from Managed Profiles in Android for Work|| | | //Author//: Ruben de Vries |//Supervisors//: Paul van Iterson | | || | {{2015-2016:courses:rp1:p65_report.pdf|Report}}{{2015-2016:courses:rp1:p65_presentation.pdf|Presentation}} ^Malicious Domain Name Detection System|| | | //Author//: Auke Zwaan |//Supervisors//: Marco Davids, Cristian Hesselman, Maarten Wullink | | || ===== 2014-2015 ===== ===== Research Project 2 ===== | {{2014-2015:courses:rp2:p83_report.pdf|Report}}{{2014-2015:courses:rp2:p83_presentation.pdf|Presentation}} ^Improving the Performance of an IP-over-P2P Overlay for Nested Cloud Environments|| | | //Author//: Dragos-Laurentiu Barosan |//Supervisors//: Renato Figueiredo, Kaveh Razavi, Ana Oprescu | | || | {{2014-2015:courses:rp2:p82_report.pdf|Report}}{{2014-2015:courses:rp2:p82_presentation.pdf|Presentation}} ^Crawling the USENET for DMCA|| | | //Author//: Eddie Bijnen |//Supervisors//: Niels Sijm, Arno Bakker | | || | {{2014-2015:courses:rp2:p12_report.pdf|Report}}{{2014-2015:courses:rp2:p12_presentation.pdf|Presentation}} ^Analysis of DNS Resolver Performance Measurements|| | | //Author//: Hamza Boulakhrif |//Supervisors//: Willem Toorop, Yuri Schaeffer | | || | {{2014-2015:courses:rp2:p45_report.pdf|Report}}{{2014-2015:courses:rp2:p45_presentation.pdf|Presentation}} ^Container Network Solutions|| | | //Author//: Joris Claassen |//Supervisors//: Paola Grosso | | || | {{2014-2015:courses:rp2:p00_report.pdf|Report}}{{2014-2015:courses:rp2:p00_presentation.pdf|Presentation}} ^Remote Acquisition Boot environment|| | | //Author//: Dennis Cortjens |//Supervisors//: Ruud Schramp | | || | {{2014-2015:courses:rp2:p97_report.pdf|Report}}{{2014-2015:courses:rp2:p97_presentation.pdf|Presentation}} ^The use of workflow topology observables in a Security Autonomous Response Network|| | | //Author//: Adriaan Dens |//Supervisors//: Marc Makkes, Robert Meijer | | || | {{2014-2015:courses:rp2:p63_report.pdf|Report}}{{2014-2015:courses:rp2:p63_presentation.pdf|Presentation}} ^Graph500 in the public cloud|| | | //Author//: Harm Dermois |//Supervisors//: Ana Varbanescu | | || | {{2014-2015:courses:rp2:p20_report.pdf|Report}}{{2014-2015:courses:rp2:p20_presentation.pdf|Presentation}} ^Network utilization with SDN in on-demand application-specific Networks|| | | //Author//: Ioannis Grafis |//Supervisors//: Marc Makkes | | || | {{2014-2015:courses:rp2:p93_report.pdf|Report}}{{2014-2015:courses:rp2:p93_presentation.pdf|Presentation}} ^PTP Switches Accuracy and Hollow Core Fiber Latency|| | | //Author//: Martin Leucht |//Supervisors//: Cees de Laat | | || | {{2014-2015:courses:rp2:p16_report.pdf|Report}}{{2014-2015:courses:rp2:p16_presentation.pdf|Presentation}} ^Functional breakdown of decentralised social networks|| | | //Author//: Wouter Miltenburg |//Supervisors//: Michiel Leenaars | | || | {{2014-2015:courses:rp2:p33_report.pdf|Report}}{{2014-2015:courses:rp2:p33_presentation.pdf|Presentation}} ^Zero-effort Monitoring|| | | //Author//: Julien Nyczak |//Supervisors//: Rick van Rein | | || | {{2014-2015:courses:rp2:p93_report.pdf|Report}}{{2014-2015:courses:rp2:p93_presentation.pdf|Presentation}} ^PTP Switches Accuracy and Hollow Core Fiber Latency|| | | //Author//: Carlo Rengo |//Supervisors//: Cees de Laat | | || | {{2014-2015:courses:rp2:p92_report.pdf|Report}}{{2014-2015:courses:rp2:p92_presentation.pdf|Presentation}} ^Measuring The Impact of Docker on Network I/O Performance|| | | //Author//: Ardho Rohprimardho |//Supervisors//: Cees de Laat | | || | {{2014-2015:courses:rp2:p84_report.pdf|Report}}{{2014-2015:courses:rp2:p84_presentation.pdf|Presentation}} ^Remote data acquisition of IskraME372 GPRS smart meter|| | | //Author//: Nikolaos Sidiropoulos |//Supervisors//: Max Hovens, Rick van Galen | | || | {{2014-2015:courses:rp2:p11_report.pdf|Report}}{{2014-2015:courses:rp2:p11_presentation.pdf|Presentation}} ^Discovery method for a DNSSEC validating stub resolver|| | | //Author//: Xavier Torrent Gorjón |//Supervisors//: Willem Toorop | | || | {{2014-2015:courses:rp2:p07_report.pdf|Report}}{{2014-2015:courses:rp2:p07_presentation.pdf|Presentation}} ^Automated configuration of BGP on edge routers|| | | //Author//: Tarcan Turgut |//Supervisors//: Stavros Konstantaras, Benno Overeinder | | || | {{2014-2015:courses:rp2:p07_report.pdf|Report}}{{2014-2015:courses:rp2:p07_presentation.pdf|Presentation}} ^Automated configuration of BGP on edge routers|| | | //Author//: Stella Vouteva |//Supervisors//: Stavros Konstantaras, Benno Overeinder | | || | {{2014-2015:courses:rp2:p91_report.pdf|Report}}{{2014-2015:courses:rp2:p91_presentation.pdf|Presentation}} ^HTTP Header Analysis|| | | //Author//: Roland Zegers |//Supervisors//: Renato Fontana | | || | {{2014-2015:courses:rp2:p60_report.pdf|Report}}{{2014-2015:courses:rp2:p60_presentation.pdf|Presentation}} ^Pre-boot RAM acquisition and compression|| | | //Author//: Martijn Bogaard |//Supervisors//: Ruud Schramp, Zeno Geradts, Erwin van Eijk | | || | {{2014-2015:courses:rp2:p50_report.pdf|Report}}{{2014-2015:courses:rp2:p50_presentation.pdf|Presentation}} ^Circumventing Forensic Live-Acquisition Tools On Linux|| | | //Author//: Yonne de Bruijn |//Supervisors//: Arno Bakker, Jaap van Ginkel | | || | {{2014-2015:courses:rp2:p42_report.pdf|Report}}{{2014-2015:courses:rp2:p42_presentation.pdf|Presentation}} ^Extremely Secure Communication|| | | //Author//: Daniel Romão |//Supervisors//: Martijn Sprengers, Ruud Verbij, Jarno Roos | | || | {{2014-2015:courses:rp2:p95_report.pdf|Report}}{{2014-2015:courses:rp2:p95_presentation.pdf|Presentation}} ^Online events registration with minimal privacy violation|| | | //Author//: Niels van Dijkhuizen |//Supervisors//: Jeroen van der Ham | | || | {{2014-2015:courses:rp2:p96_report.pdf|Report}}{{2014-2015:courses:rp2:p96_presentation.pdf|Presentation}} ^Security evaluation of smart-cars' remote control Applications|| | | //Author//: Florian Ecard |//Supervisors//: Cees de Laat | | || | {{2014-2015:courses:rp2:p48_report.pdf|Report}}{{2014-2015:courses:rp2:p48_presentation.pdf|Presentation}} ^Proving the wild jungle jump|| | | //Author//: James Gratchoff |//Supervisors//: Niek Timmers | | || | {{2014-2015:courses:rp2:p73_report.pdf|Report}}{{2014-2015:courses:rp2:p73_presentation.pdf|Presentation}} ^Securing the SDN northbound interface|| | | //Author//: Jan Laan |//Supervisors//: Haiyun Xu | | || | {{2014-2015:courses:rp2:p77_report.pdf|Report}}{{2014-2015:courses:rp2:p77_presentation.pdf|Presentation}} ^CoinShuffle anonymity in the Block chain|| | | //Author//: Jan-Willem Selij |//Supervisors//: Roberta Piscitelli, Oskar van Deventer | | || | {{2014-2015:courses:rp2:p66_report.pdf|Report}}{{2014-2015:courses:rp2:p66_presentation.pdf|Presentation}} ^An Overview on Hiding and Detecting Stego-data in Video Streams|| | | //Author//: Alexandre Ferreira |//Supervisors//: Zeno Geradts | | || | {{2014-2015:courses:rp2:p98_report.pdf|Report}}{{2014-2015:courses:rp2:p98_presentation.pdf|Presentation}} ^StealthWare - Social Engineering Malware|| | | //Author//: Joey Dreijer |//Supervisors//: Jeroen van Beek | | || ===== Research Project 1 ===== | {{2014-2015:courses:rp1:p09_report.pdf|Report}}{{2014-2015:courses:rp1:p09_presentation.pdf|Presentation}} ^Security intelligence data mining|| | | //Author//: Nikolaos Triantafyllidis, Diana Rusu |//Supervisors//: Henri Hambartsumyan | | || | {{2014-2015:courses:rp1:p14_report.pdf|Report}}{{2014-2015:courses:rp1:p14_presentation.pdf|Presentation}} ^Teleporting virtual machines|| | | //Author//: Carlo Rengo, Harm Dermois |//Supervisors//: Oskar van Deventer | | || | {{2014-2015:courses:rp1:p17_report.pdf|Report}}{{2014-2015:courses:rp1:p17_presentation.pdf|Presentation}} ^Fine-grained control of LAMP component versions for Hosting Companies|| | | //Author//: Xander Lammertink |//Supervisors//: Michiel Leenaars | | || | {{2014-2015:courses:rp1:p24_report.pdf|Report}}{{2014-2015:courses:rp1:p24_presentation.pdf|Presentation}} ^DANE verification test suite report|| | | //Author//: Guido Kroon, Hamza Boulakhrif |//Supervisors//: Michiel Leenaars | | || | {{2014-2015:courses:rp1:p38_report.pdf|Report}}{{2014-2015:courses:rp1:p38_presentation.pdf|Presentation}} ^Monitoring DNSSEC|| | | //Author//: Martin Leucht, Julien Nyczak |//Supervisors//: Rick van Rein | | || | {{2014-2015:courses:rp1:p41_report.pdf|Report}}{{2014-2015:courses:rp1:p41_presentation.pdf|Presentation}} ^Protecting against relay attacks forging increased distance reports|| | | //Author//: Xavier Torrent Gorjón |//Supervisors//: Martijn Sprengers | | || | {{2014-2015:courses:rp1:p49_report.pdf|Report}}{{2014-2015:courses:rp1:p49_presentation.pdf|Presentation}} ^Feasibility and Deployment of Bad USB|| | | //Author//: Stella Vouteva |//Supervisors//: Martijn Sprengers | | || | {{2014-2015:courses:rp1:p52_report.pdf|Report}}{{2014-2015:courses:rp1:p52_presentation.pdf|Presentation}} ^Evaluating the security of the KlikAanKlikUit Internet Control Station 1000|| | | //Author//: Roland Zegers |//Supervisors//: Martijn Sprengers | | || | {{2014-2015:courses:rp1:p57_report.pdf|Report}}{{2014-2015:courses:rp1:p57_presentation.pdf|Presentation}} ^Study on a known-plaintext attack on ZIP encryption|| | | //Author//: Dragos-Laurentiu Barosan |//Supervisors//: Armijn Hemel | | || | {{2014-2015:courses:rp1:p67_report.pdf|Report}}{{2014-2015:courses:rp1:p67_presentation.pdf|Presentation}} ^Large-scale drive-by download detection: visit^n. process. analyse. report.|| | | //Author//: Adriaan Dens, Martijn Bogaard |//Supervisors//: Jop van der Lelie, Wouter Katz | | || | {{2014-2015:courses:rp1:p74_report.pdf|Report}}{{2014-2015:courses:rp1:p74_presentation.pdf|Presentation}} ^Trusted Network Initiative to combat DDos attacks|| | | //Author//: Jeroen van Kessel, Alexandros Stavroulakis |//Supervisors//: Marc Gauw | | || | {{2014-2015:courses:rp1:p75_report.pdf|Report}}{{2014-2015:courses:rp1:p75_presentation.pdf|Presentation}} ^Peeling the Google Public DNS Onion|| | | //Author//: Ardho Rohprimardho, Tarcan Turgut |//Supervisors//: Roland van Rijswijk - Deij | | || | {{2014-2015:courses:rp1:p76_report.pdf|Report}}{{2014-2015:courses:rp1:p76_presentation.pdf|Presentation}} ^Security automation and optimization using HP-NA|| | | //Author//: Florian Ecard |//Supervisors//: Olivier Willm | | || | {{2014-2015:courses:rp1:p80_report.pdf|Report}}{{2014-2015:courses:rp1:p80_presentation.pdf|Presentation}} ^Preventing Common Attacks on Critical Infrastructure|| | | //Author//: Koen Veelenturf, Wouter Miltenburg |//Supervisors//: Oscar Koeroo | | || | {{2014-2015:courses:rp1:p81_report.pdf|Report}}{{2014-2015:courses:rp1:p81_presentation.pdf|Presentation}} ^Evaluation of the security of a high class UAV telemetry communication link|| | | //Author//: Yonne de Bruijn, James Gratchoff |//Supervisors//: Martijn Sprengers | | || ===== 2013-2014 ===== ==== Research Project 2 ==== | {{2013-2014:courses:rp2:p03_report.pdf|Report}}{{2013-2014:courses:rp2:p03_presentation.pdf|Presentation}} ^DNSsec Revisited|| | | //Author//: Anastasios Poulidis, Hoda Rohani |//Supervisors//: Jeroen Scheerder | | || | {{2013-2014:courses:rp2:p08_report.pdf|Report}}{{2013-2014:courses:rp2:p08_presentation.pdf|Presentation}} ^Controlled DDoS Security Testing|| | | //Author//: Mike Berkelaar |//Supervisors//: Pieter Westein | | || | {{2013-2014:courses:rp2:p10_report.pdf|Report}}{{2013-2014:courses:rp2:p10_presentation.pdf|Presentation}} ^Search optimization through JPEG quantization tables using a decision tree learning approach|| | | //Author//: Sharon Gieske |//Supervisors//: Marcel Worring, Zeno Geradts | | || | {{2013-2014:courses:rp2:p11_report.pdf|Report}}{{2013-2014:courses:rp2:p11_presentation.pdf|Presentation}} ^Anomaly Detection on Internet Content Filter Data|| | | //Author//: Peter van Bolhuis |//Supervisors//: Sjoerd Peerlkamp, Johannes Ijkel | | || | {{2013-2014:courses:rp2:p13_report.pdf|Report}}{{2013-2014:courses:rp2:p13_presentation.pdf|Presentation}} ^Implementing Security Control Loops in Security Autonomous Response Networks|| | | //Author//: Hristo Dimitrov |//Supervisors//: Marc Makkes, Robert Meijer | | || | {{2013-2014:courses:rp2:p14_report.pdf|Report}}{{2013-2014:courses:rp2:p14_presentation.pdf|Presentation}} ^Measuring the deployment of DNSSEC over the Internet|| | | //Author//: Nicolas Canceill |//Supervisors//: Benno Overeinder, Willem Toorop | | || | {{2013-2014:courses:rp2:p30_report.pdf|Report}}{{2013-2014:courses:rp2:p30_presentation.pdf|Presentation}} ^Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests|| | | //Author//: Sebastiaan Vlaszaty |//Supervisors//: Casper Joost Eyckelhof | | || | {{2013-2014:courses:rp2:p31_report.pdf|Report}}{{2013-2014:courses:rp2:p31_presentation.pdf|Presentation}} ^Using EVPN to minimize ARP traffic in an IXP environment|| | | //Author//: Stefan Plug, Lutz Engels |//Supervisors//: Kay Rechtien, Thorben Krüger | | || | {{2013-2014:courses:rp2:p33_report.pdf|Report}}{{2013-2014:courses:rp2:p33_presentation.pdf|Presentation}} ^Rich Identity Provisioning|| | | //Author//: Jos van Dijk |//Supervisors//: Michiel Leenaars | | || | {{2013-2014:courses:rp2:p39_report.pdf|Report}}{{2013-2014:courses:rp2:p39_presentation.pdf|Presentation}} ^Implementing proximity based device-to-device communication in commercial LTE networks in The Netherlands|| | | //Author//: Remco van Vugt |//Supervisors//: Bastiaan Wissingh | | || | {{2013-2014:courses:rp2:p40_report.pdf|Report}}{{2013-2014:courses:rp2:p40_presentation.pdf|Presentation}} ^Android patching from an MDM perspective|| | | //Author//: Cedric Van Bockhaven |//Supervisors//: Henri Hambartsumyan, Martijn Knuiman, Coen Steenbeek | | || | {{2013-2014:courses:rp2:p45_report.pdf|Report}}{{2013-2014:courses:rp2:p45_presentation.pdf|Presentation}} ^Open Data analysis to retrieve sensitive information regarding national-centric critical infrastructures|| | | //Author//: Renato Fontana |//Supervisors//: Benno Overeinder, Ralph Dolmans | | || | {{2013-2014:courses:rp2:p48_report.pdf|Report}}{{2013-2014:courses:rp2:p48_presentation.pdf|Presentation}} ^Timestomping NTFS|| | | //Author//: Wicher Minnaard |//Supervisors//: Kevin Jonkers, Marco van Loosen | | || | {{2013-2014:courses:rp2:p52_report.pdf|Report}}{{2013-2014:courses:rp2:p52_presentation.pdf|Presentation}} ^Securing the last mile of DNS with CGA-TSIG|| | | //Author//: Marc Buijsman |//Supervisors//: Matthijs Mekking, Jeroen van der Ham | | || | {{2013-2014:courses:rp2:p54_report.pdf|Report}}{{2013-2014:courses:rp2:p54_presentation.pdf|Presentation}} ^Detecting routing anomalies with RIPE Atlas|| | | //Author//: Todor Yakimov |//Supervisors//: Jeroen van der Ham, Barry van Kampen | | || | {{2013-2014:courses:rp2:p56_report.pdf|Report}}{{2013-2014:courses:rp2:p56_presentation.pdf|Presentation}} ^Feasibility of attacks against weak SSL/TLS ciphers|| | | //Author//: Kim van Erkelens |//Supervisors//: Marc Smeets, Jeroen van der Ham | | || | {{2013-2014:courses:rp2:p63_report.pdf|Report}}{{2013-2014:courses:rp2:p63_presentation.pdf|Presentation}} ^Information Centric Networking for Delivering Big Data with Persistent Identifiers|| | | //Author//: Andreas Karakannas |//Supervisors//: Zhiming Zhao | | || | {{2013-2014:courses:rp2:p64_report.pdf|Report}}{{2013-2014:courses:rp2:p64_presentation.pdf|Presentation}} ^Combating DNS amplification using cookies|| | | //Author//: Sean Rijs |//Supervisors//: Roland van Rijswijk-Deij | | || | {{2013-2014:courses:rp2:p65_report.pdf|Report}}{{2013-2014:courses:rp2:p65_presentation.pdf|Presentation}} ^Peer-to-Peer Botnet Detection Using Netflow|| | | //Author//: Connor Dillon |//Supervisors//: Pepijn Janssen | | || | {{2013-2014:courses:rp2:p66_report.pdf|Report}}{{2013-2014:courses:rp2:p66_presentation.pdf|Presentation}} ^Covert channel detection using flow data|| | | //Author//: Guido Pineda Reyes |//Supervisors//: Pepijn Janssen | | || | {{2013-2014:courses:rp2:p68_report.pdf|Report}}{{2013-2014:courses:rp2:p68_presentation.pdf|Presentation}} ^Practical Security and Key Management|| | | //Author//: Magiel van der Meer |//Supervisors//: Jeroen van der Ham, Marc Smeets | | || | {{2013-2014:courses:rp2:p69_report.pdf|Report}}{{2013-2014:courses:rp2:p69_presentation.pdf|Presentation}} ^Software Defined VPNs|| | | //Author//: George Thessalonikefs, Stavros Konstantaras |//Supervisors//: Rudolf Strijkers | | || | {{2013-2014:courses:rp2:p70_report.pdf|Report}}{{2013-2014:courses:rp2:p70_presentation.pdf|Presentation}} ^Bootable Linux CD / PXE for the remote acquisition of multiple computers|| | | //Author//: Dennis Cortjens |//Supervisors//: Zeno Geradts, Ruud Schramp | | || | {{2013-2014:courses:rp2:p71_report.pdf|Report}}{{2013-2014:courses:rp2:p71_presentation.pdf|Presentation}} ^Remote data acquisition on block devices in large environments|| | | //Author//: Eric van den Haak |//Supervisors//: Zeno Geradts, Ruud Schramp | | || | {{2013-2014:courses:rp2:p73_report.pdf|Report}}{{2013-2014:courses:rp2:p73_presentation.pdf|Presentation}} ^Beacon detection in PCAP files|| | | //Author//: Leendert van Duijn |//Supervisors//: Robert Jan Mora | | || | {{2013-2014:courses:rp2:p75_report.pdf|Report}}{{2013-2014:courses:rp2:p75_presentation.pdf|Presentation}} ^Cross-realm Kerberos implementations|| | | //Author//: Mick Pouw, Esan Wit |//Supervisors//: Michiel Leenaars | | || ==== Research Project 1 ==== | {{2013-2014:courses:rp1:p01_report.pdf|Report}}{{2013-2014:courses:rp1:p01_presentation.pdf|Presentation}} ^ Mice and Elephants || | | //Author//: Ioannis Giannoulatos | //Supervisor//: Ronald van der Pol | | ||| | {{2013-2014:courses:rp1:p05_report.pdf|Report}}{{2013-2014:courses:rp1:p05_presentation.pdf|Presentation}} ^ Evaluating the Network Performance of ExoGENI Cloud Computing System || | | //Authors//: Andreas Karakannas, Tasos Poulidis | //Supervisors//: Paola Grosso, Ralph Koning | | ||| | {{2013-2014:courses:rp1:p07_report.pdf|Report}}{{2013-2014:courses:rp1:p07_presentation.pdf|Presentation}} ^ A closer look at SQRL || | | //Author//: Jos van Dijk | //Supervisors//: Henri Hambartsumyan, Hugo Ideler | | ||| | {{2013-2014:courses:rp1:p17_report.pdf|Report}}{{2013-2014:courses:rp1:p17_presentation.pdf|Presentation}} ^ Calculating Total System Availability || | | //Authors//: Azad Kamaliroosta, Hoda Rohani | //Supervisor//: Betty Gommans | | ||| | {{2013-2014:courses:rp1:p26_report.pdf|Report}}{{2013-2014:courses:rp1:p26_presentation.pdf|Presentation}} ^ Information loss to public networks || | | //Authors//: Peter van Bolhuis, Jan-Willem Selij | //Supervisor//: Steven Raspe | | ||| | {{2013-2014:courses:rp1:p27_report.pdf|Report}}{{2013-2014:courses:rp1:p27_presentation.pdf|Presentation}} ^ Secure Sockets Layer Health Assessment || | | //Authors//: Eric van den Haak, Mick Pouw | //Supervisors//: Thijs Kinkhorst, Teun Nijssen | | ||| | {{2013-2014:courses:rp1:p28_report.pdf|Report}}{{2013-2014:courses:rp1:p28_presentation.pdf|Presentation}} ^ DDOS protection measures for Electronic Payment Systems || | | //Authors//: Joris Claassen, Sean Rijs | //Supervisor//: Stefan Dusée | | ||| | {{2013-2014:courses:rp1:p32_report.pdf|Report}}{{2013-2014:courses:rp1:p32_presentation.pdf|Presentation}} ^ Cryptanalysis of, and practical attacks against E-Safenet encryption || | | //Authors//: Cedric Van Bockhaven, Jan Laan | //Supervisor//: Armijn Hemel | | ||| | {{2013-2014:courses:rp1:p42_report.pdf|Report}}{{2013-2014:courses:rp1:p42_presentation.pdf|Presentation}} ^ OpenFlow (D)DoS Mitigation || | | //Authors//: Mike Berkelaar, Connor Dillon | //Supervisor//: Hidde van der Heide | | ||| | {{2013-2014:courses:rp1:p46_report.pdf|Report}}{{2013-2014:courses:rp1:p46_presentation.pdf|Presentation}} ^ Detecting IP Hijacking Through Server Fingerprinting || | | //Authors//: Eddie Bijnen, Magiel van der Meer | //Supervisors//: Douwe Schmidt, Sacha van Geffen | | ||| | {{2013-2014:courses:rp1:p47_report.pdf|Report}}{{2013-2014:courses:rp1:p47_presentation.pdf|Presentation}} ^ DDoS Detection and Alerting || | | //Authors//: Daniel Cabaça Romão, Niels van Dijkhuizen | //Supervisor//: Rogier Spoor | | ||| | {{2013-2014:courses:rp1:p51_report.pdf|Report}}{{2013-2014:courses:rp1:p51_presentation.pdf|Presentation}} ^ MySQL record carving || | | //Authors//: Leendert van Duijn, Esan Wit | //Supervisor//: Kevin Jonkers | | ||| | {{2013-2014:courses:rp1:p55_report.pdf|Report}}{{2013-2014:courses:rp1:p55_presentation.pdf|Presentation}} ^ Data Map || | | //Authors//: Sharon Gieske, Thijs Houtenbos | //Supervisors//: Jeroen van der Ham, Barry van Kampen | | ||| | {{2013-2014:courses:rp1:p57_report.pdf|Report}}{{2013-2014:courses:rp1:p57_presentation.pdf|Presentation}} ^ Security assessment on a VXLAN-based network || | | //Author//: Guido Pineda Reyes | //Supervisors//: Sander Ruiter, Maarthen Kastanja, Maarten Dammers | | ||| | {{2013-2014:courses:rp1:p60_report.pdf|Report}}{{2013-2014:courses:rp1:p60_presentation.pdf|Presentation}} ^ Evaluation of the feasible attacks against RFID tags for access control systems || | | //Authors//: Hristo Dimitrov, Kim van Erkelens | //Supervisors//: Henri Hambartsumyan, Hugo Ideler | | ||| | {{2013-2014:courses:rp1:p62_report.pdf|Report}}{{2013-2014:courses:rp1:p62_presentation.pdf|Presentation}} ^ PIRE ExoGENI – ENVRI Preparation for Big Data Science || | | //Authors//: Ioannis Grafis, Stavros Konstantaras | //Supervisors//: Ana Oprescu, Zhiming Zhao | | ||| | {{2013-2014:courses:rp1:p67_report.pdf|Report}}{{2013-2014:courses:rp1:p67_presentation.pdf|Presentation}} ^ ElectroMagnetic Fault Injection Characterization || | | //Author//: George Thessalonikefs | //Supervisors//: Niek Timmers, Albert Spruyt | | ||| | {{2013-2014:courses:rp1:p74_report.pdf|Report}}{{2013-2014:courses:rp1:p74_presentation.pdf|Presentation}} ^NetFlow Anomaly Detection; finding covert channels on the network|| | | //Author//: Joey Dreijer |//Supervisors//: Sjoerd Peerlkamp, Johannes Ijkel | | || ===== 2012-2013 ===== ==== Research Project 2 ==== | {{2012-2013:courses:rp2:p14_report.pdf|Report}}{{2012-2013:courses:rp2:p14_presentation.pdf|Presentation}} ^ Architecture of dynamic VPNs in OpenFlow || | | //Author//: Michiel Appelman | //Supervisor//: Rudolf Strijkers | | ||| | {{2012-2013:courses:rp2:p18_report.pdf|Report}}{{2012-2013:courses:rp2:p18_presentation.pdf|Presentation}} ^ Research cache rebuilding for different browsers || | | //Authors//: Iwan Hoogendoorn, Edwin Schaap | //Supervisors//: Zeno Geradts, Ruud van Baar | | ||| | {{2012-2013:courses:rp2:p28_report.pdf|Report}}{{2012-2013:courses:rp2:p28_presentation.pdf|Presentation}} ^ OpenFlow network virtualization with FlowVisor || | | //Author//: Sebastian Dabkiewicz | //Supervisor//: Ronald van der Pol | | ||| | {{2012-2013:courses:rp2:p31_report.pdf|Report}}{{2012-2013:courses:rp2:p31_presentation.pdf|Presentation}} ^ Discovery and Mapping of the Dutch National Critical IP Infrastructure || | | //Authors//: Razvan Oprea, Fahimeh Alizadeh | //Supervisor//: Benno Overeinder | | ||| | {{2012-2013:courses:rp2:p50_report.pdf|Report}}{{2012-2013:courses:rp2:p50_presentation.pdf|Presentation}} ^ Load balancing in ESB based service platform|| | | //Author//: Nick Barendregt | //Supervisor//: Yuri Demchenko | | ||| | {{2012-2013:courses:rp2:p54_report.pdf|Report}}{{2012-2013:courses:rp2:p54_presentation.pdf|Presentation}} ^ Performance optimisation of webmail || | | //Authors//: Periklis Stefopoulos, Katerina Barmpopoulou | //Supervisor//: Michiel Leenaars | | ||| | {{2012-2013:courses:rp2:p57_report.pdf|Report}}{{2012-2013:courses:rp2:p57_presentation.pdf|Presentation}} ^ OpenFlow at AMS-IX || | | //Authors//: Hanieh Bagheri, Victor Boteanu | //Supervisor//: Martin Pels | | ||| | {{2012-2013:courses:rp2:p59_report.pdf|Report}}{{2012-2013:courses:rp2:p59_presentation.pdf|Presentation}} ^ BGP route origin validation || | | //Authors//: Javy de Koning, Remy de Boer | //Supervisors//: Jac Kloots, Marijke Kaat | | ||| | {{2012-2013:courses:rp2:p68_report.pdf|Report}}{{2012-2013:courses:rp2:p68_presentation.pdf|Presentation}} ^ Reliable Client-Server Connections || | | //Authors//: Rene Klomp, Thijs Rozekrans | //Supervisor//: Michiel Leenaars | | ||| | {{2012-2013:courses:rp2:p70_report.pdf|Report}}{{2012-2013:courses:rp2:p70_presentation.pdf|Presentation}} ^ Using git to circumvent censorship of access to the Tor network || | | //Authors//: Bjorgvin Ragnarsson, Pieter Westein | //Supervisors//: Henri Hambartsumyan, Martijn Knuiman, Coen Steenbeek | | ||| | {{2012-2013:courses:rp2:p75_report.pdf|Report}}{{2012-2013:courses:rp2:p75_presentation.pdf|Presentation}} ^ OpenFlow Enlightenment; Extending lightpaths through the campus network || | | //Authors//: Diederik Vandevenne, Tjebbe Vlieg | //Supervisors//: Marijke Kaat, Ronald van der Pol | | ||| | {{2012-2013:courses:rp2:p77_report.pdf|Report}}{{2012-2013:courses:rp2:p77_presentation.pdf|Presentation}} ^ Detection of client-side e-banking fraud using a heuristic model || | | //Authors//: Jurgen Kloosterman, Tim Timmermans | //Supervisor//: Steven Raspe | | ||| | {{2012-2013:courses:rp2:p88_report.pdf|Report}}{{2012-2013:courses:rp2:p88_presentation.pdf|Presentation}} ^ GNUnet and PSYC integration || | | //Author//: Gabor Toth | //Supervisor//: Christian Grothoff | | ||| | {{2012-2013:courses:rp2:p90_report.pdf|Report}}{{2012-2013:courses:rp2:p90_presentation.pdf|Presentation}} ^ Gaining insight into network hygiene a visual analytics approach || | | //Author//: Tarik El Yassem | //Supervisor//: Martijn van der Heide | | ||| | {{2012-2013:courses:rp2:p91_report.pdf|Report}}{{2012-2013:courses:rp2:p91_presentation.pdf|Presentation}} ^ Automated vulnerability scanning and exploitation || | | //Authors//: Thijs Houtenbos, Dennis Pellikaan | //Supervisors//: Jop van der Lelie, Bart Roos | | ||| | {{2012-2013:courses:rp2:p92_report.pdf|Report}}{{2012-2013:courses:rp2:p92_presentation.pdf|Presentation}} ^ Analysis of DNS amplification attack packets || | | //Author//: Pieter Lexis | //Supervisors//: Marcel Worring, Matthijs Mekking | | ||| | {{2012-2013:courses:rp2:p94_report.pdf|Report}}{{2012-2013:courses:rp2:p94_presentation.pdf|Presentation}} ^ Data from home routers for forensics purposes || | | //Author//: Tobias Fiebig | //Supervisor//: Andreas Schuster | | ||| | {{2012-2013:courses:rp2:p95_report.pdf|Report}}{{2012-2013:courses:rp2:p95_presentation.pdf|Presentation}} ^ Metasploit-able honeypots || | | //Author//: Wouter Katz | //Supervisors//: Jop van der Lelie, Bart Roos | | ||| | {{2012-2013:courses:rp2:p96_report.pdf|Report}}{{2012-2013:courses:rp2:p96_presentation.pdf|Presentation}} ^ Preventing DNS Amplification Attacks using white- and greylisting || | | //Author//: Ralph Dolmans | //Supervisor//: Maurits van der Schee | | ||| ==== Research Project 1 ==== | {{2012-2013:courses:rp1:p03_report.pdf|Report}}{{2012-2013:courses:rp1:p03_presentation.pdf|Presentation}} ^ Traffic Volume vs. Network Inspection || | | //Authors//: Fahimeh Alizadeh, Rawi Ramdhan | //Supervisor//: Jeroen Scheerder | | ||| | {{2012-2013:courses:rp1:p04_report.pdf|Report}}{{2012-2013:courses:rp1:p04_presentation.pdf|Presentation}} ^ Linux Open Source Distributed Filesystem || | | //Author//: Remco van Vugt | //Supervisor//: Walter de Jong | | ||| | {{2012-2013:courses:rp1:p08_report.pdf|Report}}{{2012-2013:courses:rp1:p08_presentation.pdf|Presentation}} ^ FileSender Terabyte Challenge || | | //Authors//: Rene Klomp, Edwin Schaap | //Supervisor//: Jan Meijer | | ||| | {{2012-2013:courses:rp1:p17_report.pdf|Report}}{{2012-2013:courses:rp1:p17_presentation.pdf|Presentation}} ^ Using random sampling as a way to determine disk complexity || | | //Author//: Nicolas Canceill | //Supervisors//: Zeno Geradts, Erwin van Eijk | | ||| | {{2012-2013:courses:rp1:p20_report.pdf|Report}}{{2012-2013:courses:rp1:p20_presentation.pdf|Presentation}} ^ Time skew analysis using web cookies || | | //Author//: Bjorgvin Ragnarsson | //Supervisors//: Zeno Geradts, Marnix Kaart | | ||| | {{2012-2013:courses:rp1:p22_report.pdf|Report}}{{2012-2013:courses:rp1:p22_presentation.pdf|Presentation}} ^ SSH Botnet Member Credential Collection using Connect Back Honeypots || | | //Author//: Tobias Fiebig | //Supervisor//: Jaap van Ginkel | | ||| | {{2012-2013:courses:rp1:p29_report.pdf|Report}}{{2012-2013:courses:rp1:p29_presentation.pdf|Presentation}} ^ Defending against DNS reflection amplification attacks || | | //Authors//: Thijs Rozekrans, Javy de Koning | //Supervisor//: Matthijs Mekking | | ||| | {{2012-2013:courses:rp1:p30_report.pdf|Report}}{{2012-2013:courses:rp1:p30_presentation.pdf|Presentation}} ^ Remote relay attack on RFID access control systems using NFC enabled devices || | | //Authors//: Pieter Westein, Wouter van Dullink | //Supervisor//: Bart Roos | | ||| | {{2012-2013:courses:rp1:p32_report.pdf|Report}}{{2012-2013:courses:rp1:p32_presentation.pdf|Presentation}} ^ Topology discovery || | | //Authors//: Dennis Pellikaan, Diederik Vandevenne | //Supervisor//: Freek Dijkstra | | ||| | {{2012-2013:courses:rp1:p35_report.pdf|Report}}{{2012-2013:courses:rp1:p35_presentation.pdf|Presentation}} ^ Using wavelengths outside of the Telecom spectrum || | | //Authors//: Stefan Plug, Remy de Boer | //Supervisor//: Erik Radius | | ||| | {{2012-2013:courses:rp1:p36_report.pdf|Report}}{{2012-2013:courses:rp1:p36_presentation.pdf|Presentation}} ^ GreenSONAR; A multi-domain energy profiling system based on perfSONAR || | | //Authors//: Lutz Engels, Todor Yakimov | //Supervisors//: Paola Grosso, Karel van der Veldt, Hao Zhu | | ||| | {{2012-2013:courses:rp1:p37_report.pdf|Report}}{{2012-2013:courses:rp1:p37_presentation.pdf|Presentation}} ^ Monitoring GreenClouds; Evaluating the trade-off between Performance and Energy Consumption in DAS-4 || | | //Authors//: Renato Fontana, Katerina Barmpopoulou | //Supervisors//: Karel van der Veldt, Hao Zhu, Paola Grosso | | ||| | {{2012-2013:courses:rp1:p40_report.pdf|Report}}{{2012-2013:courses:rp1:p40_presentation.pdf|Presentation}} ^ Tinfoil attack; A study on the security threats and weaknesses of GSM-based communication in BMW car || | | //Authors//: Thijs Houtenbos, Jurgen Kloosterman | //Supervisors//: Henri Hambartsumyan, Martijn Knuiman, Coen Steenbeek | | ||| | {{2012-2013:courses:rp1:p42_report.pdf|Report}}{{2012-2013:courses:rp1:p42_presentation.pdf|Presentation}} ^ Malware Analysis on Carberp || | | //Authors//: Wouter Katz, Ralph Dolmans | //Supervisors//: Henri Hambartsumyan, Martijn Knuiman, Coen Steenbeek | | ||| | {{2012-2013:courses:rp1:p45_report.pdf|Report}}{{2012-2013:courses:rp1:p45_presentation.pdf|Presentation}} ^ Image-based localization of pictures using Google Streetview images || | | //Authors//: Bas Vlaszaty, Tim Timmermans | //Supervisor//: John Schavemaker | | ||| | {{2012-2013:courses:rp1:p56_report.pdf|Report}}{{2012-2013:courses:rp1:p56_presentation.pdf|Presentation}} ^ Additional certificate verification methods for TLS client applications || | | //Authors//: Gabor Toth, Tjebbe Vlieg | //Supervisor//: Michiel Leenaars | | ||| /* June 2013, waiting for reports... | {{2012-2013:courses:rp1:p89_report.pdf|Report}}{{2012-2013:courses:rp1:p89_presentation.pdf|Presentation}} ^ Mice and Elephants || | | //Author//: Ioannis Giannoulatos | //Supervisor//: Ronald van der Pol | | ||| */ ===== 2011-2012 ===== ==== Research Project 2 ==== | {{2011-2012:courses:rp2:p06_report.pdf|Report}}{{2011-2012:courses:rp2:p06_presentation.pdf|Presentation}} ^ Advanced Metering Infrastructure|| | | //Author//: Vic Ding | //Supervisor//: Jan Amoraal | | ||| | {{2011-2012:courses:rp2:p19_report.pdf|Report}}{{2011-2012:courses:rp2:p19_presentation.pdf|Presentation}} ^ Electromagnetic Fault Injection (EMFI) on System-on-a-Chips (SoC) / Smartcards|| | | //Author//: Sebastian Carlier | //Supervisor//: Niek Timmers | | ||| | {{2011-2012:courses:rp2:p53_report.pdf|Report}}{{2011-2012:courses:rp2:p53_presentation.pdf|Presentation}} ^ Secure Internet Banking on Insecure Hosts|| | | //Author//: Christos Tziortzios | //Supervisors//: Martijn Knuiman, Sander Vos | | ||| | {{2011-2012:courses:rp2:p61_report.pdf|Report}}{{2011-2012:courses:rp2:p61_presentation.pdf|Presentation}} ^ Fault injection model for the XMEGA64A3|| | | //Author//: Albert Spruyt | //Supervisor//: Niek Timmers | | ||| | {{2011-2012:courses:rp2:p26_report.pdf|Report}}{{2011-2012:courses:rp2:p26_presentation.pdf|Presentation}} ^ Visualizing attacks on honeypots|| | | //Authors//: Jop van der Lelie, Rory Breuk | //Supervisor//: Bart Roos | | ||| | {{2011-2012:courses:rp2:p40_report.pdf|Report}}{{2011-2012:courses:rp2:p40_presentation.pdf|Presentation}} ^ Green computing in IEEE 802.3az enabled clusters|| | | //Authors//: Joris Soeurt, Dimitar Pavlov | //Supervisors//: Zhiming Zhao, Paola Grosso | | ||| | {{2011-2012:courses:rp2:p57_report.pdf|Report}}{{2011-2012:courses:rp2:p57_presentation.pdf|Presentation}} ^ Discovering Path MTU black holes using RIPE Atlas|| | | //Authors//: Maikel de Boer, Jeffrey Bosma | //Supervisor//: Benno Overeinder | | ||| | {{2011-2012:courses:rp2:p22_report.pdf|Report}}{{2011-2012:courses:rp2:p22_presentation.pdf|Presentation}} ^ OpenDNSSEC|| | | //Author//: Aleksandar Kasabov | //Supervisor//: Yuri Schaeffer | | ||| | {{2011-2012:courses:rp2:p41_report.pdf|Report}}{{2011-2012:courses:rp2:p41_presentation.pdf|Presentation}} ^ Torrent monitoring and statistics|| | | //Author//: Hidde van der Heide | //Supervisor//: Jeroen van der Ham | | ||| | {{2011-2012:courses:rp2:p60_report.pdf|Report}}{{2011-2012:courses:rp2:p60_presentation.pdf|Presentation}} ^ Social media crawling|| | | //Authors//: Yannick Scheelen, Daan Wagenaar | //Supervisor//: Marc Smeets | | ||| | {{2011-2012:courses:rp2:p46_report.pdf|Report}}{{2011-2012:courses:rp2:p46_presentation.pdf|Presentation}} ^ Multipath TCP|| | | //Author//: Gerrie Veerman | //Supervisor//: Ronald van der Pol | | ||| | {{2011-2012:courses:rp2:p47_report.pdf|Report}}{{2011-2012:courses:rp2:p47_presentation.pdf|Presentation}} ^ Time Sensitive Application Transport|| | | //Author//: Mohammad Shafahi | //Supervisors//: Cees de Laat, Erik-Jan Bos | | ||| | {{2011-2012:courses:rp2:p08_report.pdf|Report}}{{2011-2012:courses:rp2:p08_presentation.pdf|Presentation}} ^ Content Delivery Network Interconnection|| | | //Author//: Bastiaan Wissingh | //Supervisor//: Ray van Brandenburg | | ||| /* | {{2011-2012:courses:rp2:p54_report.pdf|Report}}{{2011-2012:courses:rp2:p54_presentation.pdf|Presentation}} ^ Secure embedding of external content|| | | //Author//: Alexandre Miguel Ferreira | //Supervisors//: Martijn Knuiman, Coen Klaver, Coen Steenbeek, Steven Raspe | | ||| */ ==== Research Project 1 ==== | {{2011-2012:courses:rp1:p25_report.pdf|Report}}{{2011-2012:courses:rp1:p25_presentation.pdf|Presentation}} ^ OpenFlow|| | | //Authors//: Iwan Hoogendoorn, Joris Soeurt | //Supervisor//: Ronald van der Pol | | ||| | {{2011-2012:courses:rp1:p18_report.pdf|Report}}{{2011-2012:courses:rp1:p18_presentation.pdf|Presentation}} ^ Performance Analysis of OpenFlow Hardware|| | | //Authors//: Michiel Appelman, Maikel de Boer | //Supervisor//: Ronald van der Pol | | ||| | {{2011-2012:courses:rp1:p27_report.pdf|Report}} //presentation unavailable// ^ IPv6 risks and vulnerabilities|| | | //Author//: Fred Wieringa | //Supervisors//: //unavailable// | | ||| | {{2011-2012:courses:rp1:p21_report.pdf|Report}}{{2011-2012:courses:rp1:p21_presentation.pdf|Presentation}} ^ Bootstrapping the Internet of the Future|| | | //Author//: Mohammad Shafahi | //Supervisor//: Rudolf Strijkers | | ||| | {{2011-2012:courses:rp1:p20_report.pdf|Report}}{{2011-2012:courses:rp1:p20_presentation.pdf|Presentation}} ^ l/O Load Scheduler for Grid Mass Storage|| | | //Author//: Christos Tziortzios | //Supervisor//: Walter de Jong | | ||| | {{2011-2012:courses:rp1:p29_report.pdf|Report}}{{2011-2012:courses:rp1:p29_presentation.pdf|Presentation}} ^ DNS-Based Authentication of Named Entries (DANE)|| | | //Author//: Pieter Lexis | //Supervisor//: Bert Hubert | | ||| | {{2011-2012:courses:rp1:p09_report.pdf|Report}}{{2011-2012:courses:rp1:p09_presentation.pdf|Presentation}} ^ Automatic end-host configuration|| | | //Author//: Sebastian Dabkiewicz | //Supervisor//: Jeroen van der Ham | | ||| | {{2011-2012:courses:rp1:p04_report.pdf|Report}}{{2011-2012:courses:rp1:p04_presentation.pdf|Presentation}} ^ Traffic anomaly detection using a distributed measurement network|| | | //Authors//: Razvan Oprea | //Supervisor//: Emile Aben | | ||| | {{2011-2012:courses:rp1:p23_report.pdf|Report}}{{2011-2012:courses:rp1:p23_presentation.pdf|Presentation}} ^ Camera Identification on YouTube|| | | //Authors//: Yannick Scheelen, Jop van der Lelie | //Supervisors//: Marcel Worring, Zeno Geradts| | ||| | {{2011-2012:courses:rp1:p24_report.pdf|Report}}{{2011-2012:courses:rp1:p24_presentation.pdf|Presentation}} ^ Ranking of manipulated images in a large set using error level analysis|| | | //Authors//: Jeffrey Bosma, Daan Wagenaar | //Supervisor//: Marcel Worring | | ||| | {{2011-2012:courses:rp1:p14_report.pdf|Report}}{{2011-2012:courses:rp1:p14_presentation.pdf|Presentation}} ^ Integrating DMA attacks in exploitation frameworks|| | | //Authors//: Rory Breuk, Albert Spruyt | //Supervisor//: Marc Smeets | | ||| | {{2011-2012:courses:rp1:p13_report.pdf|Report}}{{2011-2012:courses:rp1:p13_presentation.pdf|Presentation}} ^ Distributed Password Cracking Platform|| | | //Authors//: Dimitar Pavlov, Gerrie Veerman | //Supervisor//: Marc Smeets | | ||| | {{2011-2012:courses:rp1:p30_report.pdf|Report}}{{2011-2012:courses:rp1:p30_presentation.pdf|Presentation}} ^ Securing an outsourced network: Detecting and preventing malware infections|| | | //Authors//: Dennis Cortjens, Tarik El Yassem | //Supervisor//: Ewout Meij | | ||| ===== 2010-2011 ===== ==== Research Project 2 ==== | {{2010-2011:courses:rp2:p29_report.pdf|Report}}{{2010-2011:courses:rp2:p29_presentation.pdf|Presentation}} ^ Measuring DNSSEC Validation|| | | //Author//: Niels Monen | //Supervisor//: Roland van Rijswijk | | ||| | {{2010-2011:courses:rp2:p40_report.pdf|Report}}{{2010-2011:courses:rp2:p40_presentation.pdf|Presentation}} ^ Security of IPv6 and DNSSEC for penetration testers|| | | //Author//: Vesselin Hadjitodorov | //Supervisor//: Jaap van Ginkel | | ||| | {{2010-2011:courses:rp2:p43_report.pdf|Report}}{{2010-2011:courses:rp2:p43_presentation.pdf|Presentation}} ^ Passive LAN information gathering|| | | //Author//: Roy Duisters | //Supervisor//: Marc Smeets | | ||| | {{2010-2011:courses:rp2:p08_report.pdf|Report}}{{2010-2011:courses:rp2:p08_presentation.pdf|Presentation}} ^ PersLink Security|| | | //Authors//: Eleonora Petridou, Pascal Cuylaerts | //Supervisors//: Jo Lahaye, Martijn Stegeman| | ||| | {{2010-2011:courses:rp2:p26_report.pdf|Report}}{{2010-2011:courses:rp2:p26_presentation.pdf|Presentation}} ^ Exploiting Jailbrakes|| | | //Author//: Jochem van Kerkwijk | //Supervisors//: Gijs Hollestelle, Derk Wieringa| | ||| | {{2010-2011:courses:rp2:p46_report.pdf|Report}}{{2010-2011:courses:rp2:p46_presentation.pdf|Presentation}} ^ BufferBloat detection|| | | //Authors//: Harald Kleppe, Danny Groenewegen | //Supervisor//: Michiel Leenaars | | ||| | {{2010-2011:courses:rp2:p48_report.pdf|Report}}{{2010-2011:courses:rp2:p48_presentation.pdf|Presentation}} ^ CurveCP protocol efficiency|| | | //Author//: Thorben Krüger | //Supervisor//: Jeroen Scheerder | | ||| | {{2010-2011:courses:rp2:p09_report.pdf|Report}}{{2010-2011:courses:rp2:p09_presentation.pdf|Presentation}} ^ Comparing TCP connection performance over VPN-tunnels vs non-tunneled traffic|| | | //Authors//: Berry Hoekstra, Damir Musulin | //Supervisor//: Jan Just Keijser | | ||| | {{2010-2011:courses:rp2:p44_report.pdf|Report}}{{2010-2011:courses:rp2:p44_presentation.pdf|Presentation}} ^ A mapping daemon for the Locator/ID Separation Protocol (LISP)|| | | //Author//: Marek Kuczynski | //Supervisors//: Job Snijders, Rager Ossel | | ||| ==== Research Project 1 ==== | {{2010-2011:courses:rp1:p33_report.pdf|Report}}{{2010-2011:courses:rp1:p33_presentation.pdf|Presentation}} ^ Power measuremeents in DAS|| | | //Author//: Vesselin Hadjitodorov | //Supervisors//: Ralph Koning, Paola Grosso | | ||| | {{2010-2011:courses:rp1:p10_report.pdf|Report}}{{2010-2011:courses:rp1:p10_presentation.pdf|Presentation}} ^ Desktop Virtualisatie|| | | //Author//: Sudesh Jethoe | //Supervisors//: //unavailable// | | ||| | {{2010-2011:courses:rp1:p13_report.pdf|Report}}{{2010-2011:courses:rp1:p13_presentation.pdf|Presentation}} ^ Synergy of social networks defeat online privacy|| | | //Authors//: Eleonora Petridou, Marek Kuczynski | //Supervisor//: Marc Smeets | | ||| | {{2010-2011:courses:rp1:p11_report.pdf|Report}}{{2010-2011:courses:rp1:p11_presentation.pdf|Presentation}} ^ Large scale GPU based password cracking|| | | //Authors//: Jochem van Kerkwijk, Aleksandar Kasabov | //Supervisor//: Marc Smeets | | ||| | {{2010-2011:courses:rp1:p32_report.pdf|Report}}{{2010-2011:courses:rp1:p32_presentation.pdf|Presentation}} ^ Emulating network latency on high speed networks|| | | //Authors//: Niels Monen, Berry Hoekstra | //Supervisors//: Cosmin Dumitru, Ralph Koning| | ||| | {{2010-2011:courses:rp1:p27_report.pdf|Report}}{{2010-2011:courses:rp1:p27_presentation.pdf|Presentation}} ^ Quality analysis of automated penetration testing tools|| | | //Authors//: Harald Kleppe, Alexandre Miguel Ferreira | //Supervisors//: Coen Steenbeek, Derk Wieringa| | ||| | {{2010-2011:courses:rp1:p25_report.pdf|Report}}{{2010-2011:courses:rp1:p25_presentation.pdf|Presentation}} ^ Analysis of network measurement data|| | | //Authors//: Roy Duisters, Damir Musulin | //Supervisors//: Robert Kisteleki, Emile Aben| | ||| | {{2010-2011:courses:rp1:p21_report.pdf|Report}}{{2010-2011:courses:rp1:p21_presentation.pdf|Presentation}} ^ Android Market monitoring|| | | //Authors//: Bastiaan Wissingh, Thorben Krüger | //Supervisor//: Michiel Leenaars | | ||| | {{2010-2011:courses:rp1:p20_report.pdf|Report}}{{2010-2011:courses:rp1:p20_presentation.pdf|Presentation}} ^ OpenSSH automatic public key retrieval|| | | //Authors//: Marc Buijsman, Pascal Cuylaerts | //Supervisor//: Michiel Leenaars | | ||| | {{2010-2011:courses:rp1:p19_report.pdf|Report}}{{2010-2011:courses:rp1:p19_presentation.pdf|Presentation}} ^ DNSSEC Certificate validation|| | | //Authors//: Pieter Lange, Danny Groenewegen | //Supervisor//: Michiel Leenaars | | ||| | {{2010-2011:courses:rp1:p17_report.pdf|Report}}{{2010-2011:courses:rp1:p17_presentation.pdf|Presentation}} ^ DNS anomaly detection|| | | //Authors//: Nick Barendregt, Hidde van der Heide | //Supervisors//: Bart Roos, Sander Peters | | ||| ===== 2009-2010 ===== ==== Research Project 2 ==== | {{2009-2010:courses:rp2:p41_report.pdf|Report}}{{2009-2010:courses:rp2:p41_presentation.pdf|Presentation}} ^ HTTP session identification|| | | //Authors//: Marcus Bakker, Kevin de Kok | //Supervisors//: Bart Roos | | ||| | {{2009-2010:courses:rp2:p01_report.pdf|Report}}{{2009-2010:courses:rp2:p01_presentation.pdf|Presentation}} ^ Self-adaptive Routing|| | | //Authors//: Marvin Rambhadjan, Arthur van Kleef | //Supervisors//: Rudolf Strijkers | | ||| | {{2009-2010:courses:rp2:p16_report.pdf|Report}}{{2009-2010:courses:rp2:p16_presentation.pdf|Presentation}} ^ DFRWS Forensics Challenge 2010|| | | //Authors//: Joeri Blokhuis, Axel Puppe | //Supervisors//: Hans Wim Tinholt | | ||| | {{2009-2010:courses:rp2:p18_report.pdf|Report}}{{2009-2010:courses:rp2:p18_presentation.pdf|Presentation}} ^ Performance measurement tools|| | | //Authors//: Jeroen Vanderauwera, Alex Giurgiu | //Supervisors//: Freek Dijkstra | | ||| | {{2009-2010:courses:rp2:p05_report.pdf|Report}}{{2009-2010:courses:rp2:p05_presentation.pdf|Presentation}} ^ Evaluation of the Handle System to identify and retrieve digital objects|| | | //Authors//: Taarik Hassenmahomed | //Supervisors//: Paola Grosso, Andy Maltz | | ||| | {{2009-2010:courses:rp2:p32_report.pdf|Report}}{{2009-2010:courses:rp2:p32_presentation.pdf|Presentation}} ^ SURFnet storage Design|| | | //Authors//: Jeroen Klaver, Roel van der Jagt | //Supervisors//: Rogier Spoor | | ||| | {{2009-2010:courses:rp2:p36_report.pdf|Report}}{{2009-2010:courses:rp2:p36_presentation.pdf|Presentation}} ^ On Demand Grid on Cloud|| | | //Authors//: Willem Toorop, Alain van Hoof | //Supervisors//: Rudolf Strijkers, Paola Grosso | | ||| | //undisclosed// ^ Detecting illegal use in TomTom PND's|| | | //Authors//: Daan Muller, Arthur Schutijser | //Supervisors//: Jaap-Jan Boor, Karl Robinson | | ||| | //undisclosed// ^ Secure services on TomTom PND's|| | | //Authors//: Cosmin Dumitru, Niek Timmers | //Supervisors//: Jaap-Jan Boor | | ||| | {{2009-2010:courses:rp2:p40_report.pdf|Report}}{{2009-2010:courses:rp2:p40_presentation.pdf|Presentation}} ^ Mail client IPv6 interoperabillity problems|| | | //Authors//: Michiel Timmers, Sebastian Carlier | //Supervisors//: Freek Dijkstra | | ||| ==== Research Project 1 ==== | {{2009-2010:courses:rp1:p10_report.pdf|Report}}{{2009-2010:courses:rp1:p10_presentation.pdf|Presentation}} ^ Trustworthiness of Cyber Infrastructure for e-Science|| | | //Authors//: Niels Monen, Berry Hoekstra | //Supervisors//: //unavailable// | | ||| | {{2009-2010:courses:rp1:p15_report.pdf|Report}}{{2009-2010:courses:rp1:p15_presentation.pdf|Presentation}} ^ Horse-ID|| | | //Authors//: Vic Ding, Laurens Bruinsma | //Supervisors//: Jeroen van Beek | | ||| | {{2009-2010:courses:rp1:p13_report.pdf|Report}}{{2009-2010:courses:rp1:p13_presentation.pdf|Presentation}} ^ Bright Cluster Manager inc. Failover Research|| | | //Authors//: Cosmin Dumitru, Niek Timmers | //Supervisors//: Martijn de Vries | | ||| | {{2009-2010:courses:rp1:p28_report.pdf|Report}}{{2009-2010:courses:rp1:p28_presentation.pdf|Presentation}} ^ Security Virtual Infrastructure; Study possible security issues with a virtual infrastructure|| | | //Authors//: Niels Monen, Berry Hoekstra | //Supervisors//: //unavailable// | | ||| | {{2009-2010:courses:rp1:p30_report.pdf|Report}}{{2009-2010:courses:rp1:p30_presentation.pdf|Presentation}} ^ SSD performance|| | | //Authors//: Daan Muller, Sebastian Carlier | //Supervisors//: Ronald van der Pol | | ||| | {{2009-2010:courses:rp1:p02_report.pdf|Report}}{{2009-2010:courses:rp1:p02_presentation.pdf|Presentation}} ^ Load simulation on [Open]Solaris systems|| | | //Authors//: Alain van Hoof | //Supervisors//: Jeroen Roodhart | | ||| | {{2009-2010:courses:rp1:p31_report.pdf|Report}}{{2009-2010:courses:rp1:p31_presentation.pdf|Presentation}} ^ SURFnet Cloud Computing Design|| | | //Authors//: Arthur Schutijser, Marvin Rambhadjan | //Supervisors//: Rogier Spoor | | ||| | {{2009-2010:courses:rp1:p34_report.pdf|Report}}{{2009-2010:courses:rp1:p34_presentation.pdf|Presentation}} ^ GPU-based password cracking|| | | //Authors//: Roel van der Jagt, Marcus Bakker | //Supervisors//: Marc Smeets | | ||| | //report unavailable// {{2009-2010:courses:rp1:p29_presentation.pdf|Presentation}} ^ Automatic Network Configuration in Clouds|| | | //Authors//: Alex Giurgiu | //Supervisors//: Rudolf Strijkers, Paola Grosso| | ||| | {{2009-2010:courses:rp1:p07_report.pdf|Report}}{{2009-2010:courses:rp1:p07_presentation.pdf|Presentation}} ^ Modern Age Burglars|| | | //Authors//: Kevin de Kok, Jeroen Klaver | //Supervisors//: Christiaan Roselaar | | ||| | {{2009-2010:courses:rp1:p19_report.pdf|Report}}{{2009-2010:courses:rp1:p19_presentation.pdf|Presentation}} ^ Des-Plus encryptie on IP over the powernet: HomePlug Security|| | | //Authors//: Jeroen Vanderauwera, Axel Puppe | //Supervisors//: Christiaan Roselaar | | ||| ===== 2008-2009 ===== ==== Research Project 2 ==== | {{2008-2009:courses:rp2:dvde_th_report.pdf|Report}}{{2008-2009:courses:rp2:dvde_th_presentation.pdf|Presentation}} ^ Online Banking: Attacks & Defences|| | | //Authors//: Dominic van den Ende, Tom Hendrickx | //Supervisors//: Jan Joris Vereijken, Kino Verburg | | ||| | {{2008-2009:courses:rp2:sk_report.pdf|Report}}{{2008-2009:courses:rp2:sk_presentation.pdf|Presentation}} ^ 802.1ah in NetherLight; an application proposal|| | | //Author//: Sevickson Kwidama | //Supervisors//: Ronald van der Pol, Mark Meijerink | | ||| | {{2008-2009:courses:rp2:sr_report.pdf|Report}}{{2008-2009:courses:rp2:sr_presentation.pdf|Presentation}} ^ Ad-hoc trust associations with Trust Anchor Repositories|| | | //Author//: Stefan Roelofs | //Supervisor//: Yuri Demchenko | | ||| | {{2008-2009:courses:rp2:cdj_report.pdf|Report}}{{2008-2009:courses:rp2:cdj_presentation.pdf|Presentation}} ^ Implementation difference between DNScurve and DNSsec|| | | //Author//: Cornel de Jong | //Supervisor//: Fred Mobach | | ||| | {{2008-2009:courses:rp2:ns_mw_report.pdf|Report}}{{2008-2009:courses:rp2:ns_mw_presentation.pdf|Presentation}} ^ IPv4 ARP/IPv6 ND Sponge Daemon|| | | //Authors//: Niels Sijm, Marco Wessel | //Supervisor//: Steven Bakker | | ||| | {{2008-2009:courses:rp2:avdz_ydj_report.pdf|Report}}{{2008-2009:courses:rp2:avdz_ydj_presentation.pdf|Presentation}} ^ Design and development of a SAN Alarm system|| | | //Authors//: Adriaan van der Zee, Yanick de Jong | //Supervisors//: Leon Gommans | | ||| | {{2008-2009:courses:rp2:wvd_avh_report.pdf|Report}}{{2008-2009:courses:rp2:wvd_avh_presentation.pdf|Presentation}} ^ The DFRWS 2009 Challenge|| | | //Authors//: Wouter van Dongen, Alain van Hoof | //Supervisor//: Ruud van Baar | | ||| | {{2008-2009:courses:rp2:jvdm_dv_report.pdf|Report}}{{2008-2009:courses:rp2:jvdm_dv_presentation.pdf|Presentation}} ^ Car security: remote keyless entry and go systems|| | | //Authors//: Jarno van de Moosdijk, Dick Visser | //Supervisors//: Hans Ijkel, Stan Hegt, Pieter Ceelen | | ||| | {{2008-2009:courses:rp2:adg_ys_report.pdf|Report}}{{2008-2009:courses:rp2:adg_ys_presentation.pdf|Presentation}} ^ IP multicast routing on AMS-IX|| | | //Authors//: Attilla De Groot, Yuri Schaeffer | //Supervisors//: Ariën Vijn, Martin Pels | | ||| | {{2008-2009:courses:rp2:tk_mvk_report.pdf|Report}}{{2008-2009:courses:rp2:tk_mvk_presentation.pdf|Presentation}} ^ Busting the ghost on the web: real time detection of drive-by-infections|| | | //Authors//: Thijs Kinkhorst, Michael van Kleij | //Supervisors//: Bart Roos, Sander Peters | | ||| ==== Research Project 1 ==== | {{2008-2009:courses:rp1:dvde_report.pdf|Report}}{{2008-2009:courses:rp1:dvde_presentation.pdf|Presentation}} ^ Verschillende toepassingen voor virtualisatie|| | | //Author//: Dominic van den Ende | //Supervisor//: Fred Mobach | | ||| | {{2008-2009:courses:rp1:adg_report.pdf|Report}}{{2008-2009:courses:rp1:adg_presentation.pdf|Presentation}} ^ Implementing OpenLISP with LISP + ALT|| | | //Author//: Attilla De Groot | //Supervisor//: Benno Overeinder | | ||| | {{2008-2009:courses:rp1:wvd_report.pdf|Report}}{{2008-2009:courses:rp1:wvd_presentation.pdf|Presentation}} ^ Browser Security|| | | //Author//: Wouter van Dongen | //Supervisors//: Marc Smeets, Hans Ijkel | | ||| | {{2008-2009:courses:rp1:th_report.pdf|Report}}{{2008-2009:courses:rp1:th_presentation.pdf|Presentation}} ^ Stream Control Transport Protocol|| | | //Author//: Taarik Hassenmahomed | //Supervisor//: Ronald van der Pol | | ||| | {{2008-2009:courses:rp1:avdz_report.pdf|Report}}{{2008-2009:courses:rp1:avdz_presentation.pdf|Presentation}} ^ Troubleshooting Grid authentication from the client side|| | | //Author//: Adriaan van der Zee | //Supervisors//: Jan Just Keijser, David Groep | | ||| | {{2008-2009:courses:rp1:ydj_report.pdf|Report}}{{2008-2009:courses:rp1:ydj_presentation.pdf|Presentation}} ^ Xen Hypervisor security in VM isolation|| | | //Author//: Yanick de Jong | //Supervisor//: Fred Mobach | | ||| | {{2008-2009:courses:rp1:ys_report.pdf|Report}}{{2008-2009:courses:rp1:ys_presentation.pdf|Presentation}} ^ XEN VGA passthrough|| | | //Author//: Yuri Schaeffer | //Supervisor//: Mendel Mobach | | ||| | {{2008-2009:courses:rp1:avk_report.pdf|Report}}{{2008-2009:courses:rp1:avk_presentation.pdf|Presentation}} ^ Using XEN Technology for Green IT|| | | //Author//: Arthur van Kleef | //Supervisors//: Ralph Koning, Cees de Laat | | ||| | {{2008-2009:courses:rp1:sr_report.pdf|Report}}{{2008-2009:courses:rp1:sr_presentation.pdf|Presentation}} ^ Feasibility study Network Access Control (NAC)|| | | //Author//: Stefan Roelofs | //Supervisor//: Marcel Verbruggen | | ||| | {{2008-2009:courses:rp1:jb_report.pdf|Report}}{{2008-2009:courses:rp1:jb_presentation.pdf|Presentation}} ^ Universal Plug and Play Eventing vulnerabilities|| | | //Author//: Joeri Blokhuis | //Supervisor//: Armijn Hemel | | ||| | {{2008-2009:courses:rp1:avh_report.pdf|Report}}{{2008-2009:courses:rp1:avh_presentation.pdf|Presentation}} ^ Top40 cache compared to LRU and LFU|| | | //Author//: Alain van Hoof | //Supervisor//: Dick Snippe | | ||| | {{2008-2009:courses:rp1:jvdm_report.pdf|Report}}{{2008-2009:courses:rp1:jvdm_presentation.pdf|Presentation}} ^ Research on OpenID and its integration within the GravityZoo framework|| | | //Author//: Jarno van de Moosdijk | //Supervisor//: Marcel van Birgelen | | ||| | {{2008-2009:courses:rp1:wt_report.pdf|Report}}{{2008-2009:courses:rp1:wt_presentation.pdf|Presentation}} ^ Desktop sharing with SIP|| | | //Author//: Willem Toorop | //Supervisor//: Michiel Leenaars | | ||| | {{2008-2009:courses:rp1:mt_report.pdf|Report}}{{2008-2009:courses:rp1:mt_presentation.pdf|Presentation}} ^ DNSCurve Analysis|| | | //Author//: Michiel Timmers | //Supervisor//: J. Scheerder | | ||| | {{2008-2009:courses:rp1:tomh_report.pdf|Report}}{{2008-2009:courses:rp1:tomh_presentation.pdf|Presentation}} ^ Cloud Computing|| | | //Author//: Tom Hendrickx | //Supervisor//: Jan Meijer | | ||| | {{2008-2009:courses:rp1:mt_avk_report.pdf|Report}}{{2008-2009:courses:rp1:mt_avk_presentation.pdf|Presentation}} ^ In depth abuse statistics|| | | //Authors//: Michiel Timmers, Arthur van Kleef | //Supervisors//: Carel van Straten, JP Velders | | ||| ===== 2007-2008 ===== ==== Research Project 2 ==== | {{2007-2008:courses:rp2:br_sk-report.pdf|Report}}{{2007-2008:courses:rp2:br_sk-presentation.pdf|Presentation}} ^ Slimme meters|| | | //Authors//: Bart Roos, Sander Keemink | //Supervisors//: Hans Ijkel, Jeroen van Beek, Marc Smeets | | ||| | {{2007-2008:courses:rp2:ii-report.pdf|Report}}{{2007-2008:courses:rp2:ii-presentation.pdf|Presentation}} ^ Multicast in a PBT enabled CineGrid network|| | | //Author//: Igor Idziejczak | //Supervisors//: Ralph Koning, Paola Grosso | | ||| | {{2007-2008:courses:rp2:ms-report.pdf|Report}}{{2007-2008:courses:rp2:ms-presentation.pdf|Presentation}} ^ High performance TFTP and DHCP for network booting cluster computers|| | | //Author//: Matthew Steggink | //Supervisor//: Martijn de Vries | | ||| | {{2007-2008:courses:rp2:ns-report.pdf|Report}}{{2007-2008:courses:rp2:ns-presentation.pdf|Presentation}} ^ Security en privacy in het Landelijk Schakelpunt|| | | //Author//: Niels Sijm | //Supervisor//: Guido van 't Noordende | | ||| | //undisclosed// ^ Evaluate the safety of Microsoft Office documents|| | | //Author//: Cornel de Jong | //Supervisor//: //undisclosed// | | ||| | //undisclosed// ^ Cross-country disaster recovery with Geant2|| | | //Author//: Marco Wessel | //Supervisor//: //undisclosed// | | ||| | {{2007-2008:courses:rp2:pr-report.pdf|Report}}{{2007-2008:courses:rp2:pr-presentation.pdf|Presentation}} ^ Detecting inconsistencies in INRDB data|| | | //Author//: Peter Ruissen | //Supervisors//: Tiziana Refice, Daniël Karrenberg | | ||| | {{2007-2008:courses:rp2:rb-report.pdf|Report}}{{2007-2008:courses:rp2:rb-presentation.pdf|Presentation}} ^ Usability- en efficientieverbeteringen Mailman|| | | //Author//: Rudy Borgstede | //Supervisor//: Michiel Leenaars | | ||| | {{2007-2008:courses:rp2:sevk-report.pdf|Report}}{{2007-2008:courses:rp2:sevk-presentation.pdf|Presentation}} ^ Streaming and storing CineGrid data: A study on optimization methods|| | | //Author//: Sevickson Kwidama | //Supervisors//: Ralph Koning, Paola Grosso, Peter Hinrich | | ||| | {{2007-2008:courses:rp2:ts-report.pdf|Report}}{{2007-2008:courses:rp2:ts-presentation.pdf|Presentation}} ^ pNFS, high speed parallel open standard file access|| | | //Author//: Thijs Stuurman | //Supervisor//: Jan Meijer | | ||| | {{2007-2008:courses:rp2:av-report.pdf|Report}}{{2007-2008:courses:rp2:av-presentation.pdf|Presentation}} ^ Wireless protocol analysis using GNUradio|| | | //Author//: Alex Verduin | //Supervisors//: Karst Koymans, Maurits van der Schee | ==== Research Project 1 ==== | {{2007-2008:courses:rp1:br_mw-report.pdf|Report}}{{2007-2008:courses:rp1:br_mw-presentation.pdf|Presentation}} ^ Haalbaarheidsstudie implementatie IPv6 bij de Nederlandse Publieke Omroep (NPO)|| | | //Authors//: Bart Roos, Marco Wessel | //Supervisors//: Ed van Vuuren, Dirk-Jan van Helmond | | ||| | {{2007-2008:courses:rp1:cdj-report.pdf|Report}}{{2007-2008:courses:rp1:cdj-presentation.pdf|Presentation}} ^ Online authentication methods; Evaluate the strength of online authentication methods|| | | //Author//: Cornel de Jong | //Supervisors//: Gijs Hollestelle, Tom Schuurmans | | ||| | {{2007-2008:courses:rp1:dv_tk-report.pdf|Report}}{{2007-2008:courses:rp1:dv_tk-presentation.pdf|Presentation}} ^ Security and Reliability of Automated Waste Registration in The Netherlands|| | | //Authors//: Dick Visser, Thijs Kinkhorst | //Supervisors//: Jeroen van Beek, Marc Smeets, Hans Ijkel | | ||| | //undisclosed// ^ Mobile devices security; degree of risk, mobile devices pose to a company's confidential data|| | | //Authors//: Ralph Laclé, Sevickson Kwidama | //Supervisor//: Cees de Laat | | ||| | {{2007-2008:courses:rp1:ii_ms-report.pdf|Report}}{{2007-2008:courses:rp1:ii_ms-presentation.pdf|Presentation}} ^ Detection of peer-to-peer botnets|| | | //Authors//: Igor Idziejczak, Matthew Steggink | //Supervisors//: Rogier Spoor, Wim Biemolt | | ||| | {{2007-2008:courses:rp1:mvk_sk-report.pdf|Report}}{{2007-2008:courses:rp1:mvk_sk-presentation.pdf|Presentation}} ^ Implementing Snort into SURFids|| | | //Authors//: Michael van Kleij, Sander Keemink | //Supervisors//: Rogier Spoor, Wim Biemolt | | ||| | {{2007-2008:courses:rp1:rb-report.pdf|Report}}{{2007-2008:courses:rp1:rb-presentation.pdf|Presentation}} ^ Security model for hybrid token-based networking models|| | | //Author//: Rudy Borgstede | //Supervisor//: Yuri Demchenko | | ||| | {{2007-2008:courses:rp1:sd_rs-report.pdf|Report}}{{2007-2008:courses:rp1:sd_rs-presentation.pdf|Presentation}} ^ Improving scalability of the AMS-IX network; analyzing load adaptive TE concepts and solutions|| | | //Authors//: Stefan Deelen, Reinier Schoof | //Supervisors//: Henk Steenman, Paola Grosso | | ||| | //undisclosed// ^ HoneyClients; Low interaction detection methods|| | | //Authors//: Thijs Stuurman, Alex Verduin | //Supervisors//: Rogier Spoor, Wim Biemolt | | ||| ===== 2006-2007 ===== ==== Research Project 2 ==== | {{2006-2007:courses:rp2:cm_jp_report.pdf|report}}{{2006-2007:courses:rp2:cm_jp_presentation.pdf|presentation}} ^ Scale-free Optical Networks|| | | //Authors//: Carol Meertens, Joost Pijnaker| //Supervisor//: Freek Dijkstra, Jeroen van der Ham| | ||| | {{2006-2007:courses:rp2:ds_report.pdf|report}}{{2006-2007:courses:rp2:ds_presentation.pdf|presentation}} ^ Store and Forward Architecture to support CineGrid|| | | //Author//: Daniël Sánchez| //Supervisor//: Paola Grosso, Jeroen Roodhart | | ||| | {{2006-2007:courses:rp2:gvm_cs_report.pdf|report}}{{2006-2007:courses:rp2:gvm_cs_presentation.pdf|presentation}} ^ LAN-2 Hybrid|| | | //Authors//: Gerben van Malenstein, Coen Steenbeek| //Supervisor//: Ronald van der Pol | | ||| | {{2006-2007:courses:rp2:mr_rb_report.pdf|report}}{{2006-2007:courses:rp2:mr_rb_presentation.pdf|presentation}} ^ A Zero Day Warning System|| | | //Authors//: Michael Rave, Rob Buijs| //Supervisor//: Scott A. McIntyre| | ||| | {{2006-2007:courses:rp2:pr_rv_report.pdf|report}}{{2006-2007:courses:rp2:pr_rv_presentation.pdf|presentation}} ^ Veiligheid van Update Mechanismen|| | | //Authors//: Peter Ruissen, Robert Vloothuis| //Supervisor//: Jeroen van Beek, Hans IJkel| | ||| | {{2006-2007:courses:rp2:ps_mvds_report.pdf|report}}{{2006-2007:courses:rp2:ps_mvds_presentation.pdf|presentation}} ^ Beveiliging van Wegwerp OV-rittenkaart|| | | //Authosr//: Pieter Siekerman, Maurits van der Schee| //Supervisor//: Jaap van Ginkel, Cees de Laat| | ||| | {{2006-2007:courses:rp2:pt_tvdb_report.pdf|report}}{{2006-2007:courses:rp2:pt_tvdb_presentation.pdf|presentation}} ^ The PERFSonar Framework|| | | //Authors//: Peter Tevenier, Tijmen van den Brink| //Supervisor//: Ronald van der Pol, Paola Grosso| | ||| | {{2006-2007:courses:rp2:pva_rk_report.pdf|report}}{{2006-2007:courses:rp2:pva_rk_presentation.pdf|presentation}} ^ Path Computation Element in the SURFnet6 network|| | | //Authors//: Patrick van Abswoude, Ralph Koning| //Supervisor//: Ronald van der Pol | | ||| ==== Research Project 1 ==== | {{2006-2007:courses:rp1:cs_mr_report.pdf|report}}{{2006-2007:courses:rp1:cs_mr_presentation.pdf|presentation}} ^ Intrusion Detection System Sensors|| | | //Authors//: Coen Steenbeek, Michael Rave| //Supervisors//: Rogier Spoor, Jan van Lith, Kees Trippervitz| | ||| | {{2006-2007:courses:rp1:ds_jp_report.pdf|report}}{{2006-2007:courses:rp1:ds_jp_presentation.pdf|presentation}} ^ RIPE-NCC|| | | //Authors//: Daniël Sanchèz, Joost Pijnaker | //Supervisor//: Daniël Karrenberg| | ||| | {{2006-2007:courses:rp1:gvm_rv_report.pdf|report}}{{2006-2007:courses:rp1:gvm_rv_presentation.pdf|presentation}} ^ CERT Noodnet|| | | //Authors//: Gerben van Malenstein, Robert Vloothuis| //Supervisor//: Jan Meijer| | ||| | {{2006-2007:courses:rp1:lsl_report.pdf|report}}{{2006-2007:courses:rp1:lsl_presentation.pdf|presentation}} ^ Xen Guest Migration in a Dynamic Environment|| | | //Author//: Lotte-Sara Laan| //Supervisor//: Cees de Laat | | ||| | {{2006-2007:courses:rp1:mj_pr_report.pdf|report}}{{2006-2007:courses:rp1:mj_pr_presentation.pdf|presentation}} ^ Xen based High Availability Backup Environment|| | | //Author//: Marju Jalloh, Peter Ruissen| //Supervisor//: Cees de Laat | | ||| | {{2006-2007:courses:rp1:mvds_sd_report.pdf|report}}{{2006-2007:courses:rp1:mvds_sd_presentation.pdf|presentation}} ^ SSL HSM en Accelerator Testbank|| | | //Author//: Maurits van der Schee, Stefan Deelen| //Supervisor//: Jan Meijer| | ||| | {{2006-2007:courses:rp1:ps_rb_report.pdf|report}}{{2006-2007:courses:rp1:ps_rb_presentation.pdf|presentation}} ^ Expansion of the SURFNet IDS|| | | //Author//: Pieter Siekerman, Rob Buijs| //Supervisors//: Rogier Spoor, Jan van Lith, Kees Trippervitz| | ||| | {{2006-2007:courses:rp1:pva_pt_report.pdf|report}}{{2006-2007:courses:rp1:pva_pt_presentation.pdf|presentation}} ^ Open Recursive Nameservers|| | | //Author//: Patrick van Abswoude, Peter Tavenier| //Supervisors//: Karst Koymans, JP Velders| | ||| | {{2006-2007:courses:rp1:rs_rk_report.pdf|report}}{{2006-2007:courses:rp1:rs_rk_presentation.pdf|presentation}} ^ Detecting peer-to-peer botnets|| | | //Author//: Reinier Schoof, Ralph Koning| //Supervisors//: Wim Biemolt, Rogier Spoor| | ||| | {{2006-2007:courses:rp1:tvdb_cm_report.pdf|report}}{{2006-2007:courses:rp1:tvdb_cm_presentation.pdf|presentation}} ^ UCLP2 Evaluation|| | | //Author//: Tijmen van den Brink, Carol Meertens| //Supervisors//: Ronald van der Pol, Paola Grosso| | ||| ===== 2005-2006 ===== ==== Research Project 2 ==== | //undisclosed// ^ Beveiliging Belastingsdienst: CERT|| | | //Author//: Gert Bon, Jimmy Macé| //Supervisor//: Norien Kuiper| | ||| |{{2005-2006:rp2:lb_rj_report.pdf|report}}{{2005-2006:rp2:lb_rj_presentation.pdf|presentation}}^ ``Cut Through Switching/routing'' op een Internet Exchange || | | //Author//: René Jorissen, Lourens Bordewijk| //Supervisor//: Henk Steenman| | ||| |{{2005-2006:rp2:rdj_mk_report.pdf|report}}{{2005-2006:rp2:rdj_mk_presentation.pdf|presentation}}^ Integration of MPI support in a large-scale grid deployment || | | //Author//: Richard de Jong, Matthijs Koot| //Supervisors//: David Groep, Jeff Templon, Louis Poncet| | ||| | //undisclosed// ^ Beveiliging Belastingsdienst: Vertrouwd Toegangspad|| | | //Author//: Steffen van Loon, Fangbin Liu| //Supervisor//: Norien Kuiper| | ||| |{{2005-2006:rp2:as_be_report.pdf|report}}{{2005-2006:rp2:as_be_presentation.pdf|presentation}}^ Voice over IP. status en toekomst || | | //Author//: Bas Eenink, Antoine Schonewille| //Supervisor//: Rob Denekamp| | ||| |{{2005-2006:rp2:rp_mm_report.pdf|report}}{{2005-2006:rp2:rp_mm_presentation.pdf|presentation}}^ GMPLS || | | //Author//: Rob Prickaerts, Mark Meijerink| //Supervisors//: Ronald van der Pol, Paola Grosso| | ||| |{{2005-2006:rp2:djvh_ms_report.pdf|report}}{{2005-2006:rp2:djvh_ms_presentation.pdf|presentation}}^ Benefits and tradeoffs of application-specific WAN acceleration technologies on different latency and loss scenarios || | | //Author//: Dirk-Jan van Helmond, Marc Smeets| //Supervisor//: Saverio Pangoli | ==== Research Project 1 ==== |{{2005-2006:rp1:rj_rp_report.pdf|report}}{{2005-2006:rp1:rj_rp_presentation.pdf|presentation}}^ Ictivity VoIP Consultancy || | | //Authors//: René Jorissen, Rob Prickaerts| //Supervisor//: Ewout van Dijck| | ||| |{{2005-2006:rp1:lb_jm_report.pdf|report}}{{2005-2006:rp1:lb_jm_presentation.pdf|presentation}}^ Veiligheid c.q. beveiliging van de SURFnet IDS dienst || | | //Authors//: Lourens Bordewijk, Jimmy Macé| //Supervisor//: Rogier Spoor| | ||| |{{2005-2006:rp1:as_djvh_report.pdf|report}}{{2005-2006:rp1:as_djvh_presentation.pdf|presentation}}^ DNS statistieken bruikbaar als spy-, ad-, malware, botnet en virus detector? || | | //Authors//: Dirk-Jan van Helmond, Antoine Schonewille| //Supervisors//: Rogier Spoor, Wim Biemolt| | ||| | //undisclosed// ^ Virtualisatie en distributie || | | //Authors//: Richard de Jong, Bas Eenink| //Supervisor//: Martin Maas| | ||| |{{2005-2006:rp1:ms_mk_report.pdf|report}}{{2005-2006:rp1:ms_mk_presentation.pdf|presentation}}^ Covert channels || | | //Authors//: Matthijs Koot, Marc Smeets| //Supervisor//: Eric Nieuwland| | ||| |{{2005-2006:rp1:svl_gb_report.pdf|report}}{{2005-2006:rp1:svl_gb_presentation.pdf|presentation}}^ Versleutelalgoritmes voor wachtwoorden || | | //Authors//: Steffen van Loon, Gert Bon| //Supervisor//: Jeroen van Beek| | ||| |{{2005-2006:rp1:js_mm_report.pdf|report}}{{2005-2006:rp1:js_mm_presentation.pdf|presentation}}^ SURFnet IDS project honeypot || | | //Authors//: Mark Meijerink, Jonel Spellen| //Supervisor//: Rogier Spoor| | ||| |{{2005-2006:rp1:fl_report.pdf|report}}{{2005-2006:rp1:fl_presentation.pdf|presentation}}^ HPC Parallel File System || | | //Author//: Fangbin Liu | //Supervisors//: Huub Stoffers, Ans Sullot| ===== 2004-2005 ===== ==== Research Project 2 ==== |{{2004-2005:rp2:ms_tvdb_report.pdf|report}}{{2004-2005:rp2:ms_tvdb_presentation.pdf|presentation}}^ Bestands- en Schijfencryptie || | | //Authors//: Marya Steenman, Thijs van den Berg| //Supervisor//: Xander Jansen| | ||| |{{2004-2005:rp2:wb_rv_report.pdf|report}}{{2004-2005:rp2:wb_rv_presentation.pdf|presentation}}^ BGP (D)DoS Diversion || | | //Authors//: Wouter Borremans, Ruben Valke| //Supervisor//: Jan Hoogenboom| | ||| |{{2004-2005:rp2:jelmerb_mp_report.pdf|report}}{{2004-2005:rp2:jelmerb_mp_presentation.pdf|presentation}}^ Centralised patch management || | | //Authors//: Jelmer Barhorst, Martin Pels| //Supervisor//: Frank Pinxt| | ||| |{{2004-2005:rp2:jvl_mm_report.pdf|report}}{{2004-2005:rp2:jvl_mm_presentation.pdf|presentation}}^ Distributed File Systems - Inzetbaar als data consistentie houder? || | | //Authors//: Jan van Lith, Maarten Michels| //Supervisor//: Fred Mobach| | ||| |{{2004-2005:rp2:ad_rh_report.pdf|report}}{{2004-2005:rp2:ad_rh_presentation.pdf|presentation}}^ High Availability Services || | | //Authors//: Arjan Dekker, Remco Hobo| //Supervisor//: Jaap van Ginkel| | ||| |{{2004-2005:rp2:jeffreyb_report.pdf|report}}{{2004-2005:rp2:jeffreyb_presentation.pdf|presentation}}^ Systeembeheer in het MKB || | | //Author//: Jeffrey Barendse| //Supervisor//: Mark van der Zwaag| | ||| |{{2004-2005:rp2:pdb_mr_report.pdf|report}}{{2004-2005:rp2:pdb_mr_presentation.pdf|presentation}}^ TCP/IP stack extensies || | | //Authors//: Pieter de Boer, Martijn Rijkeboer| //Supervisor//: Jan Meijer| | ||| | //undisclosed// ^ Beveiliging banktransacties|| | | //Authors//: Bart Dorlandt, Carlos Groen| //Supervisors//: Roeland Kluit, Martien Arends| | ||| |{{2004-2005:rp2:kt_hb_report.pdf|report}}{{2004-2005:rp2:kt_hb_presentation.pdf|presentation}}^ SURFNet Intrusion Detection Systemss || | | //Authors//: Kees Trippelvitz, Harm-Jan Blok| //Supervisor//: Rogier Spoor| ==== Research Project 1 ==== | //undisclosed// ^ Onderzoek naar machine virtualisatie technieken|| | | //Authors//: Martijn Rijkeboer, Jelmer Barhorst| //Supervisor//: Jan Meijer| | ||| | {{2004-2005:rp1:report05.pdf|report}}^ Onderzoek naar de problematiek van invoering van IPv6 in een organisatie zoals die van het SNB Lab || | | //Authors//: Jan van Lith, Marya Steenman| //Supervisors//: Mendel Mobach, Wim Biemolt| | ||| | {{2004-2005:rp1:report09.pdf|report}}^ Voor- en nadelen van Sender Policy Framework || | | //Authors//: Thijs van den Berg, Kees Trippelvitz| //Supervisors//: Jeroen Scheerder, Karst Koymans| | ||| | {{2004-2005:rp1:report11.pdf|report}}^ MonALISA || | | //Authors//: Harm-Jan Blok, Bart Dorlandt| //Supervisors//: Freek Dijkstra, Bas van Oudenaarde| | ||| | {{2004-2005:rp1:report12.pdf|report}}^ User Controlled LightPath, UCLP || | | //Authors//: Ruben Valke, Remco Hobo| //Supervisors//: Bas van Oudenaarde, Freek Dijkstra| | ||| | {{2004-2005:rp1:report16.pdf|report}}^ Loganalyse en IDS || | | //Authors//: Carlos Groen, Arjan Dekker| //Supervisor//: Fred Mobach| | ||| | {{2004-2005:rp1:report19.pdf|report}}^ Host Based Intrusion Detection Systemen || | | //Authors//: Martin Pels, Pieter de Boer| //Supervisor//: Jaap van Ginkel| | ||| | {{2004-2005:rp1:report20.pdf|report}}^ Clustering with OpenMosix || | | //Authors//: Wouter Borremans, Maarten Michels| //Supervisor//: Harris Sunyoto| | ||| | {{2004-2005:rp1:report22.pdf|report}}^ Universele Configuratie Methode || | | //Author//: Jeffrey Barendse| //Supervisor//: Marten Hoekstra| ===== 2003-2004 ===== ==== Research Project 2 ==== |{{2003-2004:anp:reports:eh nv-q0s-for-wireless.pdf|report}}^ Real-Time and Quality of Service Facilities for Wireless Networks || | | //Authors//: Eric Hos, Niels Visser| //Supervisor//: Jeroen Scheerder| | ||| |{{2003-2004:anp:reports:aam rl-generic-aaa-architecture-performance.pdf|report}}^ Performance van een op Web Services gebaseerde AAA service binnen een J2EE application server omgeving || | | //Authors//: Aziz Ait Messaoud, Redouan Lahit| //Supervisors//: Yuri Demchenko, Cees de Laat| | ||| | //unavailable// ^ Virtual Network Experiments with User Mode Linux || | | //Authors//: Jeroen van der Ham, Gert Jan Verhoog| //Supervisors//: Karst Koymans, Jeroen Scheerder| | ||| |{{2003-2004:anp:reports:mvd rk-traffic-engineering-force10.pdf|report}}^ Traffic Engineering op een Force10 || | | //Authors//: Marco van Doorn, Roeland Kluit| //Supervisors//: Cees de Laat, Freek Dijkstra| | ||| | //unavailable// ^ Het grootschalig inzetten van Zigbee-technologie in een bedrijfsomgeving || | | //Authors//: Eelco Driel, Ronald Wezeman| //Supervisor//: Rob Meijer| | ||| |{{2003-2004:anp:reports:jvb tn-distributed-intrusion-detection-platform.pdf|report}}^ Distributed Intrusion Detection Platform || | | //Authors//: Jeroen van Beek, Tjerk Nan| //Supervisor//: Jaap van Ginkel| | ||| | //unavailable// ^ Beveiliging Portal Interpay (undisclosed) || | | //Authors//: Sander Bootsma, Daniël Hilster| //Supervisors//: Ramses Hoek, Jan Mastenbroek, Rob Meijer| | ||| | //unavailable// ^ Cyberauthoring, SANE 2004 paper || | | //Author//: Arjen Krap| //Supervisors//: Karst Koymans, Jeroen Scheerder| | ||| | //unavailable// ^ IPv4 to IPv6 Migration || | | //Authors//: Aziz Ahrouch, Samir Ezzine| //Supervisor//: Karst Koymans| | ||| |{{2003-2004:anp:reports:at lvd-reductie-convergentietijd.pdf|report}}^ Verbetering convergentietijd klantaansluitingen SURFnet || | | //Authors//: Leendert van Doesburg, Andree Toonk| //Supervisors//: Dennis Paus, Jeroen Scheerder| | ||| |{{2003-2004:anp:reports:th-multicast-configuration.pdf|report}}^ Multicast Configuration || | | //Author//: Thijs Hodiamont| //Supervisors//: Leonard Knijff, Cees de Laat| | ||| |{{2003-2004:anp:reports:jb rv-distributed-mail.pdf|report}}^ Distributed Mail || | | //Authors//: Jaap Bouwsma, Robert Visser| //Supervisor//: Jeroen Scheerder| | ||| |{{2003-2004:anp:reports:dm mm-disrupting-wireless-networks.pdf|report}}^ Disrupting Wireless Networks || | | //Authors//: Dennis Marinus, Martijn Meijer| //Supervisor//: Mark Burgess| ==== Research Project 1 ==== |{{2003-2004:asp:reports:at lvd-infrastructuur.pdf|report}}^ Onderzoek naar een professionele ICT infrastructuur || | | //Authors//: Leendert van Doesburg, Andree Toonk| //Supervisor//: Jeroen Scheerder| | ||| | //unavailable// ^ Setting up a Virtual Network Laboratory with User-Mode Linux || | | //Author//: Arjen Krap| //Supervisor//: Karst Koymans| | ||| |{{2003-2004:asp:reports:dh nv-g5-performance-report.pdf|report}}^ G5 Performance Report || | | //Authors//: Daniël Hilster, Niels Visser| //Supervisors//: Freek Dijkstra, Cees de Laat| | ||| | //unavailable// ^ Single sign-on || | | //Authors//: Martijn Meijer, Jaap Bouwsma| //Supervisor//: Jeroen Scheerder| | ||| | //unavailable// ^ Linux/PPC Netbooting Analyzed || | | //Authors//: Jeroen van der Ham, Thijs Hodiamond| //Supervisor//: Jeroen Scheerder| | ||| |{{2003-2004:asp:reports:mvd rk-licenties.pdf|report}}^ Licenties onder de loep || | | //Authors//: Marco van Doorn, Roeland Kuit| //Supervisor//: Rob Meijer| | ||| | //unavailable// ^ Een overzicht van de gangbare methoden in de spambestrijding || | | //Authors//: Eelco Driel, Ronald Wezeman| //Supervisor//: Rob Meijer| | ||| |{{2003-2004:asp:reports:jvb gjv-monitoring-web-services.pdf|report}}^ IPv6 Monitoring Web Services || | | //Authors//: Jeroen van Beek, Gert Jan Verhoog| //Supervisors//: Remco Poortinga, Karst Koymans| | ||| | //undisclosed// ^ Meten en monitoren bij SURFnet|| | | //Authors//: Dennis Marinus, Tjerk Nan| //Supervisors//: Dennis Paus, Erik-Jan Bos, Cees de Laat| | ||| | //unavailable// ^ Generic Authentication, Authorization and Accounting || | | //Authors//: Sander Bootsma, Eric Hos| //Supervisors//: Leon Gommans, Bas van Oudenaarde, Cees de Laat| | ||| |{{2003-2004:asp:reports:aam rl-cnl.pdf|report}}^ Evaluatie van de beveiligingsarchitectuur van Collaboratory.nl || | | //Authors//: Aziz Ait Messaoud, Redouan Lahit| //Supervisors//: Yuri Damchenko, Cees de Laat| | ||| | //unavailable// ^ Migratie van Sendmail naar Postfix || | | //Authors//: Sander Hollaar, Samir Ezzine| //Supervisors//: Jeroen Roodhart, Gert Poletiek, Karst Koymans| | ||| | //unavailable// ^ ICT Consultancy || | | //Author//: Samir Ezzine| //Supervisors//: Jeroen Roodhart, Karst Koymans| | ||| |{{2003-2004:asp:reports:aa rv-zeroconf.pdf|report}}^ Zeroconf || | | //Authors//: Robert Visser, Aziz Ahrouch| //Supervisor//: Jeroen Scheerder|