Project exam information
Assignment:
-
The student (or group of students) is asked to analyze the attacks presented below or to propose new ones, if they already have something in mind.
In particular, the student/s has/ve to reproduce the chosen attacks on their computer and share the source code
of the attacks with the teachers and TAs to allow them to reproduce the attack, as well. The student/s can rely on existing software
or they can write custom code for the attacks. It is mandatory to get in touch with the teachers and the TAs before starting working on a project to decide together the purpose of the project.
- Honeypot implementation and testing on a Raspberry PI
- Morris worm link
- Mitnick Attack link
- Heartbleed link
- Analysis of a device firmware
- Fault Injection
- RSA key extraction from an Arduino device
- Log4j
- Ransomware/malware reversing
- Ransomware implementation
Network security
Hardware security
Web security
Pwn
Reverse-engineering
Evaluation:
-
Student/s has/ve to write a final report concerning the analyzed attacks. Such report should specify (to download the template click here):
- An overview of the attack.
- The instructions to set up the attack.
- Possible countermeasures to defend against the attack.