Submit four topic preferences here.

1) Zero Trust Network Security: Enabling Technologies and Challenges

Traditional network security architecture based on perimeter defense/trust zones appears less effective in modern, highly diverse and distributed networks. A single compromised host or link could render the whole network segment after this architecture insecure. Zero Trust aims to address this shortcoming by removing the implicit placement of trust while demanding its continual evaluation. In this paper, we analyze the tenets of zero trust, provide various deployment use cases and conduct a survey on its enabling technologies and challenges.

2) Deep Packet Inspection using FPGAs

An advanced technique in network security is Deep Packet Inspection (DPI), which is used to implement Intrusion Detection Systems and firewalls. For that, DPI needs to analyze vast amounts of network data in short periods. FPGAs can provide efficient, yet flexible circuits with direct network connectivity.

3) Post-Quantum-Crypto on FPGAS

Post quantum cryptography is useful for securing network communication against the possible advent of quantum computers. FPGAs (Field programmable gate arrays) may help to achieve good performance for this often highly expensive branch of cryptography.

4) Quo vadis, Post-quantum cryptography?

Research on post-quantum cryptography has been going on for more than a decade. However, most online communication is not yet quantum secure. What is the current status of PQC-research? Is PQC going to be employed soon? What challenges must be overcome to make it work?

5) Why Johnny can't encrypt: Current state of e-mail encryption

The 2005 paper "Johnny can't encrypt" pointed out design flaws in PGP that make it hard to use. 17 years later, e-mail encryption is still not common. What are current insights about usability of message encryption tools and does e-mail encryption have a future?

6) The Signal messenger

The Signal messenger app has gained a reputation for being especially privacy-friendly. This topic reviews the main security features that Signal has, explaining how they work, what they are supposed to accomplish, and trying to estimate whether they achieve their goal.

7) Secure Development: Techniques and Benefits

Security often works in theory, but is impeded when programmers make mistakes and the resulting software turns out to be insecure. Are programmers aware of their role in IT security? And what techniques exist to help them do a good job?

8) Multi-Party Computation: Techniques and Use cases

Multi party computation allows a group of entities to communicate the result of a joint computation without disclosing each partie's input. This is useful in auctions or salary negotiations, where each individual is interested in keeping their tolerated values private, but the parties have to agree on some final value. What is the current state of the art? Where is MPC used in practice? What are the best techniques and who benefits from them?

9) HTTPS: Is web browsing becoming more secure?

When trying to access a website that is not secured with https, most users get a warning. What is the mechanism behind https, when (if ever) is it safe to ignore the warning, and has the adoption of https across the web made online experiences more secure?

10) Digital signatures against phishing

Recently, offices were swept by a wave of phishing e-mails where the recipient was made to believe that their supervisor required them to urgently wire large amounts of money to a certain bank account. What measures are currently taken to hinder the success of such attacks? How effective are they? Why do digital signatures seem to play such a minor role here and what would it take to make them more effective, usable and commonplace?

11) Comparing the German Corona-Warn-App with the digital Covid19 tracing methods of another country

During the Covid19-pandemic, many countries developed a digital tracing method. In Germany, this was the Corona-Warn-App. The goal of this paper is to compare the German solution to that of another country, trying to answer the questions: How is tracing implemented technically? What security goals are achieved? To what extent were privacy goals considered in the development and how did the public respond?

12) Current use of Identity-based cryptography

Identity-based cryptography (IBC) was introduced in 1985 as an alternative to certificate-based public key cryptography. The idea: By using the identity (e.g., alice@e-mail.de) as a public key, certificate management could be avoided. It was not until the early 2000s however, that first practical schemes were proposed. But even so, the wide-spread adoption of IBC is still waiting to happen. What are the pro's and cons of IBC and why is it so scarcely used? What use cases are there and is there a future in either encryption or digital signatures based on IBC?

13) The Democracy Live's OmniBallot platform in the context of a global shift to e-voting

In the wake of the 2020 US-american presidential election, three US states moved to allow the online voting tool OmniBallot for certain voters. Shortly after that, researchers published a detailed analysis of the system, pointing out some security and privacy risks and recommending certain measures for using the tool securely. As trust in the results of this election was famously low, we want to survey the current state of secure e-voting: What techniques are there? Which countries have moved to allow e-voting and why are others hesitant to adopt it? What are current benefits and caveats, and should we expect e-voting to become more common in the near- to far-term future?

14) Physical Unclonable Functions: Practical Strong PUFs that withstand Machine Learning attacks

Physical Unclonable Functions (PUFs) are physical systems which are disordered at a nanoscale (like a piece of wood) and have a challenge/response-mechanism (like the reflection of light from a certain angle). This challenge-response-mechanism is so difficult to reproduce that it is useful for different cryptographic purposes; so-called Strong PUFs may, for example be used for key establishment or authentication. However, Machine Learning algorithms have managed to learn enough about a certain PUFs to imitate the correct behaviour well. How far along is the development of machine-learning-resilient Strong PUFs?

15) Distributed Identity Management

There are serious concerns about any kind of centralized identity providers as used in many areas of our daily life (e.g. in social logins). In the digital age our personal information is stored on computer systems. Databases store millions of records that are hosted on servers or in data centers which often belong to private companies. This probably sensitive information is stored centrally and is thus often at risk from data theft by hackers. A new paradigm, distributed identity, tries to let user be in direct control of the profile information they share with services. Rather than letting others provide claims towards a service, the users collects claim themselves from various sources and independently provides these when so requested by services. The services can check the validity of these claims against a central verifiable claims registry. Using new technologies like a distributed ledger enables a decentralized approach, which became so popular that even the EU is planning to implement a national identity wallet as a digital identity for citizens. The goal of this paper is to investigate this novel approach in identity management, its use cases and technologies.

16) IT-Security Frameworks Comparison

Using an established it security framework helps an organization to develop their cybersecurity programm in a structured and priotized approach. But which one to choose?! This paper aims to give an overview of existing it security frameworks and compare their application area, scope, focus and consequently their advantages for diffrent target groups. Frameworks to start with:

17) Information requests and cybercrime: Law enforcement meets ISP

In the wake of rising cybercrime, law enforcement agencies are increasingly making requests for information from Internet service providers (ISPs). The discussion in the paper should include the legal situation in germany and problems that stand in the way of a stringent, smooth and rapid process. It should also be examined what law enforcement agencies should consider when making requests (including timely and complete requests, encrypted communication) in order to achieve high chances of success with a request. Possible solutions - both for law enforcement agencies and telecommunications companies or ISPs - as well as procedures for efficient cooperation should be aggregated or conceptually developed in this paper.

18) Threat Landscaping

The threat landscape covers the entirety of potential and identified it security reats affecting a particular sector and group of users at a given point in time. The goal of this paper is to give an overview about the current threat landscape for a higher education data center in germany starting from a glimpse at the process of threat landscaping. The top threats should be elaborated with their with their modes of operation, effects and possible detection- and countermeasures.

19) Security in SDN

Software Defined Networks (SDN) are a promising paradigm in computer networking and facilitate network policy enforcement by multiple entities through a centralized interface. The concept entails new possibilities for policy enforcement but also new problems. Policies by two applications on multiple nodes in a network can contradict and can result in connection failure or compromised security. Firewall applications are subject to new challenges due to the novel properties of SDN. Objectives:

Preliminary work: Lehrstuhl Kommunikationssysteme Experimental Examination of Distributed Conflicts in Software Defined Networks:

20) Supply Chain Security Risks - Security Aspects of Cloud Services

In recent years, cloud service providers (CSP) have become increasingly popular as central IT suppliers. Due to the decreasing costs, more and more companies are outsourcing their IT services and infrastructure to them. From a security perspective, responsibility is often shifted to the CSP, but this also creates new threats and attack vectors. Supply chain risk management traditionally deals with the risks that arise from working with suppliers. How does this work in the context of CSPs? What security risks does the use of as-a-service offerings pose to companies?

21) Ransomware - organisational aspects in times of BYOD and home offices

Over the last few years, ransomware has become an increasing threat to organizations. Especially in combination with the trend towards working from home and Bring Your Own Device (BYOD), more attack vectors are being added. Why is ransomware so successful as malware? What technical and organizational measures can companies take to protect themselves? This paper is intended to provide an overview of the topic and answer the above questions.

22) Information Security Standards - does ISO 27001 improve security?

An Information Security Management System (ISMS) enables organizations to coordinate their security program. The most popular of these is ISO/IEC 27001, an international standard for setting up an ISMS. This standard also provides a list of controls and control objectives that an organization should implement. Although the adaptation of the standard is increasing and more and more organizations are getting certified, the number of security incidents on a global scale continues to rise. The question is whether the proposed measures are adequate to address the current threats? Take a critical look at the controls defined in ISO/IEC 27001 Annex A. Analyse the most frequent security incidents and threats of the last few years and compare them with the controls. Do they match and are they suitable to prevent the incidents?


Last Change: Tue, 26 Apr 2022 17:08:33 +0200 - Viewed on: Fri, 09 Dec 2022 20:32:56 +0100
Copyright © MNM-Team http://www.mnm-team.org - Impressum / Legal Info  - Datenschutz / Privacy