MSc Projects and Material

MSc Projects

The students that study for the MSc in Information Security at Royal Holloway are obliged to complete a project. In any one year the Smart Card Centre will suggest and supervise around 25 MSc projects. At the beginning of the new term we gather project ideas from our industry members and supporters, then we put them into a list that is circulated (usually by end of October) to the new intake. We aim to match students to projects by the Xmas break – so they can make an early start.

Good students will be working on the project from this point on, along side their lectures. They take a break around May to the exams, before focussing full-time on completed and writing up their projects by early September. A project should be related to applied information security in some way, be achievable in the timescale, and involve some challenge and original thought for the student. Projects may be theoretical or a mix of practical/theoretical. Note that a proposed project should not involve confidential data/info as the final report is regarded as ‘public’, and simply implementing someone else’s idea (e.g. demonstrator) would not make a good report.

More info on the MSc project can be found here.

Examples of Current and Past MSc Projects

  • Security and Trust in Swarm Intelligence based Vehicular Systems
  • GPU-based microarchitectural attacks on ARM-based devices
  • IoT Devices on the Blockchain
  • User Centric Data Provenance in E-Health Systems or Transport Travel
  • Analysing the security risks to transport related public information systems.
  • Privacy preserving smart card ticketing and payment protocols.
  • What are the security pros/cons of a public transport operator storing all customer data in the cloud?
  • Exploiting SGX to Improve Applications Integrity in Untrusted Environments
  • Securing Internet of Things (IoT) from Botnet Control – Evolution, Analysis and Recommendations
  • Analysing the Behaviour of Worms in Critical Infrastructure via Monte-Carlo Simulations
  • Examining impact of attacks in wireless Internet of Things security and safety devices
  • Analysis of Wireless Sensor Networks used in Smart Cities: Threats and Challenges
  • Protecting Users from Ransomware
  • Trusted Execution of Docker Containers: An Evaluation of Intel TXT and SGX
  • Mapping out ransomware campaign via Bitcoin transactions
  • Detecting and Preventing Malvertising in Browsers
  • Security Analysis of Smart Home Security Devices
  • IoT Ransomware
  • Security Analysis of Novel Smart Home Applications
  • Anomaly Detection in IoT networks
  • Ransomware and the SME – an Analysis and Critique
  • Digital Cash protocols: attacks and defences
  • Secure transactions using NFC Tags
  • SIM/USIM-centric trusted home network
  • Mobile phone/SIM card agents to gather network and performance characteristics
  • Mobile Payment Solutions
  • E-voting protocols
  • “Helpful” root-kit for Android phones
  • Fair exchange protocols
  • Cloud security for personal/business data using tamper/attack resistant personal device e.g. smart card
  • Mobile device malware and botnets
  • RFID tagging system for fieldwork sample collection and tracking for use in the Science Faculty
  • Creation of monitoring manager for movements of personal data from within Android OS
  • Secure Personal Area Network, using RFID/phone/laptop in wireless proximity
  • Analysis of security of different mobile phone platforms (e.g. Symbian, Windows, Android, iOS)
  • Security of smart metering systems
  • The use of touch and pay debit cards in e-ticket transport systems
  • Using phones and RFIDs to assist vulnerable citizens
  • Java Card 3 vulnerability analysis
  • Theoretical analysis of code density and processor performance of smart card micro controllers
  • Evaluation of performance of Elliptic Curve Cryptography in smart cards
  • Mobile voting in difficult and dangerous environments
  • Study of general vehicle security e.g. key-less/RFID locks, immobilisers
  • Development of security related application for Android OS

ISG MSc Project Prize

In the past, several students of the SCC has been awarded with the David Lindsay Prize:

  • 2016: Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay by Gareth Haken, supervised by Konstantinos Markantonakis.
  • 2014: Verifying the Integrity of Open Source Android Applications by Michael Macnair, supervised by Keith Mayes.
  • 2013: Analyzing Application Data Security on Android Devices by Pallavi Sivakumaran, supervised by Keith Mayes.
  • 2011: Practical Implementation of Grouping Proof for RFID by Antony Bills, supervised by Konstantinos Markantonakis.
  • 2010: Efficiency of Zero-Knowledge Proofs of Knowledge Identification Protocols on Smart Cards by Andreas Grünert, supervised by Keith Mayes.
  • 2003: Java Card Application to Provide Secure SMS by Brian Portsmore, supervised by Konstantinos Markantonakis.

This prize is awarded every year by the British Computer Society’s Information Security Specialist Group to the project that best addresses innovative applications of Information Security. It is open to all MSc projects which focus on information security. The decision is made by BCS ISSG.

Msc Block Mode Timetables 2017: TBC

MSc Lecture Materials:

All MSc Smart Card lecture notes and lecture recordings are available on Moodle.