projects
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
projects [2011/09/06 00:12] – dymond | projects [2011/09/07 01:16] – dymond | ||
---|---|---|---|
Line 192: | Line 192: | ||
In this project you will compare several efficient methods for solving polynomials. | In this project you will compare several efficient methods for solving polynomials. | ||
+ | ---- | ||
+ | : | ||
+ | ---- | ||
+ | ====== MF7114 Assembler ====== | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | **Required Background**: | ||
+ | Some knowledge of microprocessor architecture and assembly programming | ||
+ | |||
+ | __Description__ | ||
+ | |||
+ | Every microprocessor is supported by a variety of software tools, such as assemblers, disassemblers, | ||
+ | |||
+ | Background Information: | ||
+ | manufactured in Canada (by Microsystems International Ltd, or MIL) and one of the earliest microprocessors ever produced. The microprocessor was used, among other applications as the CPU of the CPS-1 microcomputer. Although none of the CPS/1 computers (nor MF7114 software) have survived, technical information about the microprocessor and the CPS-1 has been preserved. This makes the design and | ||
+ | implementation of an assembler possible. More information on | ||
+ | |||
+ | http:// | ||
+ | |||
+ | ---- | ||
+ | : | ||
+ | ---- | ||
+ | ====== MF7114 Debugger ====== | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | **Required Background**: | ||
+ | Some knowledge of microprocessor architecture and assembly programming | ||
+ | |||
+ | __Description__ | ||
+ | |||
+ | Every microprocessor is supported by a variety of software tools, such as assemblers, | ||
+ | |||
+ | Background Information: | ||
+ | manufactured in Canada (by Microsystems International Ltd, or MIL) and one of the earliest microprocessors ever produced. The microprocessor was used, among other applications as the CPU of the CPS-1 microcomputer. Although none of the CPS/1 computers (nor MF7114 software) have survived, technical information about the microprocessor and the CPS-1 has been preserved. This makes the design and | ||
+ | implementation of a debugger possible. More information on | ||
+ | |||
+ | http:// | ||
+ | |||
+ | ---- | ||
+ | : | ||
+ | ---- | ||
+ | |||
+ | ======Web Crawlers Behaving Like Humans: Are We There Yet!? ====== | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | **Required Background**: | ||
+ | |||
+ | |||
+ | __Description__ | ||
+ | |||
+ | |||
+ | Distributed Denial of Service (DDoS) attacks are recognized as one | ||
+ | of the most serious threats to today' | ||
+ | simplicity of their execution and their ability to severely degrade | ||
+ | the quality at which Web-based services are offered to the end users. | ||
+ | An especially challenging form of DDoS attacks are the so-called | ||
+ | Application-Layer DDoS attacks. Namely: | ||
+ | 1) In Application-Layer DDoS attacks, the attackers utilize a flood | ||
+ | of legitimate-looking Layer-7 network sessions (i.e., sessions that | ||
+ | are generally hard to detect and/or filter out by a firewall or an | ||
+ | IDS system); | ||
+ | 2) Increasingly, | ||
+ | cleverly programmed crawler that executes a semi-random walk over the | ||
+ | web site links, thereby attempting to appear as a legitimate human | ||
+ | visitor. | ||
+ | |||
+ | The goal of this project is to investigate the state of the art in | ||
+ | malicious web crawler design. In particular, the project will look | ||
+ | into the challenges of designing a smart-DDoS-crawler from the | ||
+ | attacker point of view - one of these challenges being the estimation | ||
+ | of web-page popularity assuming no a priori access to the web-logs | ||
+ | of the victim web-site. | ||
+ | ---- | ||
+ | : | ||
+ | ---- | ||
+ | ====== GFI Sandbox | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | **Required Background**: | ||
+ | |||
+ | |||
+ | __Description__ | ||
+ | |||
+ | GFI Sandbox is a sophisticated industry-leading tool for quick and | ||
+ | safe analysis of malware behaviour. The goals of this project are: | ||
+ | 1) familiarize yourself with the operation of GFI Sandbox; | ||
+ | 2) using readily available GFI Sandbox Feeds (i.e., ThreatTrack Feeds), | ||
+ | build a database of malware designed specifically for execution of | ||
+ | DDoS-attacks - the so-called botnet malware; | ||
+ | 3) examine the behaviour of the collected malware 'upon execution'; | ||
+ | 4) propose and build an environment - comprising the standard freeware | ||
+ | security tools - for longer term (beyond immediate execution) analysis | ||
+ | of the collected malware. | ||
+ | |||
+ | |||
---- | ---- | ||
: | : | ||
---- | ---- |
projects.txt · Last modified: 2016/01/13 20:05 by stevenc