6.857: Computer and Network Security
Term Projects
Project ideas
We'll be posting project ideas here as the term
progresses. Check back for updates.
You should also check out the
references page, in particular online proceedings
from the linked conferences, for inspiration.
Another source of ideas for your final project might be Phillip
Hallam-Baker's new book,
The dotCrime Manifesto.
Hallam-Baker has compiled a short list of potential
projects related to the book. We encourage you to take a look at this page and consider the
suggested projects.
Topics from Previous Years
This list has gotten a bit long over the past few years. For now, take a look at the project pitches from 2010 and a list of projects from 2009 and before.
Hints for writing your paper and giving your talk
This year's projects
- Security Analysis of GrubHub by Cynthia Jing, Rebecca Krosnick, Shiyang Liu, Kimberly Toy
- Efficient Integer Vector Homomorphic Encryption by Angel Yu, Wai Lok Lai, James Payor
- Hydra: A Trustless Decentralized Digital Identity System by Anish Athalye, Ankush Gupta, Kate Yu
- The Internet of Insecure Things by Lucas Camelo Sa, Amy Greene, James Loving, Ulziibayar Otgonbaatar
- One Time Pad by Julia Huang, Harini Kannan, Yuanqing Xiao, Edwin Zhang
- Traceless by Nikhil Buduma, Pratheek Nagaraj, Mayuri Sridhar
- Secure Transactions Without Mining of Central Authority by Andre Saraiva, Bruno Almeida, Samuel Barroso
- A Javascript Side-Channel Attack on LLC by Alan Chiao, Donghyun Choi, Jeffrey Sun
- Implementing and Modifying Desai's UFE by Matt Fox, Armand McQueen, Andre Mroz, Eugene Oh
- Scalable Anonymous Authentication by Asya Bergal, Benjamin Tidor, Eeway Hsu, Catherine Zuo
- QUARTIS by Jenny Astrachan, Erica Du, Marcel Polanco
- User-Friendly Chat by Julian Bangert, Jelle van den Hooff, Tsotne Tabidze
- Pseudo by Nicholas Mohr, Jonathon Root, Scott Robinson, Chae Won Lee
- Security Analysis of Picture Gesture Authentication by Clare Liu, Denise Che, Srinidhi Viswanathan
- Private Decentralized E-Voting by Pak Hay Chan, Heng Li, Jordan Ugalde, Yoni Stoller
- Using Secure MPC to Play Games by Peinan Chen, Shruthi Narayanan, Jeffrey Shen
- Honey Encryption Applications by Nirvan Tyagi, Jessica Wang, Kevin Wen, Daniel Zuo
- CryptoBook: An Encrypted Journal by Donald Little, Nicholas Uhlenhuth, Zachary Uhlenhuth, Rachel Wang
- Implementing a Secure Verifiable Auction by Mark Bun, Yi-Hsiu Chen, Tom Morgan
- PAuth: A Peer-to-peer Authentication Protocol by Zijing Gao, Thomas Lu, Anand Srinivasan
- Entropy Poisoning from the Hypervisor by Matthew Alt, William Barto, Andrew Fasano, Andre King
- Iris: Third-Party Authentication Service by Akshay Padmanabha, Kevin Chen, Surya Bhupatiraju, Thomas Zhang
- Security Analysis of the MIT Gradebook Module by Adam Suhl, Stacey Terman, Max Justicz
- A Public-Key Authentication Scheme for Controller Area Networks by Nicolas Bravo, Skanda Koppula, Matthew Chang
- Enhanced MIT ID Security via One-Time Passcode by Emma Christie, Nchinda Nchinda, Hannah Pang, Hyungie Sung
- Defending Against Rogue Hard Disks by Anitha Gollamudi, Andres Perez, Ivan Tadeu Ferreira Antunes Filho, Ben Yuan
- Assessing Security of iOS Apps by David Sukhin, Samuel Edson, Santhosh Narayan, Akshit Dua
- Breaking Microsoft's CAPTCHA by Colin Hong, Bokil Lopez-Pineda, Karthik Rajendran, Adria Recansens
- Rock, Paper, Scissors ... Cheat by Changping Chen, Ariel Hamlin, Jeffrey Lim, Manushaqe Muco
- Automated Testing against Timing Attacks by Justin Dove, Victor Vasiliev