Student Projects

Main content

We have several open proposals for student projects, both for Research Project (Semesterarbeiten) and Master theses. Below, you can find a non-exhaustive list of the open projects we have. Please do not hesitate to write an e-mail to , we will come back to you as soon as possible with some open projects. Remember to specify what interests you or if you have any particular project in mind.

Open projects

  • Decentralized Encrypted Messaging. Current email infrastructure is decentralized, but it does not offer end-to-end encryption out of the box. Therefore, anyone processing an email can read its content. Well known extensions for encrypting and signing mails, such as GnuPG and S/MIME are based on a naive use of asymmetric keys. Namely, they do not provide automated ways to distribute keys and leave this bothersome task to the final user. As a result, using these systems requires a high level of technical understanding which limits their adoption for the ordinary user.

    In recent years, encryption has spread into the messenger area and lead to fully end-to-end encrypted but centralized protocols which allow asynchronous communication between partly offline participants. Although the technology partially exists, there is no complete and easy to use combination of these concepts that matches today's needs.
    Contact: Details (PDF, 428 KB).
  • Security and Privacy of Blockchain based technologies. With the increasing adoption of P2P crypto-currencies (e.g. Bitcoin) and blockchain technologies in general (e.g. Counterparty, Ethereum), new froms of interactions, payments and contracts between peers become possible. Alone for Bitcoin this created a multi-billion industry, with the creation of many startups. Recently, with the emergence of blockchain based P2P networks, larger comanies and banks have started to investigate blockchain based networks.

    These new opportunities simultaneously create new challenges as well as the possibility to improve the security and privacy of existing systems. Our group has over 7 publications related to
  • Design and Implementation of 3D Localization System. In the world of Internet of Things accurate indoor and outdoor localization of people and assets is not just desirable, but an imperative feature for a number of security- and safety-critical systems. In this project, we will explore the limits of accurate and secure 3D localization using an in-house purpose-built sensor module with an Ultra-Wide Band (UWB) chipset and several sensors (e.g., Accelerometer, Gyroscope). The project goal is to build a complete 3D localization system based on state-of-art time-of-flight ranging UWB aided by sensor fusion, deploy it in scalable real-life scenarios and study the behavior. Both infrastructure-based and infrastructure-free approaches will be explored. Upon exceptional successful completion of the project, preparation for participating in the Microsoft Indoor Localization Competition 2016 will be considered. (Note: This project is available for students from ITET and INFK.) [Project description (PDF, 87 KB)]
  • Usable two-factor authentication. Two-factor authentication protects online accounts even if passwords are leaked. Most users, however, still prefer password-only authentication. One of the reasons behind two-factor authentication being unpopular is the extra steps that the user must complete in order to log in. Current two-factor authentication mechanisms require the user to interact with his phone, and e.g., copy a verification code to the browser.

    In this project we aim to design a two-factor authentication mechanism that does not require interaction between the user and his phone. We envision the second authentication factor to be the proximity of the user's phone to the device being used to log in. The proximity of the two devices is verified by comparing the ambient noise recorded by their microphones. Audio recording and comparison are transparent to the user, who is only asked to input his access credentials as in a password-only authentication scheme.

    The goal of the project is to investigate relevant features of the ambient audio that allow for secure and robust authentication. The features should allow to determine with great accuracy whether the two devices are in the same environment. This should hold for both indoor and outdoor environments. The features should also be compressible so that low-bandwidth channels (e.g., SMS messages) could be used for the server-to-phone communication. The system should work with different browsers and smartphones. Optionally, the system could be implemented on Android Wear and leverage a smartwatch rather than a smartphone.


  • Guillaume Felley, Data Feeds for Blockchains, Semester Thesis, AS 2016 [supervision: Arthur Gervais, Hubert Ritzdorf]
  • Gregor Wegberg, Secure Deletion, Master Thesis, SS 2016 [supervision: Hubert Ritzdorf]
  • Damian Gruber, Extending Shared Ownership, Semester Thesis, SS 2016 [supervision: Hubert Ritzdorf, Arthur Gervais]
  • Karl WüstEthereum Security, Master Thesis, SS 2016 [supervision: Arthur Gervais]
  • Vasilis GlykantzisBitcoin Security and Privacy, Master Thesis, SS 2016 [supervision: Arthur Gervais]
  • Alexandros FiliosAdblocker Privacy, Master Thesis, SS 2016 [supervision: Arthur Gervais]
  • Mansoor AhmedData Integrity Protection on Intel SGX, Master Thesis, SS 2016 [supervision: Kari Kostiainen]
  • Thomas Knell, User Interface Attacks, Master Thesis, SS 2016 [supervision: Luka Malisa, Kari Kostiainen]
  • Lukas Häfliger, Audio Similarity Based on Feature Extraction for Sound-Proof, Master Thesis, SS 2016 [supervision: Nikos Karapanos, Claudio Marforio]
  • Simon MartiContinuous Authentication and Extensions for Sound-Proof, Master Thesis, SS 2016 [supervision: Nikos Karapanos, Claudio Marforio]
  • Roman Trüb, Retrieving Meteorological Information by Passive Monitoring of the 1090 MHz Channel, Master Thesis, SS 2016 [supervision: Daniel Moser, Mario Lucic]


  • Martina Rivizzigno, Exploration of Audio Similarity Techniques to Improve the Accuracy of Sound-Proof , Semester Project, AS 2015 [supervision: Nikos Karapanos, Claudio Marforio]
  • Michael Och, Impersonation Detection on Android, Master Thesis, SS 2015 [supervision: Luka Malisa, Kari Kostiainen]
  • Ferran Llama, Bitmessage Security Analysis, Semester Thesis, SS 2015 [supervision: Arthur Gervais]
  • Stathakopoulou ChrysoulaWeb Search Personalization, Semester Project, SS 2015 [supervision: Arthur Gervais]
  • Alexandros FiliosIntegrity Protection for Web Applications, Semester Project, SS 2015 [supervision: Nikos Karapanos]


  • Severin Wischmann, Emulation of an x86 Many-core Platform, Master Thesis, SS 2014 [supervision: Ramya Jayaram Masti, Claudio Marforio]
  • Pedro Mendez Montejano, Realization of a Framework for VM and VMM monitoring, Semester Project, SS 2014 [supervision: Ramya Jayaram Masti, Claudio Marforio]
  • Fabian Aggeler, Implementation of ARM TrustZone in QEMU, Master Thesis, SS 2014 [supervision: Claudio Marforio, Ramya Jayaram Masti]
  • Hildur Òlafsdóttir, Detection of GPS Spoofing Attacks, Master Thesis, SS 2014 [supervision: Aanjhan]
  • Christoph Knecht, Smartphone Baseband Security Analysis, Master Thesis, SS 2014 [supervision: Luka Malisa]
  • Damian GruberSecurity and Privacy of Bitcoin, Bachelor Thesis, SS 2014 [supervision: Arthur Gervais]
  • Jesse Badash, Web Search Privacy, Semester Project, SS 2014 [supervision: Arthur Gervais]
  • Lorenzo Wölckner, Security and Privacy of Bitcoin, Master Thesis, SS 2014 [supervision: Arthur Gervais]


  • Daniela Meier, Realizing and Implementing Location-based Access Control Policies, Master Thesis, FS2013 [supervision: Elli Androulaki, Claudio Soriente, Claudio Marforio]
  • Dominik Landtwing, An Investigation of Secure Execution Environments, Master Thesis, FS2013 [supervision: Claudio Marforio, Ramya Jayaram Masti]
  • Damiano Boppart, Android Application Behavior Analysis, Semester Project, SS2013 [supervision: Claudio Marforio]
  • Ivan Jovanovic, Investigation of the Effectiveness of Binary Instrumentation for Monitoring Application Execution, Master Thesis, SS2013 [supervision: Claudio Marforio, Ramya Jayaram Masti]
  • Nicolas Rüegg, Analysis of the SSL-Certificate Landscape and Proposal for an Extended Validation Method, Master Thesis, SS2013 [supervision: Claudio Marforio, opensystems]
  • Luca Cometta, Implementation and Evaluation of a GPS Spoofing Countermeasure, Master's Thesis, AS 2012/2013 [supervision: Nils Ole, Christina]


  • Pascal Fischl, Android Applications Analysis System, Bachelor Thesis, FS2012 [supervision: Claudio Marforio]
  • Der-Yeuan Yu, USB Communication Security: Threats and Countermeasures, Master Thesis, SS 2012 [supervision: Davide, Claudio M., Ramya]
  • Marc Röschlin, Standalone Simulator for a Digital Currency System, Semester Project, SS 2012 [supervision: Ghassan, Elli]
  • Tobias Scherer, Privacy Analysis of a Popular Payment System, Semester Project, SS 2012 [supervision: Ghassan, Elli]
  • Nikolaos Karapanos, Exploring Security Technologies on Modern Smartphones, Master's Thesis, SS 2012 [supervision: Claudio M., Ramya]
  • Matthias Herrmann, Implementation and evaluation of a doublespend-attack on Bitcoin, Master's Thesis, SS 2012 [supervision: Ghassan, Elli]
  • Hubert Ritzdorf, Analyzing Covert Channels on Mobile Devices, Master's Thesis, AS 2011 [supervision: Claudio M.]


  • Kirila Adamova, Fingerprinting UHF RFID tags as an Anti-counterfeit Mechanism, Research project, SS 2011 [supervision: Davide]
  • Pascal Brogle, Smart and Secure WiFi Pairing, Master's Thesis, SS 2011 [supervision: Aanjhan, Ghassan]
  • Luka Malisa, ARESOC: An Architecture for Assisted Reverse Engineering of System on Chips, Master's Thesis, SS 2011 [supervision: Aurélien]
  • Der-Yeuan Yu, Schemes for Anti-Jamming Broadcast Communication, Research Project, SS 2011 [supervision: Christina]
  • Pascal Sachs, Automated Reverse Engineering, Master's Thesis, AS 2010 [supervision: Aurélien]
  • Luka Malisa, Low Level Platform Security of Modern Smartphones, Research project, SS 2010 [supervision: Aurélien]
  • Roland Häusler, Efficient Query Processing over Encrypted Data, Masters Thesis, AS 2010 [supervision: Ghassan, Ramya]
  • Tobias Heinzen, Automated Program Security Analysis, Master's Thesis, AS 2010 [supervision: Aurélien]
  • Victor Budilivschi, Secure and Convenient Distributed Computing, Master's Thesis, AS 2010 [supervision: Aurélien, Ghassan]


  • Stefan Thöni, Cryptographic Device Simulation, Masters Thesis, AS 2010 [supervision: Ghassan]
  • Cyrill Bannwart, Large Scale Network Measurements, Semester Project, AS 2010 [supervision: Boris, Ghassan]
  • Pascal Sachs, A Physical-layer Fingerprinter Implementation in USRP2 Platforms, Research project, SS 2010 [supervision: Boris, Davide]
  • Ramya Jayaram Masti, On the Security of Virtual Trusted Platform Modules, Master's Thesis, SS 2010 [supervision: Boris, Ghassan]
  • Lars Krapf, Improving a Privacy-preserving Clone Detection Mechanism with Elliptic Curve Cryptography, Master's Thesis, SS 2010 [supervision: Davide]
  • Reto Weingart, A Privacy-preserving Clone Detection Mechanism against Realistic Adversaries, Master's Thesis, SS 2010 [supervision: Davide]
  • Claudio Marforio, Timed Data Deletion on Mobile Communication Devices, Master's Thesis, SS 2010 [supervision: Christina]


  • Ramya Jayaram Masti, Physical-layer RFID Analysis, Semester Thesis, AS 2009 / SS 2010 [supervision: Boris]
  • Pascal Lippmann, Clustering Analysis of Source Code, Master's Thesis, AS 2009 [supervision: Boris]
  • Sami Kerim Galal, Physical layer attacks on sensor nodes, Master's thesis, SS 2009 [supervision: Nils Ole]
  • Leo Fellmann, Privacy–preserving Anti-counterfeiting for RFID-enhanced Supply Chains, Master's Thesis, SS 2009 [supervision: Davide]
  • Basil Hess, Clone Detection in RFID–enhanced Supply Chains, Master's Thesis, SS 2009 [supervision: Davide]
  • Arthur Schmitt, Reactive Jamming and Active Signal Interference, Master's Thesis, SS 2009 [supervision: Boris & Christina]


  • Rolf Wagner, Secure Verification of Computing Power, Master's Thesis, AS 2008 / SS 2009 [supervision: Ghassan]
  • Sami Kerim Galal, DWT-based Fingerprinting of Wireless Sensor Nodes, Semester Thesis, AS 2008 [supervision: Boris]
  • Bojan Konic, Security Issues in SharePoint 2007, Master's Thesis, SS 2008, [supervision: Nils Ole]


  • Ada Lezama Lugo, Implementation and evaluation of a realistic VANET simulator, Master's Thesis, AS 2007 [supervision: Nils Ole]
  • Sasa Meskovic, Jamming-resistant Communication, Master's Thesis, AS 2007 [supervision: Christina & Mario]
  • Dominik Langenegger, Trusted computing based opportunities for financial services, Master's Thesis, AS 2007 [supervision: Nils Ole]
  • Laurent Zimmerli, Implementation of Secure RSS-based Localization in Sensor Networks, Semester Thesis, AS 2007 [supervision: Christina & Kasper]
  • David Gubler, Peer-to-Peer Security, Master's Thesis, AS 2007 [supervision: Ghassan]
  • Andrea Malagoni, Multi-party key agreement over insecure wireless channels, Master's Thesis, SS 2007 [supervision: Christina & Kasper]
  • Dominik Langenegger, Integrity-codes over Wi-Fi, Semester Thesis, SS 2007 [supervision: Kasper]
Page URL:
© 2017 Eidgenössische Technische Hochschule Zürich