Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Next revisionBoth sides next revision
public:research:main_archived [2019-10-23 06:37] xsvendapublic:research:main_archived [2023-07-15 04:44] xsvenda
Line 5: Line 5:
 ---- ----
  
-===== Open Source Security tools ===== 
  
-FIXME+===== Wireless Sensor Networks ===== 
 +{{ :public:research:wsn.png?direct&150|}}
  
-<button collapse="secTools">Find out more</button>+This project includes providing a secure platform that is transparent for applications in wireless sensor networks (WSN) - WSNProtectLayer. Our platform includes intrusion detection system (IDS) detecting active attacks. We consider privacy issues to prevent passive attacks on the WSN. We also propose secrecy amplification protocols and evaluate key management schemes. Current work includes parametrised attacker simulated on KMSforWSN framework.
  
-<collapse id="secTools" collapsed="true"> +<button collapse="wsn">Find out more</button> 
-**Last update: 2009. 2018**+<button  icon="fa fa-file-text-o">[[:publications:keywords:wsn|Publications]]</button> 
 + 
 +<collapse id="wsn" collapsed="true"> 
 +**Last update: 17.5.2018**
  
 **Contact: Lukáš Němec <lukas.nemec@mail.muni.cz> ** **Contact: Lukáš Němec <lukas.nemec@mail.muni.cz> **
  
-**More informationprojects and resources:** +Additionally, we are developing an optimization framework for the IDS incorporating MiXiM simulator. Evolutionary algorithms are used to optimize the IDS's performance.  
-  * [[research:secToolsInternal directory]]+ 
 +  Research project [[research:wsn:main| internal wiki pages]] 
 +  **WSNProtectLayer** - security middleware for TinyOS 
 +    * virtual radio is simulated and automatic packet protectionIDS and key management is provided. 
 +    * WSNProtectLayer [[https://github.com/petrs/WSNProtectLayer | Github repository]]   
 +    Take a look at [[https://youtu.be/qHaUO_XMEqE | video]] showing WSNProtectLayer middleware in action.  
 +  **Secrecy amplification protocols** 
 +    * establishing secure links in partially compromised network 
 +    * SensorSim simulator [[http://www.fi.muni.cz/~xsvenda/s3.html| download page]] - fast simulator optimized for simulation of secrecy amplification protocols and probabilistic key predistribution 
 +    * KMSforWSN framework based on OMNet++ simulator together with parametrised attacker specification 
 +  * **Laboratory testbed** 
 +    * [[research:wsn:testbedLaboratory tesbed]] with 28 TelosB and 20 JeeNode nodes 
 +    * [[https://github.com/crocs-muni/Edu-hoc/ | Edu-Hoc]] - laboratory Arduino-based [[research:wsn:testbed_arduino| testbed]] with JeeNode nodes together with security applications for ad-hoc and wireless sensor networks. 
 + 
 + 
 +**Involved people:**  
 +{{:public:crocs:nemec.jpg?50|}} {{:public:crocs:ostadal.jpg?50|}} {{:public:crocs:svenda.jpg?50|}}  
 +  
 +  * [[https://is.muni.cz/auth/osoba/394036|Lukáš Němec]] 2013-now (Crypto and Key management in TinyOS, Arduino testbed network, Edu-hoc) 
 +  * [[https://is.muni.cz/auth/osoba/255508|Radim Ošťádal]] 2013-now (Secrecy amplification protocols, parametrised attacker in) 
 +  * [[https://is.muni.cz/auth/osoba/4085|Petr Švenda]] 2004-now (Key management schemes, secrecy amplification protocols) 
 + 
 +**Former participants:** Martin Stehlík 2010-2017 (IDS, simulators, optimization); Marek Sýs 2015 (secrecy amplification protocols); Filip Jurnečka 2010-2014 (Key management schemes), Marcel Gazdík 2012-2013 (ePIR&RFID hw readers), Dušan Klinec 2008-2014 (WSNProtectLayer core developer, a lot of network experiments), Jiří Kůr 2009-2014 (Privacy protection, key establishment), Tobiáš Smolka (testbed, omnetpp experiments, secrecy amplification), Andriy Stetsko (IDS in WSN) 
 + 
 +** Selected publications: ** 
 +  * [2019] Němec, L.; Matyáš, V;Ošťádal, R.; Švenda, P.; Palant P.-L.: Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks, Sensors, 19-4, 2019 
 +  * [2018] [[public:papers:dcoss2018 | Němec, L.; Ošťádal, R.; Švenda, P.; Matyáš, V.: Adaptive Secrecy Amplification with Radio Channel Key Extraction]], 2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2018. 
 +  * [2018] Němec, L.; Ošťádal, R.; Švenda, P.; Matyáš, V.: Entropy Crowdsourcing – Protocols for Link Key Updates in Wireless Sensor Networks, In 26th International Workshop on Security Protocols (SPW 2018). Lecture Notes of Computer Science. Springer. 
 +  * [2016] [[public:papers:icnsc2016 | Stehlík, M.; Matyáš, V.; Stetsko, A.: Towards Better Selective Forwarding and Delay Attacks Detection in Wireless Sensor Networks]] 
 +  * [2016] [[public:papers:spw2016 | Ošťádal, R.; Švenda, P.; Matyáš, V.: Reconsidering Attacker Models in Ad-hoc Networks]], In 24th International Workshop on Security Protocols (SPW 2016). Lecture Notes of Computer Science. Springer. 
 +  * [2015] {{:public:papers:secamplif_wistp15.pdf| Ošťádal, R.; Švenda, P.; Matyáš, V.: On Secrecy Amplification Protocols}}, In 9th WISTP International Conference on Information Security Theory and Practice, LNCS 9311, Springer, pp. 3-19, 2015. 
 +  * [2014] {{:public:crocs:space14_final.pdf| Ošťádal, R.; Švenda, P.; Matyáš, V.: A new approach to secrecy amplification in partially compromised networks}}, In 4th International Conference on Security, Privacy and Applied Cryptography Engineering, LNCS 8804, Springer, pp. 92–109, 2014.
  
-**Involved people:**   
-  * [[https://is.muni.cz/auth/osoba/394036|Lukáš Němec]] 2019-now  
-  * [[https://is.muni.cz/auth/osoba/168968|Milan Brož]] 2019-now  
-  * [[https://is.muni.cz/auth/osoba/325219|Dušan Klinec]] 2019-now  
-  * [[https://is.muni.cz/auth/osoba/4085|Petr Švenda]] 2019-now  
-  FIXME 
-** Selected publications ** 
-  FIXME 
 </collapse> </collapse>
  
  
 +
 +===== Software Security and Secure Programming =====
 +
 +This project focuses on usage, evaluation and extension of various tools related to secure programming, application vulnerabilities, security testing and code review. We are interested in static and dynamic analysis of applications with a special focus on security bugs, fuzzy testing, taint analysis and semi-automated review procedures and its incorporation into application development lifecycle. This project is coordinated with [[ http://www.ysoft.com/ | Y Soft Corporation, a.s.]], and for students participating in this project, there is a possibility to get a financial support from this company. More general information about Y Soft cooperation with students can be found [[https://www.ysoft.com/en/company/university-relations|here]].
 +
 +<button collapse="swsecurity">Find out more</button>
 +
 +<collapse id="swsecurity" collapsed="true">
 +
 +**Last update: 19.09.2018**
 +
 +**Contact:** Andriy Stetsko <xstetsko@fi.muni.cz> or <andriy.stetsko@ysoft.com>
 +
 +** Financial support:**
 +Y Soft Corporation, a.s. will provide financial support (in a form of stipend at the faculty or a part-time job in the company) to students with promising results.
 +
 +** Possible topics for cooperation with bachelor students:**
 +  * [[https://is.muni.cz/auth/rozpis/tema?balik=1275;tema=336359|OWASP Dependency Check: add support for Go]]
 +  * [[https://is.muni.cz/auth/rozpis/tema?balik=1275;tema=336361|OWASP Dependency Check: add support for C]]
 +  * [[https://is.muni.cz/auth/rozpis/tema?balik=1275;tema=336378|OWASP Dependency Check: enhance support for JavaScript]]
 +  * [[https://is.muni.cz/auth/rozpis/tema?balik=1275;tema=336379|Unused code detection]]
 +  * [[https://is.muni.cz/auth/rozpis/tema?balik=1275;tema=336397|Automatic API extraction from traffic analysis]]
 +
 +** Possible topics for cooperation with master students:**
 +  * [[https://is.muni.cz/auth/rozpis/tema?balik=58;tema=336354;|OWASP Dependency Check: add support for C and Go]]
 +  * [[https://is.muni.cz/auth/rozpis/tema?balik=58;tema=336381|Unused code detection]]
 +  * [[https://is.muni.cz/auth/rozpis/tema?balik=58;tema=336384|Dynamic security analysis of web application]]
 +  * [[https://is.muni.cz/auth/rozpis/tema?balik=58;tema=336385|Automatic API extraction from traffic analysis]]
 +  * [[https://is.muni.cz/auth/rozpis/tema?balik=58;tema=276842;uplne_info=1|Analysis of export and import laws for systems that involve cryptography]]
 +
 +**Involved people:**  
 +{{:public:crocs:stetsko.jpg?50|}}
 +  * [[https://is.muni.cz/auth/osoba/184905|Andriy Stetsko]] 2012-now (Project coordinator, thesis supervisor, Y Soft Corporation, a.s.)
 +
 +**Previous research topics:**
 +  * 2013-2017: **Tools for dynamic security analysis of web applications**, financial support from Y Soft Corporation
 +  * 2015-2016: **Analysis and application of OWASP testing guide**, financial support from Y Soft Corporation
 +  * 2015-2016: **Metasploit**, financial support from Y Soft Corporation
 +  * 2014-2016: **Secure software development processes**, financial support from Y Soft Corporation
 +  * 2012-2016: **Tools for static and dynamic code analysis**, financial support from Y Soft Corporation
 +  * 2014-2015: **Security mechanisms of PDF files**
 +  * 2014-2015: **Security aspects of Xamarin/Android Platform**
 +  * [[http://sourceforge.net/projects/cesta/ | Cesta project]] - security-related transformations of JavaCard source code, financial support from Y Soft Corporation
 +
 +</collapse>
  
 ===== Faster randomness testing ===== ===== Faster randomness testing =====