Recent Submissions

  • Detection of nework attacks using graph neural networks 

    Cobo Arróniz, Guillermo (Universitat Politècnica de Catalunya, 2023-01-20)
    Master thesis
    Open Access
    The last few years have seen an increasing wave of attacks with serious economic and privacy damages, which evinces the need for accurate Network Intrusion Detection Systems (NIDS). Recent works proposed the use of Machine ...
  • RanAware, analysis and detection of ransomware on Windows systems 

    Aznar Puyalto, Pablo (Universitat Politècnica de Catalunya, 2022-06-17)
    Master thesis
    Open Access
    These past years the use of the computers increased significantly with the introduction of the home office policy caused by the pandemic. This grow has been accompanied by malware attacks and ransomware in particular. ...
  • State-of-the art teaching material of the OWASP Top 10 

    Hernández Plaza, Nicolás (Universitat Politècnica de Catalunya, 2022-07-06)
    Master thesis
    Open Access
    Nowadays, web security has become something indispensable when working with the Internet, whether to protect business databases, establish communications, etc. With the aim of creating teaching material, I have created ...
  • Teaching self-sovereign identity 

    Rus Bordas, Laia (Universitat Politècnica de Catalunya, 2022-07-06)
    Master thesis
    Open Access
    For service providers, secure and reliable identification of users is essential to provide its services. From a user perspective, traditional identifiers are currently solved by centralized entities who have the capacity ...
  • Fuzzing a MACsec Key Agreement Protocol Application 

    Sans Falip, Roger (Universitat Politècnica de Catalunya, 2022-07-07)
    Master thesis
    Open Access
    Covenantee:   Technica electronics
    Along this thesis, a popular testing technique to find bugs and vulnerabilities called fuzzing is implemented in order to exploit an application developed by Technica Electronics Barcelona S.L. First, a study of how the ...
  • Specification and implementation of metadata for secure image provenance information 

    Fotos, Nikolaos (Universitat Politècnica de Catalunya, 2022-07-07)
    Master thesis
    Open Access
    The booming of AI tools capable of modifying images has equipped fake media producers with strong tools in their arsenal. Complementary to the efforts of implementing fake media detectors, research organizations are designing ...
  • Recent practical applications of pairing-based cryptography 

    Argyriadοu, Danae (Universitat Politècnica de Catalunya, 2022-07-08)
    Master thesis
    Open Access
    Pairing based cryptοgraphy was bοrn near year 2000 with the paper "A Οne Rοund Prοtοcοl fοr Tripartite Diffie-Hellman" by A. Jοux. Since then, hundreds οf research papers have been published, οffering a wide range οf ...
  • Generation of synthetic data with privacy guarantees 

    Triginer Perera, Anna (Universitat Politècnica de Catalunya, 2022-06-30)
    Master thesis
    Restricted access - confidentiality agreement
  • Browsing Behavior : Tracking Users on the Internet 

    Brosa I Hernández, Lluís (Universitat Politècnica de Catalunya, 2022-07-13)
    Master thesis
    Open Access
    Web tracking databases usually use pseudonyms to identify subjects. It has been proven that subjects web behaviour has enough information to identify them. In this thesis, we attempted to retrieve this identifying data ...
  • Securing a REST API Server 

    Mendoza Jiménez, Francisco (Universitat Politècnica de Catalunya, 2022-09-07)
    Master thesis
    Open Access
    Nowadays, there are more sources of cyber-threats and more cyber-attacks that target all kind of victim profiles. From big companies with big architectures, to small businesses that only have a web site as a platform to ...
  • Dataset for hardware Trojan detection 

    Mus León, Sergi (Universitat Politècnica de Catalunya, 2022-07-14)
    Master thesis
    Open Access
    Nowadays, cloud services rely extensively on the use of virtual machines to enforce security by isolation. However, hardware trojan attacks break this assumption. Within these attacks, cache side-channel attacks such as ...
  • Simplified access control language based on XACML using JSON 

    Stroppa, Luca (Universitat Politècnica de Catalunya, 2022-07-13)
    Master thesis
    Open Access
    In the literature, there is no standard JSON format for XACML policies. Indeed, The JSON profile of XACML only deals with XACML requests and responses. The idea behind this project is implementing a simplified Access Control ...

View more