Past Theses
Full list of bachelor and master theses I have supervised at the IT-University of Copenhagen. Recent entries are also shown on the main teaching page.
- Developing Robust Neural Network Models for Network Intrusion Detection, Vladislav Konjusenko and Oleksandr Adamov (BDS, 2025)
- Exploring PAC-Learnability of decision stumps in Coq, Magnus Brun Larsen (SWU, 2024)
- Security Vulnerabilities in Kubernetes Web Services, Asger Clement Nebelong Lysdahl (BSc, 2024)
- Gamification of learning in cybersecurity, Daniel Lunddal Nygaard Hansen (BSc, 2024)
- Formal Verification of "The Entity Attestation Token (EAT) draft-ietf-rats-eat-31", Mathias Emil Lystlund Rasmussen (BSc, 2024)
- Machine learning robustness using Vehicle, Gusts Gustavs Grinbergs and Karlis Buiko (BDS, 2024)
- Building training material and challenges on fuzzing and symbolic execution (SWU, 2024)
- Building a linter for finding security vulnerabilities in Dockerfiles (SWU, 2024)
- Implementing Apachi, a conference management system, Philip Mørch and Bastjan Rosgaard Sejberg (SWU, 2024, co-supervised with Rosario Giustolisi) Continuation of the 2022 SWU Apachi project.
- Visualizing security protocols as choreographies, David Martin Sørensen and Philip Kristian Møller Flyvholm (SWU, 2023)
- Hacking of an IoT Device (Wi-Fi router), Rasmus Balthazar Rødgaard Andreasen, Nikoline Burman and Anton Lukas Dørge Friis (BSc, 2023)
- Building a platform for running CTF competitions (Haaukins), Thea Ullegård Kjeldsmark, Mai Sigurd Adelheid Odgaard and Marcus Sebastian Emil Holmgaard (SWU, 2023)
- Human detection of AI generated images (KCS, 2023)
- EMV payment attacks, Emil Due Rasmussen (KCS, 2023)
- Implementing Apachi, a conference management system (SWU, 2022, co-supervised with Rosario Giustolisi)
- LoRaRatchet, implementation and investigation, Ask Harup Sejsbo and David Martin Carl (KCS, 2022) code code (alt)
- Compiling security choreographies to executable code and ProVerif models, Anders Reedtz Sparrevohn, Elitsa Miroslavova Marinovska and Lukas Hundt Petersen (KCS, 2022) code
- Hacking CAN bus vehicle health monitors (SWU, 2022)
- Finding zero day vulnerabilities in the Linux kernel using the CodeQL code scanning tool, Jacob Buchholz Bech (SWU, 2022)
- Creating cybersecurity training material for highschool students, Kasper Ørntoft Thor (KSD, 2022)
- Ratcheting in LoRaWAN: implementing the Double Ratchet algorithm in constrained networks, Astrid Ellermann-Aarslev and Laura Kromann-Larsen (KSD, Spring 2021)
- From LoRaWAN to LoRaRatchet: a security analysis, Ditte Nygaard Rasmussen (KSD, Autumn 2021)
- Threat assessment for LoRaWAN devices in offshore wind energy (KSD, 2021)
- Using the angr.io framework to find information flow vulnerabilities in Unix binaries, Jakob Eik Thunbo Mollerup (KCS, 2021)
- Security analysis of the OSCORE secure transport protocol for IoT (BSc, 2021)
- Extending session types to model security properties (KCS, 2021) May be Julie Tollund's late finalisation of her 2019 work — to verify.
- Mitigating timing attacks on network traffic (tvalv), Niclas Hedam (MSc, 2021) Distilled into the rejected NDSS22 tvalv submission.
- Apachi - an Accountable, Secure and Fair Approach to Conference Paper Submission, Yoav Schwartz and Nicolai Strøm Steffensen (KCS, 2020) code
- Scanning the Danish internet to determine the state of Danish cybersecurity (SWU, 2020)
- Detection of botnets through the use of Honeypots (SWU, 2020)
- Formal verification of Mozilla (Firefox) Sync Protocol, Amalie Anderson (BSc, Spring 2019)
- Security Analysis of a Smart Heat Meter, Mike Laumann Bellika (BSc, Spring 2019) code
- CityRun: A combined running- and sightseeing app, Mia Pihl and Cathrine Søby Rathje (KSD, Spring 2019)
- Decentralized Certificate Authorities using DAOs, Mark Rostgaard Mortensen and Markus Thomsen (KCS, Spring 2019) code
- Extending Session Types to Model Security Properties, Julie Tollund (KCS, Spring 2019)
- Formal Verification of Object Security for Constrained RESTful Environments (OSCORE), Mikkel Kaj Andersen (BSc, Spring 2019) code
- Formal Verification of the Certificate Transparency Standard, Thomas Tyge Andersen (BSc, Spring 2019, co-supervised with Rosario Giustolisi)
- Verification of privacy in Bingo Voting, Sean Wachs and Rasmus Dilling Møller (BSc, Spring 2019, co-supervised with Rosario Giustolisi)
- Zero-knowledge proofs on the GPU for voting, Emil Lemming and Timmie Nielsen (BSc, Spring 2019)
- A Precise Translation of the Applied Pi-calculus into Linear Logic, Theis Grønbech Petersen (KCS, Fall 2018)
- Formal analysis of EDHOC, a protocol for IoT secure communication, Theis Grønbech Petersen and Thorvald Sahl Jørgensen (BSc, Spring 2018) Led to the SSR 2018 paper.
- Security analysis for smart door lock, Steffen Mogensen (BSc, Spring 2018)
- Deduplicated Storage Systems: Trade-offs between security and efficiency, Emma Arfelt Kock (KCS, Fall 2017)
- Verifying Selene in Tamarin, Eva Drewsen (KCS, Spring 2017, co-supervised with Carsten Schürmann) Led to the E-Vote-ID 2017 paper.
- Voting Protocol in Ethereum, Adrian Brink (KCS, Spring 2017)
- Transparent authentication with wearable devices, Jacob Cholewa and Rasmus Wismann (BSc, Spring 2017)
- Hacking WinVote machines, Florin Vasile and Andreas Nielsen (BSc, Fall 2016)