Amrita TIFAC-CORE: M.Tech Projects

TIFAC-CORE in Cyber Security - M.Tech Projects

Amrita TIFAC-CYBER

M.Tech 2017 - 2019

S.No Roll No. Name Project Title
1 CB.EN.P2CYS17001 Aishwarya Raghavan Simulation and Formal Verification of SIP/ZRTP Protocol Using UPPAAL
2 CB.EN.P2CYS17002 Anto Ajisha Shriny M Design and Implementation of the Protocol for Secure Software-Based Remote Attestation in IoT Devices
3 CB.EN.P2CYS17003 Arunima Saha White-Box cryptography based data encryption-decryption scheme for IoT environment
4 CB.EN.P2CYS17004 Arvind S MITIGATING CoAP SECURITY VULNERABILITY USING OSCORE
5 CB.EN.P2CYS17005 Batta Hemanth Saikumar Enhanced Attach Procedure for Prevention of Authentication Synchronisation Failure Attack
6 CB.EN.P2CYS17006 Devarapalli Naveen PUF Authentication using Visual Secret Sharing Scheme
7 CB.EN.P2CYS17007 Duggempudi Srikanth Reddy Acknowledgement Spoofing at Kernel Level and TCP Sender Behaviour Analysis
8 CB.EN.P2CYS17008 Gottumukkala Eswar Kumar Raju Chip off IoT Devices: Attacks and Mitigations
9 CB.EN.P2CYS17009 Harikrishnan M Secure Digital Service Payments using Zero Knowledge Proof in Distributed Network
10 CB.EN.P2CYS17010 Kondapally Ashritha Redactable Blockchain using Enhanced Chameleon Hash Function
11 CB.EN.P2CYS17011 Krishna Steganalysis of Reversible Data Hiding in Color Image Using Grayscale Invariance
12 CB.EN.P2CYS17012 Manasa Sidhardhan Data Obfuscation Using Secret Sharing
13 CB.EN.P2CYS17013 Meghna Ashoka Mohan Preserving the Privacy of Audio File Using Ideal Secret Sharing Scheme with Cloud Storage
14 CB.EN.P2CYS17014 Misha Abraham Runtime Verification and Vulnerability Testing of Smart Contracts
15 CB.EN.P2CYS17015 Naveen S Ransomware Analysis Using Reverse Engineering
16 CB.EN.P2CYS17017 Putrevu Venkata Sai Charan Advance Persistent Threat Detection Using Long Short Term Memory (LSTM) Neural Networks
17 CB.EN.P2CYS17018 Ramaguru R Blockchain for the Internet of Vehicles
18 CB.EN.P2CYS17019 Ratnakaram Gowtham Proof of concept on Darknet Sensor Implementation in Linux Kernel
19 CB.EN.P2CYS17020 Remyasree N A Reliable Time Lock Encryption Scheme for Relatively Weak Computational Resources
20 CB.EN.P2CYS17021 Saurabh Choudhury Stegware Destruction Using Showering Methods
21 CB.EN.P2CYS17022 Smile Manuel J LoPT : LoRa Penetration Testing Tool
22 CB.EN.P2CYS17023 Sode Pallavi PREVENTING MITM ATTACKS ON BLE BASED IOT DEVICES
23 CB.EN.P2CYS17024 Thanusree Mohan Fraud Detection in Medical Insurance Claim with Privacy Preserving Data Publishing in TLS-N Using Blockchain
24 CB.EN.P2CYS17025 Vignesh Kumar V Averting Paging Related Attacks in 4G LTE Communication System
25 CB.EN.P2CYS17026 Viji S INTELLIGENT ANOMALY DETECTION MODEL FOR ATM BOOTH SURVEILLANCE
26 CB.EN.P2CYS17027 Akshay Pillai Securing Firmware in Internet of Things using Blockchain