The first master theses of the 4TU.CybSec specialisation started to appear in 2017, but we also list a number of theses from cyber security students enrolled in related / earlier programs. We are particularly proud of the fact that many of our students graduated cum laude and that several students have won a prestigious prize.
2020
- Tariq Bontekoe, Balancing privacy and accountability in digital payment methods using zk-SNARKs (cum laude) link
- Riccardo Colombo, On the escalation from Cyber Incidents to Cyber Crises link; EIT Digital
- Ruben Groot Roessink, Experimental review of the IKK query recovery attack: Assumptions, recovery rate and improvements link
- Kimberly Hengst, Best Practices in Cloud Incident Handling link
- Joran Honig, Incremental symbolic execution (cum laude) link
- Yoep Kortekaas, Access Pattern Hiding Aggregation over Encrypted Databases (cum laude) link
- Ruth Scholten, Secure biometric verification in a malicious attacker model setting link
- Daniel Vos, Adversarially Robust Decision Trees Against User-Specified Threat Models (cum laude) link
2019
- Rob van Emous, Towards Systematic Black-Box Testing for Exploitable Race Conditions in Web Apps link
- Joeri Kock, A signature-based Approach to DDoS Attack Mitigation using BGP Flowspec Rules link
- Valentine Legoy, Retrieving ATT&CK tactics and techniques in cyber threat reports link; EIT Digital
- Giovanni Riva, Privacy architecting of GDPR-compliant high-tech systems: the PAGHS methodology link; EIT Digital
- David Stritzl, Privacy-Preserving Matching Using Bloom Filters: an Analysis and an Encrypted Variant link
- Daan van der Valk, Towards Understanding of Deep Learning in Profiled Side-Channel Analysis (cum laude) link
2018
- Lisette Altena, Exploring effective notification mechanisms for infected IoT devices link
- Anirudh Ekambaranathan, Using stylometry to track cybercriminals in darknet forums (cum laude) link
- Mourad El Maouchi: DECOUPLES: A Privacy-Preserving Solution for Traceability in Supply Chains link
- Lars van de Kamp, PRECLUDE: PRivacy-prEserving Collaborative Learning Using a Decentralised Ensemble approach (cum laude) link
- Bjorn van der Laan, Publicly verifiable authenticity of data from multiple external sources for smart contracts using aggregate signatures (cum laude) link
- Sophie Lathouwers, Reasoning About the Correctness of Sanitizers link
- Azqa Nadeem, Clustering Malware's Network Behavior using Simple Sequential Features (cum laude) link
- Elsa Turcios Rodriguez, Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation link
- Pieter van der Veeken, Constructing a Confidential, Authenticated, Forward Secure and Offline Logging Scheme link
2017
- Ali Davanian: Effective Granularity in Internet Badhood Detection - Detection rate, Precision and Implementation performance link; EIT Digital
- Thijs van Ede: Detecting adaptive data exfiltration in HTTP traffic (cum laude) link Prize Twente Graduate School 6-month Bridging Grant for PhD program
- Ana Guerra Veloz: Security Requirements Engineering in Medical IoT - comparing literature and developers’ practices link
- Amit Kumar Gupta: Security Risk Analysis of Automotive Ethernet Networks link
- Leon Helsloot: Preserving Privacy through Cryptography in Online Behavioural Advertising (cum laude) link Prize Winner of the best graduate award of the EEMCS faculty
- Sjors Hijgenaar: Electric Vehicles; The Driving Power for Energy Transition - Blockchain-based Decentralised Energy Trading link
- Roeland Krak: Cycle-Accurate Timing Channel Analysis of Binary Code (cum laude) link Prize Winner of theENIAC Best Thesis Award 2017
- Christian Maulany: Integrating Self-Monitoring Devices Into The Untrusted Cloud For Healthcare link
- Jennie de Vries: What drives cybersecurity investment? Organizational factors and perspectives from decision-makers link
- Stijn van Winsen: Threat Modelling for Future Vehicles : On Identifying and Analysing Threats for Future Autonomous and Connected Vehicles link
2016
- Yorick Breukers: The Vulnerability Ecosystem (cum laude) link
- Herson Esquivel-Vargas: Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol link
- Mark Janssen: Combining Learning with Fuzzing for Software Deobfuscation link
- Daniel Mast: A Framework for the Implementation and Comparison of Authenticated Data Structures link
- Vincent van Mieghem: Detecting Malicious Behavior using System Calls (cum laude) link
- Uraz Odyurt: Bring your own authenticator/authentication security in physical access control systems (cum laude) link EIT Digital
- Jelte Orij: Self-adaptation to Concept Drift in Web-based Anomaly Detection link
- Joep Peeters: Fast and Accurate Likelihood Ratio Based Biometric Verification in the Encrypted Domain link
- Kevin Joseph Syauta: Traceability in cyber risk assessment - A design science approach link
- Kris Shrishak: Incorporating Leveled Homomorphic Encryption-based Private Information Retrieval in Federated eID Schemes to Enhance User Privacy link
- Rick Slangen:Understanding Cyber-risk By Investigating the Behaviour of Defender and Threat Agent Organisations link
- Simon de Vries: Achieving 128-bit Security against Quantum Attacks in OpenVPN (cum laude) link Prize: Winner of the 2016 Internet Thesis award
- Lisa de Wilde: A Bayesian Network Model for predicting data breaches caused by insiders of a health care organization (cum laude) link
2015
- Inés Carvajal Gallardo: Privacy-preserving social DNA-based recommender (cum laude) link
- Justyna Chromic: Booters (black)list link
- Rick van Holsteijn: The motivation of attackers in attack tree analysis link
- Katrien Meijdam: Phishing as a Service - Designing an ethical way of mimicking targeted phishing attacks to train employees link
- Moritz Müller: SIDekICk: SuspIcious DomaIn Classification in the .nl zone (cum laude) link Prize: Winner of the 2015 Internet Thesis award EIT Digital
- Nils Rodday: Exploring Security Vulnerabilities of Unmanned Aerial Vehicles link Press coverage: wired Forbes cnet BBC EIT Digital
- Federico Scrinzi: Behavioral analysis of obfuscated code (cum laude) link EIT Digital
- Jeroen Senden: Biasing a ring-oscillator based true random number generator with an electro-magnetic fault injection using harmonic waves link
- Bas Stottelaar: Practical cyber-attacks on autonomous vehicles (cum laude) link
- Krijn Wijnands: Using endpoints process information for malicious behavior detection link
2014
- Djurre Broekhuis: Sousveillance on Intelligent Transportations Systems (cum laude) link
- Ralph Broenink: Finding relations between botnet C&Cs for forensic purposes link
- Mircea Cadariu: Tracking known security vulnerabilities in third-party components link
- Henrique Dantas: Vulnerability analysis of smart meters link
- Keith Davelaar: Protecting high school students from bullying: Bully Shield link
- Rick van Galen: Design and feasibility of mobile peer-to-peer payment systems link
- Brinda Hampiholi: Secure and privacy-preserving national eID systems with attribute-based credential technologies link EIT Digital
- Matthijs Jonker: Flow-based SSH dictionary attack detection - the effects of aggregation link
- Rutger Plak: Anonymous Internet - Anonymizing peer-to-peer traffic using applied cryptography link
- Risto Tanaskoski: Anonymous HD video streaming - Peer-to-peer onion router link
- Ruud Verbij: Dutch e-voting opportunities - Risk assessment framework based on attacker resources (cum laude) link Prize: Winner of the 2014 Joop Bautz Information Security Award
- Wouter de Vries: How asymmetric is the Internet? A Study to support DDoS mitigation approaches link
2013
- Olga Havlikova: Hierarchical range queries on encrypted data link
- Christina Höfer: POPCORN: Privacy-preserving charging for eMobility (cum laude) link Prize: Winner of the 2013 Joop Bautz Information Security Award
- Zhenshi Li: An exploratory study on authorship verification models for forensic purposes link
- Andrei Manta: Publishing privacy sensitive open data using an automated decision support system link
- Gaurav Misra: Permeance of ICT in crime in India link
- Antonio Spadaro: Event correlation for detecting advanced multi-stage cyber-attacks link
- Samaneh Tajalizadehkhoob: Online banking fraud mitigation -- A quantitative study for extracting intelligence about target selection by cybercriminals from Zeus financial malware files link publication
- Jeroen de Wit: Continuous forensic readiness link
2012
- Jan-Willem Beusink: Secure Access Control to Personal Sensor Information in Federations of Personal Networks link Prize: Winner of the 2012 Joop Bautz Information Security Award
- Rens van der Heijden: SeDyA: Secure Dynamic Aggregation in VANETs link
- Olga Kulikova: Cyber crisis management: A decision-support framework for disclosing security incident information link
- Stas Verberkt: Claiming security properties in a service oriented architecture link
- Peter Wagenaar: Detecting botnets using file system indicators link