Proposta de tesi | Investigadors/es | Grup de recerca |
Digital media security, privacy and forensics (steganography, watermarking, fingerprinting and steganalysis) The security and privacy of digital media content has been attracting the attention of academia and industry for the past two decades. Since copies of digital content can be made without any loss and with no cost, content vendors and producers are trying to design mechanisms either to avoid or to detect unauthorized copies. Steganography, watermarking and fingerprinting, for images, audio and video content are being investigated by different groups worldwide in order to produce practical solutions to these kinds of problems while at the same time satisfying requirements such as security, privacy, capacity, robustness and transparency. Steganography is also used to send concealed messages in an apparently innocent cover object. Steganalysis techniques are being developed in order to detect whether a multimedia object contains secret information which may be used for malicious purposes. In general, these topics belong to computer forensic techniques that can be used to provide legal evidence of illegal or criminal actions. This line of research is related to all these issues, with a special focus on networked distribution systems such as online social networks or peer-to-peer applications. |
Mail:dmegias@uoc.edu |
KISON |
Security and Privacy in the Internet of Things (SP@IoT) The Internet of things (IoT) refers to the internetworking of devices (including smartphones), vehicles, embedded systems, sensors, actuators, and other hardware and software components, which enable these objects to collect and exchange data. These data can be used later on (or in real time) for a wide variety of applications. For example, samples on the mobility patterns of a group of people can be used for designing new and more efficient public transportation systems. Despite the advantages that this information can provide –for example, to advise individuals for specific routes to avoid traffic jams–, it is clear that the collection and storage of such data raises important ethical issues, such as those concerned with the information security and users’ privacy. It is essential that the storage and processing of this information is carried out in a way that ensures the privacy of individuals whose data are collected or who want to enjoy the benefits of this technology. The project involves designing systems that allow data collection with the required degree of privacy through the use of specific cryptographic protocols, combined with data mining and managing large amounts of data (big data). |
Mail:dmegias@uoc.edu |
|
Blockchain
Blockchain, and more broadly Distributed Ledger Technology (DLT), extends far beyond cryptocurrencies, revolutionizing various industries and enabling innovative business models based on decentralized services. Blockchain enhances security, privacy and transparency, eliminates intermediaries, empowers end-users, and facilitates new use cases previously deemed unfeasible. Current blockchain projects span numerous domains, including cryptocurrencies, payment systems, supply chains, e-health, e-voting, decentralized identity, and the collaborative economy.
Key Research Focus Areas:
- Enhancing Current Blockchain Technology: Improving security, privacy, scalability, interoperability and overall efficiency.
- Exploring Second Layer Protocols: Investigating advanced protocols to augment blockchain performance.
- Innovative Decentralized Services: Proposing new services or protocols where blockchain is a fundamental enabler.
- Blockchain and Artificial Intelligence Integration: Exploring the synergy between blockchain technology and AI.
- Blockchain Techniques for IoT security: Researching and evaluating efficient techniques/architectures for decentralization of IoT security.
This research line is not confined to the topics listed above. We actively welcome and encourage other related research proposals that align with our overarching goals of advancing blockchain technology and its applications.
|
Mail: vgarciafo@uoc.edu
Mail: fsanchezcas@uoc.edu
|
KISON |
Digital Chain of Custody in computer forensics
The thesis is focused on the proposal to create a "Digital Chain of Custody" to ensure that the digital evidence (information or data, stored or trans-mitted in binary form which has been determined, through the process of analysis, to be relevant to the investigation) will be accepted in international court proceedings, so in it will be guaranteed the principles of identification, preservation, securing and posterior analysis.
After to establish a clear procedure, it will proceed with the second part: to create an artifice which it is able to comply with the procedure and it should take into account a set of items as: digital evidence acquisition and metadata associated (video, audio, photographs or files in general), probe localization, timestamp and secure communication capabilities. This device will be the starting point of the "Chain".
|
Mail: jserrai@uoc.edu |
KISON |
Tampering detection in multimedia content A new study of methods and applications in order to detect tampered multimedia content. Using Machine Learning and Artificial Intelligence techniques, the final method and application will be detect all modification media content, sound, video or images. Using techniques of steganography and steganalysis. |
Mail: jserrai@uoc.edu |
KISON |
User-centered privacy-enhancing technologies
Data mining technologies have been constantly improving from last 20 years, the increasing computational power and storage capacity have allowed impressive accomplishments on the Artificial Intelligence and Machine Learning algorithms.
This progress has been powered by the data collection through pervasive sensing by the Internet of Things and of smart-devices (such as smart-watches, smart-meters, etc.). As users’ data is collected in real-time, this must be carried out in a privacy-preserving manner not only to fulfill legal and ethical requirements but also individuals’ expectations. A user-centered (or local) approach for privacy protection may increase users’ confidence, through transparency and control.
The aim of this proposal is to develop user-centered technologies for privacy protection of time-series obtained from sensors (such as location, health, behavioral or relational data).
We will study the guarantees provided by aggregation and randomized response methods to attain Local Differential Privacy. We will apply them to protect data that may be used for recommender systems, sequential pattern mining, complex networks analysis, predictions and decision making.
The main contributions of this project will be to provide local algorithms for data protection and to analyze and develop strong guarantees of privacy for dynamic data.
Some relevant of differentialy private technologies, are google’s RAPPOR (Randomized Aggregatable Privacy-Preserving Ordinal Response) [1] or the US Census Bureau product called OnTheMap [2].
REFERENCES
[1] U. Erlingsson, V. Pihur, and A. Korolova. Rappor: Randomized aggregatable privacy-preserving ordinal response. In CCS, 2014.
[2] A. Machanavajjhala, D. Kifer, J. Abowd, J. Gehrke, and L. Vilhuber. Privacy: Theory meets practice on the map. In ICDE, 2008.
|
Mail: dmegias@uoc.edu
|
KISON |
Malware Detection Using Machine Learning Algorithms
This research thesis proposes a novel framework leveraging Artificial Intelligence (AI) techniques, specifically machine learning (ML) and deep learning (DL) algorithms, to effectively distinguish between malware-infected files and clean files. The primary aim is to develop a proactive method for detecting intrusions, malware, and ransomware before attackers gain control over information systems. This approach addresses the limitations of traditional signature-based detection methods by providing a more adaptable and accurate solution to evolving cyber threats.
The framework builds upon existing research in the field, such as the works of Hussain et al. (2022) and Gavriluţ et al. (2009), which explored the application of ML algorithms for malware detection. By enhancing these methodologies, the proposed research will incorporate advanced techniques, such as neural networks and ensemble learning, to improve detection rates and reduce false positives and negatives. The adaptability of these AI models is crucial for identifying zero-day attacks and polymorphic malware, which often evade conventional detection systems.
Related work:
* Hussain, A., Asif, M., Ahmad, M.B., Mahmood, T., Raza, M.A. (2022). Malware Detection Using Machine Learning Algorithms for Windows Platform. In: Ullah, A., Anwar, S., Rocha, Á., Gill, S. (eds) Proceedings of International Conference on Information Technology and Applications. Lecture Notes in Networks and Systems, vol 350. Springer, Singapore. doi.org/10.1007/978-981-16-7618-5_53
* D. Gavriluţ, M. Cimpoeşu, D. Anton and L. Ciortuz, ""Malware detection using machine learning,"" 2009 International Multiconference on Computer Science and Information Technology, 2009, pp. 735-741, doi: 10.1109/IMCSIT.2009.5352759.
|
Mail: jserrai@uoc.edu |
KISON |