Projects

This is list of projects that are not availabe on github. Click on the icon to view/download the file.

IN5280 - Security By Design

Security Analysis

This project consists of Asset identification, categorization and criticality assessment, threat modeling, analysis, using the RMF and Security requirements


IN5290 - Ethical Hacking

Technical Information Gathering

Get in touch with services

Web hacking 1, Client side bypass, Brute-forcing

Web hacking 2 – Parameter tampering, Cross Site Scripting, Session hijacking

Web hacking 3 – SQL Injection, Xpath injection, Local File Inclusion

IN5130 - Unassailable IT-systems

Security Risk Assessment of product monitoring during shipping

Security risk assessment of product monitoring system during shipping.


Refinement of a recruitment‐system

Creating a verifiable transformation of an abstract (high-level) formal specification into a concrete (low-level) specification/model.


Modelling Product monitoring system during shipping

Modelling the behaviour of processes and technology focusing particularly on interaction and communication of product monitoring system during shipping.


UNIK4250 – Security in distributed systems

TCP/IP Attack

This project conists of TCP RST Attacks on telnet and ssh Connections, TCP Session Hijacking and Creating Reverse Shell using TCP Session Hijacking.


INF5870 – Energy Informatics

Machine Learning for Wind Energy Forecasting

Wind power forecasts are very critical for decision-making problems in electricity markets, e.g., energy load balance, electricity price, and power grid stability. It is therefore very important to understand how these forecasts can be generated.


Home Energy Management

Each household has combination of the following appliances. Typical appliances included for the purpose of Illustration. In practice, households may have a variety of other appliances. The daily consumption of each household is divided into a 24-slot time-frame with each slot corresponding to an hour period.


INF5181 – Process improvement and agile methods in systems development

Software process improvement

The task is to describe a (realistic) software process improvement (SPI) plan for a software/systems development organization in the form of a report.


CMPE 187 - Software Quality Engineering: Projects

Test cases

Mutation Testing

Control Flow Graphs

Data Flow Graphs

Domain Testing

Generating Test Cases with FSM's

Testing Without Specifications

Writing Test Cases-II

INF3121 – Software Testing

Manual testing and test automation

Testing a website using Selenium IDE - currently, the most used test automation tool in the world. Writing Test cases, manual tests, automated tests, black box testing/ experience-based test design techniques, which we then used to test with.

Interpret the metrics offered by the static analyzer

Using a static analysis tool (Source Monitor) to interpret metrics and improve code of a game in our case the game was Minesweeper. And thus improve performance, maintainability and readability of a program, this by the static analysis tool. Which can tell us about weaknesses of the code which we would rewrite, eliminate, decouple, etc, and so that the overall performance of the code improves.

INF3510 – Information Security

iOS Vulnerabilities

This paper is in Norwegian.
I denne artikkelen diskuterer vi den generelle oppbyggningen til iOS kommer inn på sikkerhetskomponentene ved operativsystemet. Deretter vil vi se på ulike utført angrep og løsninger, samt statistikk. Strukturen i oppgaven er satt opp slik at vi tar for oss de ulike sikkerhetskomponenter, med en hendelse eller angrep relatert til det respektive område. Når det kommer til jailbreaking vi begge har erfaring med dette, så noe av informasjon er kontribuert fra denne. Til slutt diskuterer vi de siste hendelser som har skjedd og diskutere om dagens situasjon, og hva som potensielt kan påvirke trusler.

- Struktur
- Sikkerhetskomponenter
- Nettverkssikkerhet og iCloud
- Åpen kildekode vs Lukket kildekode