A Forensic Analyis of WinVote Voting Machines

Supervisor: Carsten Schürmann

A Security Analysis of Apple's Keychain

Supervisor: Carsten Schürmann

Security Standards for IoT

Supervisor: Carsten Schürmann, Alessandro Bruni

Forensics of an IoT device

Supervisor: Carsten Schürmann, Alessandro Bruni

Generating Law Texts from Formal Specifications

Supervisor: Carsten Schürmann

Analysis of the risk of reusing the Winternitz signatures in blockchains

Supervisor: Rosario Giustolisi

Analysis of the multisigning scheme in IOTA flash

Supervisor: Rosario Giustolisi

Evaluate different attacker models in the Danish transport ticket system

Supervisor: Rosario Giustolisi

Derive a security ceremony of choice. For example flight boarding, ticketing system, car sharing , bike rental, etc

Supervisor: Rosario Giustolisi

Control your E-mail Inbox with Capabilities

Supervisor: Willard Rafnsson

Program Synthesis for Security

Supervisor: Willard Rafnsson, Alessandro Bruni

Work on tools and techniques for analyzing security protocols

Supervisor: Carsten Schürmann, Alessandro Bruni