The objective of this module is to provide a broad understanding of computer security with some in-depth discussions on selected topics in system and network security. The module covers the following topics: intrusion detection, DNS security, electronic mail security, authentication, access control, buffer overflow, memory and stack protection, selected topics in application security, for instance, web security, and well-known attacks. The student projects are picked by themselves, in some area of computer security.


44 students in 12 teams


NFC Cracking - NUS Matriculation Cards

NFC technology is now quite ubiquitous in our modern world. It is now known that the encryption of a certain NFC tag, the MIFARE Classic can now be broken in about 200 seconds on a laptop. Unfortunately for NUS, our matriculation cards are MIFARE Classic cards. This allows us to clone these cards easily and potentially abuse them to allow multiple non-NUS students to gain entry into the NUS libraries. In addition, we have figured out a way to forge NUS cards to impersonate any undergraduate or staff member. This presents a serious challenge to NUS to continue using the same technology whilst still ensuring that the security of card accessed doors is not compromised.


NFC sniffing through android applications

With the development of IoT, NFC is fast becoming a much used technology in our daily lives. One of the main use of NFC is for contact-less payments (Google wallet, Apple pay etc). With our project, we explore the possibility of gaining credit card information without physical access to your wallet.



Detecting and Combating ARP Spoofing

Our project aims to create a program for users to detect if they are victims of ARP spoofing, and offer ways to protect themselves.


Infra-red Pin-Pad Sniffing

In this project, we attempt to use side channel attacks to increase the probability of guessing a bank account PIN over a traditional brute force method. For the attack, we examine the use of thermo-graphic imaging on a used PIN pad to examine traces of leftover radiant heat from the user. The images will then be used to generate the possible PIN combinations.


IoT hacking: Attacking the Photon

Photon is a Wi-Fi enabled chip that is packaged as an Internet of Things prototyping-to-production development kit which is reprogrammable and connected to the cloud. The project seeks to investigate the security of Photon, and implement possible attacks on the device. A viable attack will be showcased, which demonstrates how one can compromise a connected photon and disclose the associated Wi-Fi passwords. Possible defence measures will be suggested and discussed.



Ultrasound Authentication Scheme: Within 4 Walls

This project aims to create an authentication scheme that can only be shared within a classroom or any confined physical space. The means of implementation would be through the use of ultrasound, as it is unable to pass through the walls of the room, to send data such that 2 systems may authenticate via ultrasound to establish a connection subsequently.


Secure lock system with NFC-enabled Android devices

How many times have you been locked out of our classrooms and offices because you did not bring along your access cards? We present a new alternative to the old digital security lock commonly found around NUS and offices around Singapore, where users present their access cards to it for unlocking the door. Our solution uses the same technology behind the old security locks to seamlessly integrate into current systems, while providing extra usability by allowing access using NFC-enabled Android devices, which we never leave behind no matter where we go.



Sniff and Capture Mining info from the tightly secured LTE network

Using Software Defined Radios such as the BladeRF and the USRP B100, one half of our project involves sniffing out LTE signals and frequency from nearby mobile base stations. The other half involves using of an International Mobile Subscriber Identity (IMSI) catcher to sniff out information, in particular the IMSI number, of those equipped with a LTE user equipment in the vicinity


Visualizing Application to Application Links on a Secure Network

Our project involves visualization of application to application links on a secure network. This entails using software such as Wireshark or devices such as Wi-Fi dongles to sniff encrypted data on communication links involving the application link from sender to receiver. Our main focus is to study encrypted packets sent during VoIP calls and messages (mainly skype and whatsapp calls) to gain meaningful information about the participants and their conversation.


Drone hacking: Demystified

In this project, we will focus on investigating the security measures implemented on the communication channels of commercial drones, in particular, the Hubsan X4 quadcopter, by analyzing the drone’s frequency and signals using Software Defined Radios. Through the analysis, we will uncover the proprietary chips and protocols it is using and identify plausible attack vectors that can be done.


Hack My Router

We investigate the Singtel Home Fiber Broadband Network Infrastructure. In particular, emphasis is placed on Customer Premises Equipments (CPEs), namely the broadband routers and the Fiber Broadband Gateways a.k.a. Optical Network Terminals. We find that some routers are vulnerable to attacks based on, CSS and Local Privilege Escalation. These attacks, in turn, allows an attacker to possess full control over the router, sometimes with Telnet and SSH access from WAN and LAN endpoints. We explore the potential extent of exploitation and list some precautionary measures that can be taken to prevent local network compromise.


Acoustic Keystroke Sniffing

Many side channel attacks focus inherently on the emanations of computer systems, such as the electromagnetic, the optical and the power consumption. Fundamentally any form of emissions from a machine has the potential to be vulnerable to an attack so long as you can make information out of the data. That is the goal that inspired this project, to see whether it is possible to make information out of the audible byproduct of entering information over a keyboard and on the condition of success, to devise preventative measures to contain the leak discovered. In today’s acclimatization with the digital age, many have come to trust systems we have in place with protecting them and their secrets. However the predominant method in which we interact with computers, being a QWERTY keyboard and number pads creates a point of interest for malicious intent as the payoff of exploitation is ubiquitous since the amount of information that could be at risk to acoustic sniffing is at a correlated growing all-time high with our acclimatization to conventional computer systems. Therefore the value in ensuring the security of the information entered over such mediums is rather significant.