Published theses

The 4TU.CybSec master specialisation program offers a large variety of courses enabling students to select a highly individual course program.
4TU Delft
4TU Eindhoven
4TU Twente
4TU Wageningen

The first master theses of the 4TU.CybSec specialisation started to appear in 2017, but we also list a number of theses from cyber security students enrolled in related / earlier programs. We are particularly proud of the fact that many of our students graduated cum laude and that several students have won a prestigious  prize.

2018

  • Lisette Altena, Exploring effective notification mechanisms for infected IoT devices link
  • Anirudh Ekambaranathan, Using stylometry to track cybercriminals in darknet forums (cum laude) link
  • Mourad El Maouchi: DECOUPLES: A Privacy-Preserving Solution for Traceability in Supply Chains link
  • Lars van de Kamp, PRECLUDE: PRivacy-prEserving Collaborative Learning Using a Decentralised Ensemble approach (cum laude) link
  • Bjorn van der Laan, Publicly verifiable authenticity of data from multiple external sources for smart contracts using aggregate signatures (cum laude) link
  • Sophie Lathouwers, Reasoning About the Correctness of Sanitizers link
  • Azqa Nadeem, Clustering Malware's Network Behavior using Simple Sequential Features (cum laude) link
  • Elsa Turcios Rodriguez, Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation link
  • Pieter van der Veeken, Constructing a Confidential, Authenticated, Forward Secure and Offline Logging Scheme link

2017

  • Ali Davanian: Effective Granularity in Internet Badhood Detection - Detection rate, Precision and Implementation performance link
  • Thijs van Ede: Detecting adaptive data exfiltration in HTTP traffic (cum laude) link Prize Twente Graduate School 6-month Bridging Grant for PhD program
  • Ana Guerra Veloz: Security Requirements Engineering in Medical IoT - comparing literature and developers’ practices link
  • Amit Kumar Gupta: Security Risk Analysis of Automotive Ethernet Networks link
  • Leon Helsloot: Preserving Privacy through Cryptography in Online Behavioural Advertising (cum laude) link Prize Winner of the best graduate award of the EEMCS faculty
  • Sjors Hijgenaar: Electric Vehicles; The Driving Power for Energy Transition - Blockchain-based Decentralised Energy Trading link
  • Roeland Krak: Cycle-Accurate Timing Channel Analysis of Binary Code (cum laude) link Prize Winner of theENIAC Best Thesis Award 2017
  • Christian Maulany: Integrating Self-Monitoring Devices Into The Untrusted Cloud For Healthcare link
  • Jennie de Vries: What drives cybersecurity investment? Organizational factors and perspectives from decision-makers link
  • Stijn van Winsen: Threat Modelling for Future Vehicles : On Identifying and Analysing Threats for Future Autonomous and Connected Vehicles link

2016

  • Yorick Breukers: The Vulnerability Ecosystem (cum laude) link
  • Herson Esquivel-Vargas: Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol link
  • Mark Janssen: Combining Learning with Fuzzing for Software Deobfuscation link
  • Daniel Mast: A Framework for the Implementation and Comparison of Authenticated Data Structures link
  • Vincent van Mieghem: Detecting Malicious Behavior using System Calls (cum laude) link
  • Uraz Odyurt: Bring your own authenticator/authentication security in physical access control systems (cum laude) link EIT Digital
  • Jelte Orij: Self-adaptation to Concept Drift in Web-based Anomaly Detection link
  • Joep Peeters: Fast and Accurate Likelihood Ratio Based Biometric Verification in the Encrypted Domain link
  • Kevin Joseph Syauta: Traceability in cyber risk assessment - A design science approach link
  • Kris Shrishak: Incorporating Leveled Homomorphic Encryption-based Private Information Retrieval in Federated eID Schemes to Enhance User Privacy link
  • Rick Slangen:Understanding Cyber-risk By Investigating the Behaviour of Defender and Threat Agent Organisations link
  • Simon de Vries: Achieving 128-bit Security against Quantum Attacks in OpenVPN (cum laude) link Prize: Winner of the 2016 Internet Thesis award 
  • Lisa de Wilde: A Bayesian Network Model for predicting data breaches caused by insiders of a health care organization (cum laude) link

2015

  • Inés Carvajal Gallardo: Privacy-preserving social DNA-based recommender (cum laude) link 
  • Justyna Chromic: Booters (black)list link
  • Rick van Holsteijn: The motivation of attackers in attack tree analysis link
  • Katrien Meijdam: Phishing as a Service - Designing an ethical way of mimicking targeted phishing attacks to train employees link
  • Moritz Müller: SIDekICk: SuspIcious DomaIn Classification in the .nl zone (cum laude) link Prize: Winner of the 2015 Internet Thesis award EIT Digital
  • Nils Rodday: Exploring Security Vulnerabilities of Unmanned Aerial Vehicles link Press coveragewired Forbes cnet BBC EIT Digital
  • Federico Scrinzi: Behavioral analysis of obfuscated code (cum laude) link EIT Digital
  • Jeroen Senden: Biasing a ring-oscillator based true random number generator with an electro-magnetic fault injection using harmonic waves link
  • Bas Stottelaar: Practical cyber-attacks on autonomous vehicles (cum laude) link
  • Krijn Wijnands: Using endpoints process information for malicious behavior detection link

2014

  • Djurre Broekhuis: Sousveillance on Intelligent Transportations Systems (cum laude) link
  • Ralph Broenink: Finding relations between botnet C&Cs for forensic purposes link
  • Mircea Cadariu: Tracking known security vulnerabilities in third-party components link
  • Henrique Dantas: Vulnerability analysis of smart meters link
  • Keith Davelaar: Protecting high school students from bullying: Bully Shield link
  • Rick van Galen: Design and feasibility of mobile peer-to-peer payment systems link
  • Brinda Hampiholi: Secure and privacy-preserving national eID systems with attribute-based credential technologies link EIT Digital
  • Matthijs Jonker: Flow-based SSH dictionary attack detection - the effects of aggregation link
  • Rutger Plak: Anonymous Internet - Anonymizing peer-to-peer traffic using applied cryptography link
  • Risto Tanaskoski: Anonymous HD video streaming - Peer-to-peer onion router link
  • Ruud Verbij: Dutch e-voting opportunities - Risk assessment framework based on attacker resources (cum laude) link Prize: Winner of the 2014 Joop Bautz Information Security Award
  • Wouter de Vries: How asymmetric is the Internet? A Study to support DDoS mitigation approaches link

2013

  • Olga Havlikova:  Hierarchical range queries on encrypted data link
  • Christina Höfer: POPCORN: Privacy-preserving charging for eMobility (cum laude) link Prize: Winner of the 2013 Joop Bautz Information Security Award
  • Zhenshi Li: An exploratory study on authorship verification models for forensic purposes link
  • Andrei Manta: Publishing privacy sensitive open data using an automated decision support system link
  • Gaurav Misra: Permeance of ICT in crime in India link
  • Antonio Spadaro:  Event correlation for detecting advanced multi-stage cyber-attacks link
  • Samaneh Tajalizadehkhoob: Online banking fraud mitigation -- A quantitative study for extracting intelligence about target selection by cybercriminals from Zeus financial malware files link   publication
  • Jeroen de Wit: Continuous forensic readiness link

2012

  • Jan-Willem Beusink:  Secure Access Control to Personal Sensor Information in Federations of Personal Networks link Prize: Winner of the 2012 Joop Bautz Information Security Award
  • Rens van der Heijden: SeDyA: Secure Dynamic Aggregation in VANETs link
  • Olga Kulikova: Cyber crisis management: A decision-support framework for disclosing security incident information link
  • Stas Verberkt: Claiming security properties in a service oriented architecture link
  • Peter Wagenaar: Detecting botnets using file system indicators link

The first master theses of the 4TU.CybSec specialisation started to appear in 2017, but we also list a number of theses from cyber security students enrolled in related / earlier programs. We are particularly proud of the fact that many of our students graduated cum laude and that several students have won a prestigious  prize.

2018

  • Lisette Altena, Exploring effective notification mechanisms for infected IoT devices link
  • Anirudh Ekambaranathan, Using stylometry to track cybercriminals in darknet forums (cum laude) link
  • Mourad El Maouchi: DECOUPLES: A Privacy-Preserving Solution for Traceability in Supply Chains link
  • Lars van de Kamp, PRECLUDE: PRivacy-prEserving Collaborative Learning Using a Decentralised Ensemble approach (cum laude) link
  • Bjorn van der Laan, Publicly verifiable authenticity of data from multiple external sources for smart contracts using aggregate signatures (cum laude) link
  • Sophie Lathouwers, Reasoning About the Correctness of Sanitizers link
  • Azqa Nadeem, Clustering Malware's Network Behavior using Simple Sequential Features (cum laude) link
  • Elsa Turcios Rodriguez, Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation link
  • Pieter van der Veeken, Constructing a Confidential, Authenticated, Forward Secure and Offline Logging Scheme link

2017

  • Ali Davanian: Effective Granularity in Internet Badhood Detection - Detection rate, Precision and Implementation performance link
  • Thijs van Ede: Detecting adaptive data exfiltration in HTTP traffic (cum laude) link Prize Twente Graduate School 6-month Bridging Grant for PhD program
  • Ana Guerra Veloz: Security Requirements Engineering in Medical IoT - comparing literature and developers’ practices link
  • Amit Kumar Gupta: Security Risk Analysis of Automotive Ethernet Networks link
  • Leon Helsloot: Preserving Privacy through Cryptography in Online Behavioural Advertising (cum laude) link Prize Winner of the best graduate award of the EEMCS faculty
  • Sjors Hijgenaar: Electric Vehicles; The Driving Power for Energy Transition - Blockchain-based Decentralised Energy Trading link
  • Roeland Krak: Cycle-Accurate Timing Channel Analysis of Binary Code (cum laude) link Prize Winner of theENIAC Best Thesis Award 2017
  • Christian Maulany: Integrating Self-Monitoring Devices Into The Untrusted Cloud For Healthcare link
  • Jennie de Vries: What drives cybersecurity investment? Organizational factors and perspectives from decision-makers link
  • Stijn van Winsen: Threat Modelling for Future Vehicles : On Identifying and Analysing Threats for Future Autonomous and Connected Vehicles link

2016

  • Yorick Breukers: The Vulnerability Ecosystem (cum laude) link
  • Herson Esquivel-Vargas: Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol link
  • Mark Janssen: Combining Learning with Fuzzing for Software Deobfuscation link
  • Daniel Mast: A Framework for the Implementation and Comparison of Authenticated Data Structures link
  • Vincent van Mieghem: Detecting Malicious Behavior using System Calls (cum laude) link
  • Uraz Odyurt: Bring your own authenticator/authentication security in physical access control systems (cum laude) link EIT Digital
  • Jelte Orij: Self-adaptation to Concept Drift in Web-based Anomaly Detection link
  • Joep Peeters: Fast and Accurate Likelihood Ratio Based Biometric Verification in the Encrypted Domain link
  • Kevin Joseph Syauta: Traceability in cyber risk assessment - A design science approach link
  • Kris Shrishak: Incorporating Leveled Homomorphic Encryption-based Private Information Retrieval in Federated eID Schemes to Enhance User Privacy link
  • Rick Slangen:Understanding Cyber-risk By Investigating the Behaviour of Defender and Threat Agent Organisations link
  • Simon de Vries: Achieving 128-bit Security against Quantum Attacks in OpenVPN (cum laude) link Prize: Winner of the 2016 Internet Thesis award 
  • Lisa de Wilde: A Bayesian Network Model for predicting data breaches caused by insiders of a health care organization (cum laude) link

2015

  • Inés Carvajal Gallardo: Privacy-preserving social DNA-based recommender (cum laude) link 
  • Justyna Chromic: Booters (black)list link
  • Rick van Holsteijn: The motivation of attackers in attack tree analysis link
  • Katrien Meijdam: Phishing as a Service - Designing an ethical way of mimicking targeted phishing attacks to train employees link
  • Moritz Müller: SIDekICk: SuspIcious DomaIn Classification in the .nl zone (cum laude) link Prize: Winner of the 2015 Internet Thesis award EIT Digital
  • Nils Rodday: Exploring Security Vulnerabilities of Unmanned Aerial Vehicles link Press coveragewired Forbes cnet BBC EIT Digital
  • Federico Scrinzi: Behavioral analysis of obfuscated code (cum laude) link EIT Digital
  • Jeroen Senden: Biasing a ring-oscillator based true random number generator with an electro-magnetic fault injection using harmonic waves link
  • Bas Stottelaar: Practical cyber-attacks on autonomous vehicles (cum laude) link
  • Krijn Wijnands: Using endpoints process information for malicious behavior detection link

2014

  • Djurre Broekhuis: Sousveillance on Intelligent Transportations Systems (cum laude) link
  • Ralph Broenink: Finding relations between botnet C&Cs for forensic purposes link
  • Mircea Cadariu: Tracking known security vulnerabilities in third-party components link
  • Henrique Dantas: Vulnerability analysis of smart meters link
  • Keith Davelaar: Protecting high school students from bullying: Bully Shield link
  • Rick van Galen: Design and feasibility of mobile peer-to-peer payment systems link
  • Brinda Hampiholi: Secure and privacy-preserving national eID systems with attribute-based credential technologies link EIT Digital
  • Matthijs Jonker: Flow-based SSH dictionary attack detection - the effects of aggregation link
  • Rutger Plak: Anonymous Internet - Anonymizing peer-to-peer traffic using applied cryptography link
  • Risto Tanaskoski: Anonymous HD video streaming - Peer-to-peer onion router link
  • Ruud Verbij: Dutch e-voting opportunities - Risk assessment framework based on attacker resources (cum laude) link Prize: Winner of the 2014 Joop Bautz Information Security Award
  • Wouter de Vries: How asymmetric is the Internet? A Study to support DDoS mitigation approaches link

2013

  • Olga Havlikova:  Hierarchical range queries on encrypted data link
  • Christina Höfer: POPCORN: Privacy-preserving charging for eMobility (cum laude) link Prize: Winner of the 2013 Joop Bautz Information Security Award
  • Zhenshi Li: An exploratory study on authorship verification models for forensic purposes link
  • Andrei Manta: Publishing privacy sensitive open data using an automated decision support system link
  • Gaurav Misra: Permeance of ICT in crime in India link
  • Antonio Spadaro:  Event correlation for detecting advanced multi-stage cyber-attacks link
  • Samaneh Tajalizadehkhoob: Online banking fraud mitigation -- A quantitative study for extracting intelligence about target selection by cybercriminals from Zeus financial malware files link   publication
  • Jeroen de Wit: Continuous forensic readiness link

2012

  • Jan-Willem Beusink:  Secure Access Control to Personal Sensor Information in Federations of Personal Networks link Prize: Winner of the 2012 Joop Bautz Information Security Award
  • Rens van der Heijden: SeDyA: Secure Dynamic Aggregation in VANETs link
  • Olga Kulikova: Cyber crisis management: A decision-support framework for disclosing security incident information link
  • Stas Verberkt: Claiming security properties in a service oriented architecture link
  • Peter Wagenaar: Detecting botnets using file system indicators link

Published theses

The first master theses of the 4TU.CybSec specialisation started to appear in 2017, but we also list a number of theses from cyber security students enrolled in related / earlier programs. We are particularly proud of the fact that many of our students graduated cum laude and that several students have won a prestigious  prize.

2018

  • Lisette Altena, Exploring effective notification mechanisms for infected IoT devices link
  • Anirudh Ekambaranathan, Using stylometry to track cybercriminals in darknet forums (cum laude) link
  • Mourad El Maouchi: DECOUPLES: A Privacy-Preserving Solution for Traceability in Supply Chains link
  • Lars van de Kamp, PRECLUDE: PRivacy-prEserving Collaborative Learning Using a Decentralised Ensemble approach (cum laude) link
  • Bjorn van der Laan, Publicly verifiable authenticity of data from multiple external sources for smart contracts using aggregate signatures (cum laude) link
  • Sophie Lathouwers, Reasoning About the Correctness of Sanitizers link
  • Azqa Nadeem, Clustering Malware's Network Behavior using Simple Sequential Features (cum laude) link
  • Elsa Turcios Rodriguez, Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation link
  • Pieter van der Veeken, Constructing a Confidential, Authenticated, Forward Secure and Offline Logging Scheme link

2017

  • Ali Davanian: Effective Granularity in Internet Badhood Detection - Detection rate, Precision and Implementation performance link
  • Thijs van Ede: Detecting adaptive data exfiltration in HTTP traffic (cum laude) link Prize Twente Graduate School 6-month Bridging Grant for PhD program
  • Ana Guerra Veloz: Security Requirements Engineering in Medical IoT - comparing literature and developers’ practices link
  • Amit Kumar Gupta: Security Risk Analysis of Automotive Ethernet Networks link
  • Leon Helsloot: Preserving Privacy through Cryptography in Online Behavioural Advertising (cum laude) link Prize Winner of the best graduate award of the EEMCS faculty
  • Sjors Hijgenaar: Electric Vehicles; The Driving Power for Energy Transition - Blockchain-based Decentralised Energy Trading link
  • Roeland Krak: Cycle-Accurate Timing Channel Analysis of Binary Code (cum laude) link Prize Winner of theENIAC Best Thesis Award 2017
  • Christian Maulany: Integrating Self-Monitoring Devices Into The Untrusted Cloud For Healthcare link
  • Jennie de Vries: What drives cybersecurity investment? Organizational factors and perspectives from decision-makers link
  • Stijn van Winsen: Threat Modelling for Future Vehicles : On Identifying and Analysing Threats for Future Autonomous and Connected Vehicles link

2016

  • Yorick Breukers: The Vulnerability Ecosystem (cum laude) link
  • Herson Esquivel-Vargas: Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol link
  • Mark Janssen: Combining Learning with Fuzzing for Software Deobfuscation link
  • Daniel Mast: A Framework for the Implementation and Comparison of Authenticated Data Structures link
  • Vincent van Mieghem: Detecting Malicious Behavior using System Calls (cum laude) link
  • Uraz Odyurt: Bring your own authenticator/authentication security in physical access control systems (cum laude) link EIT Digital
  • Jelte Orij: Self-adaptation to Concept Drift in Web-based Anomaly Detection link
  • Joep Peeters: Fast and Accurate Likelihood Ratio Based Biometric Verification in the Encrypted Domain link
  • Kevin Joseph Syauta: Traceability in cyber risk assessment - A design science approach link
  • Kris Shrishak: Incorporating Leveled Homomorphic Encryption-based Private Information Retrieval in Federated eID Schemes to Enhance User Privacy link
  • Rick Slangen:Understanding Cyber-risk By Investigating the Behaviour of Defender and Threat Agent Organisations link
  • Simon de Vries: Achieving 128-bit Security against Quantum Attacks in OpenVPN (cum laude) link Prize: Winner of the 2016 Internet Thesis award 
  • Lisa de Wilde: A Bayesian Network Model for predicting data breaches caused by insiders of a health care organization (cum laude) link

2015

  • Inés Carvajal Gallardo: Privacy-preserving social DNA-based recommender (cum laude) link 
  • Justyna Chromic: Booters (black)list link
  • Rick van Holsteijn: The motivation of attackers in attack tree analysis link
  • Katrien Meijdam: Phishing as a Service - Designing an ethical way of mimicking targeted phishing attacks to train employees link
  • Moritz Müller: SIDekICk: SuspIcious DomaIn Classification in the .nl zone (cum laude) link Prize: Winner of the 2015 Internet Thesis award EIT Digital
  • Nils Rodday: Exploring Security Vulnerabilities of Unmanned Aerial Vehicles link Press coveragewired Forbes cnet BBC EIT Digital
  • Federico Scrinzi: Behavioral analysis of obfuscated code (cum laude) link EIT Digital
  • Jeroen Senden: Biasing a ring-oscillator based true random number generator with an electro-magnetic fault injection using harmonic waves link
  • Bas Stottelaar: Practical cyber-attacks on autonomous vehicles (cum laude) link
  • Krijn Wijnands: Using endpoints process information for malicious behavior detection link

2014

  • Djurre Broekhuis: Sousveillance on Intelligent Transportations Systems (cum laude) link
  • Ralph Broenink: Finding relations between botnet C&Cs for forensic purposes link
  • Mircea Cadariu: Tracking known security vulnerabilities in third-party components link
  • Henrique Dantas: Vulnerability analysis of smart meters link
  • Keith Davelaar: Protecting high school students from bullying: Bully Shield link
  • Rick van Galen: Design and feasibility of mobile peer-to-peer payment systems link
  • Brinda Hampiholi: Secure and privacy-preserving national eID systems with attribute-based credential technologies link EIT Digital
  • Matthijs Jonker: Flow-based SSH dictionary attack detection - the effects of aggregation link
  • Rutger Plak: Anonymous Internet - Anonymizing peer-to-peer traffic using applied cryptography link
  • Risto Tanaskoski: Anonymous HD video streaming - Peer-to-peer onion router link
  • Ruud Verbij: Dutch e-voting opportunities - Risk assessment framework based on attacker resources (cum laude) link Prize: Winner of the 2014 Joop Bautz Information Security Award
  • Wouter de Vries: How asymmetric is the Internet? A Study to support DDoS mitigation approaches link

2013

  • Olga Havlikova:  Hierarchical range queries on encrypted data link
  • Christina Höfer: POPCORN: Privacy-preserving charging for eMobility (cum laude) link Prize: Winner of the 2013 Joop Bautz Information Security Award
  • Zhenshi Li: An exploratory study on authorship verification models for forensic purposes link
  • Andrei Manta: Publishing privacy sensitive open data using an automated decision support system link
  • Gaurav Misra: Permeance of ICT in crime in India link
  • Antonio Spadaro:  Event correlation for detecting advanced multi-stage cyber-attacks link
  • Samaneh Tajalizadehkhoob: Online banking fraud mitigation -- A quantitative study for extracting intelligence about target selection by cybercriminals from Zeus financial malware files link   publication
  • Jeroen de Wit: Continuous forensic readiness link

2012

  • Jan-Willem Beusink:  Secure Access Control to Personal Sensor Information in Federations of Personal Networks link Prize: Winner of the 2012 Joop Bautz Information Security Award
  • Rens van der Heijden: SeDyA: Secure Dynamic Aggregation in VANETs link
  • Olga Kulikova: Cyber crisis management: A decision-support framework for disclosing security incident information link
  • Stas Verberkt: Claiming security properties in a service oriented architecture link
  • Peter Wagenaar: Detecting botnets using file system indicators link

The first master theses of the 4TU.CybSec specialisation started to appear in 2017, but we also list a number of theses from cyber security students enrolled in related / earlier programs. We are particularly proud of the fact that many of our students graduated cum laude and that several students have won a prestigious  prize.

2018

  • Lisette Altena, Exploring effective notification mechanisms for infected IoT devices link
  • Anirudh Ekambaranathan, Using stylometry to track cybercriminals in darknet forums (cum laude) link
  • Mourad El Maouchi: DECOUPLES: A Privacy-Preserving Solution for Traceability in Supply Chains link
  • Lars van de Kamp, PRECLUDE: PRivacy-prEserving Collaborative Learning Using a Decentralised Ensemble approach (cum laude) link
  • Bjorn van der Laan, Publicly verifiable authenticity of data from multiple external sources for smart contracts using aggregate signatures (cum laude) link
  • Sophie Lathouwers, Reasoning About the Correctness of Sanitizers link
  • Azqa Nadeem, Clustering Malware's Network Behavior using Simple Sequential Features (cum laude) link
  • Elsa Turcios Rodriguez, Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation link
  • Pieter van der Veeken, Constructing a Confidential, Authenticated, Forward Secure and Offline Logging Scheme link

2017

  • Ali Davanian: Effective Granularity in Internet Badhood Detection - Detection rate, Precision and Implementation performance link
  • Thijs van Ede: Detecting adaptive data exfiltration in HTTP traffic (cum laude) link Prize Twente Graduate School 6-month Bridging Grant for PhD program
  • Ana Guerra Veloz: Security Requirements Engineering in Medical IoT - comparing literature and developers’ practices link
  • Amit Kumar Gupta: Security Risk Analysis of Automotive Ethernet Networks link
  • Leon Helsloot: Preserving Privacy through Cryptography in Online Behavioural Advertising (cum laude) link Prize Winner of the best graduate award of the EEMCS faculty
  • Sjors Hijgenaar: Electric Vehicles; The Driving Power for Energy Transition - Blockchain-based Decentralised Energy Trading link
  • Roeland Krak: Cycle-Accurate Timing Channel Analysis of Binary Code (cum laude) link Prize Winner of theENIAC Best Thesis Award 2017
  • Christian Maulany: Integrating Self-Monitoring Devices Into The Untrusted Cloud For Healthcare link
  • Jennie de Vries: What drives cybersecurity investment? Organizational factors and perspectives from decision-makers link
  • Stijn van Winsen: Threat Modelling for Future Vehicles : On Identifying and Analysing Threats for Future Autonomous and Connected Vehicles link

2016

  • Yorick Breukers: The Vulnerability Ecosystem (cum laude) link
  • Herson Esquivel-Vargas: Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol link
  • Mark Janssen: Combining Learning with Fuzzing for Software Deobfuscation link
  • Daniel Mast: A Framework for the Implementation and Comparison of Authenticated Data Structures link
  • Vincent van Mieghem: Detecting Malicious Behavior using System Calls (cum laude) link
  • Uraz Odyurt: Bring your own authenticator/authentication security in physical access control systems (cum laude) link EIT Digital
  • Jelte Orij: Self-adaptation to Concept Drift in Web-based Anomaly Detection link
  • Joep Peeters: Fast and Accurate Likelihood Ratio Based Biometric Verification in the Encrypted Domain link
  • Kevin Joseph Syauta: Traceability in cyber risk assessment - A design science approach link
  • Kris Shrishak: Incorporating Leveled Homomorphic Encryption-based Private Information Retrieval in Federated eID Schemes to Enhance User Privacy link
  • Rick Slangen:Understanding Cyber-risk By Investigating the Behaviour of Defender and Threat Agent Organisations link
  • Simon de Vries: Achieving 128-bit Security against Quantum Attacks in OpenVPN (cum laude) link Prize: Winner of the 2016 Internet Thesis award 
  • Lisa de Wilde: A Bayesian Network Model for predicting data breaches caused by insiders of a health care organization (cum laude) link

2015

  • Inés Carvajal Gallardo: Privacy-preserving social DNA-based recommender (cum laude) link 
  • Justyna Chromic: Booters (black)list link
  • Rick van Holsteijn: The motivation of attackers in attack tree analysis link
  • Katrien Meijdam: Phishing as a Service - Designing an ethical way of mimicking targeted phishing attacks to train employees link
  • Moritz Müller: SIDekICk: SuspIcious DomaIn Classification in the .nl zone (cum laude) link Prize: Winner of the 2015 Internet Thesis award EIT Digital
  • Nils Rodday: Exploring Security Vulnerabilities of Unmanned Aerial Vehicles link Press coveragewired Forbes cnet BBC EIT Digital
  • Federico Scrinzi: Behavioral analysis of obfuscated code (cum laude) link EIT Digital
  • Jeroen Senden: Biasing a ring-oscillator based true random number generator with an electro-magnetic fault injection using harmonic waves link
  • Bas Stottelaar: Practical cyber-attacks on autonomous vehicles (cum laude) link
  • Krijn Wijnands: Using endpoints process information for malicious behavior detection link

2014

  • Djurre Broekhuis: Sousveillance on Intelligent Transportations Systems (cum laude) link
  • Ralph Broenink: Finding relations between botnet C&Cs for forensic purposes link
  • Mircea Cadariu: Tracking known security vulnerabilities in third-party components link
  • Henrique Dantas: Vulnerability analysis of smart meters link
  • Keith Davelaar: Protecting high school students from bullying: Bully Shield link
  • Rick van Galen: Design and feasibility of mobile peer-to-peer payment systems link
  • Brinda Hampiholi: Secure and privacy-preserving national eID systems with attribute-based credential technologies link EIT Digital
  • Matthijs Jonker: Flow-based SSH dictionary attack detection - the effects of aggregation link
  • Rutger Plak: Anonymous Internet - Anonymizing peer-to-peer traffic using applied cryptography link
  • Risto Tanaskoski: Anonymous HD video streaming - Peer-to-peer onion router link
  • Ruud Verbij: Dutch e-voting opportunities - Risk assessment framework based on attacker resources (cum laude) link Prize: Winner of the 2014 Joop Bautz Information Security Award
  • Wouter de Vries: How asymmetric is the Internet? A Study to support DDoS mitigation approaches link

2013

  • Olga Havlikova:  Hierarchical range queries on encrypted data link
  • Christina Höfer: POPCORN: Privacy-preserving charging for eMobility (cum laude) link Prize: Winner of the 2013 Joop Bautz Information Security Award
  • Zhenshi Li: An exploratory study on authorship verification models for forensic purposes link
  • Andrei Manta: Publishing privacy sensitive open data using an automated decision support system link
  • Gaurav Misra: Permeance of ICT in crime in India link
  • Antonio Spadaro:  Event correlation for detecting advanced multi-stage cyber-attacks link
  • Samaneh Tajalizadehkhoob: Online banking fraud mitigation -- A quantitative study for extracting intelligence about target selection by cybercriminals from Zeus financial malware files link   publication
  • Jeroen de Wit: Continuous forensic readiness link

2012

  • Jan-Willem Beusink:  Secure Access Control to Personal Sensor Information in Federations of Personal Networks link Prize: Winner of the 2012 Joop Bautz Information Security Award
  • Rens van der Heijden: SeDyA: Secure Dynamic Aggregation in VANETs link
  • Olga Kulikova: Cyber crisis management: A decision-support framework for disclosing security incident information link
  • Stas Verberkt: Claiming security properties in a service oriented architecture link
  • Peter Wagenaar: Detecting botnets using file system indicators link