You could write about the government hiring the people they get hacked by to try and prevent it in the future.
Or you could write about these modern day bank robber dudes who stole like $150 million from Bangladesh and more from that other place (Argentina maybe? Venezuela?)
Asher Gray
>cloud/distributed computing (paas, iaas, etc) plus machine learning (deep neural networks) and skynet (and the eventual doomsday) gl
Owen Wood
So far cloud/distributed computing is winning. Might be worth writing about how hyper-v, and unikernals could essentially eradicate malware.
Sorry, but Windows 10 is actually one of the more secure OS on the market. That and it's probably the topic of 100 other fucks.
Eat shit and die.
Charles Stewart
Quontom cryptography
Josiah Rivera
Everything is a botnet.
Jayden Young
install manjaro
Liam Moore
DDoS attacks and a moving target defense to mitigate impact
Michael Ramirez
>OSs that have updates that alter core behaviour- and are run in system state. >These updates could be hijacked >If these updates are forced; everyone is forcibly vulnerable
Leo Parker
> thesis for a bachelor's Just
David Williams
You clearly need a Gentoo installation
Christopher Lopez
>manjaro.
Everything Arch Linux is cancer. And it's shitty deviant distros amount to unix hipsters.
Debian. CentOS. RHEL. Welcome to adulthood.
Michael Harris
Talk about insecurity of Proprietary software. And advocate for free software.
Charles Hernandez
Man I went to a bad school. I didn't have to write any sort of thesis for my bachelors.
Increased Security and Decreased Surveillance Through Use of *nix Operating Systems
Caleb Mitchell
kek
Henry Morales
Kill yourself, Pajeet.
Caleb Williams
The role of machine learning and neural networks in security Google's TPUs are a good place to start.
Tyler Robinson
>Kill yourself, Pajeet. apt-get a-grip
Sebastian Martin
A comparative analysis of phishing attacks
Evan Murphy
Prove you're not a faggot
>Securty by design >>Automated theorem proving >>>All theorems proven by using Event-B
You can now come here and suck me off
Carter Ward
Instruction aliasing on x86 and how this makes correct disassembly difficult
Also called junk byte, but try to focus on valid indeterminate control flows instead of opaque false predicates
Isaiah Stewart
If you have any understanding of cryptography, take a look at what DJB is doing with sphinx-ElGamal, but being the usual cybersec shiteater you probably are, I would take a look at some modern appliances that are internet connected and write some bullshit exploits for them.
if you're willing to pay, I'll give you a 0day for Android :)
Haha, find me a 0 day for Java, Google, or Facebook and I'll gladly shell out some bitcoins. Android's a playground for zero days, thanks for the offer though.
It's more geared towards a current development in the realm of cybersecurity. Thanks for he heads up on sphinx-EIGamal. Even if it's not my final topic, definitely worth researchig.
Luke Lewis
no one expects undergrads to produce anything good, interesting, or unique
write on anything
>undergrads think their degree means something
Owen Thomas
Militarized malware, milware
Michael Jackson
statistical sidechannel attacks classifiers to identify attackers identifying people by biometrics like typing or mouse patterns generating human-like biometrics
Jayden Stewart
np bb. good luck and post back on what you decide on