Security代写:ECE544 Thrustworthy Computing



The goal of the final project is to pursue research in a specific narrow topic in trustworthy computing, learn how to write a good research proposal and improve your presentation skills. The project will be done in groups (ECE 544 students in groups of 2 students and ECE 644 in groups of 3 students).

Please be cognizant of the fact that this project includes more than surveying a topic. You need to propose a “semi-new” concept. Do not be afraid to dare, even if the proposed concept is not new, but you defend it well and layout a good plan, you will get the full credit. This is NOT a MS or PhD proposal in which the topic has to be entirely unexplored. We will emphasize in our grading the fact that you have written the proposal well, explained your goals, the literature is surveyed well (not comprehensive, but what you surveyed is done well) and the proposed concept is exposed clearly. It is highly important to correlate your ideas with the existing works by showing concrete citations.

Any work that cogs well with the existing work will be given high value. In this document we provide a list of suggested topics as well as guidelines for the proposal writing. Please read the rest of the document carefully.

We will provide more details on Phase I, Phase II, Phase III and the presentation.

Suggested Research Topics

Here is a list of suggested general topics which include applications of trustworthy computing as well as technology developments. You are welcome to pick your own topic.

  1. Cyber security mitigation techniques for critical infrastructures such as banking and finance, communications, emergency services, energy, food chain, health, mass gatherings, transport and water (pick a specific industry segment)
  2. Secure software distribution
  3. Security in Emergency Situations (e.g. DIORAMA system)
  4. Payment via Mobile Phones
  5. Secure body sensor devices
  6. Security in implantable devices
  7. Secure healthcare web services
  8. Secure Instant Messaging
  9. Virtual Private Network for TCP and/or UDP packets using your own cryptographic code
  10. Secure Wearable Device (e.g. Apple Watch, Android Watch)
  11. Secure message distribution system in Green Buildings (e.g. computer energy managed building)
  12. Secure power distribution systems
  13. Secure Assistive Technology (e.g. PERCEPT)
  14. Cyber forensics
  15. Security in vehicular networks
  16. Mobile evidence preservation and examination
  17. Watermarking and intellectual property theft
  18. Network traffic analysis, traceback and attribution
  19. Network incidents response, investigation and evidence handling
  20. Biometrics related to cyber security
  21. Security for Internet of Things
  22. Cloud security
  23. Content Protection and Digital Rights Management
  24. Security and privacy in Social Networks

Please use the IEEE Explore database through the UMASS library. It includes a vast repository of papers with a powerful search engine.Please use the IEEE Explore database through the UMASS library. It includes a vast repository of papers with a powerful search engine.

Phase I

Submit through moodle a topic that you picked including a number of sentences (up to 1⁄2 page) that describe the topic as well as a list of preliminary references (conference and journal papers, books, web sites, etc).
ECE 644 students: include a detailed description of the system/application as detailed in the Appendix.

Phase II

Each group will submit a preliminary report containing 6 pages that outlines your proposal along with sound background study needs to be submitted. The preliminary report should contain an abstract, specific aims, background and significance and proposed work.
Each group will have a 5-10 minutes presentation during class time (check the web site for your assigned slot).
ECE 644 students: implement a client-server architecture and submit it on Moodle (see details in the Appendix).

Phase III

All students will submit a final report which should be up to 15 pages.
ECE 644 students: Featured presentations will take place. Final project review of the working demo will take place.

Proposal Format

The proposal will follow the NIH PHS 398 guidelines and includes the following sections:

  1. Abstract
  2. Specific Aims
  3. Background and significance
  4. Preliminary studies
  5. Research design and methods
  6. Implementation details or Test Bed
  7. Literature cited

More description on each one of the sections.


It should contain a summary of the whole work along with general motivation. It should also briefly discuss the advantages of your system.
Phase III: One page is recommended.

Specific Aims

List the broad, long-term objectives and the goal of the specific research proposed, e.g., create a novel design, solve a specific problem, challenge an existing paradigm or develop new technology.
Phase III: One page is recommended

Background and Significance

Briefly sketch the background leading to this proposal, critically evaluate existing knowledge. State concisely the importance of the research described in this proposal by relating the specific aims to the broad, long-term objectives. If the aims of the application are achieved, state how scientific knowledge will be advanced.
Phase III: Three to five pages are recommended.

Preliminary Studies

In this project our preliminary studies part will be minimal, unlike the “real” NIH applications (in “real: NIH applications this is the most important part that established the experience and competence of the investigator to pursue the proposed project). Describe here one or more papers that are the most similar to the proposed approach which you will provide in the next section.
Phase III: Three to five pages are recommended.

Research Design and Methods

Describe the research design conceptual framework, procedures, and analyses to be used to accomplish the specific aims of the project. Include how the data will be collected, analyzed, and interpreted. Describe any new methodology and its advantage over existing methodologies. Describe any novel concepts, approaches, tools, or technologies for the proposed studies. Discuss the potential difficulties and limitations of the proposed procedures and alternative approaches to achieve the aims.
Phase III: Two to three pages are recommended.

Implementation Details or Test Bed

You should come up with a system architecture or software design.
ECE 544 students: implementation details of a “proof of concept” are mandatory, whereas the implementation is not.
ECE 644 students: your project needs to include an implementation.
Implementation guidelines are presented in the Appendix.
Phase III: Two to three pages are recommended.