PostDoc
PhD
Researchers
-
Privacy-preserving machine learning services through hybrid homomorphic encryption
2025 | Anton Israelsson | RISE
Masters
-
Vulnerability research of mobile applications commonly used in Sweden
2025 - | Rahila Shamrin | KTH
-
Ethical hacking of mobile applications commonly used in Sweden
2025 - | Yamini Balannagari | KTH
-
Analyzing and exploiting vulnerabilities in the Raspberry Pi compute module
2025 - | Hassan El Ghamri | KTH
-
Implementing penetration testing methodologies for embedded systems
2025 - | Roy Dolonius | KTH
-
Penetration testing security weaknesses in embedded devices
2025 - | Ísak Arnar Kolbeins | KTH
-
De-obfuscating and clustering potentially malicious JavaScript injected Swedish webpages
2025 - | Hávar Sigurðarson | Stockholm University
-
Web application hacking agent through Llama LLM
2025 - | Gabriel Gerdin | Karlstad University
-
Fine tuning DeepSeek LLM for vulnerability research
2025 - | Siwei Zhang | Stockholm University
-
Fine tuning LLama LLM for vulnerability research
2025 - | Yanxiang Du | Stockholm University
-
Fuzzing Matter(s) : Stateful black-box fuzzer implementation for Matter protocol devices
2025 - | Marco Campione | KTH
-
Investigating fileless malware in Windows operating systems
2025 - | Anton Rådberg | KTH
-
Vulnerabiliy research in MG smart cars
2024 - | Roni Henareh | KTH
-
Triggering false alarms in computer networks
2024 - 2025 | Peter Daniel | KTH
-
Extraction and analysis of brand new artifacts in Windows 11 OS memory
2024 - 2024 | Edward Norberg | KTH
-
Memory corruption in IoT: Extending PatrIoT to hunt memory corruption bugs
2023 - 2024 | Erik Mickols | KTH
-
Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat
2023 - 2023 | Adam Lindberg | KTH
-
Nationwide password patterns of Swedish people
2022 - 2022 | Daniel Gustafsson | KTH
-
Automated security analysis of firmware
2022 - 2022 | Farrokh Bolandi | KTH
-
(Classified) Hacking the airport X-ray machine
2022 - 2022 | Felix Zuber | KTH
-
Threat modeling and penetration testing of an IoT product. Yanzi IoT network
2021 - 2021 | Diyala Isabar | KTH
-
Security analysis of a Beckhoff CX-9020 programmable logic controller
2021 - 2021 | Liam Carter | KTH
Bachelors
-
Security evaluation of a YI Dome X smart home camera
2025 - | Adam Caspary & Niclas Damström | KTH
-
Exploring the potential of LLM-based multi-agent systems for penetration testing
2024 - | Vincent Ferrigan & Robert Furuvald | KTH
-
Smart home infrastructure for penetration testing and national cyber ranges
2024 - 2024 | Gergo Emin Tarcheh & Nina Shamaya | KTH
-
Collaboration platform for penetration tests enhanced with machine learning
2024 - 2024 | Hjalmar Höglund & Roni Henareh | KTH
-
Penetration testing of ten popular Swedish Android applications
2022 - 2022 | Alexander Astély & Johan Ekroth | KTH
-
Security evaluation of ten Swedish mobile applications
2022 - 2022 | Jens Ekenblad & Stefan Andres Garrido Valenzuela | KTH
-
Creating new Security Tools Using Attack Simulation Results
2022 - 2022 | Frida Grönberg & Björn Thiberg | KTH
-
Trends and scientometrics in cyber security research
2021 - 2022 | Jesper Slagarp & Elvira Häggström | KTH