Denna tjänst avvecklas 2026-01-19. Läs mer här (länk) 
    
    
    Dr. Emre Süren - Supervision | MSc, BSc, PhD, Postdoc, Cybersecurity, KTH
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
Denna tjänst avvecklas 2026-01-19. Läs mer här (länk) 
    
        
        
        
            
            
                
                
                
                
                
                PostDoc
                PhD
                Researchers
                
                  - 
                    Privacy-preserving machine learning services through hybrid homomorphic encryption
 2025 | Anton Israelsson | RISE
Masters
                 
                
                  - 
                    Vulnerability research of mobile applications commonly used in Sweden
 2025 - | Rahila Shamrin | KTH
- 
                    Ethical hacking of mobile applications commonly used in Sweden
 2025 - | Yamini Balannagari | KTH
- 
                    Analyzing and exploiting vulnerabilities in the Raspberry Pi compute module
 2025 - | Hassan El Ghamri | KTH
- 
                    Implementing penetration testing methodologies for embedded systems
 2025 - | Roy Dolonius | KTH
- 
                    Penetration testing security weaknesses in embedded devices
 2025 - | Ísak Arnar Kolbeins | KTH
- 
                    De-obfuscating and clustering potentially malicious JavaScript injected Swedish webpages
 2025 - | Hávar Sigurðarson | Stockholm University
- 
                    Large Language Models for Software Vulnerability Discovery and Exploitation
 2025 - | Gabriel Gerdin | Karlstad University
- 
                    Fine tuning DeepSeek LLM for vulnerability research
 2025 - | Siwei Zhang | Stockholm University
- 
                    Fine tuning LLama LLM for vulnerability research
 2025 - | Yanxiang Du | Stockholm University
- 
                    Fuzzing Matter(s) : Stateful black-box fuzzer implementation for Matter protocol devices
 2025 - | Marco Campione | KTH
- 
                    Investigating fileless malware in Windows operating systems
 2025 - | Anton Rådberg | KTH
- 
                    Fine-Tuning Small Open-Weight LLMs for Cybersecurity
 2024 - | Roni Henareh | KTH
- 
                    Design and Evaluation of Memory Analytics Measures for Windows 11 Forensics
 2024 -  | Edward Norberg | KTH
- 
                    Triggering false alarms in computer networks
 2024 - 2025 | Peter Daniel | KTH
- 
                    Memory corruption in IoT: Extending PatrIoT to hunt memory corruption bugs
                    
 2023 - 2024 | Erik Mickols | KTH
- 
                    Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat
                    
 2023 - 2023 | Adam Lindberg | KTH
- 
                    Nationwide password patterns of Swedish people
                    
 2022 - 2022 | Daniel Gustafsson | KTH
- 
                    Automated security analysis of firmware
                    
 2022 - 2022 | Farrokh Bolandi | KTH
- 
                    (Classified) Hacking the airport X-ray machine
                    
 2022 - 2022 | Felix Zuber | KTH
- 
                    Threat modeling and penetration testing of an IoT product. Yanzi IoT network
                    
 2021 - 2021 | Diyala Isabar | KTH
- 
                    Security analysis of a Beckhoff CX-9020 programmable logic controller
                    
 2021 - 2021 | Liam Carter | KTH
Bachelors
                
                  - 
                    Smart home infrastructure for penetration testing and national cyber ranges
                    
 2024 - 2024 | Gergo Emin Tarcheh & Nina Shamaya | KTH
- 
                    Collaboration platform for penetration tests enhanced with machine learning
                    
 2024 - 2024 | Hjalmar Höglund & Roni Henareh | KTH
- 
                    Penetration testing of ten popular Swedish Android applications
                    
 2022 - 2022 | Alexander Astély & Johan Ekroth | KTH
- 
                    Security evaluation of ten Swedish mobile applications
                    
 2022 - 2022 | Jens Ekenblad & Stefan Andres Garrido Valenzuela | KTH
- 
                    Creating new Security Tools Using Attack Simulation Results
                    
 2022 - 2022 | Frida Grönberg & Björn Thiberg | KTH
- 
                    Trends and scientometrics in cyber security research
                    
 2021 - 2022 | Jesper Slagarp & Elvira Häggström | KTH