PostDoc

PhD

Researchers

  1. Privacy-preserving machine learning services through hybrid homomorphic encryption
    2025 | Anton Israelsson | RISE

Masters

  1. Vulnerability research of mobile applications commonly used in Sweden
    2025 - | Rahila Shamrin | KTH
  2. Ethical hacking of mobile applications commonly used in Sweden
    2025 - | Yamini Balannagari | KTH
  3. Analyzing and exploiting vulnerabilities in the Raspberry Pi compute module
    2025 - | Hassan El Ghamri | KTH
  4. Implementing penetration testing methodologies for embedded systems
    2025 - | Roy Dolonius | KTH
  5. Penetration testing security weaknesses in embedded devices
    2025 - | Ísak Arnar Kolbeins | KTH
  6. De-obfuscating and clustering potentially malicious JavaScript injected Swedish webpages
    2025 - | Hávar Sigurðarson | Stockholm University
  7. Web application hacking agent through Llama LLM
    2025 - | Gabriel Gerdin | Karlstad University
  8. Fine tuning DeepSeek LLM for vulnerability research
    2025 - | Siwei Zhang | Stockholm University
  9. Fine tuning LLama LLM for vulnerability research
    2025 - | Yanxiang Du | Stockholm University
  10. Fuzzing Matter(s) : Stateful black-box fuzzer implementation for Matter protocol devices
    2025 - | Marco Campione | KTH
  11. Investigating fileless malware in Windows operating systems
    2025 - | Anton Rådberg | KTH
  12. Vulnerabiliy research in MG smart cars
    2024 - | Roni Henareh | KTH
  13. Triggering false alarms in computer networks
    2024 - 2025 | Peter Daniel | KTH
  14. Extraction and analysis of brand new artifacts in Windows 11 OS memory
    2024 - 2024 | Edward Norberg | KTH
  15. Memory corruption in IoT: Extending PatrIoT to hunt memory corruption bugs
    2023 - 2024 | Erik Mickols | KTH
  16. Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat
    2023 - 2023 | Adam Lindberg | KTH
  17. Nationwide password patterns of Swedish people
    2022 - 2022 | Daniel Gustafsson | KTH
  18. Automated security analysis of firmware
    2022 - 2022 | Farrokh Bolandi | KTH
  19. (Classified) Hacking the airport X-ray machine
    2022 - 2022 | Felix Zuber | KTH
  20. Threat modeling and penetration testing of an IoT product. Yanzi IoT network
    2021 - 2021 | Diyala Isabar | KTH
  21. Security analysis of a Beckhoff CX-9020 programmable logic controller
    2021 - 2021 | Liam Carter | KTH

Bachelors

  1. Security evaluation of a YI Dome X smart home camera
    2025 - | Adam Caspary & Niclas Damström | KTH
  2. Exploring the potential of LLM-based multi-agent systems for penetration testing
    2024 - | Vincent Ferrigan & Robert Furuvald | KTH
  3. Smart home infrastructure for penetration testing and national cyber ranges
    2024 - 2024 | Gergo Emin Tarcheh & Nina Shamaya | KTH
  4. Collaboration platform for penetration tests enhanced with machine learning
    2024 - 2024 | Hjalmar Höglund & Roni Henareh | KTH
  5. Penetration testing of ten popular Swedish Android applications
    2022 - 2022 | Alexander Astély & Johan Ekroth | KTH
  6. Security evaluation of ten Swedish mobile applications
    2022 - 2022 | Jens Ekenblad & Stefan Andres Garrido Valenzuela | KTH
  7. Creating new Security Tools Using Attack Simulation Results
    2022 - 2022 | Frida Grönberg & Björn Thiberg | KTH
  8. Trends and scientometrics in cyber security research
    2021 - 2022 | Jesper Slagarp & Elvira Häggström | KTH