About the Scheme SETS has been working in the challenging areas of Cyber security research with a focus on Cryptology and Computing; Hardware Security; Network Security and Quantum security adhering to the three tenets (i) Directed basic research (ii) Translational research and (iii) Coherent synergy. The R&D projects taken-up by SETS are mainly focusing for the long-term research (directed basic research) leading to capability building by publishing the research works in reputed journals/ conferences; IPR generation, patents; development of technology prototypes and deployment of products & solutions for end user organizations. Over the last few years SETS based on coherent synergy principle explored R&D collaborations with other R&D labs; academia and PSUs to work towards the usable solutions/ products. Towards opening up R&D problems and nurturing talents, SETS Chennai is announcing SETS STARS scheme for students. This offers opportunities for internship / final year project / dissertation programmes to graduate/postgraduate students and for students who are pursing PhD – who would like to pursue their academic projects in the area of information security.
Overall Guidelines
Procedure for Application
Selection Process
Proceedings after Selection
Students are expected to publish the work done in reputed journals/conferences
S. No | Title of Problem Statement |
---|---|
1. | Artificial Intelligence (AI) assisted Side Channel Analysis (SCA) |
2. | Boolean function and their measurement for the randomness |
3. | Development of a Time-to-Digital Converter (TDC) on FPGA with 50ps Resolution |
4. | Experiments on Differential Fault Analysis on Microcontroller Platform |
5. | Prototype Development of PQC-based Hardware Crypto Tokens (Dongle) |
6. | Root cause analysis using machine learning (ML) techniques for a QKD field deployable system |
7. | XAI (Explainable Artificial Intelligence) for Side Channel Analysis (SCA) |
8. | Feasibility study on implementing PQC algorithms on Noise Protocol Framework |
9. | Integrated generative AI for threat hunting process |
10. | AI assisted Malware Risk Assessment Tool |
11. | Post Quantum Signature Schemes for Blockchain |
12. | Voice Phishing detection using Applied Machine Learning: Gathering various types of voice based phishing attacks like phone calls, audio messages, voice notes, etc. and generate a model to analyze the patterns and predict the outcomes |
13. | 6G/5G Security Testbed and experiments |
14. | Anomaly detection techniques for cyber security |
15. | Post Quantum Cryptography based Browser |
16. | Post Quantum Cryptography based VPN |
17. | Timing Analysis of PQC based Key Encapsulation Mechanism |
18. | Side Channel Analysis on STM32 Microcontroller Platform |
19. | Drone detection and classification system |
20. | Emulation of Real-Time Operating System [RTOS] |
21. | Serial communication protocol analysis for Embedded System |
22. | Container Security: Simulation of various types of containers and orchestration engine vulnerabilities and implement robust security and mitigating measures to protect containerized environments from various types of attacks |
23. | Interactive Mobile Application For Cyber Security Threat Awareness – CyberMaaveeran |