Project Specification - FC 382 - Spring 2025 - V1.0
Project Specification - FC 382 - Spring 2025 - V1.0
PROJECT DESCRIPTION:
In this course, we are providing you with a chance to excel in applying and learning
about new attacks! Choose an interesting attack from the attached list of attacks and
defences, that you like. All of the ideas are practical, meaning you need to implement
the attack and the defence against this attack. We have many project ideas, so no 2
groups are allowed to work on the same attack. Each group needs an approval for
their chosen topic from the course instructors before they start working.
At the end of the course, along with your other deliverables, you will also be required
to submit the ATT&CK Matrix for your project. You can build the matrix using the
ATT&CK Navigator tool available here: https://mitre-attack.github.io/attack-
navigator/. We will do a workshop with you guys on how to build an attack matrix
after the midterm.
DELIVERABLES:
A 200-word proposal by the 9th of February clearly explaining your idea and what
you plan on doing This will comprise 2% of your overall grade. . You need to clearly
state in the proposal:
a. What is your objective
b. What kind of attack and defense you are going to do.
c. What are the expected outcomes
d. Note that during the midterm review we might ask you for additional tasks
and requirements to implement before your final project deliverables.
2. A midsemester review of the progress you have made. The instructors need to see
that you have made meaningful progress and each group member has been
contributing. Again, this will comprise 10% of your overall grade.
3. At the end of the semester, a 5-minute demo where you will show the instructors
and other students what you have done.
4. At the end of the semester, a 5-minute presentation where you will explain the
problem you have been working on and what exactly your solution is (providing
details about the various technical aspects of the project). The presentation and
Page 1 of 4
the demo will be followed by a 10-minute question and answer session. The
presentation and the Q&A will comprise 15% of your overall grade. You will also
be required to submit an attack matrix (or TTP heat map) for your project using
the ATT&CK Navigator tool, the presentation, a detailed report explaining how you
implemented the attack/defence, and any code you’ve developed.
GRADING CRITERIA:
We will be using the following evaluation criteria to grade your presentation and demo:
The marks for each metric in the criteria are in the yellow row. Total marks are 30.
Below is an explanation of each metric:
Midterm Review:
• The most important thing about the presentation is the Technical Content.
This means that you have covered all the technical aspects/concepts and given
the complete overview of the project from start to finish. This metric also
includes discussion about the problem, the design of the solution, the
implementational details, the results, etc.
• Working environment: You need to have the project environment setup and
functioning.
• In the midterm review, we want to see your attack is actually working. That
means whatever attack you wrote in the proposal, must be done and you must
show it to us
• Q&A: we will be asking you detailed questions and you must be able to answer
all of them.
• The first thing in the demo is to check for functionality. This means that the
solution implemented (Attack and Defence) actually does what it is supposed
to do.
Page 2 of 4
• Another important evaluation criterion in the demo is completeness where
the goal is to judge if the project is 50% working (or complete), 75% working,
or 100% working. Which agreed upon functionality has been shown and
demonstrated by the students and what is missing?
Q&A:
• After the presentation and the demo, the instructors will ask questions from
each of the students about technical concepts and aspects of the project, the
contribution of each student, the difficulties and challenges faced, etc. again,
you must answer all of the questions in order to get all marks.
PROJECT SUBMISSION:
Submission Date: Last week of Classes
Deliverables: • PowerPoint Presentation
• Codebase
• Technical Report
• Project Proposal
Work Type: Group Project (ideally 3-5 students per group).
Targeted Learning • CLO 5: Analyze the types of defenses available on end-
Outcomes: host and build an appropriate Defense-in-Depth
pipeline to guarantee a strong security posture.
• CLO 6: Leverage various static and dynamic
approaches in the cyber security discourse to analyse
software and its runtime behaviour.
Page 3 of 4
Proposal Deadline • Feb 9, 2025
Midsemester • April 13, 2025
Review
Final Demo and • May 11, 2025
Presentation
For any further questions, please contact Dr. Abdulhakim, Mr. Mohammad, Miss
Haya, or Miss Reham
Page 4 of 4
Cross-Site Request Forgery (CSRF)
Command Injection
Privilege Escalation
Buffer Overflow
Code Injection
Fileless Malware
• Using Sysmon + Wazuh to detect.
• Using Falco to detect malicious memory execution.
API Exploitation
Phishing Emails
Email Spoofing
HMI Attacks
Malicious Apps
Prompt Injection
• Using LLM Guard to detect and sanitize inputs.
• Using Guardrails AI to enforce input constraints and filtering.
• Using LangChain's Prompt Validator to prevent malicious input manipulation.