Thesis defence

Please note: This master’s thesis presentation will take place online.

Shannon Veitch, Master’s candidate
David R. Cheriton School of Computer Science

Supervisor: University Professor Doug Stinson

Please note: This master’s thesis presentation will take place online.

Junqiao Lin, Master’s candidate
David R. Cheriton School of Computer Science

Supervisor: Professor Richard Cleve

Please note: This master’s thesis presentation will take place online.

Peyman Momeni, Master’s candidate
David R. Cheriton School of Computer Science

Supervisor: Professor Sergey Gorbunov

Please note: This PhD defence will take place in DC 3317 and online.

Atrisha Sarkar, PhD candidate
David R. Cheriton School of Computer Science

Supervisor: Professor Krzysztof Czarnecki

Please note: This master’s thesis presentation will be given online.

Zeinab El-Rewini, Master’s candidate
David R. Cheriton School of Computer Science

Supervisor: Professor Yousra Aafer

Android’s permission model is used to regulate access to the Application Program Interfaces (APIs) within the Android system services, which provide access to sensitive system resources, such as the camera and microphone. To successfully invoke sensitive APIs, a caller must hold one or more Android permissions.

Please note: This master’s thesis presentation will take place online.

Karthik Ramesh, Master’s candidate
David R. Cheriton School of Computer Science

Supervisor: Professor N. Asokan

Authentication mechanisms have always been prevalent in our society — even as far back as Ancient Mesopotamia in the form of seals. Since the advent of the digital age, the need for a good digital authentication technique has soared stemming from the widespread adoption of online platforms and digitized content.