Supervision

Supervision

PhD

  1. Privacy-preserving machine learning services through hybrid homomorphic encryption
    2025 | Anton Israelsson | RISE & Uppsala University

Masters ⛓️‍💥

  1. Adversarial Evasion of the Two-Phase Guardian Agent
    2026 - | Melvin Sandberg | KTH
  2. Cyber Threat Intelligence from Adaptive Deception: Analyzing Attacker Behavior in LLM-Powered Honeypot Environments
    2026 - | Adam Maeedi | KTH
  3. Adaptive Counter-Intrusion: Optimizing LLM Strategic Deception for High-Interaction Network Honeypots
    2026 - | Jonathan Shahi | KTH
  4. Temporal and Contextual Fidelity: Achieving High-Realism in LLM-Driven Honeypots through Dynamic State Management
    2026 - | Linda Widell | KTH
  5. Analyzing and exploiting vulnerabilities in the Raspberry Pi compute module
    2025 - | Hassan El Ghamri | KTH
  6. Implementing penetration testing methodologies for embedded systems
    2025 - | Roy Dolonius | KTH
  7. Penetration testing security weaknesses in embedded devices
    2025 - | Ísak Arnar Kolbeins | KTH
  8. De-obfuscating and clustering potentially malicious JavaScript injected Swedish webpages
    2025 - | Hávar Sigurðarson | Stockholm University
  9. Large Language Models for Software Vulnerability Discovery and Exploitation
    2025 - | Gabriel Gerdin | Karlstad University
  10. Fine tuning DeepSeek LLM for vulnerability research
    2025 - | Siwei Zhang | Stockholm University
  11. Fine tuning LLama LLM for vulnerability research
    2025 - | Yanxiang Du | Stockholm University
  12. Fuzzing Matter(s) : Stateful black-box fuzzer implementation for Matter protocol devices
    2025 - | Marco Campione | KTH
  13. Investigating fileless malware in Windows operating systems
    2025 - | Anton Rådberg | KTH
  14. Fine-Tuning Small Open-Weight LLMs for Cybersecurity
    2024 - | Roni Henareh | KTH
  15. Design and Evaluation of Memory Analytics Measures for Windows 11 Forensics
    2024 - | Edward Norberg | KTH
  16. A Penetration Testing and Vulnerability Analysis Approach: Examining Security Risks, Vulnerabilities, and Mitigation Strategies in Swedish Banking, Parking, Delivery, Transport, and Healthcare Apps
    2025 - | Rahila Kundan | KTH
  17. What are the most effective static analysis, dynamic analysis, and reverse engineering methodologies for identifying and evaluating security vulnerabilities in mobile applications?
    2025 - 2025 | Yamini Balannagari | KTH
  18. Triggering false alarms in computer networks
    2024 - 2025 | Peter Daniel | KTH
  19. Memory corruption in IoT: Extending PatrIoT to hunt memory corruption bugs
    2023 - 2024 | Erik Mickols | KTH
  20. Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat
    2023 - 2023 | Adam Lindberg | KTH
  21. Nationwide password patterns of Swedish people
    2022 - 2022 | Daniel Gustafsson | KTH
  22. Automated security analysis of firmware
    2022 - 2022 | Farrokh Bolandi | KTH
  23. (Classified) Hacking the airport X-ray machine
    2022 - 2022 | Felix Zuber | KTH
  24. Threat modeling and penetration testing of an IoT product. Yanzi IoT network
    2021 - 2021 | Diyala Isabar | KTH
  25. Security analysis of a Beckhoff CX-9020 programmable logic controller
    2021 - 2021 | Liam Carter | KTH

Bachelors

  1. Vulnerability Research of Large Language Models (LLMs): Focus on Prompt Injection Using the Swedish Language
    2026 - | Rebecca Ehrnrooth From & Alexander Timsäter
  2. Smart home infrastructure for penetration testing and national cyber ranges
    2024 - 2024 | Gergo Emin Tarcheh & Nina Shamaya | KTH
  3. Collaboration platform for penetration tests enhanced with machine learning
    2024 - 2024 | Hjalmar Höglund & Roni Henareh | KTH
  4. Penetration testing of ten popular Swedish Android applications
    2022 - 2022 | Alexander Astély & Johan Ekroth | KTH
  5. Security evaluation of ten Swedish mobile applications
    2022 - 2022 | Jens Ekenblad & Stefan Andres Garrido Valenzuela | KTH
  6. Creating new Security Tools Using Attack Simulation Results
    2022 - 2022 | Frida Grönberg & Björn Thiberg | KTH
  7. Trends and scientometrics in cyber security research
    2021 - 2022 | Jesper Slagarp & Elvira Häggström | KTH