Center for Cybersecurity

Internships

Open Calls

This page lists the internship projects currently available in the Center for Cybersecurity of Fondazione Bruno Kessler (FBK).

Procedure

  1. Application: submit your application for the internship project you are interested in using the designated online form and providing the required information. Make sure to apply before the specified deadline. You are advised not to apply to more than two projects at the same time.
  2. Selection: project supervisors will review the applications and choose the most suitable candidate. If needed, they may request an oral interview during the selection process. Each project is evaluated independently.
  3. Results: once the selection process is complete, all applicants (both selected and not selected) will be notified of the outcome for the specific project.

For general inquiries, you can email internships-cs@fbk.eu. If you have specific questions about a project, please reach out to the project supervisor directly.

Please note that applications sent via email will not be considered.

Projects are listed starting with those that have the earliest submission deadlines.

Automatic Security Testing Tool for Identity Management Protocols CLEANSE ST

ID: p-2024-st-8

Published on: Friday, 18 October 2024

Deadline for Applications: Monday, 18 November 2024 at 23:59 Sunday, 5 January 2025 at 23:59 (extended)

Description:

Identity Management (IdM) protocols are the protocols supporting Single-Sign On (SSO) which is an authentication schema allowing the user to access different services using the same set of credentials. Two of the most known IdM protocols are SAML 2.0 SSO and OAuth 2.0/OpenID Connect. Several solutions for corporations like Google, Meta (Facebook) and for Public Administration like eIDAS and SPID are based on IdM protocols. We propose improving the tool to extend its capabilities by designing and implementing new features.

Levels: BSc, MSc

Supervisors: Andrea Bisegna (a.bisegna@fbk.eu), Roberto Carbone (carbone@fbk.eu)

Prerequisites: Preferably basic knowledge of Java.

Objectives:

  • Literature Review (guidelines and best practices)
  • Ethical analysis
  • Risk Assessment

Topics: Identity Management protocols, Attack patterns, Penetration testing

Notes: Multiple positions available.

Cryptography Bill of Materials (CBOM) ALEPH CLEANSE

ID: p-2024-cleanse-4

Published on: Tuesday, 17 December 2024

Deadline for Applications: Thursday, 16 January 2025 at 23:59

Description:

Discovering, managing, and reporting on cryptographic assets is a critical step for the transition to quantum-safe systems and applications [0]. The Open Worldwide Application Security Project (OWASP) [1] proposes a standard to represent Cryptography Bill of Materials (CBOM) [2], useful to describe cryptographic assets and their dependencies in a Software Supply Chain Security (SSCS) context. A CBOM is useful to understand the assets, their dependencies and the compliance with regulations, and a key enabler of cryptographic agility to secure critical systems against quantum computing threats.

Type: Internship + Thesis

Levels: BSc, MSc

Supervisors: Alessandro Tomasi (altomasi@fbk.eu), Pietro De Matteis (pdematteis@fbk.eu)

Prerequisites:

  • Practical knowledge of Java is essential; practical knowledge of docker would be useful.
  • Basic understanding of cybersecurity principles.
  • Basic knowledge of cryptography from cryptography-related courses.

Objectives: The research questions to cover with the internship are:

  • CBOM Compliance: starting from an open-source tool proposed by IBM for compliance [3], study how the tool works, what are the policies used to evaluate the compliance, and how to extend these compliance policies.
  • CBOM Creation: study how a CBOM is created for proprietary software and Third-Party dependencies.
  • CBOM Composition: study how the CBOM is composed and how to use and integrate a Third-Party CBOM.
The tools analyzed could be tested and evaluated with open-source projects such as IT-Wallet [4] and AAC [5].

Topics: Cryptography Bill of Materials, Cryptographic compliance, Quantum-resistant cryptography

Notes: Doing both internship and thesis is recommended but not required (i.e., only internship may be acceptable).

References:

  • [0] Transition to Post-Quantum Cryptography Standards (NIST IR 8547) • Link
  • [1] OWASP • Link
  • [2] Authoritative Guide to CBOM • Link
  • [3] Cryptography Bill of Materials • Link
  • [4] IO Wallet • Link
  • [5] AAC • Link