For senior design project, you can expect a well defined problem, that is not too hard.
For a master thesis, the topic may be less well defined and you need to navigate yourself in the topic and find your way through.
You can work on the topic as independently as you want. However, I will not let you alone in the dark, since I will organize some general meetings where certain techniques and problems will be presented. Depending on the topic, I expect you to attend all the meetings and events that may be related to your topic. On the meetings, I will be explaining relevant papers/material in enough detail such that you can proceed independently and work out the other details. Remember: the devil is in the details. I expect you to do converge towards the final write up in a timely fashion.
Here are the topics. The ones marked with a (*) symbol are challenging ones.
In the wake of the Snowden scandal, an interesting problem came to the surface. Its Alice and Bob against Eve. A secret bit is held by one of Alice or Bob. They both know who has the secret bit initially, but they do not both know the bit. After they perform a protocol, the secret bit is revealed to all, but they want to hide who was the initial bit-holder, even from Eve who hears everything and is not computationally limited.
A recent paper by Winkler established a new field "cryptoganography" a blend of cryptography and steganography. There are some interesting open questions there. You should read the paper and follow the path towards the open problems. Download the paper here.
This topic includes mining through a typical traffic of several regular Android phones and track the presence of malicious pieces of software, leakages of private data (location, contact, etc.) A good starting point is: http://mobile.tutsplus.com/tutorials/android/analyzing-android-network-traffic/
This is my preferred topic. I am currently focusing on the fault-tolerance of interesting computational models. I am also interested in the concept of the so called "weird machine" -- a machine that is hacked and is not obeying its program, or its program is altered somewhat.Projects may include:
I am very interested in the model of Nubots established here. M. Ozkul is focusing on it. This is somewhat theoretical model and a tough area, but if you are curious and dare to think on the construction of -- say --- molecular robots, this is a topic for you. Typically you would need to devise some algorithm for this new model (*), build a simulator for it, study its features etc.
Years ago I was interested in philogenetic trees and in devising of host specificity indices in a host/parazyte relationships. Recent talk by B. Sinaimeri sparkled some ideas in my head. See me for more details.