TUM Logo

Student Work

The open topics found on this page are not an exhaustive list of all possible topics. If you want to suggest a topic yourself or if you are interested in other topics available in one of our research areas, please contact us directly.

Open Topics

MA: Fuzzing the ACRN Hypervisor
BA/MA/GR: Hypervisor Fuzzing
MA: Anomaly Detection in Additive Manufacturing
BA/MA/GR: Intra-Kernel Isolation
BA/MA: SuKI Project1: IT Security and Artificial Intelligence
MA: Hierarchical Deterministic Key Derivation Schemes
MA/GR: Fault Attacks on Hash-based Signatures (PQ Crypto)
BA/MA/GR: Attestation of Dynamic Software Stacks

Work in Progress

BA: Development and Implementation of a Public Key Infrastructure for Industrial Environments
BA: Semantic Analysis and Reconstruction of Code Virtual Machines
MA: reclaimIoT: Decentralized Identities and Data Sharing for the Internet of Things
MA: Secure, decentralized trust establishment in self-sovereign identity systems
MA: Communicating through Firewalls by using Reinforcement Learning
BA: On the applicability of emerging identity standards to decentralized identity directories
BA: Defense-xAI-GAN
BA: Using Segmentation to Detect Adversarial Examples
BA: Dynamic Identification of Data Flows through iOS Runtime Functions via Input Manipulations
BA: Robustness Against Adversarial Examples and Noise
BA: Simulation and Analysis of Fault Injection focusing on the difference through the Instruction Set Architecture
MA: Transferring Anomaly Detection to Audio Spoofing Detection
BA: Function Matching using Call Graph Heuristics on Binaries
MA: Compliance-driven cyber risk analysis of industrial assets within the civil aircraft industry
MA: Impact of quantum computers on automotive security and possible mitigations
MA: Fuzzing Proprietary Kernel Components in Linux Based Firmware
BA: Robust Physical Attacks on Neural Networks
BA: Fuzzing Unikernels
BA: Exploiting and Hardening Unikernel Heap Allocators
BA: Dynamic Optimizations for Symbolic Execution
MA: Specializing Operating System Kernels at Runtime
MA: Fingerprinting Encrypted Virtual Machines Utilizing the Hypervisor Interfaces
BA: A Checkpoint Management System for Embedded Distributed Systems based on the L4 Fiasco.OC and the Genode OS Framework
MA: Anomaly Detection on Industrial Control Systems (ICS)
MA: Using Static Data-Flow Analysis for Precise Control-Flow Integrity
MA: Adversarial robustness using regularization techniques
BA: Using SEV-SNP Remote Attestation to Establish a TLS Connection
MA: I'll keep you my dirty little secret: Towards automatic detection of bad crypto in Type I embedded devices
GR: Evaluation of post-quantum lattice-based approaches to Attribute-Based Encryption
GR: Assessing the security of open-source online voting infrastructure
GR: Software Supply Chain Security
BA: Grey-box fuzzing embedded devices using feedback from side-channel analysis
BA: Dynamic Identification of Sources and Sinks for Data Flow Analysis on iOS Devices
MA: Towards high-performance full system fuzzing of IoT firmware
BA: Evaluation of LLVM Lifters

Finished Work


Incremental Construction of Code Property Graphs
Masterthesis of Samuel Hopstock

A Readiness Analysis of Audio to Video Deepfakes
Masterthesis of Grygoriy Garyuk

Anomaly detection methods to detect adversarial example
Bachelorthesis of Alexander Wagner

From Requirements to Architecture: Systematically Selecting Privacy Enhancing Technologies
Bachelorthesis of Andreas Binder

Evaluation of Methods to Bypass Recent Antivirus Systems in Windows Environments
Bachelorthesis of David Maul

Using Blind Quantum Computing for Secure Computation on Untrusted Quantum Servers
Bachelorthesis of Fiona Fröhler

Automatic Compartmentalization of Rust Programs to Simplify Software Development with AMD SEV
Bachelorthesis of Thomas Nibler

Learning the Correct Usage of Cryptographic APIs for Misuse Detection
Bachelorthesis of Phuong Anh Nguyen

Development of a Network Intrusion Detection Demonstrator for Industrial Control Systems
Bachelorthesis of Fabian Pröbstle

Remote Attestation of Dynamic Software Stacks
Masterthesis of Xingxing Zhou

An Infrastructure for Verifiable Sensitive Data Processing
Masterthesis of Jonas Mayer

A Systematization of Privacy Requirements for Cloud-Based Services
Masterthesis of Eray Tufan

Virtualization-Assisted User Space Heap Hardening
Bachelorthesis of Simon Schnückel

Comparison of Trusted Execution Environments for Attestation of Dynamic Software Stacks
Bachelorthesis of Andrei-Cosmin Aprodu

Building and evaluating high-interaction RDP honeypots
Bachelorthesis of Kevin Schneider

Black-Box Reverse Engineering and Feature Comparison of AV Engines
Bachelorthesis of Arxhend Zariqi

Anomaly Detection Aided by Generative Models
Masterthesis of Vadim Goryainov

Mitigation for the Method Confusion Attack on Bluetooth
Bachelorthesis of Fabian Wührer

Defenses Against Adversarial Policies
Guided Research of Pavel Czempin

Usage Control Enforcement for Linux-based embedded Systems
Masterthesis of Samy El Deib

Integrating Privacy Methods into the Software Development Lifecycle
Masterthesis of Jonas Freudenstein

On the Impact of Man-in-the-middle Attack on Bluetooth
Masterthesis of Ulrich Fourier

Assessing Privacy in Cloud Services - Measurements and Approaches
Bachelorthesis of Kevin-Florian Su

Malicious manipulations of CAM Software in Additive Manufacturing using Desktop 3D Printer Software
Bachelorthesis of Berk Güler

A survey of state of the art trusted platforms in comparison with Intel TXT
Masterthesis of Albert Stark

Modelling the Impact of the iOS Runtime on Data Flows in Applications
Masterthesis of Leonhard Kurthen

Forkbeard: A Modern and General Approach Towards TOFU
Masterthesis of Maximilian Tschirschnitz

Implementation of Attribute-Based Encryption in Rust on ARM Cortex M Processors
Bachelorthesis of Daniel Bücheler

Development of a Testbed to Demonstrate Attacks on Emulated PLC Networks
Bachelorthesis of Victor Embacher

Secure and Private Multi-Party Event Detection
Bachelorthesis of Leo Stewen

Preventing Unsafe Numeric Operations in Rust
Bachelorthesis of Dominik Stolz

Collecting Large-Scale High-Quality Audio Datasets for Text-to-Speech Synthesis
Bachelorthesis of Simon Roschmann

Fuzz Testing Virtualized Environments
Bachelorthesis of Florian Freund

Migration of Operating System Containers in Secure Encrypted Virtual Machines
Masterthesis of Joana Pecholt

Improving Performance of Blackbox and Coverage-Guided Fuzzing Using Modified System Calls
Bachelorthesis of Axel Strodel

Measuring the Linux Kernel Attack Surface
Bachelorthesis of Petra Peuker

Interactive Visualization of the Linux Kernel Code Property Graph for Security Analysis
Guided Research of Tobias Holl

Audio Adversarial Examples: Detection
Guided Research of Mykhailo Kulakov

Offset Sensitivity in Speaker Recognition Systems
Guided Research of Tom Dörr

Fault-tolerant Memory Safety with LLVM
Masterthesis of Benjamin Orthen

Typestates Learning from Code-Property Graphs
Masterthesis of Dmytro Honcharevskyi

Selective Jamming of Bluetooth
Bachelorthesis of Kristina Magnussen

Benchmarking Supersingular Isogeny Diffie-Hellman Implementations
Bachelorthesis of Jonas Hagg

Secure Communication Between Enclaves in the Keystone Platform
Bachelorthesis of Erick Ruben Quintanar Salas

Sanitizer Crash Bucketing for Fuzzing
Masterthesis of Sandro Bauer

Emulating Linux based IoT firmware for empirical security analysis
Bachelorthesis of Felix Christ

Integration of User Interaction into the Analysis of iOS Applications
Bachelorthesis of Emir Besic

Defending Network Intrusion Detection Systems against Adversarial Machine Learning Attacks
Masterthesis of Alexander Skripnik

Applications of Model Checking to Code Property Graphs
Masterthesis of Thomas Bellebaum

Transfering Visual Deepfake Detection Methods to Audio Spoof Detection
Guided Research of Roman Umberto Canals

Enhancing a general Secure Software Development Lifecycle for Hosted Solutions
Masterthesis of Felix Lange

An Adversarial Detection Model for Different Data Types
Masterthesis of Melissa Paul

Development of a secure ad-hoc wireless network protocol based on bluetooth low energy
Masterthesis of Jan Luca Pawlik

Detection of Misuse and Malicious Behaviours through an Emotion Analysis System - Speech
Bachelorthesis of Georgi Hrusanov

Emotion Detection Analysis - Face and Gesture
Bachelorthesis of Ivan Stoyanov

Application Attack Surface Reduction on the System Call Interface
Bachelorthesis of Yi He

Making incomplete code compilable
Bachelorthesis of Fabian Braun


Access Delegation using Proxy Re-Encryption
Bachelorthesis of Leon Beckmann

Verifizieren der realen Anwendbarkeit von verbreiteten Bluetooth Sicherheitslücken
Guided Research of Maximilian Tschirschnitz

Rückkopplungsgesteuerte Aktivierungsanalyse
Guided Research of Melissa Paul

Softwaresicherheitsvorkehrungen in der Praxis: Eine Analyse weit verbreiteter Software
Guided Research of Katharina Bogad

Privacy-Preserving Distributed Learning Techniques
Masterthesis of Katharina Emde

Language Dependencies in Generating Audio Adversarial Attacks
Masterthesis of Donika Mirdita

Real or Fake: a Technique to Detect Manipulated Images
Masterthesis of Hongjia Wan

Securing OS-level virtualized Systems using hardware features
Bachelorthesis of Maximilian Emanuel Peisl

Identity Escrow in Self-Sovereign Identity Systems
Bachelorthesis of Johannes Späth

Efficient Decoding of Gabidulin Codes for the RQC NIST Proposal
Bachelorthesis of Johannes Kunz

Evaluation and Analysis of Timing Leakage from Hardware Accelerators embedded in Wireless IoT Microcontrollers
Bachelorthesis of Pascal Goldbrunner

Smart Home - A Thread to Privacy?
Bachelorthesis of Patrik Neu

Offensive Security of Bluetooth Audio Devices
Bachelorthesis of Arian Sebastian Mehmanesh

Deepfake Detection Using Sequential Models
Masterthesis of Andrea Turcanová

Extracting ICS Models From Malware Via Concolic Analysis
Masterthesis of Fabian Kilger

RkNN query on encrypted multi-dimensional data using the Paillier cryptosystem and OPE
Masterthesis of Ursula Rieger

KNN on Encrypted Geospatial Data
Masterthesis of Julia Dahmen

Range Query over Encrypted Geospatial Data
Masterthesis of Ramona Sabrina Brückl

Hardening the Linux Kernel Slab Allocator
Masterthesis of Marius Momeu

Searching over an Encrypted Collection of Documents Using Attribute-Based Encryption
Masterthesis of Youdan Zhang

Hack to the Future: Development and Applications of a Timeless Debugger in Rust
Masterthesis of Stefan Huber

Extending Compiler-Based Security Checks for C Programs
Bachelorthesis of Clemens Horn

From Explainability to Robustness in Machine Learning based Malware Detection
Masterthesis of Joao Balisa Neto

Modular Greybox Fuzzing
Masterthesis of Moritz Oettle

Platform Independant Information-Flow Control for C/C++
Masterthesis of Emanuel Vintila

Improving OS-Level Virtualization Security by Syscall Interface Reduction
Masterthesis of Florian Jakobsmeier

Code Virtualization for Software Protection: Analysis and Countermeasures
Masterthesis of Ludwig Peuckert

Active Physical Layer Security
Guided Research of Leon Wenning

Life Long Learning on Language Models and its Robustness
Masterthesis of Danial Raza

Threat Modeling Serverless Architectures
Bachelorthesis of Nico Fechtner

Layered Android Malware Detection Using Program Dependence Graph Embedding and Manifest Features
Masterthesis of Asbat El Khairi

Cryptographic Basis for Data Privacy
Bachelorthesis of Anastassiya Kutafina

Design and Implementation of a Standards-compliant Trust Negotiation Framework for Decentralised, Self-sovereign Identity Systems
Masterthesis of Markus Voggenreiter

Showing the Absence of Integer Overflows in ARM Binaries by applying Abstract Interpretation
Masterthesis of Leon Wenning

Visualization Methods for Adversarial Examples
Masterthesis of Romain Parracone

Program Slicing on Code Property Graphs
Bachelorthesis of Eric Armbruster

Automated Fuzz Target Generation for C Libraries
Bachelorthesis of Jonas Bogenberger

Augmented Reality Visualization of Attacks on IoT Systems
Masterthesis of Jonas Benedikt Erasmus

Leveraging hardware-assisted TEEs to protect host secrets in an OS-level virtualization environment
Masterthesis of Martin Radev

Data-Flow Analysis using Synchronized Pushdown Systems on Code Property Graphs
Bachelorthesis of Yuling Sun

Analyzing and Improving code and data integrity in an OS-level virtualization solution
Bachelorthesis of Felix Gust

On the robustness of Active Learning Models against Data Poisoning
Bachelorthesis of Roman Canals

Automated Testing of Security Requirements
Bachelorthesis of Emin Mrkonja

Designing Policy Enforcement Systems in Cloud Environments
Masterthesis of Markus Hinz

Leveraging Weighted Pushdown Systems for Taint Analysis of iOS Applications
Masterthesis of Florian Walter

forkever: A Framework for testing and exploiting programs
Bachelorthesis of Jasper Rühl

Privacy-preserving access control for a blockchain-based distributed key-management system
Masterthesis of Erik Pohle

Collection, Summary and Evaluation of different Approaches for C++ Binary Analysis
Bachelorthesis of Alina Weber-Hohengrund


Static Analysis of iOS Applications using Supergraphs
Bachelorthesis of Christian Presa Schnell

Developing secure storage for the Keystone Enclave
Bachelorthesis of Benedikt Kopf

Deep Learning Techniques for Side-Channel Analysis
Guided Research of Varun Bahl

Introducing CFI into the Linux Kernel
Masterthesis of Charlie Pascal Groh

Code Execution Attacks against Encrypted Virtual Machines
Masterthesis of Marko Dorfhuber

Robust Audio Adversarial Examples
Bachelorthesis of Tom Dörr

Security measures and attacks on video game consoles by the example of the playstation 4
Bachelorthesis of Florian Kasten

Robust graph-based static code analysis
Bachelorthesis of Samuel Hopstock

Evaluation of Outsourced Private Set Intersection
Bachelorthesis of Paul Rieger

Secure Bootstrap of the Trust Anchor Network for Sealed Cloud Systems
Masterthesis of Jaro Fietz

Binary Tomography: Understanding Binaries through Dynamic Data Flow Visualization
Masterthesis of Johann Alban Schöpfer

Detecting Adversarial Examples for Neural Networks
Bachelorthesis of David Glavas

RISC-V ISA Extension for Control Flow Integrity
Bachelorthesis of Leander Seidlitz - Mail: leander.seidlitz@tum.de

Machine Learning for Android Malware Detection in an Adversarial Environment
Guided Research of Donika Mirdita

Designing privacy-preserving edge services in the automotive domain
Masterthesis of Immanuel Kunz

Graph Anomaly Detection in an Adversarial Environment
Bachelorthesis of Michael Blind

Memory Corruption Exploits on RISC-V
Bachelorthesis of Maximilian Rickheit

Constant Parameterized Binary Function Identification
Bachelorthesis of Leonhard Kurthen

Time-based Evolution of Malware Behavior in Sandboxes
Masterthesis of Alexander Küchler

Development and Analysis of a VIRTIO PCI Host- and Guest-Driver for VirtualBox
Bachelorthesis of Dominik Weiß

Learning on a budget from multiple experts
Bachelorthesis of Armin Mesic

Runtime verification mechanisms applied on enclaves
Masterthesis of Daniel Schneider

Authenticated delay-based geolocation validation of cloud resources
Masterthesis of Jawad Tahir

A Longitudinal Study on WebAssembly
Bachelorthesis of Christopher Pfefferle

Static Reverse Engineering of WebAssembly Binaries
Bachelorthesis of Benedikt Werner

Decentralised Access Control using Advanced Attribute-Based Delegation in Open Directory Services
Masterthesis of Andreas Ebner

Evaluating defense strategies for facial recognition systems
Bachelorthesis of Hendrik Pauthner

Sticky File Shares: Fingerprinting SMB-Honeypots on the Internet
Bachelorthesis of Lion Steger

A Data-flow Engine for Rust: Analyzing Security Critical Programs
Bachelorthesis of Andreas Vollert

Malware Detection with hybrid Control Flow Graph and Graph Embedding
Masterthesis of Youyi Zhang


Semantics-Aware Neural Network-Based Malware Classificaton Model
Masterthesis of Gehrig Matthias

Analysis of the Wireless Security of an Insulin Pump System
Masterthesis of Nicolas Benes

Enhancing Security of Modern Linux Containers
Bachelorthesis of Charlie Groh

Garbled Circuit Generation for Private Set Intersection
Bachelorthesis of Erik Pohle

Backward-Edge Protection against Code Reuse Attacks on Embedded MIPS Devices
Bachelorthesis of Fuchs Franz Anton

Testbed zur Generierung von Feldbusdaten
Bachelorthesis of Mathias Mayer

Adversarial Machine Learning on Capsule Theory
Masterthesis of Andreas Hörmandinger

Compiler-Based Protection of Pointers Against Partial Overwrites
Masterthesis of Marcel Schumacher

Taint Analysis of x86 Machine Code
Masterthesis of Felix Wruck

Implementation and Security Assessment of a Wireless Sensor Network
Bachelorthesis of Philippe Buschmann

Design and Implementation of a High-Level Toolkit for Non-Interactive Zero-Knowledge Proofs
Bachelorthesis of Kilian Thomas

Forward and Backward Privacy in Dynamic Searchable Encryption
Bachelorthesis of Ludwig Timo

Review of Kernel-level ASLR protection in the context of ACPI
Bachelorthesis of Bogad Katharina

Development of a Semantic Threat Modeling and Analysis Framework
Bachelorthesis of Xingxing Zhuo

Cost-aware Feature Acquisition for Anomaly Detection in Sequences
Guided Research of Awad Arsany

Safety and Security for Ethernet-based Visual Servoing Systems under hard Real-time Constraints
Masterthesis of Fabian Franzen

VtRoCHAP - Read-only memory and class hierarchy based protection of binaries against vtable hijacking attacks
Bachelorthesis of Edelmann Michael

Source Code and Backward Edge-based Protection Against Advanced Code Reuse Attacks
Bachelorthesis of Matthias Neumayer

Avoiding smart contract vulnerabilities: An inter-contract concolic execution framework for Ethereum contracts
Masterthesis of Konrad Weiss

Framework for Automated Construction of Object-Oriented Code Reuse Attacks
Bachelorthesis of Richard Viehoever

MA: Dynamic Program Slicing of Machine Code in the Context of Security
Masterthesis of Mihai Dutescu

HardExVTD - Hardware extended defense mechanism against Virtual Table Hijacking attacks
Masterthesis of Matei Pavaluca

Graph Similarity Search for Anomaly Detection based on Feature Hashing
Masterthesis of Gani Qinami

Beyond Heuristics: Learning to predict vulnerability, severity and exploits
Masterthesis of Ahmad Mursaleen

Hypervisor Development Dedicated for Virtual Machine Introspection
Bachelorthesis of Christopher Roemheld

Analyzing the Robustness of Memory Augmented Neural Networks
Masterthesis of Daniel Kowatsch

Avoiding smart contract vulnerabilities: An inter-contract concolic execution framework for Ethereum contracts
Masterthesis of Konrad Weiss

CharWars: A New Heap
Masterthesis of Clemens Jonischkeit

Data Flow Analysis of EVM Smart Contracts
Masterthesis of Ece Kubilay


micro SIDH: Supersingular Isogeny Diffie-Hellmann Key Exchange on Microcontrollers
Bachelorthesis of Eduard Pop

Runtime Protection Against Bad Object Casts in C++ Programs with LLVM
Bachelorthesis of Sebastian Wuerl

Automated Packer Classification
Bachelorthesis of Ulrich Fourier

Coverage-guided fuzzing of USB Drivers
Bachelorthesis of

Practical Symbolic Execution of Android Bytecode
Bachelorthesis of Peter Greth

Understanding and Detecting Virtualization-based Analysis Environments on ARM
Bachelorthesis of Florian Jakobsmeier

Flow-based Usage Control in Distrib
Masterthesis of Hamed Rasifard

A Practical Approach on Automated Error-Repairing Crowd-Sourced Java Code
Masterthesis of Christopher Will

Enhancing Function Identification by Processing Call Traces
Bachelorthesis of David Leiter

Automatic Categorisation of Android Apps
Bachelorthesis of Felix Wielander

LLVM-Based Generic Deobfuscation to Enhance Analysis of Machine Code
Masterthesis of Markus Blöchl

A Scalable Framework to Automate Advanced Malware Analytics
Masterthesis of Christan von Pentz

Discovery and evaluation of malware distribution through advertisements om adult entertainment websites
Guided Research of Christian von Pentz

SAURON - Advanced Monitoring of Distributed Components
Bachelorthesis of Maximilian Schott

Improving the performance of data capturing in binary applications by reducing the traffic to the database.
Masterthesis of Chetan Basuray

Privacy-preserving Linear Models over Homomorphically Encrypted Data
Bachelorthesis of Melissa Paul

Identifying User Actions in Encrypted Communication of Messenger Applications
Bachelorthesis of Albert Stark

In-Depth Analysis of the PE32 Rich Header and its use in Superwised Malware Triage
Masterthesis of Timo Geissler

A Case Study of Service-Oriented Software-Architectures
Bachelorthesis of Oliver Prater

Optimization of an decoding algorithm for RM-codes based on concatenation
Bachelorthesis of Lukas Sandmeir

Prozesse und Tooling von Zertifizierungsstellen
Bachelorthesis of Markus Voggenreiter

Analysis and Evaluation of Binary Exploitation Mitigation Techniques
Masterthesis of Martin Steil

Longterm protection of authenticated communication with embedded systems
Bachelorthesis of Andreas Knipl


Continuous Behavioral User Authentication on Mobile Devices using Online Machine Learning
Bachelorthesis of Antonia Hüfner

Application Debugging using Virtual Machine Introspection
Masterthesis of Hannes Laner

A Stealth Userspace Debugger Using Virtual Machine Introspection
Masterthesis of Benjamin Schagerl

Developer driven Injection of Security Functionality into Android Apps
Bachelorthesis of Lukas Heinzmann

Distributed Configuration API for dynamic certification of Cloud services
Bachelorthesis of Victoria Simon

Machine Learning Techniques in Detection of Malicious Web Traffic
Masterthesis of Ching-Yu Kao

Bytecode-level dynamic taint analysis of Android applications
Bachelorthesis of Alexander Küchler

Side-channel attacks against white-box cryptography implementations on Android
Bachelorthesis of Michael Eder

Semi-Supervised Opinion Spam Detection
Masterthesis of Muhammad Bilal Javed

Neural Network-based Malware Classification
Masterthesis of Ghadir Eraisha

Key Management for Distributed Storage Systems
Masterthesis of Felix Engelmann

Android Activity Flow Reconstruction and Visualization
Bachelorthesis of Konrad Weiss

Machine Code Obfuscation via Instruction Set Reduction and Control Flow Graph Linearization: Analysis and Countermeasures
Bachelorthesis of Clemens Jonischkeit

Forensic Analysis utilizing Virtualization On-the-Fly
Masterthesis of Sergej Proskurin

Automated Transformation of Android-Bytecode to Native C-Code
Masterthesis of Arndt Peter

Automated and targeted execution of Android Apps via bytecode instumentation
Masterthesis of Anshul Vij

Continuous Testing of Software as a Service Using Web Application Test Methods
Masterthesis of Koosha Khajehmoogahi

Automatisierte Transformation von Android-Bytecode zu nativem C-Code
Masterthesis of Peter Arndt

Automated and Targeted Execution of Android Apps via Byte Code Instrumentation
Masterthesis of Anshul Vij

Continuous Testing of Software-as-a-Service Using Web Application Test Methods
Masterthesis of Koosha Khajehmoogahi

Detecting und Rating Malware Relationships using Machine Learning
Bachelorthesis of Donika Mirdita

Security Analysis of Bus and Firmware Attacks on USB Devices
Masterthesis of Peter Schneider

Library Detection in Android Applications Packages
Masterthesis of Michael Lux

Runtime protection against advanced code reuse attacks by static instrumentation of binaries
Masterthesis of Matthias Fischer

Towards Manipulation of Web Crawlers
Masterthesis of Chandra Shekhar

Code Pointer Examination in Modern Browsers
Bachelorthesis of Felix Wruck

Evaluating Code Pointer Examination in modern browsers
Bachelorthesis of Felix Wruck


Evaluation of the iOS security concept with a focus on code signing
Bachelorthesis of Aleksander Umov

Kryptographische Methoden in hochentwickelter Malware
Bachelorthesis of Sebastian Lehrbaum

Evaluation des iOS Sicherheitskonzeptes mit Fokus auf Codesignierung
Bachelorthesis of Aleksander Umov

Development of a Framework for the Deployment of Anomaly Detection Techniques in Cloud Infrastructures and Services
Masterthesis of Amin Chawki

Automated Obfuscation of Android Applications
Bachelorthesis of Nikolai Kircher

Binderwall: Monitoring and Filtering Android Interprocess Communication
Masterthesis of Constanze Hausner

Quiet Keys for Lightweight Block Ciphers
Bachelorthesis of Maria Möbius

Validation of code integrity of userspace applications for control flow integrity
Bachelorthesis of Richard von Seck

Quiet keys for leightweight blockcyphers
Bachelorthesis of Maria Möbius

Distributed Services for Large Scale Dynamic Malware Analysis
Bachelorthesis of Christian von Pentz

Security Testen von Steuergeräten im automobilen Bereich am Beispiel von Schnittstellenprotokollen und XCP
Masterthesis of Manuel Schmidt

Incremental One-Class Support Vector Machine with Minor Supervised Labels
Masterthesis of Dieu Linh Tran

Security Testing of electronic control units in vehicular domain using the example of interface protocols and XCP
Masterthesis of Manuel Schmidt

Security Analysis of Bus and Firmware Attacks on USB Devices
Masterthesis of Peter Schneider

Simulation Framework for Security Evaluations in Automotive Networks
Masterthesis of Simon Dieterle

Simulation Framework for Security Evaluations in Automotive Networks
Masterthesis of Dieu Linh Tran

Implementation and Evaluation of Placing Algorithms for FPGAs
Masterthesis of Chistian Sternecker

Simulation Framework for Security Evaluations in Automotive Networks
Masterthesis of Simon Dieterle

Client-side cheat detection in games using machine learning
Bachelorthesis of Mai Ton Nu Cam

Semi-Automated Detection of Sanitization, Authentication and Declassification Errors in UML State Charts
Masterthesis of Adnan Rabbi

Client-side cheat detection in games using machine learning
Bachelorthesis of Mai Ton Nu Cam

Automatic Detection, Localization and Removal of Information Exposure Errors
Masterthesis of Vasantha K. Kommanapalli

Code Integrity Validation für Windows
Bachelorthesis of Michael Kubitza

Theoretical Security Analysis of the Smart Grid Protocol IEC 61850 with Security Extension IEC 62351
Masterthesis of Maximilian Strobel

Code Integrity Validation for Windows
Bachelorthesis of Michael Kubitza

Implemetation Security of the Networking und Cryptography library
Bachelorthesis of Lars Wüstrich


Revealing Previously Unknown Malicious Domains leveraging DNS and WHOIS Data
Masterthesis of Christian Köpp

Dynamic System Call Translation between Virtual Machines
Bachelorthesis of Jonas Jelten

Automatisierte Deobfuskation von Android Apps
Masterthesis of Hannes Schulz

Automatisiertes Audit einer Cloud‐Umgebung
Masterthesis of Alexander Wittmann

Sicherheitsanalyse und Implementierung des Authentifikationsverfahrens SQRL
Bachelorthesis of Karol Babioch

Design and Implementation of a Software Security Dashboard for Continuous Integration Environments
Masterthesis of Philip Simon

Evaluation of Browser Technologies with Respect to the Security of the User
Bachelorthesis of Julian Kirsch

Security Evaluation of OpenFlow-enabled Network Devices
Bachelorthesis of Michael Kratzer

Concept Learner for CorMeL Transaction Trees in Amadeus Data Processing Systems
Masterthesis of Heeren Sharma

Numerical Stability and Scalability of Secure Private Linear Programming
Bachelorthesis of Raphael Arias

Robust Online Confidence-Weighted Learning in Adversarial Environment
Masterthesis of Gennady Shabanov

Searchable Encryption in Apache Lucene
Bachelorthesis of Andreas Greimel

Anomaly Detection in the SDN Control Plane
Masterthesis of Vincent Sommer

Proxy-based State Analysis of Web Applications
Masterthesis of Simon Bastian

Infrastructures of Browser-based Botnets
Bachelorthesis of Ulrich Gallersdörfer

Comparing functions using static binary code analysis on data structures
Bachelorthesis of André Kupka


AntiPatterns bei der Anwendung von Crypto-Primitiven am Beispiel von Ransomware
Masterthesis of

Secure Set Operations using Garbled Circuits
Masterthesis of