TUM Logo

Student Work

The open topics found on this page are not an exhaustive list of all possible topics. If you want to suggest a topic yourself or if you are interested in other topics available in one of our research areas, please contact us directly.

Open Topics

BA: Development of a Semantic Threat Modeling and Analysis Framework
BA/MA: Konzipierung verdeckter Kommunikationskanaele
BA: micro SIDH: Supersingular Isogeny Diffie-Hellmann Key Exchange on Microcontrollers
BA/MA: Adversarial attacks on semi-supervised learning with partial information
BA/MA: Hardware-in-the-loop with industrial manufacturing devices for secuity evaluations
BA/MA: Class Hierarchy-based Protection against the COOP attack in C++ Programs
BA/MA: LLVM-based Detection of Integer Overflows
BA/MA: Assessing the Attack Surface Reduction in Executables for an Advanced Code Reuse Attack
BA/MA: Resource-efficient Hidden Markov Model for Anomaly Detection
BA/MA: Source Code and Backward Edge-based Protection Against Advanced Code Reuse Attacks
MA: Android Copy and Waste Development: Detecting Vulnerabilities in Reused Code Snippets Distributed Over Stack Overflow
MA: Development and Evaluation of a Security Simulation Framework for Industry 4.0
MA: Predictive Cloud Compliance
MA: Self-adaptive, continuous certification of cloud services
BA: Testbed zur Generierung von Feldbusdaten
MA: Verifiying Correctness of Smart Contracts
BA: Anbindung der Fraunhofer-Smartcard mittels OpenSC
BA: Prozesse und Tooling von Zertifizierungsstellen
MA: Android Copy and Waste Development: Detecting Vul- nerabilities in Reused Code Snippets Distributed Over Stack Overflow
BA/MA: Secure Set Operations using Garbled Circuits
BA/MA: Ausschreibung
MA: Search over encrypted data using Attribute-Based Encryption
BA: Security video game consoles
BA/MA: Industrie 4.0-taugliches Testbed fuer Anomalieerkennung in realistischen Szenarien
MA: Simulation Framework for Security Evaluations in Automotive Networks
MA: A Practical Approach on Automated Error-Repairing Crowd-Sourced Java Code

Work in Progress

BA/MA: AntiPatterns bei der Anwendung von Crypto-Primitiven am Beispiel von Ransomware
BA: Security evaluation of video game consoles
BA: Runtime Protection Against Bad Object Casts in C++ Programs with LLVM
MA: Bewertungsmetrik für Zertifizierungsstellen
MA: Reconstructing Program Semantics from Go Binaries
BA: Enhancing Function Identification by Processing Call Traces
BA: Automated Packer Classification
MA: Dynamic Program Slicing of Machine Code in the Context of Security
BA: Function Matching using Call Graph Heuristics on Binaries
BA: Privacy-preserving Linear Models over Homomorphically Encrypted Data
BA: Identifying User Actions in Encrypted Communication of Messenger Applications
MA: A Scalable Framework to Automate Advanced Malware Analytics
MA: HardExVTD - Hardware extended defense mechanism against Virtual Table Hijacking attacks
MA: On-the-Fly Virtualization of Virtual Machines
BA: Coverage-guided fuzzing of USB Drivers
MA: Graph Similarity Search for Anomaly Detection based on Feature Hashing
BA: Automatic Categorisation of Android Apps
MA: In-Depth Analysis of the PE32 Rich Header and its use in Superwised Malware Triage
BA: Practical Symbolic Execution of Android Bytecode
MA: Semantics-Aware Neural Network-Based Malware Classificaton Model
GR: Discovery and evaluation of malware distribution through advertisements om adult entertainment websites
BA: Evaluation and extension of an knowledge-based security simulation framework
BA: Improving the estimation of the growth rate of polyedges
BA: Understanding and Detecting Virtualization-based Analysis Environments on ARM
BA: Longterm protection of authenticated communication with embedded systems
MA: Flow-based Usage Control in Distrib

Finished Work

Code Pointer Examination in Modern Browsers
Validation of code integrity of usersapce applications for control flow integrity
Code Integrity Validation für Windows
SAURON - Advanced Monitoring of Distributed Components
A Case Study of Service-Oriented Software-Architectures
Detecting und Rating Malware Relationships using Machine Learning
Forensic Analysis utilizing Virtualization On-the-Fly
Security Analysis of Bus and Firmware Attacks on USB Devices
Automated Transformation of Android-Bytecode to Native C-Code
Automated and targeted execution of Android Apps via bytecode instumentation
Key Management for Distributed Storage Systems
Side-channel attacks against whitebox cryptography implementations on Android
Machine-learning techniques in detection of malicious web traffic
Distributed Configuration API für Dynamic Certification of Cloud Services
Evaluating Code Pointer Examination in modern browsers
Library Detection in Android Applications Packages
Runtime protection against advanced code reuse attacks by static instrumentation of binaries
Towards Manipulation of Web Crawlers
Continuous Testing of Software as a Service Using Web Application Test Methods
Implementation and Evaluation of Placing Algorithms for FPGAs
Security Testen von Steuergeräten im automobilen Bereich am Beispiel von Schnittstellenprotokollen und XCP
Numerical Stability and Scalability of Secure Private Linear Programming
Evaluation of Browser Technologies with Respect to the Security of the User
Source-Code basierter Schutz gegen Code wiederverwendungs-angriffe
Evaluation von Browsertechnologien im Hinblick auf die Sicherheit des Endanwenders
Automatisierte Transformation von Android-Bytecode zu nativem C-Code
Automated and Targeted Execution of Android Apps via Byte Code Instrumentation
Bytecode-level dynamic taint analysis of Android applications
Side-channel attacks against white-box cryptography implementations on Android
Developer-driven Injection of Security Functionality into Android Apps
Android Activity Flow Reconstruction and Visualization
Automated Obfuscation of Android Applications
Advanced Monitoring of Distributed Components
Evaluation of the iOS security concept with a focus on code signing
Machine Code Obfuscation via Instruction Set Reduction and Control Flow Graph Linearization: Analysis and Countermeasures
Quiet Keys for Lightweight Block Ciphers
Distributed Configuration API for dynamic certification of Cloud services
Optimization of an decoding algorithm for RM-codes based on concatenation
Continuous Behavioral User Authentication on Mobile Devices using Online Machine Learning
Semi-Supervised Opinion Spam Detection
Improving the performance of data capturing in binary applications by reducing the traffic to the database.
Distributed Services for Large Scale Dynamic Malware Analysis
Application Debugging using Virtual Machine Introspection
Continuous Testing of Software-as-a-Service Using Web Application Test Methods
Machine Learning Techniques in Detection of Malicious Web Traffic
LLVM-Based Generic Deobfuscation to Enhance Analysis of Machine Code
Simulation Framework for Security Evaluations in Automotive Networks
A Stealth Userspace Debugger Using Virtual Machine Introspection
Incremental One-Class Support Vector Machine with Minor Supervised Labels
Client-side cheat detection in games using machine learning
Neural Network-based Malware Classification
Security Evaluation of OpenFlow-enabled Network Devices
Concept Learner for CorMeL Transaction Trees in Amadeus Data Processing Systems
Sicherheitsanalyse und Implementierung des Authentifikationsverfahrens SQRL
Binderwall: Monitoring and Filtering Android Interprocess Communication
Automatisiertes Audit einer Cloud‐Umgebung
Automatisierte Deobfuskation von Android Apps
Searchable Encryption in Apache Lucene
Anomaly Detection in the SDN Control Plane
Revealing Previously Unknown Malicious Domains leveraging DNS and WHOIS Data
Dynamic System Call Translation between Virtual Machines
Design and Implementation of a Software Security Dashboard for Continuous Integration Environments
Proxy-based State Analysis of Web Applications
Infrastructures of Browser-based Botnets
Comparing functions using static binary code analysis on data structures
Robust Online Confidence-Weighted Learning in Adversarial Environment
Security Testing of electronic control units in vehicular domain using the example of interface protocols and XCP
Validation of code integrity of userspace applications for control flow integrity
Quiet keys for leightweight blockcyphers
Automated Obfuscation of Android Applications
Security Analysis of Bus and Firmware Attacks on USB Devices
Kryptographische Methoden in hochentwickelter Malware
Evaluation des iOS Sicherheitskonzeptes mit Fokus auf Codesignierung
Development of a Framework for the Deployment of Anomaly Detection Techniques in Cloud Infrastructures and Services
Theoretical Security Analysis of the Smart Grid Protocol IEC 61850 with Security Extension IEC 62351
Code Integrity Validation for Windows
Implemetation Security of the Networking und Cryptography library
Semi-Automated Detection of Sanitization, Authentication and Declassification Errors in UML State Charts
Client-side cheat detection in games using machine learning
Automatic Detection, Localization and Removal of Information Exposure Errors
Simulation Framework for Security Evaluations in Automotive Networks