Teaching at the Professorship of Cyber Trust

Theses and Student Projects

We offer motivated students interested in our research projects the opportunity to write their Thesis (Bachelor or Master) or to conduct Guided Research Projects.


Please send your application to one of our chair members via email, including your motivation (i.e. why you are interested in our research), a short CV and your current Examination Report (TUMonline → Studies → Transcripts → Print Examination Report). Please do not hesitate to contact us for further information.

Open Student Projects

This list is not comprehensive. Please browse through our researchers' websites if you are looking for different topics you may be interested to work on.



Assigned Student Projects

An Empirical Evaluation of the Right to Erasure in the GDPR Bachelor J. Grossklags
A Comparison of Different Implementation Alternatives for the Administration of Privacy-Preserving Cross-Organizational Document Sharing Systems Bachelor J. Grossklags
A Critical Investigation of Personalized AI-based Interventions against Online Norm Violations Guided Research J. Grossklags
Measuring the Effectiveness of Security Warnings on GitHub Bachelor F. Fischer
Prototypical implementation and evaluation of an anonymization solution for textual data. Master F. Fischer
Natural Language Semantic Code Search Using Learning to Rank Master F. Fischer
History of Security Advice on Stack Overflow Master F. Fischer
An Empirical Analysis of Enterprise Credit Reporting Systems in China Bachelor M. Chen
A Comparative Study about Nudge Units in Different Countries Bachelor M. Chen
How should Android vulnerabilities be disclosed? An Analysis of Android Security Bulletins. Master J. Grossklags
A Comparison of the acceptance of contact-tracing apps in the Covid-19 pandemic in the USA, India, the UK and Germany Bachelor S. Engelmann
Measuring Code Review in the Linux Kernel Master F. Franzen

Completed Student Projects

The Right to Data Portability - Impact on Digital Platforms Master 2020
Fairness in the Chinese Social Credit Systems - A Contest-Based Approach to Answering a Design Question Master 2020
Investigating the maturity of IT security of emerging companies in Germany according to a maturity model Master 2020
Data Portability: Empirical Study on User Expectations about Data Exports from Social Network Sites Bachelor 2020
An analysis of hate comments in the Korean Internet Society Bachelor 2020
An Empirical Evaluation of the Right to Erasure in the GDPR Bachelor 2020
The Perceived Value of Our Data – A User's Perspective on Data Portability in the Context of Social Media Bachelor 2020
End User Awareness of IoT Device Users in the domain of smart homes - A survey study Bachelor 2020
Show Don't Tell: Improving user perception and understanding of privacy or anti-tracking tools Master 2020
Analysis of process mining in the context of cyber security with the example of identity and access management Master 2020
Social Media Behavior in the Context of Genealogy Platforms Bachelor 2020
"I understand it now, which I like. But trust? No!" - The Relation Between Transparency & Trust in Visual Data-Based Automated Hiring Procedures. Bachelor 2020
A survey study on mobile operating system upgrade practices Master 2020
A data-driven comparative analysis of blacklists and redlists in the Chinese Social Credit System Bachelor 2020
An investigation of the Critical Infrastructure requirements as owner of a Critical Infrastructure Bachelor 2019
Development of the Social Credit System in China and how it effects German Companies Bachelor 2019
A comprehensive empirical study on the Android patching ecosystem Master 2019
A Survey Study on the Treatment of Personal Friends' Data in the Context of Smartphone Usage Bachelor 2019
Implementation of the Critical Infrastructure requirements as owner of a Critical Infrastructure Bachelor 2019
Search Engine for Security Documentation Guided Research 2019
Learning Program Representations from Big Code Guided Research 2019
Analysis of pseudonymous data to evaluate information flow in web-based fringe communities Master 2019
An open-source intelligence collection and analysis platform for actionable product threat intelligence and coordinated cyber incident response Master 2019
Analysis of the Changes in Privacy Policies for Mobile Apps Master 2019
Privacy Related Behavior, Lifestyles, Trust and Knowledge: Do People Securely Erase Confidential Data? Bachelor 2019
Privacy and data sensivity in health promotion apps: Perceptions in private and workplace health apps Master 2019
KRACK Attack: Security and Security Awareness in Multiperson Households Bachelor 2018