Teaching at the Professorship of Cyber Trust
Theses and Student Projects
We offer motivated students interested in our research projects the opportunity to write their Thesis (Bachelor or Master) or to conduct Guided Research Projects.
Application
Please send your application to one of our chair members via email, including your motivation (i.e. why you are interested in our research), a short CV and your current Examination Report (TUMonline → Studies → Transcripts → Print Examination Report). Please do not hesitate to contact us for further information.
Open Student Projects
This list is not comprehensive. Please browse through our researchers' websites if you are looking for different topics you may be interested to work on.
Title | Type | Advisor |
---|---|---|
Large-scale open source code analysis | Bachelor/Master/GDS | F. Fischer |
An ethical analysis of user modeling techniques for social media networks. | Bachelor/Master | S.Engelmann |
Ethical implications of content moderation tools on social media | Bachelor/Master |
Assigned Student Projects
Title | Type | Advisor |
---|---|---|
An Empirical Evaluation of the Right to Erasure in the GDPR | Bachelor | J. Grossklags |
A Comparison of Different Implementation Alternatives for the Administration of Privacy-Preserving Cross-Organizational Document Sharing Systems | Bachelor | J. Grossklags |
A Critical Investigation of Personalized AI-based Interventions against Online Norm Violations | Guided Research | J. Grossklags |
Measuring the Effectiveness of Security Warnings on GitHub | Bachelor | F. Fischer |
Prototypical implementation and evaluation of an anonymization solution for textual data. | Master | F. Fischer |
Natural Language Semantic Code Search Using Learning to Rank | Master | F. Fischer |
History of Security Advice on Stack Overflow | Master | F. Fischer |
An Empirical Analysis of Enterprise Credit Reporting Systems in China | Bachelor | M. Chen |
A Comparative Study about Nudge Units in Different Countries | Bachelor | M. Chen |
How should Android vulnerabilities be disclosed? An Analysis of Android Security Bulletins. | Master | J. Grossklags |
A Comparison of the acceptance of contact-tracing apps in the Covid-19 pandemic in the USA, India, the UK and Germany | Bachelor | S. Engelmann |
Measuring Code Review in the Linux Kernel | Master | F. Franzen |
Completed Student Projects
Title | Type | Year |
---|---|---|
The Right to Data Portability - Impact on Digital Platforms | Master | 2020 |
Fairness in the Chinese Social Credit Systems - A Contest-Based Approach to Answering a Design Question | Master | 2020 |
Investigating the maturity of IT security of emerging companies in Germany according to a maturity model | Master | 2020 |
Data Portability: Empirical Study on User Expectations about Data Exports from Social Network Sites | Bachelor | 2020 |
An analysis of hate comments in the Korean Internet Society | Bachelor | 2020 |
An Empirical Evaluation of the Right to Erasure in the GDPR | Bachelor | 2020 |
The Perceived Value of Our Data – A User's Perspective on Data Portability in the Context of Social Media | Bachelor | 2020 |
End User Awareness of IoT Device Users in the domain of smart homes - A survey study | Bachelor | 2020 |
Show Don't Tell: Improving user perception and understanding of privacy or anti-tracking tools | Master | 2020 |
Analysis of process mining in the context of cyber security with the example of identity and access management | Master | 2020 |
Social Media Behavior in the Context of Genealogy Platforms | Bachelor | 2020 |
"I understand it now, which I like. But trust? No!" - The Relation Between Transparency & Trust in Visual Data-Based Automated Hiring Procedures. | Bachelor | 2020 |
A survey study on mobile operating system upgrade practices | Master | 2020 |
A data-driven comparative analysis of blacklists and redlists in the Chinese Social Credit System | Bachelor | 2020 |
An investigation of the Critical Infrastructure requirements as owner of a Critical Infrastructure | Bachelor | 2019 |
Development of the Social Credit System in China and how it effects German Companies | Bachelor | 2019 |
A comprehensive empirical study on the Android patching ecosystem | Master | 2019 |
A Survey Study on the Treatment of Personal Friends' Data in the Context of Smartphone Usage | Bachelor | 2019 |
Implementation of the Critical Infrastructure requirements as owner of a Critical Infrastructure | Bachelor | 2019 |
Search Engine for Security Documentation | Guided Research | 2019 |
Learning Program Representations from Big Code | Guided Research | 2019 |
Analysis of pseudonymous data to evaluate information flow in web-based fringe communities | Master | 2019 |
An open-source intelligence collection and analysis platform for actionable product threat intelligence and coordinated cyber incident response | Master | 2019 |
Analysis of the Changes in Privacy Policies for Mobile Apps | Master | 2019 |
Privacy Related Behavior, Lifestyles, Trust and Knowledge: Do People Securely Erase Confidential Data? | Bachelor | 2019 |
Privacy and data sensivity in health promotion apps: Perceptions in private and workplace health apps | Master | 2019 |
KRACK Attack: Security and Security Awareness in Multiperson Households | Bachelor | 2018 |