Theses and Projects

We are always looking for enthusiastic students willing to work on our research projects. We are also open for your own ideas. Just fill out this form. We are going to contact you as soon as possible.

Open

We don't necessarily advertise all current research topics. Use the websites of our scientific staff to obtain information about their research. Afterwards, you can use this form to apply for a thesis.

Research assistant (HiWi) positions

If you are interested in any of our projects (or any other related topics), fill out this form.  

Title Contact
Implementing Inverse Transparency – A new approach to data privacy V. Zieglmeier

Assigned

Title Type Advisor
Automating User Acceptance Tests Bachelor's V. Zieglmeier, D. Elsner
Anomaly Detection in Self-Adaptive Cyber-Physical Systems Bachelor's A. Petrovska
Learning Optimal Hyper-Parameters in Smart Self-Adaptive Cyber-Physical Systems Master's A. Petrovska
Logical Architecture for Engineering Smart Self-Adaptive Cyber- Physical Systems Guided Research A. Petrovska
Decentralized Partially Observable Markov Decision Processes for Planning in Smart Self-Adaptive Cyber-Physical Systems Guided Research A. Petrovska
Model-driven Monitoring Orchestration For Microservices Master's A.Ibrahim
A Canvas for Causal Modeling Bachelor's A. Ibrahim
Securing Microservice Cluster Management Cockpit using Blockchain Master's M. Ahmadvand
Public key Tracing Framework using Blockchain Master's M. Ahmadvand
Software protection composition framework Master's M. Ahmadvand
Automatic and Reproducible Attacks on insecurely configured Systems based on Security-Configuration Rules Master's P. Stöckle
Automatic Selection of Security-relevant Configurations Bachelor's P. Stöckle
Cornering Cohesion: Investigating new ways to measure cohesion Master's M. Schnappinger
Measuring cohesion and coupling: a comparison of different metrics and their usefulness  Bachelor's M. Schnappinger
Similarity-based System Trajectory Classification Bachelor's C. Jordan
Failure Pattern Recognition based on Test Results in Hardware-in-the-Loop Setups Master's C. Jordan

Finished

Title Type Year
A labeling Platform for Source COde Bachelor's 2019
Multi-Source Knowledge Aggregation in Subjective Logic Master's 2019
Security-Configuration Automation for UNIX Master's 2019
Design of an Improved Scapolite Check Mechanism Bachelor's 2019
Automatic Security Configuration for Mobile Devices Bachelor's 2019
Conflict Scenarios for an Accountability-Enabled Multi-Robot Simulation Bachelor's 2019
Path Planning and Consensus Algorithms for an Accountability-Enabled Multi-Robot Simulation Bachelor's 2019
Modelling of Attack Trees for Security Assessment of Hardening Mechanisms Bachelor's 2019
Building a Framework for Objective Evaluation of Malware Detection Methods Bachelor's 2019
Detection of Android Repackaged Malware with Active Learning Bachelor's 2019
Resilience of SIP against ML-based attacks Master's 2019
Knowledge Discovery from Drone Logs  Master's 2019
Vectorizing Software for Machine Learning Master's 2019
Identification of generated code parts Bachelor's 2019
Simplifying Configuration Management in the Automotive Industry Master's 2019
Design and Implementation of ROS-Based Simulated Multi-Robot Systems for Data Collection Master's 2019
Runtime Verification of Dynamic Architectures Master's 2018
Constraint size thresholding in symbolic execution for broader path coverage Bachelor's 2018
Fast and parallel compositional fuzzing aided by symbolic execution Bachelor's 2018
Design and Evaluation of an Agile Software Development Process for Space Applications Master's 2018
Comparing Stimulation Techniques for Detecting Android Piggybacked Malware Master's 2018
Software Protection Ontology Visualization Bachelor's 2018
Automatic Repackaging of Android Applications Bachelor's 2018
Self-adaptive cyber-physical systems utilizing different machine learning techniques Guided Research  2018
Analysis and Detection of Repackaged Malware Behavior Master's 2018
Testing Advanced Driver Assistance Systems: Procedural Environment Generation for Simulated Test Scenarios Master's 2017
Impact factors for severity assessment of bugs discovered via compositional symbolic execution Master's 2017
Anomaly detection and prediction in distributed software systems using machine learning Bachelor's 2017
Repackaged Malware Detection in Android Bachelor's 2017
Dynamic Taint Analysis for Java-based applications Bachelor's 2017
Benchmarking Symbolic Execution Tools on Custom Block Ciphers Bachelor's 2017
Search-Based Procedural Environment Generation for Simulated Test Scenarios Guided Research 2017
Visualization of Causality Algorithms Master's 2017
Qualifizierung von Template-basierendem C++-Code Bachelor's 2017
Evaluierung suchebasierter Verfahren zur automatischen Generierung von Testfällen für kontinuierliche Systeme Master's 2017
Runtime Service Adaption in the Context of Composed Usage Control Driven Services Bacherlor's 2017
Prediction of automated deobfuscation & tampering time using machine learning Master's 2017
iOS Application Hardening via Obfuscation Master's 2017
Detecting Process Memory Tampering Bachelor's 2016
Compositional analysis for exposing vulnerabilities - A symbolic execution approach Master's 2016
Building Accountability Mechanisms into the Roomba iRobot Bachelor's 2016
Automated Attack Planning using a Partially Observable Model for Penetration Testing of Industrial Control Systems Master's 2016
Automatic Generation of Secure and Usable Mnemonic Passphrases Master's 2016
State of the Art Survey of Security Incident Management compliant to ISO 27001 Guided Research 2016
A Reliable Automated Vulnerability Check in Continuous Integration Bachelor's 2016
Botnet Battlefield Master's 2016
Master's 2016
Software Protection by Self-Checking Master's 2016
Bachelor's 2015
Master's 2015
Master's 2015
Master's 2015
Bachelor's 2015
Software Protection by Virtualization Obfuscation Master's 2015
A Taxonomy of Browser Hijacking Malware Guided Research 2015
Metadata Recovery of Transformations from Obfuscated Software via Machine Learning Techniques Master's 2015
Enhancing Accuracy for Usage Control Enforcement Bachelor's 2015
Composing data-usage-driven Services Bachelor's 2015
Securing Data Usage Control Infrastructures Master's 2015
Raising the Bar for Automated Attacks against Web Applications using Software Diversity Master's 2015
Model Based Development of a Safety AUTOSAR Basic Software Component - NVRAM Manager Bachelor's 2015
A Comparative Study of Secret Sharing Schemes Master's 2015
Checking Non-Equivalence of Software Programs using Symbolic Execution Bachelor's 2015
Regressionstests mit Fehlermodellen Bachelor's 2015
Zum Verhältnis von Agilität und Architektur Master's 2015
Design and Implementation of "Sealed Search" on Encrypted Data while Maintaining Privacy Master's 2015
A Generic Description Language for Fault Models Bachelor's 2015
Towards Testing Malware Detection Systems using Behavior Obfuscation Bachelor's 2015
Usage Control for Apple iOS Master's 2015
Code Transformations and Software Diversity for Improving Software Attack and Analysis Resilience Master's 2014
Monitoring Compliance of Third-Party Applications in Online Social Networks Bachelor's 2014
Graph-based system profiling and anomaly detection Master's 2014
Erstellen einer Fehlerdatenbank mit zugehörigem Pflegeprozess Master's 2014
Towards improving data driven usage control precision with intra-process data-flow tracking Master's 2014
A Qualitative Study of Indistinguishability Obfuscation Bachelor's 2014
Fault-model driven test derivation for controller-based systems Master's 2014
Quantitative Data Flow Pattern Mining for Malware Detection Master's 2014
Data Usage Control for Office Applications Master's 2014
Asset Protection via White Box Cryptography Master's 2014
Towards data flow graph based misuse detection at the Windows kernel level Bachelor's 2014
A Test Automation Framework for AJAX-based Web Applications Bachelor's 2013
A dynamically configurable Policy Information Point Bachelor's 2013
Testing Concurrency in Android Apps Master's 2013
Dynamic Information Flow Tracking for V8 Master's 2013
Distributed Usage Control for the mySQL Server Master's 2012
Data Usage Control for Google Chrome Diplomarbeit 2012
Assessment of HTML5 security properties and emerging web security threats Master's 2012
Data Usage Control for the Thunderbird Mail Client Master's 2012
A Policy Management Infrastructure for Distributed Usage Control Master's 2011
Implementation of Usage Control for the Windows API Master's 2011
Extending Android with Usage Control Policies Master's 2011
A hypervisor-based bus system for inter-level data flow tracking Master's 2011
Data Usage Control for a Web Application: The Server Bachelor's 2010
Data Usage Control for a Web Application: The Client Bachelor's 2010
Bringing Trust to the Cloud Bachelor's 2010
Usage Control for Dynamically Loaded Windows Binaries Bachelor's 2010
Engineering Bytecode to Detect Implicit Information Flow Bachelor's 2009
Usage Control Enforcement with an Application to the X11 Protocol Master's 2009
Usage Control Enforcement at the CPU level Master's 2009
Usage Control Enforcement at the Java bytecode level Master's 2009
Analysis of Usage Control Policies Master's 2008
Delegation in Usage Control Master's 2008
AXIS-Based Configuration of Services for Usage Control Studienarbeit 2008
Sicherheitsanalyse einer Webapplikation Studienarbeit 2007
Policy Evaluation and Negotiation in Distributed Usage Control Master's 2007
Translating Usage Control Policies Studienarbeit 2007
Implementing DRM on a Mobile Phone Studienarbeit 2007
Monitoring Usage Control Requirements Master's 2006
A Taxonomy of Usage Control Mechanisms Studienarbeit 2006
Definition struktureller Überdeckungsmaße für den Test von Continuous Function Charts Bachelor's 2004
Onboard-Testsystem für teilautomatisierte Benutzerfunktionstests im Fahrzeug Diplomarbeit 2003
Konzeption und prototypische Implementierung einer Software-Diagnose-Infrastruktur im Fahrzeug Diplomarbeit 2003