Abschlussarbeiten und Projekte
Sie sind auf der Suche nach einer interessanten Bachelor- oder Masterarbeit, oder haben eine eigene Idee?
Sie möchten uns aktiv als Hiwi oder Tutor bei unseren Forschungsprojekten bzw. in der Lehre unterstützen?
Dann bewerben Sie sich, wir sind immer auf der Suche nach enthusiastischen Student*innen!
Angebotene Themen
Es ist kein Thema für Sie dabei? Nutzen Sie die Webseiten unserer Mitarbeitenden, um sich über deren Forschung zu informieren, nicht immer sind alle Forschungsthemen ausgeschrieben.
Oder schlagen Sie Ihr eigenes Thema vor! Bewerbung!
Bachelor's / Master's Thesis | Lang. | Type | Contact |
---|---|---|---|
Intrusion Detection on the CAN Bus—A Systematic Literature Mapping Study | EN/DE | Both | T. Hutzelmann |
Automatic Detection and Identification of Breaking Security-Configuration Rules | EN/DE | Master’s | P. Stöckle |
Discovering Causal Models for PX4 Unmanned Aerial Vehicles | EN | Master’s | E. Zibaei |
Research Assistent (HiWi)
Project | Contact |
---|---|
Scapolite Framework | P. Stöckle |
Implementing Inverse Transparency – A new approach to data privacy | V. Zieglmeier |
Regression Test Optimization in CI Environments | D. Elsner |
In Bearbeitung
Title | Type | Advisor |
---|---|---|
A Framework for Engineering Self-Adaptive Cyber-Physical Systems | Master’s | A. Petrovska |
A Taxonomy for Sequential Diagnosis Algorithms | Bachelor’s | C. Jordan |
Automatisiertes Test Management für Hardware-in-the-loop Prüfstände im Automobilumfeld | Bachelor’s | C. Jordan |
Evaluation Framework for a Self-Adaptive Cyber-Physical System on an Example of a Multi-Robot System | Master’s | A. Petrovska |
Assessing the Reliability of Optimization Algorithms for Detecting Worst-Case Situations for UAVs | Bachelor's | |
Generation of OVAL Checks for Security-Configuration Assessments | Bachelor’s | P. Stöckle |
Incident Response Automation: Challenges and Opportunities for Automated Course of Action Deployment | Master’s | |
Automatic Selection of Security-relevant Configurations | Bachelor’s | P. Stöckle |
Algorithmic Accountability for Inverse Transparency | Master's | V. Zieglmeier |
Enabling Sensible People Analytics with Inverse Transparency | Master's | V. Zieglmeier |
IT security awareness: comparing inovulation methods | Master's | S.Kacianka |
Digitizing EDAP - a tool for ethical deliberation in agile processes | Bachelor's | S.Kacianka |
Using Text- and Image-based Machine Learning to Predict SW Quality | Master's | M.Schnappinger |
Assessing the Quality of Data Models | Master's | M.Schnappinger |
Investigating the Relationship between intra- and interclass Software Quality Attributes | Master's | M.Schnappinger |
A Super-Metric for Measuring Adequacy in the Context of Software Architecture and Software Programming | Master's | M.Schnappinger |
Using machine learning to predict softwarevulnerabilities in low-level code | Master's | S. Lipp |
A Systematic Assessment of Machine Learning-Based Intrusion Detection Systems for the Automotive Domain | Bachelor's |
Abgeschlossen
2020 - 2021
Title | Type | Year |
---|---|---|
Run-time Reasoning and Solving Conflicting Observations with Subjective Logic in Multi-Agent Self-Adaptive Cyber-Physical Systems | Master’s | 2020 |
Semantically-Enhanced Failure Diagnosis : Application of Ontology-based Reasoning to an Autonomous Crane System | Master’s | 2020 |
Tracking Jira Data Accesses through the Database Layer | Bachelor’s | 2020 |
An Analysis Plugin Toolbox for Jira Software | Bachelor’s | 2020 |
Methodologically Achieving User Trust | Bachelor’s | 2020 |
Fighting bushfires with Preparation: Prevention of Malware spread using Security-Configuration Guidelines | Bachelor’s | 2020 |
Change-based Test Execution Optimization in the Development Environment | Bachelor’s | 2020 |
Realization of Adaptive System Transitions for Smart Self-Adaptive Cyber-Physical Systems using a Modular Approach with Learned Parameters on an Example of Multi-Robot Collaboration | Master’s | 2020 |
Experimental Derivation of Fitness Functions for Testing Automated and Autonomous Driving Systems in Road Intersection Scenarios | Master’s | 2020 |
Multi-Agent Partially Observable Markov Decision Processes for Planning in Multi-Robot Self-Adaptive Cyber-Physical Systems | Guided research | 2020 |
Logical Architecture for Engineering Smart Self-Adaptive Cyber- Physical Systems | Guided research | 2020 |
Anomaly Detection in Multi-Agent Cyber-Physical Systems | Bachelor’s | 2020 |
Automatic and Reproducible Attacks on insecurely configured Systems based on Security-Configuration Rules | Master’s | 2020 |
Automating User Acceptance Tests | Bachelor’s | 2020 |
Assessing the Quality of Data Models | Master’s | 2020 |
Mining Repositories for Automatic Quality Estimations | Bachelor’s | 2020 |
Preventing Repackaging of Android Apps Using Integrity Checking | Master’s | 2020 |
Similarity-based System Trajectory Classification | Bachelor’s | 2020 |
Cornering Cohesion: Investigating new ways to measure cohesion | Master’s | 2020 |
Failure Pattern Recognition based on Test Results in Hardware-in-the-Loop Setups | Master’s | 2020 |
Measuring cohesion and coupling: a comparison of different metrics and their usefulness for software quality analyses | Bachelor’s | 2020 |
2010 - 2019
Title | Type | Year |
---|---|---|
Model-driven Monitoring Orchestration For Microservices | Master’s | 2019 |
A Canvas for Causal Modeling | Bachelor’s | 2019 |
A labeling Platform for Source COde | Bachelor’s | 2019 |
Multi-Source Knowledge Aggregation in Subjective Logic | Master’s | 2019 |
Security-Configuration Automation for UNIX | Master’s | 2019 |
Design of an Improved Scapolite Check Mechanism | Bachelor’s | 2019 |
Automatic Security Configuration for Mobile Devices | Bachelor’s | 2019 |
Conflict Scenarios for an Accountability-Enabled Multi-Robot Simulation | Bachelor’s | 2019 |
Path Planning and Consensus Algorithms for an Accountability-Enabled Multi-Robot Simulation | Bachelor’s | 2019 |
Modelling of Attack Trees for Security Assessment of Hardening Mechanisms | Bachelor’s | 2019 |
Building a Framework for Objective Evaluation of Malware Detection Methods | Bachelor’s | 2019 |
Detection of Android Repackaged Malware with Active Learning | Bachelor’s | 2019 |
Resilience of SIP against ML-based attacks | Master’s | 2019 |
Knowledge Discovery from Drone Logs | Master’s | 2019 |
Vectorizing Software for Machine Learning | Master’s | 2019 |
Identification of generated code parts | Bachelor’s | 2019 |
Simplifying Configuration Management in the Automotive Industry | Master’s | 2019 |
Securing Microservice Cluster Management Cockpit using Blockchain | Master’s | 2019 |
Public key Tracing Framework using Blockchain | Master’s | 2019 |
Software protection composition framework | Master’s | 2019 |
Design and Implementation of ROS-Based Simulated Multi-Robot Systems for Data Collection | Master’s | 2019 |
Runtime Verification of Dynamic Architectures | Master’s | 2018 |
Constraint size thresholding in symbolic execution for broader path coverage | Bachelor’s | 2018 |
Fast and parallel compositional fuzzing aided by symbolic execution | Bachelor’s | 2018 |
Design and Evaluation of an Agile Software Development Process for Space Applications | Master’s | 2018 |
Comparing Stimulation Techniques for Detecting Android Piggybacked Malware | Master’s | 2018 |
Software Protection Ontology Visualization | Bachelor’s | 2018 |
Automatic Repackaging of Android Applications | Bachelor’s | 2018 |
Self-adaptive cyber-physical systems utilizing different machine learning techniques | Guided Research | 2018 |
Analysis and Detection of Repackaged Malware Behavior | Master’s | 2018 |
Testing Advanced Driver Assistance Systems: Procedural Environment Generation for Simulated Test Scenarios | Master’s | 2017 |
Impact factors for severity assessment of bugs discovered via compositional symbolic execution | Master’s | 2017 |
Anomaly detection and prediction in distributed software systems using machine learning | Bachelor’s | 2017 |
Repackaged Malware Detection in Android | Bachelor’s | 2017 |
Dynamic Taint Analysis for Java-based applications | Bachelor’s | 2017 |
Benchmarking Symbolic Execution Tools on Custom Block Ciphers | Bachelor’s | 2017 |
Search-Based Procedural Environment Generation for Simulated Test Scenarios | Guided Research | 2017 |
Visualization of Causality Algorithms | Master’s | 2017 |
Qualifizierung von Template-basierendem C++-Code | Bachelor’s | 2017 |
Evaluierung suchebasierter Verfahren zur automatischen Generierung von Testfällen für kontinuierliche Systeme | Master’s | 2017 |
Runtime Service Adaption in the Context of Composed Usage Control Driven Services | Bacherlor’s | 2017 |
Prediction of automated deobfuscation & tampering time using machine learning | Master’s | 2017 |
iOS Application Hardening via Obfuscation | Master’s | 2017 |
Detecting Process Memory Tampering | Bachelor’s | 2016 |
Compositional analysis for exposing vulnerabilities - A symbolic execution approach | Master’s | 2016 |
Building Accountability Mechanisms into the Roomba iRobot | Bachelor’s | 2016 |
Automated Attack Planning using a Partially Observable Model for Penetration Testing of Industrial Control Systems | Master’s | 2016 |
Automatic Generation of Secure and Usable Mnemonic Passphrases | Master’s | 2016 |
State of the Art Survey of Security Incident Management compliant to ISO 27001 | Guided Research | 2016 |
A Reliable Automated Vulnerability Check in Continuous Integration | Bachelor’s | 2016 |
Botnet Battlefield | Master’s | 2016 |
Tool Support for Social Engineering Threat Analysis | Master’s | 2016 |
Software Protection by Self-Checking | Master’s | 2016 |
A Study of Checking Equivalence of Software Programs | Bachelor’s | 2015 |
Malware Detection with Temporal Quantitative Data Flow Graphs | Master’s | 2015 |
Fault detection with symbolic execution for Java | Master’s | 2015 |
A Comparative Study of Secret Sharing Schemes | Master’s | 2015 |
Combining fault-based and model-based testing for web applications | Bachelor’s | 2015 |
Software Protection by Virtualization Obfuscation | Master’s | 2015 |
A Taxonomy of Browser Hijacking Malware | Guided Research | 2015 |
Metadata Recovery of Transformations from Obfuscated Software via Machine Learning Techniques | Master’s | 2015 |
Enhancing Accuracy for Usage Control Enforcement | Bachelor’s | 2015 |
Composing data-usage-driven Services | Bachelor’s | 2015 |
Securing Data Usage Control Infrastructures | Master’s | 2015 |
Raising the Bar for Automated Attacks against Web Applications using Software Diversity | Master’s | 2015 |
Model Based Development of a Safety AUTOSAR Basic Software Component - NVRAM Manager | Bachelor’s | 2015 |
A Comparative Study of Secret Sharing Schemes | Master’s | 2015 |
Checking Non-Equivalence of Software Programs using Symbolic Execution | Bachelor’s | 2015 |
Regressionstests mit Fehlermodellen | Bachelor’s | 2015 |
Zum Verhältnis von Agilität und Architektur | Master’s | 2015 |
Design and Implementation of “Sealed Search” on Encrypted Data while Maintaining Privacy | Master’s | 2015 |
A Generic Description Language for Fault Models | Bachelor’s | 2015 |
Towards Testing Malware Detection Systems using Behavior Obfuscation | Bachelor’s | 2015 |
Usage Control for Apple iOS | Master’s | 2015 |
Code Transformations and Software Diversity for Improving Software Attack and Analysis Resilience | Master’s | 2014 |
Monitoring Compliance of Third-Party Applications in Online Social Networks | Bachelor’s | 2014 |
Graph-based system profiling and anomaly detection | Master’s | 2014 |
Erstellen einer Fehlerdatenbank mit zugehörigem Pflegeprozess | Master’s | 2014 |
Towards improving data driven usage control precision with intra-process data-flow tracking | Master’s | 2014 |
A Qualitative Study of Indistinguishability Obfuscation | Bachelor’s | 2014 |
Fault-model driven test derivation for controller-based systems | Master’s | 2014 |
Quantitative Data Flow Pattern Mining for Malware Detection | Master’s | 2014 |
Data Usage Control for Office Applications | Master’s | 2014 |
Asset Protection via White Box Cryptography | Master’s | 2014 |
Towards data flow graph based misuse detection at the Windows kernel level | Bachelor’s | 2014 |
A Test Automation Framework for AJAX-based Web Applications | Bachelor’s | 2013 |
A dynamically configurable Policy Information Point | Bachelor’s | 2013 |
Testing Concurrency in Android Apps | Master’s | 2013 |
Dynamic Information Flow Tracking for V8 | Master’s | 2013 |
Distributed Usage Control for the mySQL Server | Master’s | 2012 |
Data Usage Control for Google Chrome | Diplomarbeit | 2012 |
Assessment of HTML5 security properties and emerging web security threats | Master’s | 2012 |
Data Usage Control for the Thunderbird Mail Client | Master’s | 2012 |
A Policy Management Infrastructure for Distributed Usage Control | Master’s | 2011 |
Implementation of Usage Control for the Windows API | Master’s | 2011 |
Extending Android with Usage Control Policies | Master’s | 2011 |
A hypervisor-based bus system for inter-level data flow tracking | Master’s | 2011 |
Data Usage Control for a Web Application: The Server | Bachelor’s | 2010 |
Data Usage Control for a Web Application: The Client | Bachelor’s | 2010 |
Bringing Trust to the Cloud | Bachelor’s | 2010 |
Usage Control for Dynamically Loaded Windows Binaries | Bachelor’s | 2010 |
2003 - 2009
Title | Type | Year |
---|---|---|
Engineering Bytecode to Detect Implicit Information Flow | Bachelor’s | 2009 |
Usage Control Enforcement with an Application to the X11 Protocol | Master’s | 2009 |
Usage Control Enforcement at the CPU level | Master’s | 2009 |
Usage Control Enforcement at the Java bytecode level | Master’s | 2009 |
Analysis of Usage Control Policies | Master’s | 2008 |
Delegation in Usage Control | Master’s | 2008 |
AXIS-Based Configuration of Services for Usage Control | Studienarbeit | 2008 |
Sicherheitsanalyse einer Webapplikation | Studienarbeit | 2007 |
Policy Evaluation and Negotiation in Distributed Usage Control | Master’s | 2007 |
Translating Usage Control Policies | Studienarbeit | 2007 |
Implementing DRM on a Mobile Phone | Studienarbeit | 2007 |
Monitoring Usage Control Requirements | Master’s | 2006 |
A Taxonomy of Usage Control Mechanisms | Studienarbeit | 2006 |
Definition struktureller Überdeckungsmaße für den Test von Continuous Function Charts | Bachelor’s | 2004 |
Onboard-Testsystem für teilautomatisierte Benutzerfunktionstests im Fahrzeug | Diplomarbeit | 2003 |
Konzeption und prototypische Implementierung einer Software-Diagnose-Infrastruktur im Fahrzeug | Diplomarbeit | 2003 |