Abschlussarbeiten und Projekte

Du bist auf der Suche nach einer interessanten Bachelor- oder Masterarbeit, oder hast eine eigene Idee?
Du möchtest uns aktiv als Hiwi oder Tutor bei unseren Forschungsprojekten oder in der Lehre unterstützen?
Dann bewirb dich! Wir sind immer auf der Suche nach enthusiastischen Studierenden! 

Angebotene Themen

Es ist kein Thema für Dich dabei? Nutze die Webseiten unserer Mitarbeitenden, um Dich über deren Forschung zu informieren, nicht immer sind alle Forschungsthemen ausgeschrieben.
Oder schlage Dein eigenes Thema vor! Bewerbung!

Research Assistent (HiWi)

Project Contact
Scapolite Framework P. Stöckle
Implementing Inverse Transparency – A new approach to data privacy V. Zieglmeier
Regression Test Optimization in CI Environments D. Elsner

 


In Bearbeitung

Title Type Advisor

Regression Test Optimization in Microservices by Linking Distributed Tracing with Code Instrumentation

Master's D. Elsner
A Framework for Engineering Self-Adaptive Cyber-Physical Systems Master’s A. Petrovska
Interactive Failure Situation Exploration for Cyber-Physical Systems Bachelor’s C. Jordan
IT security awareness: comparing inovulation methods Master's S.Kacianka
Digitizing EDAP - a tool for ethical deliberation in agile processes Bachelor's S.Kacianka
Configuration of Static Analysis Tools for Effective Bug Detection Master's M.Schnappinger, D. Elsner
Assessing the Quality of Data Models Master's M.Schnappinger
Investigating the Relationship between intra- and interclass Software Quality Attributes Master's M.Schnappinger
Identifier Dictionary Bachelor's M.Schnappinger
A Super-Metric for Measuring Adequacy in the Context of Software  Architecture and Software Programming Master's M.Schnappinger
Using machine learning to predict softwarevulnerabilities in low-level code Master's S. Lipp
Qualitative Metrics for the Assessment of Intrusion Detection
on the Controller Area Network
Master's T.Hutzelmann
Designing a Usable Inverse Transparency Dashboard Master's V. Zieglmeier
Tamper-proof Inverse Transparency Logs with Intel SGX Bachelor's V. Zieglmeier, N. Kolb
Inverse Transparency in High Data Security Environments Bachelor's V. Zieglmeier
Applying Inverse Tranparency to Intercompany Contexts Bachelor's V. Zieglmeier
Software Integrity Protection Versus Machine Learning Attacks Master's S. Banescu
Scaling Self-Checksumming Combined with Virtualization Obfuscation to Real-World Software Bachelor's S. Banescu

 

Abgeschlossen

2020 - 2021

Title Type Year
Algorithmic Accountability for Inverse Tranparency Master's 2021
Enabling Sensible People Analytics with Inverse Transparency Master's 2021
Using Text- and Image-Based Machine Learning to Predict Software Quality Master's 2021
Assessing the Reliability of Optimization Algorithms for Detecting Worst-Case Situations for UAVs
Bachelor's
2021
A Systematic Assessment of Machine Learning-Based Intrusion Detection Systems for the Automotive Domain Bachelor's 2021
Automatisiertes Test Management für Hardware-in-the-loop Prüfstände im Automobilumfeld Bachelor's 2021
Systematic Evaluation and Refinement of Automotive Intrusion Detection Systems Master's 2021

Evaluation Framework for a Self-Adaptive Cyber-Physical System on an Example of a Multi-Robot System

Master’s 2021
Incident Response Automation: Challenges and Opportunities for Automated Course of Action Deployment Master’s 2021
Generation of OVAL Checks for Security-Configuration Assessments Bachelor’s 2021
Automatic Selection of Security-relevant Configurations Bachelor’s 2021

A study on failure situation exploration and the benefits for iterative diagnosis

Bachelor's 2021
Run-time Reasoning and Solving Conflicting Observations with Subjective Logic in Multi-Agent Self-Adaptive Cyber-Physical Systems Master’s 2020
Semantically-Enhanced Failure Diagnosis : Application of Ontology-based Reasoning to an Autonomous Crane System Master’s 2020
Tracking Jira Data Accesses through the Database Layer Bachelor’s 2020
An Analysis Plugin Toolbox for Jira Software Bachelor’s 2020
Methodologically Achieving User Trust Bachelor’s 2020
Fighting bushfires with Preparation: Prevention of Malware spread using Security-Configuration Guidelines Bachelor’s 2020
Change-based Test Execution Optimization in the Development Environment Bachelor’s 2020
Realization of Adaptive System Transitions for Smart Self-Adaptive Cyber-Physical Systems using a Modular Approach with Learned Parameters on an Example of Multi-Robot Collaboration Master’s 2020
Experimental Derivation of Fitness Functions for Testing Automated and Autonomous Driving Systems in Road Intersection Scenarios Master’s 2020
Multi-Agent Partially Observable Markov Decision Processes for Planning in Multi-Robot Self-Adaptive Cyber-Physical Systems Guided research 2020
Logical Architecture for Engineering Smart Self-Adaptive Cyber- Physical Systems Guided research 2020
Anomaly Detection in Multi-Agent Cyber-Physical Systems Bachelor’s 2020
Automatic and Reproducible Attacks on insecurely configured Systems based on Security-Configuration Rules Master’s 2020
Automating User Acceptance Tests Bachelor’s 2020
Assessing the Quality of Data Models Master’s 2020
Mining Repositories for Automatic Quality Estimations Bachelor’s 2020
Preventing Repackaging of Android Apps Using Integrity Checking Master’s 2020
Similarity-based System Trajectory Classification Bachelor’s 2020
Cornering Cohesion: Investigating new ways to measure cohesion Master’s 2020
Failure Pattern Recognition based on Test Results in Hardware-in-the-Loop Setups Master’s 2020
Measuring cohesion and coupling: a comparison of different metrics and their usefulness for software quality analyses Bachelor’s 2020

 

2010 - 2019

Title Type Year
Model-driven Monitoring Orchestration For Microservices Master’s 2019
A Canvas for Causal Modeling Bachelor’s 2019
A labeling Platform for Source COde Bachelor’s 2019
Multi-Source Knowledge Aggregation in Subjective Logic Master’s 2019
Security-Configuration Automation for UNIX Master’s 2019
Design of an Improved Scapolite Check Mechanism Bachelor’s 2019
Automatic Security Configuration for Mobile Devices Bachelor’s 2019
Conflict Scenarios for an Accountability-Enabled Multi-Robot Simulation Bachelor’s 2019
Path Planning and Consensus Algorithms for an Accountability-Enabled Multi-Robot Simulation Bachelor’s 2019
Modelling of Attack Trees for Security Assessment of Hardening Mechanisms Bachelor’s 2019
Building a Framework for Objective Evaluation of Malware Detection Methods Bachelor’s 2019
Detection of Android Repackaged Malware with Active Learning Bachelor’s 2019
Resilience of SIP against ML-based attacks Master’s 2019
Knowledge Discovery from Drone Logs Master’s 2019
Vectorizing Software for Machine Learning Master’s 2019
Identification of generated code parts Bachelor’s 2019
Simplifying Configuration Management in the Automotive Industry Master’s 2019
Securing Microservice Cluster Management Cockpit using Blockchain Master’s 2019
Public key Tracing Framework using Blockchain Master’s 2019
Software protection composition framework Master’s 2019
Design and Implementation of ROS-Based Simulated Multi-Robot Systems for Data Collection Master’s 2019
Runtime Verification of Dynamic Architectures Master’s 2018
Constraint size thresholding in symbolic execution for broader path coverage Bachelor’s 2018
Fast and parallel compositional fuzzing aided by symbolic execution Bachelor’s 2018
Design and Evaluation of an Agile Software Development Process for Space Applications Master’s 2018
Real-Time Remote Intrusion Detection Master's 2018
Comparing Stimulation Techniques for Detecting Android Piggybacked Malware Master’s 2018
Software Protection Ontology Visualization Bachelor’s 2018
Automatic Repackaging of Android Applications Bachelor’s 2018
Self-adaptive cyber-physical systems utilizing different machine learning techniques Guided Research 2018
Analysis and Detection of Repackaged Malware Behavior Master’s 2018
Testing Advanced Driver Assistance Systems: Procedural Environment Generation for Simulated Test Scenarios Master’s 2017
Impact factors for severity assessment of bugs discovered via compositional symbolic execution Master’s 2017
Anomaly detection and prediction in distributed software systems using machine learning Bachelor’s 2017
Repackaged Malware Detection in Android Bachelor’s 2017
Dynamic Taint Analysis for Java-based applications Bachelor’s 2017
Benchmarking Symbolic Execution Tools on Custom Block Ciphers Bachelor’s 2017
Search-Based Procedural Environment Generation for Simulated Test Scenarios Guided Research 2017
Visualization of Causality Algorithms Master’s 2017
Qualifizierung von Template-basierendem C++-Code Bachelor’s 2017
Evaluierung suchebasierter Verfahren zur automatischen Generierung von Testfällen für kontinuierliche Systeme Master’s 2017
Runtime Service Adaption in the Context of Composed Usage Control Driven Services Bacherlor’s 2017
Prediction of automated deobfuscation & tampering time using machine learning Master’s 2017
iOS Application Hardening via Obfuscation Master’s 2017
Detecting Process Memory Tampering Bachelor’s 2016
Compositional analysis for exposing vulnerabilities - A symbolic execution approach Master’s 2016
Building Accountability Mechanisms into the Roomba iRobot Bachelor’s 2016
Automated Attack Planning using a Partially Observable Model for Penetration Testing of Industrial Control Systems Master’s 2016
Automatic Generation of Secure and Usable Mnemonic Passphrases Master’s 2016
State of the Art Survey of Security Incident Management compliant to ISO 27001 Guided Research 2016
A Reliable Automated Vulnerability Check in Continuous Integration Bachelor’s 2016
Botnet Battlefield Master’s 2016
Tool Support for Social Engineering Threat Analysis Master’s 2016
Software Protection by Self-Checking Master’s 2016
A Study of Checking Equivalence of Software Programs Bachelor’s 2015
Malware Detection with Temporal Quantitative Data Flow Graphs Master’s 2015
Fault detection with symbolic execution for Java Master’s 2015
A Comparative Study of Secret Sharing Schemes Master’s 2015
Combining fault-based and model-based testing for web applications Bachelor’s 2015
Software Protection by Virtualization Obfuscation Master’s 2015
A Taxonomy of Browser Hijacking Malware Guided Research 2015
Metadata Recovery of Transformations from Obfuscated Software via Machine Learning Techniques Master’s 2015
Enhancing Accuracy for Usage Control Enforcement Bachelor’s 2015
Composing data-usage-driven Services Bachelor’s 2015
Securing Data Usage Control Infrastructures Master’s 2015
Raising the Bar for Automated Attacks against Web Applications using Software Diversity Master’s 2015
Model Based Development of a Safety AUTOSAR Basic Software Component - NVRAM Manager Bachelor’s 2015
A Comparative Study of Secret Sharing Schemes Master’s 2015
Checking Non-Equivalence of Software Programs using Symbolic Execution Bachelor’s 2015
Regressionstests mit Fehlermodellen Bachelor’s 2015
Zum Verhältnis von Agilität und Architektur Master’s 2015
Design and Implementation of “Sealed Search” on Encrypted Data while Maintaining Privacy Master’s 2015
A Generic Description Language for Fault Models Bachelor’s 2015
Towards Testing Malware Detection Systems using Behavior Obfuscation Bachelor’s 2015
Usage Control for Apple iOS Master’s 2015
Code Transformations and Software Diversity for Improving Software Attack and Analysis Resilience Master’s 2014
Monitoring Compliance of Third-Party Applications in Online Social Networks Bachelor’s 2014
Graph-based system profiling and anomaly detection Master’s 2014
Erstellen einer Fehlerdatenbank mit zugehörigem Pflegeprozess Master’s 2014
Towards improving data driven usage control precision with intra-process data-flow tracking Master’s 2014
A Qualitative Study of Indistinguishability Obfuscation Bachelor’s 2014
Fault-model driven test derivation for controller-based systems Master’s 2014
Quantitative Data Flow Pattern Mining for Malware Detection Master’s 2014
Data Usage Control for Office Applications Master’s 2014
Asset Protection via White Box Cryptography Master’s 2014
Towards data flow graph based misuse detection at the Windows kernel level Bachelor’s 2014
A Test Automation Framework for AJAX-based Web Applications Bachelor’s 2013
A dynamically configurable Policy Information Point Bachelor’s 2013
Testing Concurrency in Android Apps Master’s 2013
Dynamic Information Flow Tracking for V8 Master’s 2013
Distributed Usage Control for the mySQL Server Master’s 2012
Data Usage Control for Google Chrome Diplomarbeit 2012
Assessment of HTML5 security properties and emerging web security threats Master’s 2012
Data Usage Control for the Thunderbird Mail Client Master’s 2012
A Policy Management Infrastructure for Distributed Usage Control Master’s 2011
Implementation of Usage Control for the Windows API Master’s 2011
Extending Android with Usage Control Policies Master’s 2011
A hypervisor-based bus system for inter-level data flow tracking Master’s 2011
Data Usage Control for a Web Application: The Server Bachelor’s 2010
Data Usage Control for a Web Application: The Client Bachelor’s 2010
Bringing Trust to the Cloud Bachelor’s 2010
Usage Control for Dynamically Loaded Windows Binaries Bachelor’s 2010

2003 - 2009

Title Type Year
Engineering Bytecode to Detect Implicit Information Flow Bachelor’s 2009
Usage Control Enforcement with an Application to the X11 Protocol Master’s 2009
Usage Control Enforcement at the CPU level Master’s 2009
Usage Control Enforcement at the Java bytecode level Master’s 2009
Analysis of Usage Control Policies Master’s 2008
Delegation in Usage Control Master’s 2008
AXIS-Based Configuration of Services for Usage Control Studienarbeit 2008
Sicherheitsanalyse einer Webapplikation Studienarbeit 2007
Policy Evaluation and Negotiation in Distributed Usage Control Master’s 2007
Translating Usage Control Policies Studienarbeit 2007
Implementing DRM on a Mobile Phone Studienarbeit 2007
Monitoring Usage Control Requirements Master’s 2006
A Taxonomy of Usage Control Mechanisms Studienarbeit 2006
Definition struktureller Überdeckungsmaße für den Test von Continuous Function Charts Bachelor’s 2004
Onboard-Testsystem für teilautomatisierte Benutzerfunktionstests im Fahrzeug Diplomarbeit 2003
Konzeption und prototypische Implementierung einer Software-Diagnose-Infrastruktur im Fahrzeug Diplomarbeit 2003