Bachelor and Master Theses
This is a list of current proposed topics and research areas for theses. The degree column serves as an indicator for the expected complexity, but usually it is possible to adjust the scope to also fit other degrees. If you are interested in one of these topics, please get in touch with the indicated contact person. If you would like to write a thesis with us, but don't find a suitable topic on this list (or if you have your own idea), please contact us anyway.
Topic | Degree | Contact person |
---|---|---|
Privacy-Preserving Simulation of Smart Cities | Bachelor | Esfandiar Mohammadi |
Runtime Attestation for Open-Source Enclaves | Bachelor | Thomas Eisenbarth |
Fairness and Backdoors in Federated Learning for Health Applications | Bachelor | Thorsten Peinemann |
Self-Healing of Neural Networks Against Backdoors in Federated Learning | Bachelor | Thorsten Peinemann |
Undetectable Backdoors and Neutralisation of Backdoors in Machine Learning | Bachelor | Thorsten Peinemann |
Black-Box Discovery of Differential Privacy Violations for Neural Network Training | Bachelor | Thorsten Peinemann |
Differentially Private Evolutionary / Genetic Algorithms | Bachelor | Marven Kummerfeldt |
Analyzing the security implications of the CXL.mem protocol | Bachelor | Thore Tiemann |
Analyzing the security implications of the CXL.cache protocol | Bachelor | Thore Tiemann |
Stealthy kleptographic crypto systems | Master | Thomas Eisenbarth |
White-box cryptography | Master | Alexander Treff |
Securing cryptographic implementations | Master | Alexander Treff |
Trusted Execution Environments on Open-Source Processors | Master | Thomas Eisenbarth |
Analyze Profoundness / Tightness of Differentially Private Algorithms | Master | Moritz Kirschte |
Instrumentation and Code Analysis on OS-less Devices | Master | Florian Sieck |
Systematic Analysis of Data Privacy in JavaScript Contexts | Master | Florian Sieck |
Optimization of RSA key reconstruction algorithms | Master | Florian Sieck |
Verifying Differentially Private Python Implementations | Master | Johannes Liebenow |
Automated Software Security Testing | Master | Thomas Eisenbarth |
2024
Degree | Author | Title |
---|---|---|
Bachelor | Laura Eickholt | Differentially Private Range Approximation |
Master | Christian Franz | A Deep Learning-based Detector for Java Web Vulnerabilities |
Bachelor | Lars Fockenga | Modern Car User Privacy Attacks and Mitigations |
Bachelor | Tammo Polle | Provenance of YouTube Comments |
Bachelor | Kjell Dankert | Side-Channel Leakage Analysis of Randomized Implementations |
2023
Degree | Author | Title |
---|---|---|
Bachelor | Anja Köhl | Javascript Tracing |
Bachelor | Ruben Meyer | Differentiable Traffic Simulation |
Bachelor | Carolin Briem | Improving neural networks by using attention mechanisms |
Bachelor | Nick Mahling | Reverse-engineering des Pattern History Tables auf Intel CPUs |
Bachelor | Andre Edler | Experimental Evaluation of Differentially Private Clustering Algorithms |
Bachelor | Benedict Strunk | Privacy Attacks on Users of Public EV Charging Stations |
Bachelor | Christoph Hacker | Fast And Secure Outsourced Machine Learning |
Master | Pajam Pauls | Extending maskVerif to Advanced Masking Schemes |
Bachelor | Alexander Heimann | Electricity Grid Modelling in a Smart City Simulation |
Bachelor | Marcel Heisel | Implementing Secure Aggregation for mobile devices |
Master | Volodymyr Bezsmertnyi | Hardware-assisted fault injection emulation |
Bachelor | Till Eifert | Implementing Fault Attacks on BIKE |
Bachelor | Malte Terje Klasen | Automatic Generation of Low-Interaction Web Application Honeypots from CVE and CWE Records |
Bachelor | Valentin von Plata | Attacking Disk Encryption in AMD SEV |
Bachelor | Thilo Beccard | Using ZombieLoad for co-location detection between MicroVMs |
Bachelor | Marcel Pflaeging | Variants of DPSGD |
2022
Degree | Author | Title |
---|---|---|
Master | Felix Mächtle | Automated vulnerability detection in Java |
Bachelor | Finn Burmester | Retrofitting Remote Control-Flow Attestation for ARM TrustZone |
Master | Jonah Heller | Adapting Lattice-based Attacks to break Diffie-Hellman |
Master | Anja Rabich | Obfuscuro-Reloaded: Obfuscation of binaries using static instrumentation in Intel-SGX |
Bachelor | Peter Hodgkinson | Evaluation of a privacy preserving smart city simulation based on Cities: Skylines |
Bachelor | Eric Landthaler | Analyzing the impact of fine-tuning foundation models on the performance of DP-SGD |
Bachelor | Max Schulze | Privacy-Preserving Process Mining |
Bachelor | Jannik Westenfeld | Estimating Input Distributions of Partial Background Knowledge for Differential Privacy Mechanisms |
Master | Nils Loose | VULPEX: Vulnerable path exploration in dynamic symbolic execution using machine learning |
Bachelor | Jonas von der Heydt | Boosting sequential composition for noiseless privacy via subsampling |
Bachelor | Julian Grimm | lmproving the Corona Warn App with human activity recognition |
Bachelor | Nico Winkel | Implementing Clustering Algorithms with Secure Multiparty Computation using SCALE Framework |
Master | Julia Tönnies | On the Leakage Resilience of the Sponge Construction and its Relation to XMSS by the Usage as a Building Block of SHA-3 |
Master | Sophie Ketelsen | Fault Attacks on BIKE |
Bachelor | Adrian Billen | Implementation of Cryptographic Reverse Firewalls |
Bachelor | Jack Mähl | Implementation of covert MPC protocols |
Master | Paula Arnold | Prevention of combined probing and fault attacks using active multiparty computation in the honest-majority setting |
Bachelor | Olaf Bernhardt | Split-Streams - Improving on a scalable mixnet functionality |
Bachelor | Timothy Imort | Automated Activation of the Acoustic Scene Classification in the Corona-Warn-App |
Bachelor | Krasen Heinemeier | Membership Inference Attack on Random Forest Regression Models |
Master | Johannes Liebenow | Differentially Private Aggregation of Mobility Data |
Master | Anna Pätschke | Cipherleaks Countermeasures |
Bachelor | Frederik Lehmann | Analyse der Uniformität von Knapsack-Verteilungen |
Bachelor | Alexander Hermle | Microwalk framework with QEMU |
2021
2020
Degree | Author | Title |
---|---|---|
Master | Lucas Bergmann | Anomaly Detection for Intrusion Detection |
Bachelor | Anja Rabich | Software-based Undervolting Faults in AMD Processors |
Master | Gilian Henke | Attacks on DDR4 Memory Scrambling |
Bachelor | Tim-Henrik Traving | Practical Analysis of Algorithm Substitution Attacks |
Master | Christoph Peglow | Security Analysis of Intel's Input/Output Memory Management Unit (IOMMU) |
Bachelor | Moritz Nicklas | Security Analysis of Contact-less Smart Cards on Campus |
Bachelor | Julia Gawlik | Quantification of information leakages in binaries |
Master | Luca Wilke | Injection Attacks on Secure Encrypted Virtualization |
Bachelor | Tim Gellersen | Side-Channel Attacks on Post-Quantum Signature Scheme Picnic |
Bachelor | Pajam Pauls | An Analysis of Contemporary Attacks on White-Box Implementations |
Master | Thore Tiemann | Exploiting Cache Side-Channels on CPU-FPGA Cloud Platforms |
Master | Malte Stoffers | Analysis of microarchitectural attacks on ARM-platforms |
Bachelor | Nils Gutjahr | Attacks on AVX-512 |
Bachelor | Michael Brückner | Minimizing The Use of Personal Information in a Given Legacy System Via Data Synthesis |
2019
Degree | Author | Title |
---|---|---|
Bachelor | Volodymyr Bezsmertnyi | Fingerprinting and Secret Extraction in Docker Multi-Container Applications via Memory Deduplication |
Bachelor | Anna Pätschke | Security Analysis of a JSON RPC API with JavaScript Frontends |
Bachelor | Gordon Dahlke | Low-Resource Eclipse Attacks on Alternative Ethereum Clients |
Bachelor | Oguzhan Tekin | Side-Channel Analysis of a Compact AES FPGA Implementation |
Bachelor | Johannes Liebenow | Anomaly Detection in Login Data |
Bachelor | Fabian Westphal | Secure Data Transfer and Processing in an Enclave using Intel SGX |
2018
Degree | Author | Title |
---|---|---|
Master | Nils Klawitter | Confidential Data Storage on an IoT-oriented Distributed Ledger |
Bachelor | Florian Dahlmann | PKI for Automotive Applications |
Bachelor | Jonas Sander | MemJam+Abort: Combining Two Microarchitectural Side-Channel Attacks |
Master | Jacqueline Thaeter | Garbled Circuits: From White-Box Cryptography to Zero-Knowledge Proofs |
Master | Moritz Krebbel | Browser-basierte Cache-Angriffe auf die RSA-Schlüsselgenerierung |