Bachelor and Master Theses

This is a list of current proposed topics and research areas for theses. The degree column serves as an indicator for the expected complexity, but usually it is possible to adjust the scope to also fit other degrees. If you are interested in one of these topics, please get in touch with the indicated contact person. If you would like to write a thesis with us, but don't find a suitable topic on this list (or if you have your own idea), please contact us anyway.

TopicDegreeContact person
Privacy-Preserving Simulation of Smart CitiesBachelorEsfandiar Mohammadi
Runtime Attestation for Open-Source EnclavesBachelorThomas Eisenbarth
Fairness and Backdoors in Federated Learning for Health ApplicationsBachelorThorsten Peinemann
Self-Healing of Neural Networks Against Backdoors in Federated LearningBachelorThorsten Peinemann
Undetectable Backdoors and Neutralisation of Backdoors in Machine LearningBachelorThorsten Peinemann
Black-Box Discovery of Differential Privacy Violations for Neural Network TrainingBachelorThorsten Peinemann
Differentially Private Evolutionary / Genetic AlgorithmsBachelorMarven Kummerfeldt
Analyzing the security implications of the CXL.mem protocolBachelorThore Tiemann
Analyzing the security implications of the CXL.cache protocolBachelorThore Tiemann
Stealthy kleptographic crypto systemsMasterThomas Eisenbarth
White-box cryptographyMasterAlexander Treff
Securing cryptographic implementationsMasterAlexander Treff
Trusted Execution Environments on Open-Source ProcessorsMasterThomas Eisenbarth
Analyze Profoundness / Tightness of Differentially Private AlgorithmsMasterMoritz Kirschte
Instrumentation and Code Analysis on OS-less DevicesMasterFlorian Sieck
Systematic Analysis of Data Privacy in JavaScript ContextsMasterFlorian Sieck
Optimization of RSA key reconstruction algorithmsMasterFlorian Sieck
Verifying Differentially Private Python ImplementationsMasterJohannes Liebenow
Automated Software Security TestingMasterThomas Eisenbarth

Completed Theses

2024

Degree Author Title
Master Eric Landthaler A Comparison of MPCitH and VOLEitH - Optimisations for Post-Quantum Signatures
Master Julian M. Behrensen The Phantom Protocol - Harnessing Hypercubes and SIS in Post-Quantum Cryptography
Bachelor Laura Eickholt Differentially Private Range Approximation
Master Christian Franz A Deep Learning-based Detector for Java Web Vulnerabilities
Bachelor Lars Fockenga Modern Car User Privacy Attacks and Mitigations
Bachelor Tammo Polle Provenance of YouTube Comments
Bachelor Kjell Dankert Side-Channel Leakage Analysis of Randomized Implementations

2023

DegreeAuthorTitle
BachelorAnja Köhl Javascript Tracing
BachelorRuben MeyerDifferentiable Traffic Simulation
BachelorCarolin BriemImproving neural networks by using attention mechanisms
BachelorNick MahlingReverse-engineering des Pattern History Tables auf Intel CPUs
BachelorAndre EdlerExperimental Evaluation of Differentially Private Clustering Algorithms
BachelorBenedict StrunkPrivacy Attacks on Users of Public EV Charging Stations
BachelorChristoph HackerFast And Secure Outsourced Machine Learning
MasterPajam PaulsExtending maskVerif to Advanced Masking Schemes
BachelorAlexander HeimannElectricity Grid Modelling in a Smart City Simulation
BachelorMarcel HeiselImplementing Secure Aggregation for mobile devices
MasterVolodymyr BezsmertnyiHardware-assisted fault injection emulation
BachelorTill EifertImplementing Fault Attacks on BIKE
BachelorMalte Terje KlasenAutomatic Generation of Low-Interaction Web Application Honeypots from CVE and CWE Records
BachelorValentin von PlataAttacking Disk Encryption in AMD SEV
BachelorThilo BeccardUsing ZombieLoad for co-location detection between MicroVMs
BachelorMarcel PflaegingVariants of DPSGD

2022

DegreeAuthorTitle
MasterFelix MächtleAutomated vulnerability detection in Java
BachelorFinn BurmesterRetrofitting Remote Control-Flow Attestation for ARM TrustZone
MasterJonah HellerAdapting Lattice-based Attacks to break Diffie-Hellman
MasterAnja RabichObfuscuro-Reloaded: Obfuscation of binaries using static instrumentation in Intel-SGX
BachelorPeter HodgkinsonEvaluation of a privacy preserving smart city simulation based on Cities: Skylines
BachelorEric LandthalerAnalyzing the impact of fine-tuning foundation models on the performance of DP-SGD
BachelorMax SchulzePrivacy-Preserving Process Mining
BachelorJannik WestenfeldEstimating Input Distributions of Partial Background Knowledge for Differential Privacy Mechanisms
MasterNils LooseVULPEX: Vulnerable path exploration in dynamic symbolic execution using machine learning
BachelorJonas von der HeydtBoosting sequential composition for noiseless privacy via subsampling
BachelorJulian Grimmlmproving the Corona Warn App with human activity recognition
BachelorNico WinkelImplementing Clustering Algorithms with Secure Multiparty Computation using SCALE Framework
MasterJulia TönniesOn the Leakage Resilience of the Sponge Construction and its Relation to XMSS by the Usage as a Building Block of SHA-3
MasterSophie KetelsenFault Attacks on BIKE
BachelorAdrian BillenImplementation of Cryptographic Reverse Firewalls
BachelorJack MählImplementation of covert MPC protocols
MasterPaula ArnoldPrevention of combined probing and fault attacks using active multiparty computation in the honest-majority setting
BachelorOlaf BernhardtSplit-Streams - Improving on a scalable mixnet functionality
BachelorTimothy ImortAutomated Activation of the Acoustic Scene Classification in the Corona-Warn-App
BachelorKrasen HeinemeierMembership Inference Attack on Random Forest Regression Models
MasterJohannes LiebenowDifferentially Private Aggregation of Mobility Data
MasterAnna PätschkeCipherleaks Countermeasures
BachelorFrederik LehmannAnalyse der Uniformität von Knapsack-Verteilungen
BachelorAlexander HermleMicrowalk framework with QEMU

2021

DegreeAuthorTitle
MasterMoritz KirschteMassively Distributed Privacy-preserving Machine Learning on Large-scale Medical Applications
BachelorLeon DietrichHow to build an FPGA based PCIe fuzzer
BachelorChristopher PeredyMAMBO-V: A RISC-V Port of the Microwalk Framework
BachelorBuesra AytenOptimized Signature Schemes via Compression
BachelorChris VennAlgorithm Substitution Attacks on Matrix
MasterThorsten PeinemannThe Inside Story: Towards Understanding Privacy Leakage of Neural Networks
MasterMoritz WelbergContext Aware Anomaly Detection in Industrial Control Systems via Machine Learning
MasterJonas SanderSecure and Fast Outsourced Machine Learning
MasterAlexander TreffSide-Channel Attacks against Neural Network Hardware Accelerators
MasterMarven KummerfeldtThe Curse of Dimensionality for Additive Noise
BachelorDaniel WidmerTrading Computation Time for Energy
BachelorChristopher KrebsAlgorithms for RSA key recovery
BachelorMoritz DornOptimizing the Picnic Signature Scheme for Small Devices
MasterThéo GiovannaPrivacy-​Preserving Machine Learning for Cyber Insurance
BachelorKevin RichterPrecision of city simulations using publicly available city data
BachelorKilian ZeiseweisEvaluation of Injected Data from an Adapted Smart City Simulation
MasterNiclas KathPrivacy Concerns in Models about Physical Activity
MasterNadja AoutoufLearning advanced differential privacy mechanisms with fixed data order

2020

DegreeAuthorTitle
MasterLucas BergmannAnomaly Detection for Intrusion Detection
BachelorAnja RabichSoftware-based Undervolting Faults in AMD Processors
MasterGilian HenkeAttacks on DDR4 Memory Scrambling
BachelorTim-Henrik TravingPractical Analysis of Algorithm Substitution Attacks
MasterChristoph PeglowSecurity Analysis of Intel's Input/Output Memory Management Unit (IOMMU)
BachelorMoritz NicklasSecurity Analysis of Contact-less Smart Cards on Campus
BachelorJulia GawlikQuantification of information leakages in binaries
MasterLuca WilkeInjection Attacks on Secure Encrypted Virtualization
BachelorTim GellersenSide-Channel Attacks on Post-Quantum Signature Scheme Picnic
BachelorPajam PaulsAn Analysis of Contemporary Attacks on White-Box Implementations
MasterThore TiemannExploiting Cache Side-Channels on CPU-FPGA Cloud Platforms
MasterMalte StoffersAnalysis of microarchitectural attacks on ARM-platforms
BachelorNils GutjahrAttacks on AVX-512
BachelorMichael BrücknerMinimizing The Use of Personal Information in a Given Legacy System Via Data Synthesis

2019

Degree Author Title
Bachelor Volodymyr Bezsmertnyi Fingerprinting and Secret Extraction in Docker Multi-Container Applications via Memory Deduplication
Bachelor Anna Pätschke Security Analysis of a JSON RPC API with JavaScript Frontends
Bachelor Gordon Dahlke Low-Resource Eclipse Attacks on Alternative Ethereum Clients
Bachelor Oguzhan Tekin Side-Channel Analysis of a Compact AES FPGA Implementation
Bachelor Johannes Liebenow Anomaly Detection in Login Data
Bachelor Fabian Westphal Secure Data Transfer and Processing in an Enclave using Intel SGX

2018

DegreeAuthorTitle
MasterNils KlawitterConfidential Data Storage on an IoT-oriented Distributed Ledger
BachelorFlorian DahlmannPKI for Automotive Applications
BachelorJonas SanderMemJam+Abort: Combining Two Microarchitectural Side-Channel Attacks
MasterJacqueline ThaeterGarbled Circuits: From White-Box Cryptography to Zero-Knowledge Proofs
MasterMoritz KrebbelBrowser-basierte Cache-Angriffe auf die RSA-Schlüsselgenerierung