Software Practicals, Bachelor- and Master Theses

  1. Software Practicals, Bachelor- and Master Theses

  1. Supervisor and Contact:
    Assoc.Prof. Dipl.-Ing. Dr. Peter Schartner (PS)
    Assoc.Prof. DDipl.-Ing. Dr. Stefan Rass (SR)
    Sen. Lecturer Dipl.-Ing Dr. Raphael Wigoutschnigg (RW)
    Legend:
    BA Bachelor thesis (follow-up to a software practical)
    MA Master thesis / Diploma thesis
  1. Topic Author
    Simulation von Security in kritischen Infrastrukturen (MA) T. Grafenauer (SR)
    Alexa meets MyELGA: Patientenunterstützung durch Erweiterung der elektronischen Gesundheitsakte (MA) J. Klade (PS)
    MyELGA e-Medication: Erweiterung der ELGA-e-Medikation Anwendung (MA) E. Zografou (PS)
    Alexa "Home Security" Skill (MA) C. Wirnsberger (PS)
    Social Risk Response (MA) T. Banzhaf (SR)
    Passwort-Management in Webbrowsers (MA) A. Preiml (SR)
    Optimierung von IT Governance im Konzern IT-Risikomanagement der Cloud mit COBIT und ITIL (MA) P. Sudy (SR)
    Automatisiertes Client Management basierend auf dem IT Service Management Referenzprozess laut ITIL (MA) R. Gregoritsch (SR)
    Documents2go (MA) S. Leitner (PS)
    Web-Crawler – Angriffe und Gegenmaßnahmen (MA) S. Tischler (PS)
    Sunset Webinterface Middleware (SWP) M. Ropatsch (SR)
    Open Topic Calls – Please contact the respective supervisor by email
    Integration of SUNSET/FFAPL in JCrypTool (MA) N.N (SR)
    Verifiable Secret Sharing in JCrypTool (MA) N.N (SR)
    IT Forensics with Focus on IoT (MA) N.N (PS)
    Smart Home Security (MA) N.N (PS)
    Raspberry Password Sniffer (BA/MA) N.N (PS)
    Security & Privacy of AAL & HBMS (MA) N.N (PS)
    IoT-Security – Applications, Concepts and Raspberry- or. Arduino-Prototype (BA/MA) N.N (PS)
    Development of a secure smartwatch application
    z.B. OTP-Generator, SSO, 2-factor-authentication, ... (BA/MA)
    N.N (PS)
    Development of secure apps
    for Raspberry Pi or Arduino (BA/MA)
    N.N (PS)
    Exploring and extending the ChipWhisperer (BA) N.N (PS)
    Planning tool for "Stundentafel Informatik" (BA/MA) N.N (PS)
    go2algo NG – Re-Engineering of go2algo (BA) N.N (PS)
    Extensions to Sunset/FFapl (BA/MA) N.N (SR)
    Extensions to CrypTool2 (BA/MA) N.N (PS)
    Extensions to go2algo (BA/MA) N.N (PS)
    Your own proposals are very welcome! See the regulations

  2. Finished Topics (Selection)
    QR-basierter Ansatz für Document Lifecycle Management (MA) T. Pawluch (PS)
    Langzeitarchivierung (MA) J. Wukoutz (PS)
    Business Continuity Management (MA) L. Kulmitzer (PS)
    Graph Compression (MA)
    gemeinsame Betreuung durch Alberto Policriti (University of Udine) und SR
    F. Craighero
    Implementation and security analysis of secret sharing protocols (MA) V. Pachatz (SR)
    Verfügbarkeitsmanagement und IT-Monitoring (MA) D. Jost (PS)
    IoT-Auth & Trust (MA) F. Stornig (PS)
    Skitouren-Safety-App (MA) C. Lagger (PS)
    Robot-OS Security (MA) B. Breiling (PS)
    WiPs – Wireless Presentations and Session Management (MA) T. Trügler (PS)
    scan.net – Interaktive Lernplattform für IT-Sicherheit (MA) A. Schorn (PS)
    Phishing – Methods and Countermeasures (Anti-Phishing-Plugin for Mozilla) (MA) M. Madritsch (PS)
    Verfügbarkeitsmanagement und IT-Monitoring (MA) D. Jost (PS)
    Whisper – Secure Messaging (MA) P. Moll (SR)
    Blinde Turingmaschinen (MA) M. Brodbeck (SR)
    Intrusion Detection Techniken und Grundlagen des Datenschutzes für IT Dienstleister (MA) F. Beichbuchner (SR)
    Erweiterung des FFapl-Compilers um Pairings auf elliptischen Kurven (MA) J. Winkler (SR)
    Broadcast Encryption – Sicherheitsverfahren für Digital Video Broadcasting (MA) M. Findenig (PS)
    Mobile privacy (MA) A. Kersting (PS)
    Sicheres mobiles Messaging mit End-to-End Verschlüsselung (MA) P. Moll (SR)
    CUDA-based Attacks (MA) R. Zucchetto (PS)
    go2algo 5.0 – AVL-Bäume (MA) B. Breiling (PS)
    Blinde Turingmaschinen (MA) M. Brodbeck (SR)
    Using Business Intelligence to secure IT-Endpoints (MA) D. Sternig (PS)
    Angriffe auf das SSL/TLS-Protokoll (MA) M. Wurzer (PS)
    Mobile Enterprise SAP Applications (MA) T. Maier (PS)
    Eine Umgebung zum Vereinfachten Prototyping von Krypto-Verfahren (MA) A.O. Ortner (PHO+SR)
    Macros für PPTX (BA) M.Walch (PS)
    Android Intents – Analysis & Protection (BA) M. Bischof
    D. Sternig (PS)
    Malicious HTTP(S)-Proxy (BA) J. Gressl (PS)
    Android Passwort-Generator (BA) V. Bugl
    M. Wiltsche (PS)
    scan.net – Interaktive Lernplattform für IT Sicherheit (MA) A. Schorn (PS)
    syssecApp (BA) M. Fiebrich
    A. Glantschnig (PS)
    Ausgewählte Aspekte von Public-Key Infrastrukturen (MA) K. Wiedenbauer (PHO+SR)
    Bibliothek zur Implementierung kryptographischer Protokolle in endlichen Körpern (MA) J. Theuermann (PHO+SR)