| Topic – In process | Author | ||
|---|---|---|---|
| Der Visor von/für Geordi La Forge (BA) | M. Großmann \& A. Zangerl (PS) | ||
| Novel approaches for remote detection of malicious shared libraries to enhance vulnerability management (MA) | E. Breznik (PS) | ||
| Simulation von Security in kritischen Infrastrukturen (MA) | T. Grafenauer (SR) | ||
| Konzeption und Evaluierung von Key Management Systemen für Verbrauchsmessgeräte in Energieversorgungsunternehmen (MA) | M. Joszt (PS) | ||
| Optimierung von IT Governance im Konzern IT-Risikomanagement der Cloud mit COBIT und ITIL (MA) | P. Sudy (SR) | ||
| Automatisiertes Client Management basierend auf dem IT Service Management Referenzprozess laut ITIL (MA) | R. Gregoritsch (SR) | ||
| Sunset Webinterface Middleware (BA) | M. Ropatsch (SR) | ||
| Topic – Recently completed | Author | ||
| Art Gallery – A 3D Blockchain Museum (BA) | F. Fruhmann (PS) | ||
| Camera Certificate Deployment Tool (CCDT) (BA) | V. Berišaš(PS) | ||
| Rechteabhängiges Schwärzen von digitalen Dokumenten im Dokumentenmanagementsystem (MA) | J. Fischer (PS) | ||
| Verwaltung von personenbezogenen Daten gemäß DSGVO (Löschkonzept) (MA) | P. Pachernig (PS) | ||
| Social Engineering Awareness as a vital Part of comprehensive IT Security (MA) | L. Košir (PS) | ||
| Documents2go (MA) | M. Seywald (PS) | ||
| Social Risk Response (MA) | T. Banzhaf (SR) | ||
| Passwort-Management in Webbrowsers (MA) | A. Preiml (SR) | ||
| Alexa meets MyELGA: Patientenunterstützung durch Erweiterung der elektronischen Gesundheitsakte (MA) | J. Klade (PS) | ||
| MyELGA e-Medication: Erweiterung der ELGA-e-Medikation Anwendung (MA) | E. Zografou (PS) | ||
| Alexa "Home Security" Skill (MA) | C. Wirnsberger (PS) | ||
| Web-Crawler – Angriffe und Gegenmaßnahmen (MA) | S. Tischler (PS) | ||
| Open Topic Calls – Please contact the respective supervisor by email | |||
| Re-Design of an iOS-Security-App and secure integration of ECC (BA/SWP/Praxis/MA – Company cooperation) |
N.N (PS) | ||
| IT Forensics with Focus on IoT (MA) | N.N (PS) | ||
| Raspberry Password Sniffer (BA/MA) | N.N (PS) | ||
| Security & Privacy of AAL & HBMS (MA) | N.N (PS) | ||
| IoT-Security – Applications, Concepts and Raspberry- or. Arduino-Prototype (BA/MA) | N.N (PS) | ||
|
Development of a secure smartwatch application z.B. OTP-Generator, SSO, 2-factor-authentication, ... (BA/MA) |
N.N (PS) | ||
|
Development of secure apps for Raspberry Pi or Arduino (BA/MA) |
N.N (PS) | ||
| Planning tool for "Stundentafel Informatik" (BA/MA) | N.N (PS) | ||
| go2algo NG – Re-Engineering of go2algo (BA) | N.N (PS) | ||
| Extensions to CrypTool2 (BA/MA) | N.N (PS) | ||
| Extensions to go2algo (BA/MA) | N.N (PS) | ||
| Your own proposals are very welcome! See the regulations | |||
| Finished Topics (Selection) | |
|---|---|
| QR-basierter Ansatz für Document Lifecycle Management (MA) | T. Pawluch (PS) |
| Langzeitarchivierung (MA) | J. Wukoutz (PS) |
| Business Continuity Management (MA) | L. Kulmitzer (PS) |
| Graph Compression (MA) gemeinsame Betreuung durch Alberto Policriti (University of Udine) und SR |
F. Craighero |
| Implementation and security analysis of secret sharing protocols (MA) | V. Pachatz (SR) |
| Verfügbarkeitsmanagement und IT-Monitoring (MA) | D. Jost (PS) |
| IoT-Auth & Trust (MA) | F. Stornig (PS) |
| Skitouren-Safety-App (MA) | C. Lagger (PS) |
| Robot-OS Security (MA) | B. Breiling (PS) |
| WiPs – Wireless Presentations and Session Management (MA) | T. Trügler (PS) |
| scan.net – Interaktive Lernplattform für IT-Sicherheit (MA) | A. Schorn (PS) |
| Phishing – Methods and Countermeasures (Anti-Phishing-Plugin for Mozilla) (MA) | M. Madritsch (PS) |
| Verfügbarkeitsmanagement und IT-Monitoring (MA) | D. Jost (PS) |
| Whisper – Secure Messaging (MA) | P. Moll (SR) |
| Blinde Turingmaschinen (MA) | M. Brodbeck (SR) |
| Intrusion Detection Techniken und Grundlagen des Datenschutzes für IT Dienstleister (MA) | F. Beichbuchner (SR) |
| Erweiterung des FFapl-Compilers um Pairings auf elliptischen Kurven (MA) | J. Winkler (SR) |
| Broadcast Encryption – Sicherheitsverfahren für Digital Video Broadcasting (MA) | M. Findenig (PS) |
| Mobile privacy (MA) | A. Kersting (PS) |
| Sicheres mobiles Messaging mit End-to-End Verschlüsselung (MA) | P. Moll (SR) |
| CUDA-based Attacks (MA) | R. Zucchetto (PS) |
| go2algo 5.0 – AVL-Bäume (MA) | B. Breiling (PS) |
| Blinde Turingmaschinen (MA) | M. Brodbeck (SR) |
| Using Business Intelligence to secure IT-Endpoints (MA) | D. Sternig (PS) |
| Angriffe auf das SSL/TLS-Protokoll (MA) | M. Wurzer (PS) |
| Mobile Enterprise SAP Applications (MA) | T. Maier (PS) |
| Eine Umgebung zum Vereinfachten Prototyping von Krypto-Verfahren (MA) | A.O. Ortner (PHO+SR) |
| Macros für PPTX (BA) | M.Walch (PS) |
| Android Intents – Analysis & Protection (BA) |
M. Bischof D. Sternig (PS) |
| Malicious HTTP(S)-Proxy (BA) | J. Gressl (PS) |
| Android Passwort-Generator (BA) |
V. Bugl M. Wiltsche (PS) |
| scan.net – Interaktive Lernplattform für IT Sicherheit (MA) | A. Schorn (PS) |
| syssecApp (BA) |
M. Fiebrich A. Glantschnig (PS) |
| Ausgewählte Aspekte von Public-Key Infrastrukturen (MA) | K. Wiedenbauer (PHO+SR) |
| Bibliothek zur Implementierung kryptographischer Protokolle in endlichen Körpern (MA) | J. Theuermann (PHO+SR) |