Topic – In process | Author | ||
---|---|---|---|
Der Visor von/für Geordi La Forge (BA) | M. Großmann \& A. Zangerl (PS) | ||
Novel approaches for remote detection of malicious shared libraries to enhance vulnerability management (MA) | E. Breznik (PS) | ||
Simulation von Security in kritischen Infrastrukturen (MA) | T. Grafenauer (SR) | ||
Konzeption und Evaluierung von Key Management Systemen für Verbrauchsmessgeräte in Energieversorgungsunternehmen (MA) | M. Joszt (PS) | ||
Optimierung von IT Governance im Konzern IT-Risikomanagement der Cloud mit COBIT und ITIL (MA) | P. Sudy (SR) | ||
Automatisiertes Client Management basierend auf dem IT Service Management Referenzprozess laut ITIL (MA) | R. Gregoritsch (SR) | ||
Sunset Webinterface Middleware (BA) | M. Ropatsch (SR) | ||
Topic – Recently completed | Author | ||
Art Gallery – A 3D Blockchain Museum (BA) | F. Fruhmann (PS) | ||
Camera Certificate Deployment Tool (CCDT) (BA) | V. Berišaš(PS) | ||
Rechteabhängiges Schwärzen von digitalen Dokumenten im Dokumentenmanagementsystem (MA) | J. Fischer (PS) | ||
Verwaltung von personenbezogenen Daten gemäß DSGVO (Löschkonzept) (MA) | P. Pachernig (PS) | ||
Social Engineering Awareness as a vital Part of comprehensive IT Security (MA) | L. Košir (PS) | ||
Documents2go (MA) | M. Seywald (PS) | ||
Social Risk Response (MA) | T. Banzhaf (SR) | ||
Passwort-Management in Webbrowsers (MA) | A. Preiml (SR) | ||
Alexa meets MyELGA: Patientenunterstützung durch Erweiterung der elektronischen Gesundheitsakte (MA) | J. Klade (PS) | ||
MyELGA e-Medication: Erweiterung der ELGA-e-Medikation Anwendung (MA) | E. Zografou (PS) | ||
Alexa "Home Security" Skill (MA) | C. Wirnsberger (PS) | ||
Web-Crawler – Angriffe und Gegenmaßnahmen (MA) | S. Tischler (PS) | ||
Open Topic Calls – Please contact the respective supervisor by email | |||
Re-Design of an iOS-Security-App and secure integration of ECC (BA/SWP/Praxis/MA – Company cooperation) |
N.N (PS) | ||
IT Forensics with Focus on IoT (MA) | N.N (PS) | ||
Raspberry Password Sniffer (BA/MA) | N.N (PS) | ||
Security & Privacy of AAL & HBMS (MA) | N.N (PS) | ||
IoT-Security – Applications, Concepts and Raspberry- or. Arduino-Prototype (BA/MA) | N.N (PS) | ||
Development of a secure smartwatch application z.B. OTP-Generator, SSO, 2-factor-authentication, ... (BA/MA) |
N.N (PS) | ||
Development of secure apps for Raspberry Pi or Arduino (BA/MA) |
N.N (PS) | ||
Planning tool for "Stundentafel Informatik" (BA/MA) | N.N (PS) | ||
go2algo NG – Re-Engineering of go2algo (BA) | N.N (PS) | ||
Extensions to CrypTool2 (BA/MA) | N.N (PS) | ||
Extensions to go2algo (BA/MA) | N.N (PS) | ||
Your own proposals are very welcome! See the regulations |
Finished Topics (Selection) | |
---|---|
QR-basierter Ansatz für Document Lifecycle Management (MA) | T. Pawluch (PS) |
Langzeitarchivierung (MA) | J. Wukoutz (PS) |
Business Continuity Management (MA) | L. Kulmitzer (PS) |
Graph Compression (MA) gemeinsame Betreuung durch Alberto Policriti (University of Udine) und SR |
F. Craighero |
Implementation and security analysis of secret sharing protocols (MA) | V. Pachatz (SR) |
Verfügbarkeitsmanagement und IT-Monitoring (MA) | D. Jost (PS) |
IoT-Auth & Trust (MA) | F. Stornig (PS) |
Skitouren-Safety-App (MA) | C. Lagger (PS) |
Robot-OS Security (MA) | B. Breiling (PS) |
WiPs – Wireless Presentations and Session Management (MA) | T. Trügler (PS) |
scan.net – Interaktive Lernplattform für IT-Sicherheit (MA) | A. Schorn (PS) |
Phishing – Methods and Countermeasures (Anti-Phishing-Plugin for Mozilla) (MA) | M. Madritsch (PS) |
Verfügbarkeitsmanagement und IT-Monitoring (MA) | D. Jost (PS) |
Whisper – Secure Messaging (MA) | P. Moll (SR) |
Blinde Turingmaschinen (MA) | M. Brodbeck (SR) |
Intrusion Detection Techniken und Grundlagen des Datenschutzes für IT Dienstleister (MA) | F. Beichbuchner (SR) |
Erweiterung des FFapl-Compilers um Pairings auf elliptischen Kurven (MA) | J. Winkler (SR) |
Broadcast Encryption – Sicherheitsverfahren für Digital Video Broadcasting (MA) | M. Findenig (PS) |
Mobile privacy (MA) | A. Kersting (PS) |
Sicheres mobiles Messaging mit End-to-End Verschlüsselung (MA) | P. Moll (SR) |
CUDA-based Attacks (MA) | R. Zucchetto (PS) |
go2algo 5.0 – AVL-Bäume (MA) | B. Breiling (PS) |
Blinde Turingmaschinen (MA) | M. Brodbeck (SR) |
Using Business Intelligence to secure IT-Endpoints (MA) | D. Sternig (PS) |
Angriffe auf das SSL/TLS-Protokoll (MA) | M. Wurzer (PS) |
Mobile Enterprise SAP Applications (MA) | T. Maier (PS) |
Eine Umgebung zum Vereinfachten Prototyping von Krypto-Verfahren (MA) | A.O. Ortner (PHO+SR) |
Macros für PPTX (BA) | M.Walch (PS) |
Android Intents – Analysis & Protection (BA) |
M. Bischof D. Sternig (PS) |
Malicious HTTP(S)-Proxy (BA) | J. Gressl (PS) |
Android Passwort-Generator (BA) |
V. Bugl M. Wiltsche (PS) |
scan.net – Interaktive Lernplattform für IT Sicherheit (MA) | A. Schorn (PS) |
syssecApp (BA) |
M. Fiebrich A. Glantschnig (PS) |
Ausgewählte Aspekte von Public-Key Infrastrukturen (MA) | K. Wiedenbauer (PHO+SR) |
Bibliothek zur Implementierung kryptographischer Protokolle in endlichen Körpern (MA) | J. Theuermann (PHO+SR) |