Software Practicals, Bachelor- and Master Theses

  1. Software Practicals, Projects, Bachelor- and Master Theses

  1. Supervisor and Contact:
    Assoc.Prof. Dipl.-Ing. Dr. Peter Schartner (PS)
    Legend:
    BA Bachelor Thesis (follow-up to a software practical – SWP)
    MA Master Thesis
    SPR/LPR Small/Large Project (Maser AI&CS)
    Language:
    BA German or English
    MA/SPR/LPR English only
  1. Open Topics & Ideas – Please contact the respective supervisor by email
    Re-Design of an iOS-Security-App and secure integration of ECC
    (BA/SWP/Praxis/MA – Company cooperation)
    N.N (PS)
    Raspberry Password Sniffer (BA/MA) N.N (PS)
    IoT-Security – Applications, Concepts and Raspberry- or Arduino-Prototype (BA/MA) N.N (PS)
    Development of a secure smartwatch application
    z.B. OTP-Generator, SSO, 2-factor-authentication, … (BA/MA)
    N.N (PS)
    Development of secure apps
    for Raspberry Pi or Arduino (BA/MA)
    N.N (PS)
    go2algo NG – Re-Engineering of go2algo (BA) N.N (PS)
    Extensions to CrypTool2 (BA/MA) N.N (PS)
    Extensions to go2algo (BA/MA) N.N (PS)
    Your own proposals are very welcome! See the regulations

  2. Topics in process or completed
    Konzeption und Evaluierung von Key Management Systemen für Verbrauchsmessgeräte in Energieversorgungsunternehmen (MA)
    Meraki Toolsuite (BA)
    Combining Physical and Digital Red Teaming (LPR)
    Securin the (MQTT/TLS) Communication Library on Arduino using the SE05X Secure Element (LPR)
    Zero-Trust Boot Protocol for Consumer Router Security (SPR)
    AI-Enhanced Phishing Detection with Behavioural and Visual Cues (SPR)
    Skiline Information Diagnostics Engine (BA)
    Malicious PDF (BA)
    Crowd Meteorological Data: Acqui􀀜sition, Storage, Validation, and Accessibility (BA)
    XTalk Detector (BA)
    MCPwn – A Laboratory for the exploration of LLM-Framework vulnerabilities (MA)
    Zero Trust Architecture in Azure Cloud in the Context of an Energy Provider (MA)
    Enhancing Vulnerability Management Systems using Contextual Prioritization (MA)
    Implementing a Secure and Scalable Plugin Architecture with a Focus on Context-Aware Vulnerability Management (MA)
    Der Visor von/für Geordi La Forge (BA)
    Novel approaches for remote detection of malicious shared libraries to enhance vulnerability management (MA)
    Simulation von Security in kritischen Infrastrukturen (MA)
    Optimierung von IT Governance im Konzern IT-Risikomanagement der Cloud mit COBIT und ITIL (MA)
    Automatisiertes Client Management basierend auf dem IT Service Management Referenzprozess laut ITIL (MA)
    Sunset Webinterface Middleware (BA)
    Camera Certificate Deployment Tool (CCDT) (BA)
    Rechteabhängiges Schwärzen von digitalen Dokumenten im Dokumentenmanagementsystem (MA)
    Verwaltung von personenbezogenen Daten gemäß DSGVO (Löschkonzept) (MA)
    Social Engineering Awareness as a vital Part of comprehensive IT Security (MA)
    Documents2go (MA)
    Social Risk Response (MA)
    Passwort-Management in Webbrowsers (MA)
    Alexa meets MyELGA: Patientenunterstützung durch Erweiterung der elektronischen Gesundheitsakte (MA)
    MyELGA e-Medication: Erweiterung der ELGA-e-Medikation Anwendung (MA)
    Alexa "Home Security" Skill (MA)
    Web-Crawler – Angriffe und Gegenmaßnahmen (MA)
    QR-basierter Ansatz für Document Lifecycle Management (MA)
    Langzeitarchivierung (MA)
    Business Continuity Management (MA)
    Graph Compression (MA)
    Implementation and security analysis of secret sharing protocols (MA)
    Verfügbarkeitsmanagement und IT-Monitoring (MA)
    IoT-Auth & Trust (MA)
    Skitouren-Safety-App (MA)
    Robot-OS Security (MA)
    WiPs – Wireless Presentations and Session Management (MA)
    scan.net – Interaktive Lernplattform für IT-Sicherheit (MA)
    Phishing – Methods and Countermeasures (Anti-Phishing-Plugin for Mozilla) (MA)
    Whisper – Secure Messaging (MA)
    Blinde Turingmaschinen (MA)
    Intrusion Detection Techniken und Grundlagen des Datenschutzes für IT Dienstleister (MA)
    Erweiterung des FFapl-Compilers um Pairings auf elliptischen Kurven (MA)
    Broadcast Encryption – Sicherheitsverfahren für Digital Video Broadcasting (MA)
    Mobile privacy (MA)
    Sicheres mobiles Messaging mit End-to-End Verschlüsselung (MA)
    CUDA-based Attacks (MA)
    go2algo 5.0 – AVL-Bäume (MA)
    Using Business Intelligence to secure IT-Endpoints (MA)
    Angriffe auf das SSL/TLS-Protokoll (MA)
    Mobile Enterprise SAP Applications (MA)
    Eine Umgebung zum Vereinfachten Prototyping von Krypto-Verfahren (MA)
    Macros für PPTX (BA)
    Android Intents – Analysis & Protection (BA)
    Malicious HTTP(S)-Proxy (BA)
    Android Passwort-Generator (BA)
    scan.net – Interaktive Lernplattform für IT Sicherheit (MA)
    syssecApp (BA)
    Ausgewählte Aspekte von Public-Key Infrastrukturen (MA)
    Bibliothek zur Implementierung kryptographischer Protokolle in endlichen Körpern (MA)