| Open Topics & Ideas – Please contact the respective supervisor by email | |||
|---|---|---|---|
| Re-Design of an iOS-Security-App and secure integration of ECC (BA/SWP/Praxis/MA – Company cooperation) |
N.N (PS) | ||
| Raspberry Password Sniffer (BA/MA) | N.N (PS) | ||
| IoT-Security – Applications, Concepts and Raspberry- or Arduino-Prototype (BA/MA) | N.N (PS) | ||
|
Development of a secure smartwatch application z.B. OTP-Generator, SSO, 2-factor-authentication, … (BA/MA) |
N.N (PS) | ||
|
Development of secure apps for Raspberry Pi or Arduino (BA/MA) |
N.N (PS) | ||
| go2algo NG – Re-Engineering of go2algo (BA) | N.N (PS) | ||
| Extensions to CrypTool2 (BA/MA) | N.N (PS) | ||
| Extensions to go2algo (BA/MA) | N.N (PS) | ||
| Your own proposals are very welcome! See the regulations | |||
| Topics in process or completed |
|---|
| Konzeption und Evaluierung von Key Management Systemen für Verbrauchsmessgeräte in Energieversorgungsunternehmen (MA) |
| Meraki Toolsuite (BA) |
| Combining Physical and Digital Red Teaming (LPR) |
| Securin the (MQTT/TLS) Communication Library on Arduino using the SE05X Secure Element (LPR) |
| Zero-Trust Boot Protocol for Consumer Router Security (SPR) |
| AI-Enhanced Phishing Detection with Behavioural and Visual Cues (SPR) |
| Skiline Information Diagnostics Engine (BA) |
| Malicious PDF (BA) |
| Crowd Meteorological Data: Acquisition, Storage, Validation, and Accessibility (BA) |
| XTalk Detector (BA) |
| MCPwn – A Laboratory for the exploration of LLM-Framework vulnerabilities (MA) |
| Zero Trust Architecture in Azure Cloud in the Context of an Energy Provider (MA) |
| Enhancing Vulnerability Management Systems using Contextual Prioritization (MA) |
| Implementing a Secure and Scalable Plugin Architecture with a Focus on Context-Aware Vulnerability Management (MA) |
| Der Visor von/für Geordi La Forge (BA) |
| Novel approaches for remote detection of malicious shared libraries to enhance vulnerability management (MA) |
| Simulation von Security in kritischen Infrastrukturen (MA) |
| Optimierung von IT Governance im Konzern IT-Risikomanagement der Cloud mit COBIT und ITIL (MA) |
| Automatisiertes Client Management basierend auf dem IT Service Management Referenzprozess laut ITIL (MA) |
| Sunset Webinterface Middleware (BA) |
| Camera Certificate Deployment Tool (CCDT) (BA) |
| Rechteabhängiges Schwärzen von digitalen Dokumenten im Dokumentenmanagementsystem (MA) |
| Verwaltung von personenbezogenen Daten gemäß DSGVO (Löschkonzept) (MA) |
| Social Engineering Awareness as a vital Part of comprehensive IT Security (MA) |
| Documents2go (MA) |
| Social Risk Response (MA) |
| Passwort-Management in Webbrowsers (MA) |
| Alexa meets MyELGA: Patientenunterstützung durch Erweiterung der elektronischen Gesundheitsakte (MA) |
| MyELGA e-Medication: Erweiterung der ELGA-e-Medikation Anwendung (MA) |
| Alexa "Home Security" Skill (MA) |
| Web-Crawler – Angriffe und Gegenmaßnahmen (MA) |
| QR-basierter Ansatz für Document Lifecycle Management (MA) |
| Langzeitarchivierung (MA) |
| Business Continuity Management (MA) |
| Graph Compression (MA) |
| Implementation and security analysis of secret sharing protocols (MA) |
| Verfügbarkeitsmanagement und IT-Monitoring (MA) |
| IoT-Auth & Trust (MA) |
| Skitouren-Safety-App (MA) |
| Robot-OS Security (MA) |
| WiPs – Wireless Presentations and Session Management (MA) |
| scan.net – Interaktive Lernplattform für IT-Sicherheit (MA) |
| Phishing – Methods and Countermeasures (Anti-Phishing-Plugin for Mozilla) (MA) |
| Whisper – Secure Messaging (MA) |
| Blinde Turingmaschinen (MA) |
| Intrusion Detection Techniken und Grundlagen des Datenschutzes für IT Dienstleister (MA) |
| Erweiterung des FFapl-Compilers um Pairings auf elliptischen Kurven (MA) |
| Broadcast Encryption – Sicherheitsverfahren für Digital Video Broadcasting (MA) |
| Mobile privacy (MA) |
| Sicheres mobiles Messaging mit End-to-End Verschlüsselung (MA) |
| CUDA-based Attacks (MA) |
| go2algo 5.0 – AVL-Bäume (MA) |
| Using Business Intelligence to secure IT-Endpoints (MA) |
| Angriffe auf das SSL/TLS-Protokoll (MA) |
| Mobile Enterprise SAP Applications (MA) |
| Eine Umgebung zum Vereinfachten Prototyping von Krypto-Verfahren (MA) |
| Macros für PPTX (BA) |
| Android Intents – Analysis & Protection (BA) |
| Malicious HTTP(S)-Proxy (BA) |
| Android Passwort-Generator (BA) |
| scan.net – Interaktive Lernplattform für IT Sicherheit (MA) |
| syssecApp (BA) |
| Ausgewählte Aspekte von Public-Key Infrastrukturen (MA) |
| Bibliothek zur Implementierung kryptographischer Protokolle in endlichen Körpern (MA) |