We offer topics for Bachelor theses and advise B.Sc. candidates in the context of the class “Seminar mit Bachelorarbeit”.
|ARM simulator, interpreter and debugger for the web||Alexander Schlögl, MSc||Bachelor|
|Amortizing SGX setup times through batched inference||Alexander Schlögl, MSc||Master|
|Content-aware generation of copy-move text forgeries||Dr. Svetlana Abramova||Bachelor|
|Convolutional neural networks for the detection of nearly identical high quality recompression||Dr. Cecilia Pasquini||Master|
|Data-driven empirical analysis of privacy-aware user behavior in Bitcoin and Bitcoin Cash||Dr. Svetlana Abramova||Bachelor|
|Detectability of selfish mining||Univ.-Prof. Dr. Rainer Böhme||Master|
|Development of a software framework for the detection of copy-move text forgeries: analysis of background areas||Dr. Svetlana Abramova||Bachelor|
|Development of a software framework for the detection of copy-move text forgeries: analysis of text areas||Dr. Svetlana Abramova||Bachelor|
|EtherSci – An open Ethereum data analysis framework||Michael Armin Fröwis, MSc||Bachelor / Master|
|Evaluation of a novel blockchain-based distributed ledger||Patrik Keller, MSc||Bachelor / Master|
|Parallelizing matrix multiplication for Intel SGX||Alexander Schlögl, MSc||Bachelor|
|Quantifying the cost of model stealing||Dr. Daniel Woods||Master|
|Security of online exams||Maximilian Hils, MSc||Bachelor|
|Statistical modeling of individual agent behavior in blockchain-based systems||Dr. Svetlana Abramova||Bachelor|
|The Databike||Michael Armin Fröwis, MSc||Bachelor|
|Theoretical and empirical forensic detection limits in case of slight signal downsampling||Dr. Cecilia Pasquini||Master|
|Who uses public SMS inboxes?||Dr. Daniel Woods||Master|
|Why don't users reject all cookies?||Maximilian Hils, MSc||Bachelor / Master|
|Why is it secure? Visualizing security protocols with counterfactuals||Univ.-Prof. Dr. Rainer Böhme||Bachelor|
|Benchmarking application layer protocols for the Internet of Things||Felix Erlacher, MSc||Master|
|Design of a game to teach the principles of Nakomoto consensus||Dr. Svetlana Abramova||Bachelor|
|Exploring the difficulty of hiding keys in neural networks||Dr. Cecilia Pasquini||Master|
|Web-based LaTeX Beamer presentation tool||Maximilian Hils, MSc||Bachelor / Master|
|Analysis of Solidity programming pitfalls and compiler-based solutions||Univ.-Prof. Dr. Rainer Böhme||Master|
|Analysis of geometric and latent attributes in morphed face images||Dr. Cecilia Pasquini||Master|
|Attack vectors against 2D barcode tickets||Dr. Markus Riek||Bachelor|
|Consensus from proof-of-work puzzles||Univ.-Prof. Dr. Rainer Böhme||Master|
|Country-dependent analysis of the LinkedIn leak||Dr. Pascal Schöttle||Bachelor|
|Design and development of a tool for forensic analysis of mobile instant messenger applications||Dr. Markus Riek||Bachelor|
|Design of a Bitcoin-themed board game||Dr. Svetlana Abramova||Bachelor|
|Digital signatures to increase security of 2D barcode ticketing systems||Dr. Markus Riek||Bachelor|
|Eduthereum – A system for storing educational certificates in a public blockchain||Univ.-Prof. Dr. Rainer Böhme||Master|
|Establishment of a benchmarking image dataset of copy-move text forgeries||Dr. Svetlana Abramova||Bachelor|
|Exploring steganographic channels in Minecraft-like computer games||Olaf Markus Köhler, MSc||Bachelor|
|Forensic analysis of mobile instant messenger applications using semantic analysis||Dr. Markus Riek||Bachelor|
|Generalizing BlockSci to cross-chain analyses of forked ledgers||Michael Armin Fröwis, MSc||Master|
|Hidden overlay networks: possibility study on Minecraft||Patrik Keller, MSc||Bachelor|
|Identifying malevolent DNS servers||Sebastian Luhn, MSc||Bachelor|
|Interdependent privacy in Facebook||Dr. Pascal Schöttle||Bachelor|
|Network-based high-interaction honeypots||Maximilian Hils, MSc||Master|
|R package for channel coding with block codes||Dr. Pascal Schöttle||Bachelor|
|R package for channel coding with convolutional codes||Dr. Pascal Schöttle||Bachelor|
|R package for channel coding with turbo codes||Dr. Pascal Schöttle||Bachelor|
|Security analysis of Facebook Connect||Dr. Markus Riek||Bachelor|
|Simulation and analysis of the selfish-mining attack on Bitcoin||Dr. Svetlana Abramova||Bachelor|
|TLS certificate verification in practice||Maximilian Hils, MSc||Bachelor|
|Teaching chatbots how to teach||Dr. Cecilia Pasquini||Bachelor|
|User profiling by DNS servers||Sebastian Luhn, MSc||Bachelor|
|Visualisation of cloud performance and security metrics taking account of data protection||Sebastian Luhn, MSc||Bachelor|
|Visualizing network topologies with the help of the Spanning Tree Protocol (STP)||Dr. Pascal Schöttle||Bachelor|
We expect that undergraduate students preparing a Bachelor thesis show a strong interest in topics related to our lectures. Bachelor theses may be written in German or English. Please choose German if you have difficulties drafting a flawless document in English.
Graduate students preparing a Master thesis should have substantial knowledge in at least one sub-field of security or privacy and they should have prior experience with the research methodology they plan to use. The default language for Master theses is English.
Doctoral dissertations (Ph.D. theses) are typically prepared while working for one of our research projects. As our research group maintains strong ties to the relevant international scientific communities, we encourage our Ph.D. candidates to make use of the possibility to conduct part of their research at renowned universities abroad.
Although counting pages is generally a bad metric, take the following specifications as rules of thumb:
|Seminar thesis||< 20 pages||research the state-of-the-art and present it in a scientifically sound way|
|Bachelor thesis||~ 40 pages||independent replication of the state-of-the-art with scientific documentation of results|
|Master thesis||~ 80 pages||your adviser should learn something new|
|Dissertation||~ 150 pages + publications||the scientific community should learn something new|
Candidates are expected to be familiar with the general instructions for writing a Bachelor or Master thesis at the Department of Computer Science.
Please consider the following options to find a topic of the thesis:
The first step to a thesis is to write an exposé. The exposé is a short description of your work (max. 3 pages) in running text, possibly supported by a meaningful table or figure. It should contain the following information:
Keep in mind that drafting the exposé is an iterative process involving your supervisor. It may require some time. Your supervisor must accept your final exposé before we schedule an initial presentation in the Seminar mit Bachelorarbeit. This presentation is the formal start of the Bachelor thesis process. For Master theses, the completion of the exposé means that the candidate formally passes the preparation.
The Bachelor thesis should demonstrate that the candidate can solve problems independently and document own results according to scientific standards. If you need feedback or assistance, you must take the initiative and contact your supervisor. Before every meeting with your supervisor, please send to him/her beforehand a rough agenda and supporting materials. This helps the supervisor to prepare and improves the efficiency of the meeting.
We offer each student the opportunity to hand in up to five pages of the thesis draft. The supervisor will correct it with the same standard as for the final thesis. We expect the student to extrapolate corrections to the rest of the Bachelor thesis.
In addition to an electronic copy in PDF format, students must submit one bound hard copy of the Bachelor thesis including a signed declaration of independent work in the preface.
Writing a Master thesis is usually a very interactive process involving the supervisor and other members of the research group. Candidates often spend part of the time at a desk in our lab. Some candidates contribute to research project or publish research results related to the thesis project in scientific workshops or conferences.