Wir sind immer auf der Suche nach enthusiastischen Studierenden, die an unseren Forschungsprojekten teilnehmen möchten. Außerdem sind wir offen für Ihre eigenen Ideen - kommen Sie einfach vorbei oder senden Sie uns eine E-mail

"In an intermediate presentation I was able to get feedback about my work from the whole research group..." - Marco P.
"It has been wonderful to be part of this research group and gain this inspiring experience, bringing to light my forthcoming academic scheme." - Amjad I.
"I am very satisfied with the result of my thesis, especially knowing it has been useful in current research, as it contributed to a paper published by the chair..." - Marius G.
"My supervisors were always available to me and were extremely helpful with keeping me on track both with regard to timely completion and focus of content. And of course my personal highlight was when we were able to publish the findings of my thesis in an idea paper at ESSoS 15." - Nils K.
"Having seen the high quality of work and the good collaboration of the researchers there, I decided to do my thesis here. I highly recommend doing a thesis at the I22 chair, provided that the student wants to excel in his or her work." - Ciprian L.
"I liked that my ideas and approaches were appreciated and regarded - with the end result of making a valuable scientific contribution." - Alvin S.
"The process of regular meetings and an intermediate presentation very well facilitated a steady progress. I especially appreciate the support of the research group at the chair, a collaboration on equal footing and a fair assessment of my work." - Ralf G.
"Regular meetings, an intermediate presentation plus the support of my advisor and the research group at the chair very well assisted a steady progress, the generation and especially the assesment of ideas." - Andi H.
"The regular meetings and detailed feedback have helped forge a sense of direction as well as progress during my work. I was particularly impressed by how maintaining a strong focus and the openness to new ideas have been balanced." - Andrei C.
"I'm very glad I decided to write my thesis at this chair, one of the reasons being my really supportive advisor. Above that, the topic I wrote about was unique and refreshing in the sense that I don't think many other chairs offer such interesting propositions." - Alex U.
"Constant feedback during regular meetups, an intermediate presentation and allowing me to do my final presentation on the same day as the dead line - all of this turned one of the most difficult parts of the curriculum into the most inpiring experience of my Masters degree here in TUM." - Ilya M.

Offen

In Bearbeitung

Abgeschlossen

Title Type Year
Benchmarking Symbolic Execution Tools on Custom Block Ciphers Bachelor's2017
Visualization of Causality Algorithms Master's2017
Qualifizierung von Template-basierendem C++-Code Bachelor's2017
Runtime Service Adaption in the Context of Composed Usage Control Driven Services Bacherlor's 2017
Prediction of automated deobfuscation & tampering time using machine learning Master's 2017
iOS Application Hardening via Obfuscation Master's 2017
Detecting Process Memory Tampering Bachelor's 2016
Compositional analysis for exposing vulnerabilities - A symbolic execution approach Master's 2016
Building Accountability Mechanisms into the Roomba iRobot Bachelor's 2016
Automated Attack Planning using a Partially Observable Model for Penetration Testing of Industrial Control Systems Master's 2016
Automatic Generation of Secure and Usable Mnemonic Passphrases Master's 2016
State of the Art Survey of Security Incident Management compliant to ISO 27001 Guided Research 2016
A Reliable Automated Vulnerability Check in Continuous Integration Bachelor's 2016
Botnet Battlefield Master's 2016
Master's 2016
Software Protection by Self-Checking Master's 2016
Bachelor's 2015
Master's 2015
Master's 2015
Master's 2015
Bachelor's 2015
Software Protection by Virtualization Obfuscation Master's 2015
A Taxonomy of Browser Hijacking Malware Guided Research 2015
Metadata Recovery of Transformations from Obfuscated Software via Machine Learning Techniques Master's 2015
Enhancing Accuracy for Usage Control Enforcement Bachelor's 2015
Composing data-usage-driven Services Bachelor's 2015
Securing Data Usage Control Infrastructures Master's 2015
Raising the Bar for Automated Attacks against Web Applications using Software Diversity Master's 2015
Model Based Development of a Safety AUTOSAR Basic Software Component - NVRAM Manager Bachelor's 2015
A Comparative Study of Secret Sharing Schemes Master's 2015
Checking Non-Equivalence of Software Programs using Symbolic Execution Bachelor's 2015
Regressionstests mit Fehlermodellen Bachelor's 2015
Zum Verhältnis von Agilität und Architektur Master's 2015
Design and Implementation of "Sealed Search" on Encrypted Data while Maintaining Privacy Master's 2015
A Generic Description Language for Fault Models Bachelor's 2015
Towards Testing Malware Detection Systems using Behavior Obfuscation Bachelor's 2015
Usage Control for Apple iOS Master's 2015
Code Transformations and Software Diversity for Improving Software Attack and Analysis Resilience Master's 2014
Monitoring Compliance of Third-Party Applications in Online Social Networks Bachelor's 2014
Graph-based system profiling and anomaly detection Master's 2014
Erstellen einer Fehlerdatenbank mit zugehörigem Pflegeprozess Master's 2014
Towards improving data driven usage control precision with intra-process data-flow tracking Master's 2014
A Qualitative Study of Indistinguishability Obfuscation Bachelor's 2014
Fault-model driven test derivation for controller-based systems Master's 2014
Quantitative Data Flow Pattern Mining for Malware Detection Master's 2014
Data Usage Control for Office Applications Master's 2014
Asset Protection via White Box Cryptography Master's 2014
Towards data flow graph based misuse detection at the Windows kernel level Bachelor's 2014
A Test Automation Framework for AJAX-based Web Applications Bachelor's 2013
A dynamically configurable Policy Information Point Bachelor's 2013
Testing Concurrency in Android Apps Master's 2013
Dynamic Information Flow Tracking for V8 Master's 2013
Distributed Usage Control for the mySQL Server Master's 2012
Data Usage Control for Google Chrome Diplomarbeit 2012
Assessment of HTML5 security properties and emerging web security threats Master's 2012
Data Usage Control for the Thunderbird Mail Client Master's 2012
A Policy Management Infrastructure for Distributed Usage Control Master's 2011
Implementation of Usage Control for the Windows API Master's 2011
Extending Android with Usage Control Policies Master's 2011
A hypervisor-based bus system for inter-level data flow tracking Master's 2011
Data Usage Control for a Web Application: The Server Bachelor's 2010
Data Usage Control for a Web Application: The Client Bachelor's 2010
Bringing Trust to the Cloud Bachelor's 2010
Usage Control for Dynamically Loaded Windows Binaries Bachelor's 2010
Engineering Bytecode to Detect Implicit Information Flow Bachelor's 2009
Usage Control Enforcement with an Application to the X11 Protocol Master's 2009
Usage Control Enforcement at the CPU level Master's 2009
Usage Control Enforcement at the Java bytecode level Master's 2009
Analysis of Usage Control Policies Master's 2008
Delegation in Usage Control Master's 2008
AXIS-Based Configuration of Services for Usage Control Studienarbeit 2008
Sicherheitsanalyse einer Webapplikation Studienarbeit 2007
Policy Evaluation and Negotiation in Distributed Usage Control Master's 2007
Translating Usage Control Policies Studienarbeit 2007
Implementing DRM on a Mobile Phone Studienarbeit 2007
Monitoring Usage Control Requirements Master's 2006
A Taxonomy of Usage Control Mechanisms Studienarbeit 2006
Definition struktureller Überdeckungsmaße für den Test von Continuous Function Charts Bachelor's 2004
Onboard-Testsystem für teilautomatisierte Benutzerfunktionstests im Fahrzeug Diplomarbeit 2003
Konzeption und prototypische Implementierung einer Software-Diagnose-Infrastruktur im Fahrzeug Diplomarbeit 2003