Abschlussarbeiten und Projekte

Wir sind immer auf der Suche nach enthusiastischen Student*innen, die an unseren Forschungsprojekten teilnehmen möchten, uns sind auch offen für Ihre eigenen Ideen. Füllen Sie einfach dieses Formular aus. Wir melden uns dann sobald wie möglich bei Ihnen.

"In an intermediate presentation I was able to get feedback about my work from the whole research group..." - Marco P.
"It has been wonderful to be part of this research group and gain this inspiring experience, bringing to light my forthcoming academic scheme." - Amjad I.
"I am very satisfied with the result of my thesis, especially knowing it has been useful in current research, as it contributed to a paper published by the chair..." - Marius G.
"My supervisors were always available to me and were extremely helpful with keeping me on track both with regard to timely completion and focus of content. And of course my personal highlight was when we were able to publish the findings of my thesis in an idea paper at ESSoS 15." - Nils K.
"Having seen the high quality of work and the good collaboration of the researchers there, I decided to do my thesis here. I highly recommend doing a thesis at the I22 chair, provided that the student wants to excel in his or her work." - Ciprian L.
"I liked that my ideas and approaches were appreciated and regarded - with the end result of making a valuable scientific contribution." - Alvin S.
"The process of regular meetings and an intermediate presentation very well facilitated a steady progress. I especially appreciate the support of the research group at the chair, a collaboration on equal footing and a fair assessment of my work." - Ralf G.
"Regular meetings, an intermediate presentation plus the support of my advisor and the research group at the chair very well assisted a steady progress, the generation and especially the assesment of ideas." - Andi H.
"The regular meetings and detailed feedback have helped forge a sense of direction as well as progress during my work. I was particularly impressed by how maintaining a strong focus and the openness to new ideas have been balanced." - Andrei C.
"I'm very glad I decided to write my thesis at this chair, one of the reasons being my really supportive advisor. Above that, the topic I wrote about was unique and refreshing in the sense that I don't think many other chairs offer such interesting propositions." - Alex U.
"Constant feedback during regular meetups, an intermediate presentation and allowing me to do my final presentation on the same day as the dead line - all of this turned one of the most difficult parts of the curriculum into the most inpiring experience of my Masters degree here in TUM." - Ilya M.


Aktuelle Forschungsthemen schreiben wir nicht unbedingt aus. Nutzen Sie die Webseiten unserer Mitarbeitenden, um sich über deren Forschung zu informieren und anschließend dieses Formular, um sich zu bewerben.

Title Lang. Type Contact
en Master'sE. Zibaei
de/en Master's A. Pretschner


Wenn Sie an irgendeinem unserer (oder verwandter) Themen Interesse haben, füllen Sie bitte dieses Formular aus.

Implementing Inverse Transparency – A new approach to data privacyV. Zieglmeier

In Bearbeitung

Logical Architecture for Engineering Smart Self-Adaptive Cyber- Physical SystemsGuided ResearchA. Petrovska
Decentralized Partially Observable Markov Decision Processes for Planning in Smart Self-Adaptive Cyber-Physical SystemsGuided ResearchA. Petrovska
Multi-Source Knowledge Aggregation in Subjective LogicMaster'sA. Petrovska, I. Gerostatopoulous
Model-driven Monitoring Orchestration For MicroservicesMaster'sA.Ibrahim
A Canvas for Causal ModelingBachelor'sA. Ibrahim
Securing Microservice Cluster Management Cockpit using BlockchainMaster'sM. Ahmadvand
Public key Tracing Framework using BlockchainMaster'sM. Ahmadvand
Software protection composition frameworkMaster'sM. Ahmadvand
Automatic and Reproducible Attacks on insecurely configured Systems based on Security-Configuration RulesMaster'sP. Stöckle
Automatic Selection of Security-relevant ConfigurationsBachelor'sP. Stöckle
A labeling platform for source codeBachelor'sM. Schnappinger
Cornering Cohesion: Investigating new ways to measure cohesionMaster'sM. Schnappinger
Measuring cohesion and coupling: a comparison of different metrics and their usefulness Bachelor'sM. Schnappinger


Title Type Year
Security-Configuration Automation for UNIX Master's2019
Design of an Improved Scapolite Check Mechanism Bachelor's2019
Automatic Security Configuration for Mobile Devices Bachelor's2019
Conflict Scenarios for an Accountability-Enabled Multi-Robot Simulation Bachelor's2019
Path Planning and Consensus Algorithms for an Accountability-Enabled Multi-Robot Simulation Bachelor's2019
Modelling of Attack Trees for Security Assessment of Hardening Mechanisms Bachelor's2019
Building a Framework for Objective Evaluation of Malware Detection Methods Bachelor's2019
Detection of Android Repackaged Malware with Active Learning Bachelor's2019
Resilience of SIP against ML-based attacks Master's2019
Knowledge Discovery from Drone Logs  Master's2019
Vectorizing Software for Machine Learning Master's2019
Identification of generated code parts Bachelor's2019
Simplifying Configuration Management in the Automotive Industry Master's2019
Design and Implementation of ROS-Based Simulated Multi-Robot Systems for Data Collection Master's2019
Runtime Verification of Dynamic Architectures Master's2018
Constraint size thresholding in symbolic execution for broader path coverage Bachelor's2018
Fast and parallel compositional fuzzing aided by symbolic execution Bachelor's2018
Design and Evaluation of an Agile Software Development Process for Space Applications Master's2018
Comparing Stimulation Techniques for Detecting Android Piggybacked Malware Master's2018
Software Protection Ontology Visualization Bachelor's2018
Automatic Repackaging of Android Applications Bachelor's2018
Self-adaptive cyber-physical systems utilizing different machine learning techniques Guided Research 2018
Analysis and Detection of Repackaged Malware Behavior Master's2018
Testing Advanced Driver Assistance Systems: Procedural Environment Generation for Simulated Test Scenarios Master's2017
Impact factors for severity assessment of bugs discovered via compositional symbolic execution Master's2017
Anomaly detection and prediction in distributed software systems using machine learning Bachelor's2017
Repackaged Malware Detection in Android Bachelor's2017
Dynamic Taint Analysis for Java-based applications Bachelor's2017
Benchmarking Symbolic Execution Tools on Custom Block Ciphers Bachelor's2017
Search-Based Procedural Environment Generation for Simulated Test Scenarios Guided Research2017
Visualization of Causality Algorithms Master's2017
Qualifizierung von Template-basierendem C++-Code Bachelor's2017
Evaluierung suchebasierter Verfahren zur automatischen Generierung von Testfällen für kontinuierliche Systeme Master's 2017
Runtime Service Adaption in the Context of Composed Usage Control Driven Services Bacherlor's 2017
Prediction of automated deobfuscation & tampering time using machine learning Master's 2017
iOS Application Hardening via Obfuscation Master's 2017
Detecting Process Memory Tampering Bachelor's 2016
Compositional analysis for exposing vulnerabilities - A symbolic execution approach Master's 2016
Building Accountability Mechanisms into the Roomba iRobot Bachelor's 2016
Automated Attack Planning using a Partially Observable Model for Penetration Testing of Industrial Control Systems Master's 2016
Automatic Generation of Secure and Usable Mnemonic Passphrases Master's 2016
State of the Art Survey of Security Incident Management compliant to ISO 27001 Guided Research 2016
A Reliable Automated Vulnerability Check in Continuous Integration Bachelor's 2016
Botnet Battlefield Master's 2016
Master's 2016
Software Protection by Self-Checking Master's 2016
Bachelor's 2015
Master's 2015
Master's 2015
Master's 2015
Bachelor's 2015
Software Protection by Virtualization Obfuscation Master's 2015
A Taxonomy of Browser Hijacking Malware Guided Research 2015
Metadata Recovery of Transformations from Obfuscated Software via Machine Learning Techniques Master's 2015
Enhancing Accuracy for Usage Control Enforcement Bachelor's 2015
Composing data-usage-driven Services Bachelor's 2015
Securing Data Usage Control Infrastructures Master's 2015
Raising the Bar for Automated Attacks against Web Applications using Software Diversity Master's 2015
Model Based Development of a Safety AUTOSAR Basic Software Component - NVRAM Manager Bachelor's 2015
A Comparative Study of Secret Sharing Schemes Master's 2015
Checking Non-Equivalence of Software Programs using Symbolic Execution Bachelor's 2015
Regressionstests mit Fehlermodellen Bachelor's 2015
Zum Verhältnis von Agilität und Architektur Master's 2015
Design and Implementation of "Sealed Search" on Encrypted Data while Maintaining Privacy Master's 2015
A Generic Description Language for Fault Models Bachelor's 2015
Towards Testing Malware Detection Systems using Behavior Obfuscation Bachelor's 2015
Usage Control for Apple iOS Master's 2015
Code Transformations and Software Diversity for Improving Software Attack and Analysis Resilience Master's 2014
Monitoring Compliance of Third-Party Applications in Online Social Networks Bachelor's 2014
Graph-based system profiling and anomaly detection Master's 2014
Erstellen einer Fehlerdatenbank mit zugehörigem Pflegeprozess Master's 2014
Towards improving data driven usage control precision with intra-process data-flow tracking Master's 2014
A Qualitative Study of Indistinguishability Obfuscation Bachelor's 2014
Fault-model driven test derivation for controller-based systems Master's 2014
Quantitative Data Flow Pattern Mining for Malware Detection Master's 2014
Data Usage Control for Office Applications Master's 2014
Asset Protection via White Box Cryptography Master's 2014
Towards data flow graph based misuse detection at the Windows kernel level Bachelor's 2014
A Test Automation Framework for AJAX-based Web Applications Bachelor's 2013
A dynamically configurable Policy Information Point Bachelor's 2013
Testing Concurrency in Android Apps Master's 2013
Dynamic Information Flow Tracking for V8 Master's 2013
Distributed Usage Control for the mySQL Server Master's 2012
Data Usage Control for Google Chrome Diplomarbeit 2012
Assessment of HTML5 security properties and emerging web security threats Master's 2012
Data Usage Control for the Thunderbird Mail Client Master's 2012
A Policy Management Infrastructure for Distributed Usage Control Master's 2011
Implementation of Usage Control for the Windows API Master's 2011
Extending Android with Usage Control Policies Master's 2011
A hypervisor-based bus system for inter-level data flow tracking Master's 2011
Data Usage Control for a Web Application: The Server Bachelor's 2010
Data Usage Control for a Web Application: The Client Bachelor's 2010
Bringing Trust to the Cloud Bachelor's 2010
Usage Control for Dynamically Loaded Windows Binaries Bachelor's 2010
Engineering Bytecode to Detect Implicit Information Flow Bachelor's 2009
Usage Control Enforcement with an Application to the X11 Protocol Master's 2009
Usage Control Enforcement at the CPU level Master's 2009
Usage Control Enforcement at the Java bytecode level Master's 2009
Analysis of Usage Control Policies Master's 2008
Delegation in Usage Control Master's 2008
AXIS-Based Configuration of Services for Usage Control Studienarbeit 2008
Sicherheitsanalyse einer Webapplikation Studienarbeit 2007
Policy Evaluation and Negotiation in Distributed Usage Control Master's 2007
Translating Usage Control Policies Studienarbeit 2007
Implementing DRM on a Mobile Phone Studienarbeit 2007
Monitoring Usage Control Requirements Master's 2006
A Taxonomy of Usage Control Mechanisms Studienarbeit 2006
Definition struktureller Überdeckungsmaße für den Test von Continuous Function Charts Bachelor's 2004
Onboard-Testsystem für teilautomatisierte Benutzerfunktionstests im Fahrzeug Diplomarbeit 2003
Konzeption und prototypische Implementierung einer Software-Diagnose-Infrastruktur im Fahrzeug Diplomarbeit 2003