We are always looking for enthusiastic students willing to work on our research projects. We are also open for your own ideas. Just fill out this form. We are going to contact you as soon as possible.
We don't necessarily advertise all current research topics. Use the websites of our scientific staff to obtain information about their research.
Or propose your own topic: application
Bachelor's / Master's Thesis | Lang. | Type | Contact |
---|
Title | Type | Advisor | |
---|---|---|---|
Generation and Analysis of Metamorphic Test Cases for Neural Networks | Bachelor's | S. Speth | |
Anomaly Detection of Connectivity Events in the Automotive Domain | Master's | N.Kolb | |
Enhancing Precision and Speed in Regression Test Selection by Identifying Safe Code Changes | Master's | R. Würsching | |
Navigating the Neural Maze: A Strategic Guide for Evaluating and Improving the Robustness of Deep Neural Networks | GR | V. Vekariya | |
Test Case Prioritization using Latent Space Properties of Deep Neural Networks (DNNs) | Bachelor's | V. Vekariya | |
Scenario Parameters for Testing Reactive and Predictive Swarm Controllers | Bachelor's | D. Marson | |
Semantic Clustering and Visualization of University Modules Using NLP | Bachelor's | J. Düsing | |
Creating an Automated Course Recommendation System for Students | Bachelor's | J. Düsing | |
Mutation Testing for Microservice Systems | Master's | L. Gregor | |
Coverage Criteria for Integration Testing of Microservice Systems | Bachelor's | L. Gregor | |
Analyzing Faults in Microservice Systems | Bachelor's | L. Gregor | |
Supporting Developers in Repairing Flaky Tests in CI | Master's | F. Leinen | |
Improving Robustness of Semantic Segmentation for Autonomous Driving | Master's | S. Speth | |
Data Augmentation in the Latent Space for Boosting Performance on Radar-Based Presence Sensing Applications | Master's | S. Speth |
Title | Type | Year |
---|---|---|
Effectiveness of Search-Based Testing on a Deep Reinforcement-Learned Swarm Controller | Bachelor's | 2024 |
Evaluating ChatGPT for Software Testing | Master's | 2024 |
Benchmark for Autonomous Vehicle Testing | Guided R. | 2024 |
Search Space Creation for Testing Autonomous Driving Systems | Master's | 2024 |
Metamorphic Testing of Radar-Based Deep Learning Object Detectors | Master's | 2024 |
Investigating Latent Space Testing Boundaries in Deep Learning Models | Bachelor's | 2024 |
Prioritizing Regression Tests for Manual Testing of Mobile Applications | Master's | 2024 |
Enhanced Debugging of Flaky Test Cases | Master's | 2024 |
A Study on Flaky Tests | Bachelor's | 2024 |
Comparing Approaches for Flaky Test Research | Bachelor's | 2024 |
Fehlerhandling in Microservice Architekturen | Bachelor's | 2024 |
A Fault Injection Method for Evaluating Test Generation Frameworks for Microservices | Master's | 2024 |
Optimizing Relevant Quality Attributes of Collaborating Autonomous UAVs | Bachelor's | 2024 |
Test Case Generation for Robust Behavior During Component Failures in Collaborating Autonomous Aerial Vehicles | Master's | 2024 |
Fuzzing Algorand Smart Contracts | Master's | 2024 |
Regression Test Selection for Rust | Guided R. | 2023 |
Increasing Data Sharing Appeal Through Incentive Mechanisms | Master's | 2023 |
Evaluation of a Metric for Measuring Program Code Change | Master's | 2023 |
An Empirical Investigation of Chilling Effects Induced by Workplace Software | Master's | 2023 |
Static Analysis of Algorand Smart Contracts | Bachelor's | 2023 |
Applying Safety Testing to Collaborative Unmanned Aerial Vehicles | Bachelor's | 2023 |
Informing Consent Decisions to Usage of Health Data in an Inverse Transparent Workplace | Bachelor's | 2023 |
Non-repudiable Data Exchange With Blockchain | Bachelor's | 2023 |
Automated Smart Contract Quality Assurance | Bachelor's | 2023 |
Automatically Detecting Flaky End-to-End Test Failures Using Code Coverage | Master's | 2023 |
Automated Fault Localization in Matlab Simulink Models | Bachelor's | 2023 |
Model-Based Diagnosis on Cyber-Physical Systems | Bachelor's | 2023 |
Automatic Failure Categorization – An Ablation Study | Master's | 2023 |
Reducing Effort for Flaky Test Detection Through Resource Limitation | Bachelor's | 2023 |
Tool-Supported Reconstruction of Software Architectures | Master's | 2023 |
Applicability of Blockchain Technologies When Handling Personally Identifiable Information | Bachelor's | 2023 |
Privacy Boosts: Benevolent Educational Interventions for Data Subjects’ Privacy Behaviour | Bachelor's | 2023 |
Analyzing the Effectiveness of Rerunning Tests for Detecting Flaky UI Tests | Bachelor's | 2022 |
Scenarios in the Intersection Context - Data-Driven Derivation and Description | Master's | 2022 |
Multi-Party End-to-End Encryption for the Inverse Transparency Toolchain | Master's | 2022 |
Integrating Defect Class Predictions into the Review Workflow of Testers | Master's | 2022 |
Practical Application of Flaky Test Identification and Classification for Root Cause Analysis in the Context of Continuous Integration | Master's | 2022 |
Design of a Zero Trust Infrastructure for the Execution of GDPR Rights (Entrepeneurial Masterclass) | Master's | 2022 |
Data Owner Benefit-Driven Design of People Analytics | Guided R. | 2022 |
Reducing Effort for Flaky Test Detection through Dynamic Program Analysis | Bachelor's | 2022 |
Incentive Mechanism Design for an Inverse Transparent Environment | Master's | 2022 |
Metamorphic Testing of LiDAR/RADAR Obstacle Detection Systems | Master's | 2022 |
Latent Space-Based Test Case Generation of Naturally Occurring Environmental Conditions for Traffic Sign Classifiers | Master's | 2022 |
Search-Based Robustness Testing for Deep Learning Computer Vision Systems | Master's | 2022 |
Empirical Analysis of Flaky Tests in Practice - An Automotive Case Study | Bachelor’s | 2022 |
Model-based Fault Localization for System-level Testing of Cyber-Physical Systems | Bachelor’s | 2022 |
Failure Cause Analysis in Regression Testing for Automotive Software | Bachelor’s | 2022 |
Search-Based Robustness Testing for Deep Learning Computer Vision Systems | Master's | 2022 |
Dependency-Injection-Aware Regression Test Selection | Bachelor's | 2022 |
Regression Test Selection for End-to-end Testing in Distributed Multi-language Web Applications | Master's | 2022 |
Determining Root Causes of Flaky Tests Using System Call Analysis | Master's | 2022 |
Detecting Code Smells using Graph Neural Networks | Bachelor's | 2022 |
Metamorphic Testing of LiDAR/RADAR Obstacle Detection Systems | Master's | 2022 |
Blockchain-based Logging for the Inverse Transparency Toolchain | Bachelor's | 2022 |
Inverse Transparency for Cloud Architectures | Bachelor's | 2022 |
Scraping online documentation of Ardupilot UAV system to generate a knowledge-based causal graph | Bachelor’s | 2022 |
Automatic derivation of traffic scenario instance descriptions for testing automated and autonomous driving systems in the highway context | Bachelor's | 2022 |
Automatic derivation of traffic scenario instance descriptions for testing automated and autonomous driving systems in the intersection context | Bachelor's | 2022 |
Building a UAV Flight Data Set | Bachelor’s | 2022 |
Investigating Inter-Class Attributes for Capturing Software Maintainability | Master's | 2022 |
Latent Space-Based Test Case Generation of Naturally Occurring Environmental Conditions for Traffic Sign Classifiers | Master's | 2022 |
Evaluating the Impact of Knowledge Aggregation with Subjective Logic on the Overall System's Adaptivity in Multi-Agent Self-Adaptive Cyber-Physical Systems | Master’s | 2022 |
Designing a Usable Inverse Transparency Dashboard | Master's | 2022 |
Evaluating the Impact of the Base Rate in Knowledge Aggregation with Subjective Logic in Multi-Agent Self-Adaptive Cyber-Physical Systems | Bachelor’s | 2021 |
Defect Prediction in Open Source Software Using Workflow Metrics | Master's | 2021 |
Quantifying Adequacy of Software-Programs | Master's | 2021 |
IT security awareness: comparing inovulation methods | Master's | 2021 |
Qualitative Metrics for the Assessment of Intrusion Detection on the Controller Area Network | Master's | 2021 |
Scaling Self-Checksumming Combined with Virtualization Obfuscation to Real-World Software | Bachelor's | 2021 |
Software Integrity Protection Versus Machine Learning Attacks | Master's | 2021 |
A Framework for Engineering Self-Adaptive Cyber-Physical Systems | Master's | 2021 |
Detecting Smells in Data Models | Master's | 2021 |
Identifier Dictionary | Bachelor's | 2021 |
Configuration of Static Analysis Tools for Effective Bug Detection | Master's | 2021 |
Tamper-proof Inverse Transparency Logs with Intel SGX | Bachelor's | 2021 |
Inverse Transparency in High Data Security Environments | Bachelor's | 2021 |
Scaling Self-Checksumming Combined with Virtualization Obfuscation to Real-World Software | Bachelor's | 2021 |
Model-based Fault Localization for Cyber-Physical Systems with Limited Observability | Bachelor’s | 2021 |
Applying Inverse Transparency to Intercompany Contexts | Bachelor's | 2021 |
Co-Simulation-based Experimental Platform for Cyber-Physical Systems | Bachelor's | 2021 |
Algorithmic Accountability for Inverse Tranparency | Master's | 2021 |
A Super-Metric for Measuring Adequacy in the Context of Software Architecture and Software Programming | Master's | 2021 |
Enabling Sensible People Analytics with Inverse Transparency | Master's | 2021 |
Using Text- and Image-Based Machine Learning to Predict Software Quality | Master's | 2021 |
Assessing the Reliability of Optimization Algorithms for Detecting Worst-Case Situations for UAVs | Bachelor's | 2021 |
A Systematic Assessment of Machine Learning-Based Intrusion Detection Systems for the Automotive Domain | Bachelor's | 2021 |
Automatisiertes Test Management für Hardware-in-the-loop Prüfstände im Automobilumfeld | Bachelor's | 2021 |
Systematic Evaluation and Refinement of Automotive Intrusion Detection Systems | Master's | 2021 |
Evaluation Framework for a Self-Adaptive Cyber-Physical System on an Example of a Multi-Robot System | Master’s | 2021 |
Incident Response Automation: Challenges and Opportunities for Automated Course of Action Deployment | Master’s | 2021 |
Generation of OVAL Checks for Security-Configuration Assessments | Bachelor’s | 2021 |
Automatic Selection of Security-relevant Configurations | Bachelor’s | 2021 |
A study on failure situation exploration and the benefits for iterative diagnosis | Bachelor's | 2021 |
Using machine learning to predict software vulnerabilities in low-level code | Master's | 2021 |
Regression Test Optimization in Microservices by Linking Distributed Tracing with Code Instrumentation | Master's | 2021 |
Run-time Reasoning and Solving Conflicting Observations with Subjective Logic in Multi-Agent Self-Adaptive Cyber-Physical Systems | Master’s | 2020 |
Semantically-Enhanced Failure Diagnosis : Application of Ontology-based Reasoning to an Autonomous Crane System | Master’s | 2020 |
Tracking Jira Data Accesses through the Database Layer | Bachelor’s | 2020 |
An Analysis Plugin Toolbox for Jira Software | Bachelor’s | 2020 |
Methodologically Achieving User Trust | Bachelor’s | 2020 |
Fighting bushfires with Preparation: Prevention of Malware spread using Security-Configuration Guidelines | Bachelor’s | 2020 |
Change-based Test Execution Optimization in the Development Environment | Bachelor’s | 2020 |
Realization of Adaptive System Transitions for Smart Self-Adaptive Cyber-Physical Systems using a Modular Approach with Learned Parameters on an Example of Multi-Robot Collaboration | Master’s | 2020 |
Experimental Derivation of Fitness Functions for Testing Automated and Autonomous Driving Systems in Road Intersection Scenarios | Master’s | 2020 |
Multi-Agent Partially Observable Markov Decision Processes for Planning in Multi-Robot Self-Adaptive Cyber-Physical Systems | Guided R. | 2020 |
Logical Architecture for Engineering Smart Self-Adaptive Cyber- Physical Systems | Guided R. | 2020 |
Anomaly Detection in Multi-Agent Cyber-Physical Systems | Bachelor’s | 2020 |
Automatic and Reproducible Attacks on insecurely configured Systems based on Security-Configuration Rules | Master’s | 2020 |
Automating User Acceptance Tests | Bachelor’s | 2020 |
Assessing the Quality of Data Models | Master’s | 2020 |
Mining Repositories for Automatic Quality Estimations | Bachelor’s | 2020 |
Preventing Repackaging of Android Apps Using Integrity Checking | Master’s | 2020 |
Similarity-based System Trajectory Classification | Bachelor’s | 2020 |
Cornering Cohesion: Investigating new ways to measure cohesion | Master’s | 2020 |
Failure Pattern Recognition based on Test Results in Hardware-in-the-Loop Setups | Master’s | 2020 |
Measuring cohesion and coupling: a comparison of different metrics and their usefulness for software quality analyses | Bachelor’s | 2020 |
Title | Type | Year |
---|---|---|
Model-driven Monitoring Orchestration For Microservices | Master’s | 2019 |
A Canvas for Causal Modeling | Bachelor’s | 2019 |
A labeling Platform for Source COde | Bachelor’s | 2019 |
Multi-Source Knowledge Aggregation in Subjective Logic | Master’s | 2019 |
Security-Configuration Automation for UNIX | Master’s | 2019 |
Design of an Improved Scapolite Check Mechanism | Bachelor’s | 2019 |
Automatic Security Configuration for Mobile Devices | Bachelor’s | 2019 |
Conflict Scenarios for an Accountability-Enabled Multi-Robot Simulation | Bachelor’s | 2019 |
Path Planning and Consensus Algorithms for an Accountability-Enabled Multi-Robot Simulation | Bachelor’s | 2019 |
Modelling of Attack Trees for Security Assessment of Hardening Mechanisms | Bachelor’s | 2019 |
Building a Framework for Objective Evaluation of Malware Detection Methods | Bachelor’s | 2019 |
Detection of Android Repackaged Malware with Active Learning | Bachelor’s | 2019 |
Resilience of SIP against ML-based attacks | Master’s | 2019 |
Knowledge Discovery from Drone Logs | Master’s | 2019 |
Vectorizing Software for Machine Learning | Master’s | 2019 |
Identification of generated code parts | Bachelor’s | 2019 |
Simplifying Configuration Management in the Automotive Industry | Master’s | 2019 |
Securing Microservice Cluster Management Cockpit using Blockchain | Master’s | 2019 |
Public key Tracing Framework using Blockchain | Master’s | 2019 |
Software protection composition framework | Master’s | 2019 |
Design and Implementation of ROS-Based Simulated Multi-Robot Systems for Data Collection | Master’s | 2019 |
Runtime Verification of Dynamic Architectures | Master’s | 2018 |
Constraint size thresholding in symbolic execution for broader path coverage | Bachelor’s | 2018 |
Fast and parallel compositional fuzzing aided by symbolic execution | Bachelor’s | 2018 |
Design and Evaluation of an Agile Software Development Process for Space Applications | Master’s | 2018 |
Real-Time Remote Intrusion Detection | Master's | 2018 |
Comparing Stimulation Techniques for Detecting Android Piggybacked Malware | Master’s | 2018 |
Software Protection Ontology Visualization | Bachelor’s | 2018 |
Automatic Repackaging of Android Applications | Bachelor’s | 2018 |
Self-adaptive cyber-physical systems utilizing different machine learning techniques | Guided Research | 2018 |
Analysis and Detection of Repackaged Malware Behavior | Master’s | 2018 |
Testing Advanced Driver Assistance Systems: Procedural Environment Generation for Simulated Test Scenarios | Master’s | 2017 |
Impact factors for severity assessment of bugs discovered via compositional symbolic execution | Master’s | 2017 |
Anomaly detection and prediction in distributed software systems using machine learning | Bachelor’s | 2017 |
Repackaged Malware Detection in Android | Bachelor’s | 2017 |
Dynamic Taint Analysis for Java-based applications | Bachelor’s | 2017 |
Benchmarking Symbolic Execution Tools on Custom Block Ciphers | Bachelor’s | 2017 |
Search-Based Procedural Environment Generation for Simulated Test Scenarios | Guided Research | 2017 |
Visualization of Causality Algorithms | Master’s | 2017 |
Qualifizierung von Template-basierendem C++-Code | Bachelor’s | 2017 |
Evaluierung suchebasierter Verfahren zur automatischen Generierung von Testfällen für kontinuierliche Systeme | Master’s | 2017 |
Runtime Service Adaption in the Context of Composed Usage Control Driven Services | Bacherlor’s | 2017 |
Prediction of automated deobfuscation & tampering time using machine learning | Master’s | 2017 |
iOS Application Hardening via Obfuscation | Master’s | 2017 |
Detecting Process Memory Tampering | Bachelor’s | 2016 |
Compositional analysis for exposing vulnerabilities - A symbolic execution approach | Master’s | 2016 |
Building Accountability Mechanisms into the Roomba iRobot | Bachelor’s | 2016 |
Automated Attack Planning using a Partially Observable Model for Penetration Testing of Industrial Control Systems | Master’s | 2016 |
Automatic Generation of Secure and Usable Mnemonic Passphrases | Master’s | 2016 |
State of the Art Survey of Security Incident Management compliant to ISO 27001 | Guided Research | 2016 |
A Reliable Automated Vulnerability Check in Continuous Integration | Bachelor’s | 2016 |
Botnet Battlefield | Master’s | 2016 |
Tool Support for Social Engineering Threat Analysis | Master’s | 2016 |
Software Protection by Self-Checking | Master’s | 2016 |
A Study of Checking Equivalence of Software Programs | Bachelor’s | 2015 |
Malware Detection with Temporal Quantitative Data Flow Graphs | Master’s | 2015 |
Fault detection with symbolic execution for Java | Master’s | 2015 |
A Comparative Study of Secret Sharing Schemes | Master’s | 2015 |
Combining fault-based and model-based testing for web applications | Bachelor’s | 2015 |
Software Protection by Virtualization Obfuscation | Master’s | 2015 |
A Taxonomy of Browser Hijacking Malware | Guided Research | 2015 |
Metadata Recovery of Transformations from Obfuscated Software via Machine Learning Techniques | Master’s | 2015 |
Enhancing Accuracy for Usage Control Enforcement | Bachelor’s | 2015 |
Composing data-usage-driven Services | Bachelor’s | 2015 |
Securing Data Usage Control Infrastructures | Master’s | 2015 |
Raising the Bar for Automated Attacks against Web Applications using Software Diversity | Master’s | 2015 |
Model Based Development of a Safety AUTOSAR Basic Software Component - NVRAM Manager | Bachelor’s | 2015 |
A Comparative Study of Secret Sharing Schemes | Master’s | 2015 |
Checking Non-Equivalence of Software Programs using Symbolic Execution | Bachelor’s | 2015 |
Regressionstests mit Fehlermodellen | Bachelor’s | 2015 |
Zum Verhältnis von Agilität und Architektur | Master’s | 2015 |
Design and Implementation of “Sealed Search” on Encrypted Data while Maintaining Privacy | Master’s | 2015 |
A Generic Description Language for Fault Models | Bachelor’s | 2015 |
Towards Testing Malware Detection Systems using Behavior Obfuscation | Bachelor’s | 2015 |
Usage Control for Apple iOS | Master’s | 2015 |
Code Transformations and Software Diversity for Improving Software Attack and Analysis Resilience | Master’s | 2014 |
Monitoring Compliance of Third-Party Applications in Online Social Networks | Bachelor’s | 2014 |
Graph-based system profiling and anomaly detection | Master’s | 2014 |
Erstellen einer Fehlerdatenbank mit zugehörigem Pflegeprozess | Master’s | 2014 |
Towards improving data driven usage control precision with intra-process data-flow tracking | Master’s | 2014 |
A Qualitative Study of Indistinguishability Obfuscation | Bachelor’s | 2014 |
Fault-model driven test derivation for controller-based systems | Master’s | 2014 |
Quantitative Data Flow Pattern Mining for Malware Detection | Master’s | 2014 |
Data Usage Control for Office Applications | Master’s | 2014 |
Asset Protection via White Box Cryptography | Master’s | 2014 |
Towards data flow graph based misuse detection at the Windows kernel level | Bachelor’s | 2014 |
A Test Automation Framework for AJAX-based Web Applications | Bachelor’s | 2013 |
A dynamically configurable Policy Information Point | Bachelor’s | 2013 |
Testing Concurrency in Android Apps | Master’s | 2013 |
Dynamic Information Flow Tracking for V8 | Master’s | 2013 |
Distributed Usage Control for the mySQL Server | Master’s | 2012 |
Data Usage Control for Google Chrome | Diplomarbeit | 2012 |
Assessment of HTML5 security properties and emerging web security threats | Master’s | 2012 |
Data Usage Control for the Thunderbird Mail Client | Master’s | 2012 |
A Policy Management Infrastructure for Distributed Usage Control | Master’s | 2011 |
Implementation of Usage Control for the Windows API | Master’s | 2011 |
Extending Android with Usage Control Policies | Master’s | 2011 |
A hypervisor-based bus system for inter-level data flow tracking | Master’s | 2011 |
Data Usage Control for a Web Application: The Server | Bachelor’s | 2010 |
Data Usage Control for a Web Application: The Client | Bachelor’s | 2010 |
Bringing Trust to the Cloud | Bachelor’s | 2010 |
Usage Control for Dynamically Loaded Windows Binaries | Bachelor’s | 2010 |
Title | Type | Year |
---|---|---|
Engineering Bytecode to Detect Implicit Information Flow | Bachelor’s | 2009 |
Usage Control Enforcement with an Application to the X11 Protocol | Master’s | 2009 |
Usage Control Enforcement at the CPU level | Master’s | 2009 |
Usage Control Enforcement at the Java bytecode level | Master’s | 2009 |
Analysis of Usage Control Policies | Master’s | 2008 |
Delegation in Usage Control | Master’s | 2008 |
AXIS-Based Configuration of Services for Usage Control | Studienarbeit | 2008 |
Sicherheitsanalyse einer Webapplikation | Studienarbeit | 2007 |
Policy Evaluation and Negotiation in Distributed Usage Control | Master’s | 2007 |
Translating Usage Control Policies | Studienarbeit | 2007 |
Implementing DRM on a Mobile Phone | Studienarbeit | 2007 |
Monitoring Usage Control Requirements | Master’s | 2006 |
A Taxonomy of Usage Control Mechanisms | Studienarbeit | 2006 |
Definition struktureller Überdeckungsmaße für den Test von Continuous Function Charts | Bachelor’s | 2004 |
Onboard-Testsystem für teilautomatisierte Benutzerfunktionstests im Fahrzeug | Diplomarbeit | 2003 |
Konzeption und prototypische Implementierung einer Software-Diagnose-Infrastruktur im Fahrzeug | Diplomarbeit | 2003 |