(see table ) To register in the announcement mailing list,
contact Milivoj Simeonovski.
Description
This is the joint Bachelor/Master Seminar of the following security groups:
Information Security and
Cryptography
,
Secure and Privacy-Preserving Systems
,
System Security
,
Trusted Systems Group
.
Each student that writes a bachelor’s or master’s thesis with a member of one
of these groups has to present the topic of the thesis in the Bachelor/Master
Seminar and to attend all talks of this bachelor/master seminar.
Time Table
Date | Speaker | Title |
---|---|---|
21.01.2015 | Marvin Wißfeld | Method Hooking on ART |
28.01.2015 | Lukas Subel | Effective Slice Merging using Partial Evaluation |
04.02.2015 | Simon Koch | Correlating Traceroute Data and BGP Data |
11.02.2015 | Markus Bauer |
MATor for the masses
Integrating an anonymity analyzer in the Tor browser |
18.02.2015 | Gregor Geßner | Automatic Compilation of Security Specifications to Java Code |
15.04.2015 | Ashkan Taslimi | SSL Sniffer Box for Versatile Client Side Attacks |
29.04.2015 | Nicolas Huaman |
Usability of a right to be forgotten – Implementation and evaluation of the
Oblivion framework regarding usability |
06.05.2015 | Lukas Subel | Improving web scanners by including event dependency of client-side code |
13.05.2015 | Filip Fatz | A version agnostic API for defining fine-grained app-policies on Android |
27.05.2015 | Tobias Theobald | Identity Web of Trust |
27.05.2015 | Simon Heinzel | Novel distributed trusted-party time-release encryption protocol |
10.06.2015 | Vikash Patel | Argumentation Mining for the Sake of Privacy |
10.06.2015 | Abhishek Tiwari | Applying Privacy Case Law to the Right to be Forgotten |
17.06.2015 | Uzair Mahmood | Ensuring Integrity in Recommendation Systems |
01.07.2015 | Lukas Wedeking | Real time anonymity guarantees for Tor hidden services |
01.07.2015 | Khaled Blah | Tainting ART – Information flow taint tracking in the new Android Runtime |
08.07.2015 | Lukas Krämer |
Using Darknets to Enrich Protocols of Amplification DDoS
Honeypots |
08.07.2015 | Marvin Wißfeld | ArtHook – Callee-side method hook injection on the new Android runtime ART |
15.07.2015 | Sascha Groß |
Detecting obfuscated browser fingerprinting by dynamic JavaScript
instrumentation |
15.07.2015 | Oliver Schranz |
The ART of Taint Tracking: Towards Compiler-Assisted Taint Tracking on the
Android Runtime |
29.07.2015 | Niklas Brachmann | Security Analysis of P2P-based Messengers |
29.07.2015 | Frederik Endner-Dühr | Typosquatting Prevalence Analysis |
05.08.2015 | Andrey Chernov | Large-scale Study of Interdependence of the Popular Web Services |
05.08.2015 | Patrick Bender | Attack strategies of banking trojans |
11.08.2015 | Tobias Theobald | Identity Web of Trust |
13.08.2015 | Simon Koch | Correlating BGP and Traceroute Data |
13.08.2015 | Uzair Mahmood | Ensuring integrity of recommendations in a Marketplace |
26.08.2015 | Nils Lipp | Reference monitoring in the Android Application framework |
09.09.2015 | Vikash Patel | Argumentation Mining for the Sake of Privacy |
09.09.2015 | Michael Brengel | Detecting Hardware-Assisted Virtualized Systems |
16.09.2015 | Markus Bauer | MATor for the masses – Integrating an anonymity analyzer in the Tor browser |
16.09.2015 | Fabian Schwarz | Security Analysis of Mobile Banking Apps |
23.09.2015 | Oliver Schranz |
The ART of Taint Tracking: Towards Compiler-Assisted Taint Tracking on the
Android Runtime |
23.09.2015 | Khaled Blah | Tainting ART – Information flow in the new Android Runtime |
21.10.2015 | Xiaofan Zhang | Exhaustive Search for ROP Gadgets |
28.10.2015 | Daniel Franssinelli | Security analysis of telematic and emergency devices in a modern car |
04.11.2015 | Ulrich Steiger | Fuzzing Framework for Android Middleware Services |
04.11.2015 | Madhu Murugant | Prevalence of security APIs and their misuse in Android applications |
18.11.2015 | Abhishek Tiwari | Applying Privacy Case Law to the Right to be Forgotten |
18.11.2015 | Tahleen Rahman | Curious Volunteers: Anonymity Impact of Adding New Tor nodes |
25.11.2015 | Max Schlüter | Precise Permission Mapping on Android |
16.12.2015 | Daniel Waxweiler | Making Chromium’s Certificate Transparency Integration More Accessible |
20.01.2016 | Sascha Groß | Detecting obfuscated browser fingerprinting by dynamic JavaScript instrumentation |
20.01.2016 | Filip Fatz | Toward a Backward-compatible API for Defining Fine-grained App Policies on Android |
10.02.2016 | Rapol Tongchenchitt | Beyond Information Leakage: Customizable Policy Verification for Android Apps |
24.02.2016 | Tahleen Awazid Rahman | Curious Volunteers: Anonymity Impact of Adding New Tor nodes |
23.03.2016 | Jonas Bushart | Time-to-Live based Trilateration |
30.03.2016 | Nils Lipp | Full Reference Monitoring for Android Intents |
20.04.2016 | Ferdinand-Dennis Jost | Online Banking Integrity Countering Web Injects |
25.04.2016 | Inken Hagestedt | Static Analysis of Noninterference for Android Apps |
27.04.2016 | Frederic Endner-Dühr | Extracting and Modeling Typosquatting Errors from Large-scale Passive DNS Data |
10.05.2016 | Mark Schuegraf | Dynamic Confirmation of Statically Discovered Information Leaks |
18.05.2016 | Lukas Wedeking | Anonymity guarantees for Tor Hidden Services |
02.06.2016 | Duc Cuong Nguyen | Better Early Than Never: Supporting Android Developers to Write Secure Code |
28.06.2016 | Lukas Subel | Code pattern extraction with dynamically generated event dependency graphs for client-side Javascript web applications |
29.06.2016 | Daniel Waxweiler | Making Chromium’s Certificate Transparency integration more accessible |
27.07.2016 | Joshua Steffensky | Hardening Intel SGX enclaves against memory safety exploits |
03.08.2016 | Madhu Murugant | A Comprehensive analysis on the misuse of security relevant APIs in Android applications and a study of security-awareness among Android developers |
10.08.2016 | Rapol Tongchenchitt | Beyond Information Leakage: Customizable Policy Verification for Android Apps |
07.09.2016 | Muhammad Azeem | Xposify: Application Customization In A Sandboxed Environment |
07.09.2016 | Subhashini Ananthapadmanaban | Notify Them Right: Analysis of how (error) information is communicated to Android users |
28.09.2016 | Marvin Wißfeld | Seamless Android ad blocking using instructed class injection |
28.09.2016 | Sebastian Dietel | Towards Native Client Executables via Binary Translation on the x86 Platform |
05.10.2016 | Suresh Krishna | Investigating the Ecological Validity of an Android Permission Study |
19.10.2016 | Nicolas Huaman | Usability of a Right to be Forgotten |
19.10.2016 | Duc Cuong Nguyen | Better Early Than Never: Supporting Android Developers in Writing Secure Code |
19.10.2016 | Joshua Steffensky | Hardening Intel SGX enclaves against memory safety exploits |
02.11.2016 | Inken Hagestedt | Static Analysis of Noninterference for Android Apps |
14.11.2016 | Ahmed Salem | CRRP: A Cryptographic Protocol for Coercion-Resistant Rating Platforms |
22.11.2016 | Sharmeen Rehan | Policing Javascript components based on Source Privilege Assignment |
23.11.2016 | Muhammad Azeem | Xposify: Application Customization In A Sandboxed Environment |
30.11.2016 | Artem Perlov | Transparent Encryption of Persistent Memory on Android |
07.12.2016 | Giovanni De Francesco | DevARTist – Compiler-based vulnerability patching on the Android Runtime |
25.01.2017 | Sebastian Becking | Old Wine Into New Wineskins: Spreading Malware In Social Networks |
29.03.2017 | Dominic Deuber | Scambait – A fully automated scam baiting tool |
29.03.2017 | Ulrich Kriependorf | A Fuzzer Framweork for Androids Middleware |
29.03.2017 | Ábris Nagy | Text watermarking in PDF documents |
12.04.2017 | Ferdinand-Dennis Jost | Online Banking Integrity Countering Web Injects |
26.04.2017 | Savita Seetaraman | Threat Modeling of Plexus |
03.05.2017 | Subhashini Ananthapadmanaban | Notify Them Right: A large scale analysis on how developers communicate (error) information to Android users |
03.05.2017 | Sebastian Becking | Old Wine Into New Wineskins: Spreading MalwareIn Social Networks |
31.05.2017 | Sebastian Roth | A Platform to Recruit GitHub Users for Developer Studies |
14.06.2017 | Andrey Chernov |
Developing a Property-Graph-Based Framework for Analysis of Large-Scale
Network Threats |
21.06.2017 | Marius Steffens | Tale of the Tangled Web: A historic overview of the (In)Security of Client Side Web Applications |
19.07.2017 | Kevin Morio | A definition of accountability for protocols in the cryptographic model |
26.07.2017 | Giovanni De Francesco | DevArtist: Evaluating a Compiler-Based Approach to Application Hardening on Android |
26.07.2017 | Suresh Krishna Thiyagarajan | On the Ecological Validity of Android Permissions User Study |