Lecture Type
Bachelor/Master Seminar
Time/Place
Wednesday 14 – 16, Building E9 1 (CISPA), Room 3.08, only if a talk is scheduled
(see table ) To register in the announcement mailing list,
contact Milivoj Simeonovski.
Language
English
Administration

Description

This is the joint Bachelor/Master Seminar of the following security groups:
Information Security and
Cryptography
,
Secure and Privacy-Preserving Systems ,
System Security ,
Trusted Systems Group .
Each student that writes a bachelor’s or master’s thesis with a member of one
of these groups has to present the topic of the thesis in the Bachelor/Master
Seminar and to attend all talks of this bachelor/master seminar.

Time Table

Date Speaker Title
21.01.2015 Marvin Wißfeld Method Hooking on ART
28.01.2015 Lukas Subel Effective Slice Merging using Partial Evaluation
04.02.2015 Simon Koch Correlating Traceroute Data and BGP Data
11.02.2015 Markus Bauer MATor for the masses
Integrating an anonymity analyzer in the Tor browser
18.02.2015 Gregor Geßner Automatic Compilation of Security Specifications to Java Code
15.04.2015 Ashkan Taslimi SSL Sniffer Box for Versatile Client Side Attacks
29.04.2015 Nicolas Huaman Usability of a right to be forgotten – Implementation and evaluation of the
Oblivion framework regarding usability
06.05.2015 Lukas Subel Improving web scanners by including event dependency of client-side code
13.05.2015 Filip Fatz A version agnostic API for defining fine-grained app-policies on Android
27.05.2015 Tobias Theobald Identity Web of Trust
27.05.2015 Simon Heinzel Novel distributed trusted-party time-release encryption protocol
10.06.2015 Vikash Patel Argumentation Mining for the Sake of Privacy
10.06.2015 Abhishek Tiwari Applying Privacy Case Law to the Right to be Forgotten
17.06.2015 Uzair Mahmood Ensuring Integrity in Recommendation Systems
01.07.2015 Lukas Wedeking Real time anonymity guarantees for Tor hidden services
01.07.2015 Khaled Blah Tainting ART – Information flow taint tracking in the new Android Runtime
08.07.2015 Lukas Krämer Using Darknets to Enrich Protocols of Amplification DDoS
Honeypots
08.07.2015 Marvin Wißfeld ArtHook – Callee-side method hook injection on the new Android runtime ART
15.07.2015 Sascha Groß Detecting obfuscated browser fingerprinting by dynamic JavaScript
instrumentation
15.07.2015 Oliver Schranz The ART of Taint Tracking: Towards Compiler-Assisted Taint Tracking on the
Android Runtime
29.07.2015 Niklas Brachmann Security Analysis of P2P-based Messengers
29.07.2015 Frederik Endner-Dühr Typosquatting Prevalence Analysis
05.08.2015 Andrey Chernov Large-scale Study of Interdependence of the Popular Web Services
05.08.2015 Patrick Bender Attack strategies of banking trojans
11.08.2015 Tobias Theobald Identity Web of Trust
13.08.2015 Simon Koch Correlating BGP and Traceroute Data
13.08.2015 Uzair Mahmood Ensuring integrity of recommendations in a Marketplace
26.08.2015 Nils Lipp Reference monitoring in the Android Application framework
09.09.2015 Vikash Patel Argumentation Mining for the Sake of Privacy
09.09.2015 Michael Brengel Detecting Hardware-Assisted Virtualized Systems
16.09.2015 Markus Bauer MATor for the masses – Integrating an anonymity analyzer in the Tor browser
16.09.2015 Fabian Schwarz Security Analysis of Mobile Banking Apps
23.09.2015 Oliver Schranz The ART of Taint Tracking: Towards Compiler-Assisted Taint Tracking on the
Android Runtime
23.09.2015 Khaled Blah Tainting ART – Information flow in the new Android Runtime
21.10.2015 Xiaofan Zhang Exhaustive Search for ROP Gadgets
28.10.2015 Daniel Franssinelli Security analysis of telematic and emergency devices in a modern car
04.11.2015 Ulrich Steiger Fuzzing Framework for Android Middleware Services
04.11.2015 Madhu Murugant Prevalence of security APIs and their misuse in Android applications
18.11.2015 Abhishek Tiwari Applying Privacy Case Law to the Right to be Forgotten
18.11.2015 Tahleen Rahman Curious Volunteers: Anonymity Impact of Adding New Tor nodes
25.11.2015 Max Schlüter Precise Permission Mapping on Android
16.12.2015 Daniel Waxweiler Making Chromium’s Certificate Transparency Integration More Accessible
20.01.2016 Sascha Groß Detecting obfuscated browser fingerprinting by dynamic JavaScript instrumentation
20.01.2016 Filip Fatz Toward a Backward-compatible API for Defining Fine-grained App Policies on Android
10.02.2016 Rapol Tongchenchitt Beyond Information Leakage: Customizable Policy Verification for Android Apps
24.02.2016 Tahleen Awazid Rahman Curious Volunteers: Anonymity Impact of Adding New Tor nodes
23.03.2016 Jonas Bushart Time-to-Live based Trilateration
30.03.2016 Nils Lipp Full Reference Monitoring for Android Intents
20.04.2016 Ferdinand-Dennis Jost Online Banking Integrity Countering Web Injects
25.04.2016 Inken Hagestedt Static Analysis of Noninterference for Android Apps
27.04.2016 Frederic Endner-Dühr Extracting and Modeling Typosquatting Errors from Large-scale Passive DNS Data
10.05.2016 Mark Schuegraf Dynamic Confirmation of Statically Discovered Information Leaks
18.05.2016 Lukas Wedeking Anonymity guarantees for Tor Hidden Services
02.06.2016 Duc Cuong Nguyen Better Early Than Never: Supporting Android Developers to Write Secure Code
28.06.2016 Lukas Subel Code pattern extraction with dynamically generated event dependency graphs for client-side Javascript web applications
29.06.2016 Daniel Waxweiler Making Chromium’s Certificate Transparency integration more accessible
27.07.2016 Joshua Steffensky Hardening Intel SGX enclaves against memory safety exploits
03.08.2016 Madhu Murugant A Comprehensive analysis on the misuse of security relevant APIs in Android applications and a study of security-awareness among Android developers
10.08.2016 Rapol Tongchenchitt Beyond Information Leakage: Customizable Policy Verification for Android Apps
07.09.2016 Muhammad Azeem Xposify: Application Customization In A Sandboxed Environment
07.09.2016 Subhashini Ananthapadmanaban Notify Them Right: Analysis of how (error) information is communicated to Android users
28.09.2016 Marvin Wißfeld Seamless Android ad blocking using instructed class injection
28.09.2016 Sebastian Dietel Towards Native Client Executables via Binary Translation on the x86 Platform
05.10.2016 Suresh Krishna Investigating the Ecological Validity of an Android Permission Study
19.10.2016 Nicolas Huaman Usability of a Right to be Forgotten
19.10.2016 Duc Cuong Nguyen Better Early Than Never: Supporting Android Developers in Writing Secure Code
19.10.2016 Joshua Steffensky Hardening Intel SGX enclaves against memory safety exploits
02.11.2016 Inken Hagestedt Static Analysis of Noninterference for Android Apps
14.11.2016 Ahmed Salem CRRP: A Cryptographic Protocol for Coercion-Resistant Rating Platforms
22.11.2016 Sharmeen Rehan Policing Javascript components based on Source Privilege Assignment
23.11.2016 Muhammad Azeem Xposify: Application Customization In A Sandboxed Environment
30.11.2016 Artem Perlov Transparent Encryption of Persistent Memory on Android
07.12.2016 Giovanni De Francesco DevARTist – Compiler-based vulnerability patching on the Android Runtime
25.01.2017 Sebastian Becking Old Wine Into New Wineskins: Spreading Malware In Social Networks
29.03.2017 Dominic Deuber Scambait – A fully automated scam baiting tool
29.03.2017 Ulrich Kriependorf A Fuzzer Framweork for Androids Middleware
29.03.2017 Ábris Nagy Text watermarking in PDF documents
12.04.2017 Ferdinand-Dennis Jost Online Banking Integrity Countering Web Injects
26.04.2017 Savita Seetaraman Threat Modeling of Plexus
03.05.2017 Subhashini Ananthapadmanaban Notify Them Right: A large scale analysis on how developers communicate (error) information to Android users
03.05.2017 Sebastian Becking Old Wine Into New Wineskins: Spreading MalwareIn Social Networks
31.05.2017 Sebastian Roth A Platform to Recruit GitHub Users for Developer Studies
14.06.2017 Andrey Chernov Developing a Property-Graph-Based Framework for Analysis of Large-Scale
Network Threats
21.06.2017 Marius Steffens Tale of the Tangled Web: A historic overview of the (In)Security of Client Side Web Applications
19.07.2017 Kevin Morio A definition of accountability for protocols in the cryptographic model
26.07.2017 Giovanni De Francesco DevArtist: Evaluating a Compiler-Based Approach to Application Hardening on Android
26.07.2017 Suresh Krishna Thiyagarajan On the Ecological Validity of Android Permissions User Study