Individualprojekte und Praktika

Neben unseren regelmäßig stattfindenden Projekten und Praktika (siehe rechte Spalte) bieten wir zusätzlich eine Reihe von individuellen Einzel- und Gruppenthemen für Projekte und Praktika an. Diese können je nach Prüfungsordnung als Teil des Projektmoduls im Master oder in Form eines Praktikumsschein als Studienleistung eingebracht werden. 

Aktuelle Ausschreibungen


Kleber, Stephan; Kargl, Frank
Feature Extraction for Type-based Alignment
Bachelor's or Master's thesis, Project
Institut of Distributed Systems, Ulm University,
2017
in Vorbereitung

Marker: AA, BA, MA, PROJEKT, StephanKleber, FrankKargl, itsec, networks

Zusammenfassung: Feature extraction provides the necessary input values to identify types of network messages by clustering. The task of this thesis is to implement and evaluate alternative feature extraction methods for clustering according to a method called type-based alignment.Possible alternative feature extraction methods to be implemented are: Minimum entropy clustering, entropy-based metrics, variance-based metrics, or frequencies of substrings.

Kleber, Stephan; Kargl, Frank
Automation of Analysis Result Quality Assessment
Bachelor's or Master's thesis, Project
Institut of Distributed Systems, Ulm University,
2017
in Vorbereitung

Marker: AA, BA, MA, PROJEKT, StephanKleber, FrankKargl, itsec, networks

Zusammenfassung: For an effective evaluation of multiple inference methods for network messages with a representative set of network protocol traces, automation is required. To accomplish this, the tasks of this thesis are tree-fold:1. Generate test-case specimens by preprocessing and filtering of selected network traces. An examples for a possible metric to be filtered for is high field-type variance.2. Evaluate the inference of the generated traces with the tools ReverX, Netzob, PRISMA, or even with an own implementation of known methods.3. For the automated assessment of the result quality for all evaluated inference methods, dissectors, like those of of scapy or Wireshark may be used for a quantifiable quality validation.The scope for the evaluation is limited to message type and format explicitly excluding the behavior model of the protocol.

Matousek, Matthias; Lang, Dominik
OBD Data-Logger for Driving Behaviour Analysis
Project
Institute of Distributed Systems, Ulm University,
2017
in Vorbereitung

Marker: MatthiasMatousek, DominikLang, PROJEKT, AA

Zusammenfassung: Analysis of driving behaviour presents opportunities for security, but comes with implications for privacy. In order to conduct research in this field, driving data is required. The goal of this project is to implement tools that log driving data from a vehicle's OBD port. Further, a framework for data analysis — e.g. via machine learning mechanisms — should be provided.

Matousek, Matthias
Comparison of Homomorphic Encryption Scheme Implementations
Master Thesis, Project
Institute of Distributed Systems, Ulm University,
2017
in Vorbereitung

Marker: AA, MA, PROJEKT, MatthiasMatousek

Zusammenfassung: Homomorphic Encryption (HE) -- the "holy grail" of cryptography -- allows computation on encrypted data without knowledge of the encryption keys. While it has been shown that both partially (only limited operations) as well as fully homomorphic crypto-systems (unlimited, arbitrary operations) are possible, they still come with substantial computation complexity and storage requirements. Goal of this work is to survey and compare HE scheme implementations. Properties of interest are their capabilities (partially vs. fully homomorphic), performance (speed and storage), as well as their favourable applications. The applicant should be familiar with IT security concepts (lecture "Security of IT-Systems") and cryptography (lecture "Kryptologie - Methoden und Algorithmen" and optimally "Privacy Engineering and Privacy Enhancing Technologies - PET"). They should further be interested in the application of different programming languages (such as C++, Python, Haskell, Java, and others). While no expert knowledge of programming languages is required, HE schemes are implemented in different languages, and thus, the willingness to explore these should be present. This topic is suitable for a Master thesis, or as a Master project.

van der Heijden, Rens
Replicating data-centric detection results in VANETs
(Individual) Project
Institute of Distributed Systems, Ulm Univerisity,
2017
in Vorbereitung

Marker: PROJEKT, RensVanDerHeijden, networks, mobile, itsec

Zusammenfassung: Vehicular ad-hoc networks (VANETs) have many applications that rely on the same type of data that is directly related to traffic and sensor data available to a vehicle. These applications include traffic jam warnings, efficient navigation for drivers, and improved safety; all of them rely on the accuracy of the data stored in the vehicle. In the scientific literature, there is a multitude of mechanisms to determine this accuracy; however, existing work is often not comparable. In this project, the goal is to implement several such mechanisms in the Java-based Maat framework, which is a prototype detection framework designed to combine detection results. The purpose is twofold; verifying that existing work behaves as expected (i.e., reproducing results) and enabling the use of these mechanisms in future studies.

Al-Momani, Ala'a
Assisting Physical Layer Parameters in Vehicular Scenarios
Project (8 ECTS)
Institute of Distributed Systems, Ulm University,
2016
in Vorbereitung

Marker: PROJEKT

Zusammenfassung: In order to integrate the Physical layer into the security framework in vehicular networks which are likely to be deployed in the near future, propagation aspects need to be investigated thoroughly to check the possibility of relying on them for the sake of authentication. Within this project, you will enjoy developing scenarios for vehicular networks, e.g. (intersection, urban, suburban, highway, etc…). In particular, you will be responsible for developing the streets, the buildings, the vegetation in addition to the vehicles themselves. The software that will be used to do this is called “WallMan” offered from “AWE-Communications”. After developing the scenarios, you will be able to run the simulation with communicating vehicles using the software “WinProp” in order to assist some propagation parameters, like delay spread, power, angular spread, and Line of Sight existence. Aspects that needs to be considered while assisting such parameters include stability, uniqueness, and spoofability. Processing the data might be extended to MATLAB environments to have a solid understanding of the behavior of the wireless channel in vehicular networks.

Erb, Benjamin
A Distributed Platform Architecture for Retroactive Programming using Event Sourcing
Project (8 or 16 ECTS)
Institute of Distributed Systems, Ulm University,
2016
in Vorbereitung

Marker: PROJEKT, BenjaminErb

Zusammenfassung: Retroactive programming allows for changes to the application's past in order to change faulty application code, to correct erroneous inputs, or to simulate or predict alternative application flows. Based on conceptual work already conducted, the aim of this project is to implement an prototype architecture for such a platform. This includes a distributed runtime environment, a user-level API, as well as a sample application.

Kopp, Henning; van der Heijden, Rens
Design und Implementierung einer verschlüsselten Mailinglistensoftware
Projekt
Institute of Distributed Systems, Ulm University,
2016
in Vorbereitung

Marker: PROJEKT

Zusammenfassung: Normalerweise werden E-Mails unverschlüsselt über das Internet versendet. Technisch ist es jedoch möglich diese mit dem Schlüssel des Empfängers zu verschlüsseln, damit dritte Parteien die Inhalte nicht lesen können. Bei Mailinglisten stellt dies jedoch ein Problem dar, da der Sender die jeweiligen Empfänger nicht kennt Eine Möglichkeit ist ein Gruppenschlüssel, der von den Abonnenten der Mailingliste geteilt wird. Dabei ist jedoch das Schlüsselmanagement beim Hinzufügen und Entfernen von Abonnenten komplex. Eine andere Möglichkeit ist die sogenannte Proxy Re-encryption. Dies sind besondere Verschlüsselungen bei denen der Abonnent mit seinem Schlüssel dem Mailinglistenserver dazu ermächtigen kann, einkommende verschlüsselte Mails für ihn neu zu verschlüsseln, ohne dass der Mailinglistenserver Zugriff auf den Inhalt hat. Diese Projekt umfasst die Einarbeitung in solche Schemes, ebenso wie das Design und die Implementierung einer solchen verschlüsselten Mailinglistensoftware.

Kleber, Stephan
Proof-of-Concept for a Distance Bounding Protocol enhanced by a Physically Unclonable Function implemented on an FPGA
Master's or Bachelor's thesis, Project
Institute of Distributed Systems, Ulm University,
2016
in Vorbereitung

Marker: MA, PROJEKT, StephanKleber

Zusammenfassung: Distance Bounding Protokolle (DBPs) dienen dem Nachweis eines physischen Abstands zwischen zwei drahtlos kommunizierenden Geräten. Es gibt einen neuartigen Ansatz bestehende Sicherheitsprobleme dieser Protokolle zu lösen. Dieser bedient sich sogenannter Physical Unclonable Functions (PUFs), die ein Gerät eindeutig identifiziern können. Im Rahmen dieses Projektes soll zu diesem Konzept eines PUF-erweiterten DBPs eine Proof-of-Concept Implementierung auf einem FPGA realisiert werden. Diese Implementierung soll im Folgenden praktisch mit Messungen der Laufzeiteigenschaften evaluiert werden.

Habiger, Gerhard
Implementation of asynchronous request handling in BFT SMaRt
Institute of Distributed Systems,
2016
in Vorbereitung

Marker: PROJEKT, GerhardHabiger

Zusammenfassung: Current research efforts of our institute include a project on deterministic scheduling of multithreaded applications for State Machine Replication (SMR) systems with Byzantine Fault Tolerance (BFT). One part of this project aims to integrate our own work on deterministic scheduling with the BFT SMaRt library. Currently, BFT SMaRt only supports synchronous request-response patterns, whereas our planned SMR platform needs these patterns to be asynchronous. The goals of this project are (i) to analyze the existing BFT SMaRt codebase, (ii) to implement the necessary interfaces for asynchronous request handling and (iii) to integrate these changes into the existing BFT SMaRt libraries.

Erb, Benjamin
Evaluation of Key/Value Stores for Event Sourcing
Bachelor's thesis or individual lab project
Institute of Distributed Systems,
2016
in Vorbereitung

Marker: PROJEKT, AA, BA, BenjaminErb, FrankKargl, sidgraph, distributed

Zusammenfassung: Event sourcing is an alternative persistence approach that maintains a log of state-changing events instead of altering states directly. Event-sourced architectures require an event store for efficiently appending and retrieving log entries. In this project, an evaluation of different key/value stores and alternative (No)SQL stores is to be conducted in order to identify stores appropriate for event sourcing.

Erb, Benjamin
Evaluation of Distributed Snapshotting Algorithms for Event-sourced Graphs
Bachelor's thesis, Master's thesis or individual lab project
Institute of Distributed Systems,
2016
in Vorbereitung

Marker: PROJEKT, AA, BA, BenjaminErb, FrankKargl, sidgraph, distributed, MA

Kopp, Henning
Attacks on Cryptocurrencies using Proof of Stake
Individual lab project
Institute of Distributed Systems,
2016
in Vorbereitung

Marker: PROJEKT, HenningKopp, FrankKargl, itsec, misc

Zusammenfassung: Over the last years, cryptocurrencies like Bitcoin gained widespread popularity. These are digital peer-to-peer payment systems without any central authority. Since Bitcoin uses a resource-intensive process called Proof of Work to secure the network, it was often criticized as being a waste of energy. Lightweight alternatives like Proof of Stake emerged, which will be the focus of this project. Proof of Stake has never been formally proven to be secure and there exist numerous attacks which are theoretically feasible but have not been seen in the wild. The goal of this individual project is • to modify the source code of the Proof of Stake currency Peercoin to be able to set up a local network. • to simulate the Nothing at Stake and/or Costless simulation attack and provide accurate measurements of its efficiency. • provide hints why the Nothing at Stake and/or Costless simulation attack has not been seen in the wild.

Erb, Benjamin
Secondary index structures on event-sourced graphs
Bachelor's thesis or individual lab project
Institute of Distributed Systems,
2016
in Vorbereitung

Marker: PROJEKT, AA, BA, BenjaminErb, FrankKargl, sidgraph, distributed

Zusammenfassung: As part of an ongoing research project at our institute, we are currently developing a novel distributed computing platform prototype. The systems provides a graph-based, asynchronous programming model and takes advantage of event sourcing for history-aware computations. The aim of this student work is the identification and evaluation of appropriate secondary index structures, in order to provide fast access onto specific notes of the graph topology. Also, a prototypical implementation is part of this work.

Erb, Benjamin
Interactive exploration of event-sourced graphs
Master's thesis, Diploma thesis, or Project (8 or 16 ECTS)
Institute of Distributed Systems,
2016
in Vorbereitung

Marker: AA, MA, DA, PROJEKT, BenjaminErb, FrankKargl, sidgraph, distributed

Zusammenfassung: The chronograph platform is a system for computing on evolving graphs. One module of the platform should provide an interactive user interface for exploring the history, evolution, and topology of the graph. The goal of this project is the design and implementation of a scalable, web-based user interface for the exploration of chronograph data.

Erb, Benjamin
Design und Implementierung eines Frameworks für diskrete ereignisbasierte Simulationen auf Basis von Apache Giraph
Individualprojekt
Institut für Verteilte Systeme, Universität Ulm,
2015
in Vorbereitung

Marker: PROJEKT, BenjaminErb

Reguläre Projekte im Master

Multimedia- und Internetsysteme i.E.
3Pj, 12LP, Projektseminar, jedes Sem.
Praxisseminar IT-Sicherheit 
2S, 6LP, jedes SoSe
Rechnernetze und IT-Sicherheit I und II
4P, 8LP, jedes Semester
Multimedia- und Internetsysteme
4P, 8LP, Praktikum, jedes Sem.