Titel: Ausgewählte Themen in Verteilten Systemen
Englischer Titel: Selected Topics in Distributed Systems
Typ: Seminar, Modul
Kürzel / Nr. / Modulnr.: ATVS / CS5900.113 / 72041
SWS / LP: 2S / 4LP
Dozent: Prof. Dr. Frank Kargl, Prof. Dr.-Ing. Franz J. Hauck
Betreuungspersonen: Leonard Bradatsch, Alexander Heß, Echo Meißner, Nataša Trkulja, Juri Dispan, Artur Hermann, Externe
Termine: Einführungsveranstaltung
Begleitveranstaltungen für Seminare
Vortragsblocktermin (ganztägig)
Räume und Daten siehe Moodlekurs.
Lernplattform: Kursmaterialien finden Sie im Moodle-Kurs. Sie werden dem Kurs automatisch zum Semesterstart hinzugefügt, sobald Sie eines unserer Seminare besuchen.
Themenvergabe: Bitte Beachten: Die zentrale Themenvergabe erfolgt immer bereits gegen Ende des vorherigen Semesters über die zentrale Seminarthemen-Vergabe-Plattform im Moodle ("Anmeldung zur Verteilung der Seminare im kommenden Sommer-/ Wintersemester").
Sprache: Themen können in deutscher oder englischer Sprache bearbeitet werden, je nach Betreuungsperson und Seminartyp.

Hinweis: Alle Seminarthemen sind belegt.

Themen

The FLP Impossibility in Practice  – English only

The FLP impossibility theorem has been named after its contributing authors Fischer, Lynch, and Paterson. It states that it is impossible to deterministically reach consensus in an asynchronous system in case there is a single faulty node. Although this theorem has been proposed and proven multiple decades ago, a variety of consensus protocols were introduced in the meantime that seem to solve the problem in practical applications like distributed data stores. The task of this seminar is to provide a comprehensible introduction to the FLP impossibility theorem, and discuss its implications in practice.

Alexander Heß

ChatGPT - uses and limitations  – English only

This seminar paper's goal is to examine ChatGPT, a language model developed by OpenAI which utilizes the GPT-3.5 architecture to generate human-like responses in conversational contexts. Aside from explaining the inner workings of ChatGPT, the paper ought to present its wide range of applications, as well as its inherent limitations. By analyzing its uses and limitations, we can gain a deeper understanding of the potential and challenges associated with this advanced AI technology.

Natasa Trkulja

Comparative Analysis of CV2X and DSR  – English only

This seminar paper aims to delve into the key differences between two prominent vehicular communication technologies, namely CV2X (Cellular Vehicle-to-Everything) and DSRC (Dedicated Short-Range Communication). As the automotive industry embraces the era of connected vehicles, it is crucial to understand the unique characteristics, functionalities, and potential applications of these technologies. By examining the fundamental dissimilarities between CV2X and DSRC, this paper intends to shed light on their respective advantages, limitations, and implications for the future of intelligent transportation systems.

Natasa Trkulja

Trusted Execution Environments  – English only

The concept of trusted execution environments (TEEs) has gained significant attention in the field of computer security. TEEs provide a secure and isolated environment within a computer system, offering protection for sensitive data and enabling the execution of trusted code. This seminar paper explores the fundamental aspects, key technologies, applications, and challenges associated with trusted execution environments.

Natasa Trkulja

Public Key Authentication vs Password Authentication  – English only

For this topic, the goal is to comprehensively analyze password authentication and public key authentication.The outcome of the work should be a profound statement about the procs and cons of each authentication method.

Leonard Bradatsch

State of Cloud (End-to-End) Encryption  – English only

Goal of this seminar is to analyze which cloud provider provide which encryption methods. Which cloud provider actually does support end-to-end encryption for the user data? A profound answer to this question should be exactly the outcome of this seminar work.

Leonard Bradatsch

Network Security Breaches  – English only

The goal of this seminar is the outlining of popular network security breaches (1-3 examples). Subsequently, state-of-the-art protection or detection approaches against these presented breaches should be explained.

Leonard Bradatsch

Vehicle Platooning  – English only

Vehicle Platooning is one of the most promising applications that can be realized with Vehicular ad hoc networks (VANETs). It is a method for driving in a group of vehicles with a small distance between the them. This offers many benefits such as increasing road capacity and reducing fuel consumption. Despite the benefits, Vehicle Platooning also has limitations and challenges. In this seminar, you will analyze vehicle platooning by describing its limitations and challenges. Furthermore, approaches to overcome these limitations and challenges are explained.

Artur Hermann

Misbehavior Detection in VANETs  – English only

Vehicular ad hoc networks (VANETs) enable vehicles to communicate with each other and with infrastructure. In this way, vehicles can send messages, e.g., that there is a traffic jam ahead, which increases safety and efficiency. For the correct and safe operation of applications, it is important that the information sent by other vehicles is trustworthy or can be verified. In this seminar you will describe several approaches to detect misbehavior of vehicles in VANETs.

Artur Hermann

Security mechanisms in in-vehicle networks  – English only

Modern vehicles contain many ECUs that are responsible for various functions of the vehicle. These ECUs are interconnected through in-vehicle networks, such as CAN-bus. Important components of the vehicle, such as brakes or airbags, are controlled via the ECUs. Therefore, ensuring the integrity of in-vehicle communication and ECUs is crucial for safety. In this seminar, you will provide an overview of threat in in-vehicle networks and ECUs. In addition, protection mechanisms for these threats will be described.

Artur Hermann

Automatic Log Parsing  – English only

Logs contain rich information about the internal state of applications and are thus regularly used for anomaly detection. However, logs need to be brought into a structured format before they can be processed. While this can be done by manually writing Regexes, automatic approaches for this task are preferable. This seminar topic's aim is to give an overview on common approaches for automatic log parsing and to compare their respective strenghts and weaknesses.

Juri Dispan

Self-Destructing Data  – English only

The internet never forgets – or does it? The concept of self-destructing data was made popular by services like Snapchat and Instagram and promises to give back control of personal data to users. However, users have to trust these services to actually delete data once expired. Fortunately, there are other, decentralised methods for realising self-destructing data which do not depend on a trusted third party. The goal of this topic is to investigate these approaches and discuss their strengths as well as their limitations.

Juri Dispan

Secure Multiparty Computation  – English only

Secure Multiparty Computation (MPC) allows parties to perform computations on private data without ever knowing these data. It plays an important role in solving security and privacy issues and has been deployed in numerous real-world settings. The goal of this seminar topic is to investigate MPC, describe one protocol for realising it and critically reflect on theoretical and practical aspects.

Juri Dispan

Hardware Security Modules  – English only

A hardware security module (HSM) is a physical computing system that safeguards and administers digital keys, performs digital signatures, encryption and decryption functions, authentication, and other cryptographic functions. Traditionally such modules come in the form of a plug-in card, an external unit that is directly connected to a computer or network server, an extra chip close to the CPU, or even build into a processor, but also cloud based HSM exists. Your task is explain a HSM in detail, how it is used, how it protects the keys from tampering, why it performs so well, etc...

Michael Wolf (Mercedes-Benz Tech Innovation)

Mitigating evasion attacks on machine learning models for image recognition  – English only

Evasion attacks aim to mislead a machine learning model, often such ones used for image recognition, to prevent an object from being detected or classified. This seminar topic shall collect existing mitigations for evasion attacks against image recognition models. A selection of at least three conceptually different mitigations shall be compared with each other with focus on the effect the mitigations may have to protect cyber-physical systems against the threat that evasion attacks may pose.

Stephan Kleber (Mercedes-Benz Tech Innovation)

Sorted by Topics

  • Automotive Computing and Automotive Security
    • Security mechanisms in in-vehicle networks
    • Vehicle Platooning
    • Misbehavior Detection in VANETs
    • Comparative Analysis of CV2X and DSRC
  • IT Security
    • Network Security Breaches
    • Mitigating evasion attacks on machine learning models for image recognition
    • State of Cloud (End-to-End) Encryption
    • Public Key Authentication vs Password Authentication
  • Distributed Systems, AI and Beyond
    • The FLP Impossibility in Practice
    • ChatGPT - uses and limitations
    • Automatic Log Parsing
    • Self-Destructing Data
  • Trusted and Secure Computing
    • Secure Multiparty Computation
    • Trusted Execution Environments
    • Hardware Security Modules

Beschreibung und allgemeine Angaben, Modulbeschreibung

Einordnung in die Studiengänge:
Informatik, B.Sc.: Seminar
Medieninformatik, B.Sc.: Seminar
Software-Engineering, B.Sc.: Seminar
(siehe auch unsere Hinweise zu Seminaren)
Lehr- und Lernformen: Ausgewählte Themen in Verteilten Systemen, 2S, 4LP
Modulkoordinator: Prof. Dr. Frank Kargl
Unterrichtssprache: Deutsch
Turnus / Dauer: jedes Semester / ein volles Semester
Voraussetzungen (inhaltlich): Grundlagen der Rechnernetze, Proseminar
Voraussetzungen (formal): -
Grundlage für (inhaltlich): -

Lernziel:

Studierende vertiefen exemplarisch an einem Teilgebiet der Informatik ihre Kenntnisse im selbstständigen Arbeiten mit wissenschaftlicher Literatur sowie im mündlichen und schriftlichen Präsentieren von fachwissenschaftlichen Inhalten. In Diskussionen wird die Fähigkeit zur kritischen Reflektion geübt. Im fachlichen Teil des Seminars stehen aktuelle Themen der Verteilten Systeme im Fokus. Abhängig vom Thema lernen Studierende ein konkretes System oder ein Konzept Verteilter Systeme kennen. Sie können diese Systeme in einen größeren Kontext einordnen und deren Vor- und Nachteile selbständig ableiten.

Inhalt:

Zu Beginn des Seminars werden Themen des wissenschaftlichen Arbeitens (z.B. Literaturrecherche, Schreiben einer Publikation, Präsentationstechniken) eingeführt, um den Studenten eine methodische Hilfestellung zu geben. Die Erstellung der eigentlichen Ausarbeitung und Präsentation erfolgt in individueller Betreuung. Die Ergebnisse werden in einer Abschlusspräsentation vorgestellt.

Literatur:

Wird je nach Thema zu Beginn der Veranstaltung bekannt gegeben

Bewertungsmethode:

FSPO < 2017: Leistungsnachweis über erfolgreiche Teilnahme. Diese umfasst Anwesenheit und enthält Ausarbeitung, Vortrag und Mitarbeit.
FSPO ≥ 2017: Die Vergabe der Leistungspunkte für das Modul erfolgt aufgrund der regelmäßigen Teilnahme, der vollständigen Bearbeitung eines übernommenen Themas (Vortrag und schriftliche Ausarbeitung) sowie der Beteiligung an der Diskussion. Die genauen Modalitäten werden zu Beginn der Veranstaltung bekannt gegeben. Die Anmeldung zur Prüfung setzt keinen Leistungsnachweis voraus.

Notenbildung:

FSPO < 2017: unbenotet
FSPO ≥ 2017: Die Modulnote entspricht dem Ergebnis der Modulprüfung. Die Note der Modulprüfung ergibt sich aus den Noten der Ausarbeitung (40%), der Präsentation (40%) und der Arbeitsweise (20%). Im Transcript of Records wird die errechnete Note für die Modulprüfung als eine Prüfungsleistung eingetragen und ausgewiesen.

Arbeitsaufwand:

Präsenzzeit: 30 h
Vor- und Nachbereitung: 90 h
Summe: 120 h