Theses

On this page you can find information about on-going and completed Theses. Where possible, a download link is provided. Note that because many of our topics are issued in German, some of the descriptions on this page are also German only.

On-going Theses


8.
default
Schmid, Lukas
PriPlus: Userfriendly Privacy for a Blockchain Filestorage
Projektarbeit
Institut für Verteilte Systeme,
2018
to be published

Tags: PROJEKT, DavidMoedinger

Abstract: PriCloud ist ein Projekt mit dem Ziel einen Privatsphäre erhaltenden Cloudspeicher zu erhalten. Hierfür wird im Insitut an einem Prototypen in Python gearbeitet. Dieser bietet jedoch nur Konsolenzugriff auf die Subsysteme des Prototypen. Ziel des Projektes ist es ein fundiertes und geeignetes User Interface zu entwerfen und dieses praktisch zu erstellen.

7.
default
Eser, Ulrich
Design einer flexiblen Peer-to-Peer Bibliothek
Bachelorarbeit
Institute of Distributed Systems,
2018
to be published

Tags: PROJEKT, MA, BA, AA, DavidMoedinger, p2p, networks

Abstract: Peer-to-Peer Systeme werden Heute in einer vielfalt von Situationen eingesetzt. Dies geht von verteilung von Dateien für Programme bis hin zu Transaktionen und Blöcken in modernen Blockchain Systemen. Zur implementierung dieser Systeme kann oft nicht auf eine geeignete Bibliothek zurück gegriffen werden, da diese nicht verfügbar sind. Ziel dieser Arbeit ist die Analyse von Anforderungen an eine geeignete Peer-to-Peer Bibliothek, sowie die Implementierung eines Prototypen der Bibliothek und dessen Evaluation. Der genaue Umfang richtet sich nach dem Vorwissen, dem gewählten Fokus und der Art der Arbeit.

6.
default
Titze, Nicolai
Driving Behaviour Analysis
Bachelor Thesis, Master Thesis, Project
Institute of Distributed Systems, Ulm University,
2018
to be published

Tags: AA, BA, MatthiasMatousek, privacy

Abstract: Connected cars (cars that communicate with a backend) enable numerous interesting and useful applications, such as remote status checking, geofencing applications, or even remote control functionality. However, the backend operator — usually the car manufacturer — potentially gains access to very sensitive information about the users. To investigate the privacy issues, the goal of this thesis or project is to collect data from a vehicle's debugging port and other sensors, such as a smartphone's accelerometers. The collected data should then be analysed to demonstrate the privacy impact. This could include the training of classification algorithms to recognize drivers by their driving styles, or to detect abnormal events in the data traces.

5.
default
Diebold, Johannes
Angriffe auf Cooperative adaptive cruise control (CACC)
Bachelorarbeit
Institute of Distributed Systems, Ulm Univerisity,
2017
to be published

Tags: AA, BA, RensVanDerHeijden, mobile, networks, itsec

4.
default
Matousek, Matthias
Neural Network Prototyping
Bachelor Thesis, Project
Institute of Distributed Systems, Ulm University,
2017
to be published

Keywords: AA,

Tags: AA, BA, PROJEKT, MatthiasMatousek

Abstract: Machine learning with Neural Networks — especially Deep Learning — is currently booming. In order to test the potential of such algorithms for specific use cases, it is necessary to be able to quickly prototype and evaluate neural networks. In this thesis or project, the student shall compare different neural network frameworks, such as TensorFlow or Caffe, and implement an exemplary use case. Such a use case could be an anomaly detection mechanism for connected cars.

3.
default
Lüthi, Christian
Secure Reset: Transforming a Comprised System into a Secure State
Master's thesis or Diploma thesis
Institute of Distributed Systems, Ulm University,
2017
to be published

Tags: AA, MA, DominikLang

Abstract: Modern vehicles contain up to 100 ECUs (Electronic Control Units). These are interconnected via an on-board network and together form a complex computer system on wheels. Vehicles now also include various wireless communication systems, such as WiFi for infotainment, Bluetooth for TPMS (Tire Pressure Monitoring System), and cellular communication for backend services. It has been shown that it is possible to gain access to the internal network and compromise ECUs, for example by flashing the ECUs to add backdoors. Consequently, it is necessary to create methods for a secure bootstrapping process that resets all ECUs of a vehicle to a secure state after a compromise has been detected. With this scenario in mind, the goal of this Master's thesis is to create an architecture and respective strategies that allow for an over-the-air secure bootstrapping process. This process should be based on a security module, such as can been found in modern ARM processors. In addition, the student should create and evaluate a prototype implementation.

2.
default
Diemer, Florian
Improving position verification in VANETs
Bachelor Thesis
Institute of Distributed Systems, Ulm Univerisity,
2017
to be published

Tags: AA, BA, RensVanDerHeijden, networks, mobile, itsec

Abstract: One important use case for vehicular ad-hoc networks is to improve safety by giving vehicles communication capabilities, allowing them to respond to dangers earlier than autonomously operating vehicles, which must rely on their sensors alone. However, it is possible that vehicles transmit incorrect positions into the network. In this work, the goal is to detect such incorrect positions. This involves several steps; designing an attacker model, developing or implementing detection approaches, and evaluating the result. The implementation work will be in Java, within the Maat framework, a prototype detection framework under development at the institute of distributed systems.

1.
default
Nieß, Tobias
DoS Attacks on Congestion Control Algorithms
Bachelorarbeit
Institut für Verteilte Systeme, Uni Ulm,
2016
to be published

Tags: AA, BA, ThomasLukaseder, itsec, networks

Abstract: Current TCP congestion control algorithms have many drawbacks, especially the introduction of new high-speed and low-delay congestion control variants is impaired by the aggressiveness of the existing variants. In context of a research project by the state of Baden-Württemberg, a new system for the coexistence of different congestion control mechanisms is currently in development. As this new system strongly depends on conform/honest behavior of network subscribers, DoS attacks paralyzing the network might be possible. This thesis shall evaluate possible attack vectors and methods to detect and mitigate or prevent successful attacks.

Completed Theses


2018

82.
default
Hohberger, Florian
Design einer generischen API für Gruppenkommunikationsprotokolle
Masterarbeit VS-M09-2018
Institut für Verteilte Systeme, Universität Ulm,
2018

Tags: MA, DA, AA, ChristianSpann, FranzHauck, ft

Abstract: Die Implementierung von Einigungsalgorithmen wie zum Beispiel Paxos oder dessen Erweiterung Vertical Paxos stellen den Programmierer wiederholt vor ähnliche Designentscheidungen. Eine generische API könnte eine Basis für die Wiederverwendung vieler Teilkomponenten schaffen und so den Aufwand für die Implementierung neuer Algorithmen reduzieren. Ziel der Arbeit ist der Entwurf einer solchen API.

2017

81.
default
Hess, Alexander
Feature Extraction by Natural Language Processing for Type-based Alignment
Bachelor's thesis
Institute of Distributed Systems, Ulm University,
November 2017

Tags: AA, BA, StephanKleber, FrankKargl, itsec, networks

Abstract: The field of research of protocol reverse-engineering has gained increasing popularity in the recent years. Several papers proposing automatic protocol reverse-engineering tools for inferring the message formats of unknown network protocols operating on captured network traces were published in the past years. While some of these tools rely on field distinguisher tokens for approximating field boundaries with sequences of tokens, which can be used for inferring the message formats, others have adopted natural language processing methods for the identification of protocol keywords, which can be used to group similar messages together and use a sequence alignment algorithm to retrieve the message formats. The major limitation of these existing approaches is their computational efficiency. Therefore this thesis proposes an implementation which combines the ideas of two existing approaches and introduces some additional functionality in order to address these performance issues.

80.
default
Meißner, Dominik
A Methodology for Performance Analysis and Performance Engineering of Distributed Event-sourced Systems
Masterarbeit VS-M22-2017
Institut für Verteilte Systeme, Universität Ulm,
October 2017

Tags: MA, AA, BenjaminErb, sidgraph, distributed

Abstract: Distributed event-sourced systems adopt a fairly new architectural style for data-intensive applications that maintain the complete history of the application state. However, the performance implications of such systems is not yet well explored, let alone how the performance of these systems can be improved. A central issue is the lack of systematic performance engineering approaches that incorporate the specific properties of distributed event-sourced systems, such as messaging and event persistence. To address this problem, we developed a methodology for performance engineering and performance analysis of distributed event-sourced systems as part of a software engineering process. This approach helps developers to identify bottlenecks and resolve performance issues based on specific micro benchmarks and subsequent targeted optimizations. To show the practicality of our methology, we applied it to the \cg platform to improve the overall performance of its current research prototype. Using our structured approach, we improved the performance of the prototype system and made it more than twice as fast for certain workloads.

79.
default
Speidel, Philipp
Anonymity in Peer-to-Peer Storage Systems
Masterarbeit
Institut für Verteilte Systeme, Universität Ulm,
May 2017

Tags: AA, MA, DavidMoedinger, networks, p2p

78.
default
Jäger, Tobias
Design and Implementation of an Web-based API and Interactive Dashboard
Bachelorarbeit VS-B07-2017
Institut für Verteilte Systeme, Universität Ulm,
May 2017

Tags: BA, AA, BenjaminErb, sidgraph

77.
default
Gassner, Manuel
Recording and analysing attacks on Industrial Control Systems
Bachelorarbeit
Institute of Distributed Systems, Ulm University,
March 2017

Tags: AA, BA, RensVanDerHeijden, StephanKleber, FrankKargl, itsec, networks, tss

Abstract: Die Arbeit wird in Kooperation mit Daimler TSS durchgeführt.

76.
default
Ogger, Ferdinand
Asynchrones latentes Snapshotting von dynamischen event-sourced Systemen
Bachelorarbeit VS-B05-2017
Institut für Verteilte Systeme, Universität Ulm,
March 2017

Tags: BA, AA, BenjaminErb, sidgraph

75.
default
Matousek, Matthias and Lang, Dominik
OBD Data-Logger for Driving Behaviour Analysis
Project
Institute of Distributed Systems, Ulm University,
2017

Tags: MatthiasMatousek, DominikLang, PROJEKT, AA

Abstract: Analysis of driving behaviour presents opportunities for security, but comes with implications for privacy. In order to conduct research in this field, driving data is required. The goal of this project is to implement tools that log driving data from a vehicle's OBD port. Further, a framework for data analysis — e.g. via machine learning mechanisms — should be provided.

74.
default
Matousek, Matthias
Comparison of Homomorphic Encryption Scheme Implementations
Master Thesis, Project
Institute of Distributed Systems, Ulm University,
2017

Tags: AA, MA, PROJEKT, MatthiasMatousek

Abstract: Homomorphic Encryption (HE) -- the "holy grail" of cryptography -- allows computation on encrypted data without knowledge of the encryption keys. While it has been shown that both partially (only limited operations) as well as fully homomorphic crypto-systems (unlimited, arbitrary operations) are possible, they still come with substantial computation complexity and storage requirements. Goal of this work is to survey and compare HE scheme implementations. Properties of interest are their capabilities (partially vs. fully homomorphic), performance (speed and storage), as well as their favourable applications. The applicant should be familiar with IT security concepts (lecture "Security of IT-Systems") and cryptography (lecture "Kryptologie - Methoden und Algorithmen" and optimally "Privacy Engineering and Privacy Enhancing Technologies - PET"). They should further be interested in the application of different programming languages (such as C++, Python, Haskell, Java, and others). While no expert knowledge of programming languages is required, HE schemes are implemented in different languages, and thus, the willingness to explore these should be present. This topic is suitable for a Master thesis, or as a Master project.

73.
default
Martel, Alexander
Vergleich Statistischer Informationsverteilung in Peer-to-Peer Netzen
Bachelorarbeit
Institut für Verteilte Systeme, Universität Ulm,
2017

Tags: AA, BA, DavidMoedinger, networks, distributed, privacy, p2p

Abstract: With classical broadcast mechanism, a source detection algorithm is fairly successful. There exist proposals to break the symmetry and make source detection hard. In this thesis, two of those proposals, adaptive diffusion and dandelion, should be implemented in a simulator and evaluated for interesting characteristics in realistic networks.

2016

72.
default
Nölscher, Henrik Ferdinand
Automatisiertes PCB Reverse Engineering
Bachelorarbeit
Institut für Verteilte Systeme, Universität Ulm,
November 2016

Tags: AA, BA, StephanKleber, FrankKargl, itsec

Abstract: Die Arbeit wird in Kooperation mit Code White durchgeführt.

71.
default
Keazor, Christopher
World-Modeling in Cooperative Intelligent Transport Systems
Diplomarbeit
Institute of Distributed Systems, Ulm Univerisity,
November 2016

Tags: AA, DA, RensVanDerHeijden, mobile, distributed

70.
default
Hauser, Lukas
A Persistence Layer for Distributed Event-Sourced Architectures
Masterarbeit VS-M09-2016
Institut für Verteilte Systeme, Universität Ulm,
August 2016

Tags: MA, AA, BenjaminErb, sidgraph

Abstract: Due to the increasingly large amount of data which is collected and processed each day, enabling fast, reliable, and scalable distributed computing on very large datasets has become more important than ever. Unfortunately, distributed computation on large inhomogeneous datasets is still time-consuming and it is very difficult to make evaluations and predictions. To address these issues, event sourcing and graph computing are relevant topics. While event sourcing provides techniques to save data in a particular way, which enables evaluations and makes predictions possible, graph computing provides a way to distribute the computation on large datasets. Although there is a conceptual idea which addresses these issues, no practical experience how such a concept can be implemented in case of persistence and communication is available. As a result, a prototype system to measure and evaluate different persistence and communication implementations for distributed event-sourced architectures using event sourcing and graph computing needs to be created. Such a system can be used to find a way how to persist and work on large distributed inhomogeneous datasets efficiently.

69.
default
Alev, Celebi
Performance Engineering in verteilten, polyglotten Berechnungsplattformen
Masterarbeit VS-M08-2016
Institut für Verteilte Systeme, Universität Ulm,
June 2016

Tags: AA, BA, MA, PROJEKT, BenjaminErb, FrankKargl, sidgraph, distributed

68.
default
Moll, Markus
Survey von Physically-Unclonable-Functions- (PUF) Anwendungsszenarien
Bachelorarbeit
Institut für Verteilte Systeme, Universität Ulm,
June 2016

Tags: AA, BA, StephanKleber, FrankKargl, itsec

Abstract: Sicherheit in IT-Systemen vor allem im Bereich von verteilten Systemen wird immer wichtiger. Jedoch sind Softwarelösungen für diesen Zweck nicht als Sicher einzustufen. Der relativ leichte Zugang zu der Hardware von solchen Systemen stellt dabei das größte Problem dar, Damit kann die Software umgangen werden. Somit sind Sicherheitslösungen über Hardwarekomponenten nötig. Eine solche Komponente stellt die Physical Unclonabel Functions(PUF) dar. In dieser Arbeit werden mögliche Anwendungsszenarien vorgestellt in denen diese zum Einsatz kommen können. Die Einsatzgebiete sind die Bereiche Authentifizierung und Identifizierung, Verwaltung von geheimen Schlüsseln und Kryptographische Primitive An Hand der vorgestellten Szenarien werden dann Kriterien aufgestellt mit denen beurteilt werden kann wann und ob eine PUF eingesetzt werden kann.

67.
default
van der Heijden, Rens and Kargl, Frank
Subjective Logic Operators for Fusion of Misbehavior Detection Mechanisms
Bachelor Thesis
Institute of Distributed Systems, Ulm Univerisity,
May 2016

Tags: BA, AA, RensVanDerHeijden, mobile, itsec

66.
default
Wagner, Denis
Vergleich und Evaluierung von Time Series Databases
Bachelorarbeit VS-B07-2016
Institut für Verteilte Systeme, Universität Ulm,
May 2016

Tags: AA, MA, DA, BA, BenjaminErb, sidgraph, distributed, cloud

65.
default
Müller, Michael
Enabling Retroactive Computing Through Event Sourcing
Masterarbeit VS-M01-2016
Institut für Verteilte Systeme, Universität Ulm,
April 2016

Tags: BA, AA, MA, DA, BenjaminErb, FrankKargl, sidgraph, distributed

Abstract: Event sourcing is a style of software architecture wherein state altering operations to an application are captured as immutable events. Each event is appended to an event log, with the current state of a system derived from this series of events. This thesis addresses the utilization of retroactive capabilities in event-sourced systems: computing alternate application states, post hoc bug fixes, or the support of algorithms which have access to their own history, for example. The possibility of retroactively accessing and modifying this event log is a potential capability of an event-sourced system, but a detailed exploration how these operations can be facilitated and supported has not yet been conducted. We examine how retroaction can be applied to event-sourced systems and discuss conceptual considerations. Furthermore, we demonstrate how different architectures can be used to provide retroaction and describe the prototypical implementation of an appropriate programming model. These findings are applied in the Chronograph research project, in order to utilize potential temporal aspects of this platform.

64.
default
Maile, Lisa
Processes for Network Protocol Analyses
Bachelorarbeit
Institut für Verteilte Systeme, Universität Ulm,
January 2016

Tags: AA, BA, StephanKleber, FrankKargl, itsec, networks

Abstract: For every communication between two or more participants in distributed systems or networks, protocols are needed in order to agree upon the way the communication messages are interpreted. Unfortunately, many protocols are unknown to the public because of missing or unavailable specifications. To understand the functionality of these protocols and, eventually, their message content, these unknown protocols need to be reversed engineered. At present, network protocol reverse engineering is performed mostly manually with the expertise and intuition of the engineer, insofar as there are no completely automated methods yet. If analyzed by hand, the most difficulties are faced when comparing protocols with variable field lengths, since the protocol’s structure is blurred and patterns cannot be detected easily. Furthermore, complex state machines are hardly manageable without the support of automated tools. The value gained from protocol analyses research ranges from general understanding of the protocol to security issues, such as the creation of specific firewall rules or by helping intrusion detection systems to identify the behavior of malware. This bachelor thesis analyzes static protocol analyses and describes every stage passed from capturing unknown protocols to the deduction of protocol message formats and the state machine. It thereby presents currently existing automatic approaches for each stage and the benefits compared to a purely manual task. Finally, it evaluates the current processes, emphasizes limitations and proposes improvement suggestions for the future.

63.
default
Cepcik, Stefan
Update Strategie für IoT-Geräte auf Basis der Windows 10 IoT Core Plattform im Kontext von Industrie 4.0
Masterarbeit
Institut für Verteilte Systeme, Universität Ulm,
2016

Tags: AA, MA, DominikLang

62.
default
Schimmele, Benjamin
Implementation of a Pre-Filter for Network Intrusion Detection Systems
Diplomarbeit
Institut für Verteilte Systeme, Uni Ulm,
2016

Tags: AA, DA, ThomasLukaseder

61.
default
Forst, Christian
Erstellung eines dynamischen Testdatensets zur Sicherheitsanalyse
Masterarbeit
Institut für Verteilte Systeme, Uni Ulm,
2016

Tags: AA, MA, ThomasLukaseder

60.
default
Waldenmaier, Tobias
Privacy-Preserving Geofencing
Master's Thesis
Institute of Distributed Systems, Ulm University,
2016

Tags: AA, MA, MatthiasMatousek, privacy

Abstract: With geofencing, car holders can get notified when their vehicle leaves a predetermined area. This feature can be used by companies to keep tabs on their company vehicles, or by private individuals to gain higher security. However, when the vehicle manufacturer or a third-party provider is hosting the geofencing service, he also needs access to the vehicle location. This also means that the provider can derive movement profiles of the vehicle's drivers. So-called searchable encryption has the potential to enable geofencing without the need for the provider to know the exact vehicle locations. The goal of this thesis is to develop and evaluate a proof-of-concept that provides geofencing while preserving the drivers' privacy. Thus, several searchable encryption schemes should be compared and assessed for their applicability to this task. At least one of the schemes should be implemented and the resulting prototype evaluated regarding its adequacy and efficiency.

59.
default
Kneer, Daniel
Simulation of Backend-Based Misbehaviour Detection for Connected Cars
Master's Thesis
Institute of Distributed Systems, Ulm University,
2016

Tags: AA, MA, MatthiasMatousek, itsec

58.
default
Hunt, Alexander
Erkennung und Abwehr von DoS-Attacken mit Hilfe von Software Defined Networking
Bachelorarbeit
Institut für Verteilte Systeme, Uni Ulm,
2016

Tags: AA, BA, ThomasLukaseder

Export as: BibTeX, XML

Old news can be found in the archive.