Thesis Topics

On this page, you will find a list of available thesis topics that are available in our institute. Information about on-going and past theses can be found on this page. Some of the thesis descriptions are in German.

Note that because many of our topics are issued in German, some of the descriptions on this page are also German only. We are currently working on providing complete translations.

Open Theses

“De-Anonymization Attacks on Empirical Research Data,” Master's thesis, B. Erb (Supervisor), F. Kargl (Examiner), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
Initiatives such as the Open Science Framework promote the publication of raw data sets for empirical research as found in psychology and other related disciplines. Although these data sets are usually pseudonymized or anonymized, there is a risk of de-anonymization due to linkage of data sets and potential external data sources. This work should explore this issue and demonstrate the feasability of such attacks based on synthetic and/or real data sets.
“Designing exercise tasks for Security in IT-Systems lecture,” Bachelor's thesis, Master's thesis, Project, M. Wolf (Supervisor), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
This topic addresses primarily students of the teaching profession, however others may also apply. In this work you should design and create one or more exercise sheets (depending on the ECTS) for the lecture Security in IT-Systems combined with an automated grading system. One such sheet can be about web security where students have to hack a web server launched on a docker image - similar to hackthissite.org. For a list of other topics, please refer to the module description: https://www.uni-ulm.de/in/vs/teach/sec
“Konzeption und Entwicklung interaktiver Lerninhalte in der Rechnernetze-Lehre,” Bachelor's thesis, Master's thesis, B. Erb (Supervisor), F. Kargl (Examiner), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
Diese Abschlussarbeit richtet sich primäre an Studierende des Lehramts. In dieser Arbeit sollen Lerninhalte konzipiert und umgesetzt werden, die die Lehre im Fach 'Grundlagen der Rechnernetze' ergänzen. Im Rahmen des Blended Learning Konzepts der Lehrveranstaltung geht es insbesondere um interaktive Labs, Visualisierungen und Tools zur Vertiefung der Inhalte, die die Studierenden remote verwenden können.
“Test-based Validation of Network Programming Tasks,” Project, D. Meißner (Supervisor), F. Kargl (Examiner), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
We have a collection of Java programming tasks as part of our introduction to computer networks course. In these programming tasks students are instructed to implement network applications matching a strict set of rules. The goal of this project is to implement a rule-based testing framework to aid the grading of such programming tasks and providing immediate feedback to students whether their implementation is correct or not.
“The impact of privacy in Vehicular Edge Computing,” Bachelor's thesis, Master's thesis, Project, M. Wolf (Supervisor), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
Modern vehicles will communicate with their environment using Vehicular Ad Hoc Networks (VANET) sending out regular status beacons or warning messages. Those are collected by Road Side Units (RSU) and will be combined with other data, like weather or information from the backend. With this data certain calculations can be performed (e.g. predicting the vehicle density). Furthermore, vehicles may transfer additional data, which is too resource intensive to calculate for themselves, to the RSUs . This process of transmitting data for expensive calculations is called Edge Computing. Currently a lot of work focuses on the benefits and possible applications of VEC, as well as on how PETS can be implemented. But little research is done how privacy techniques impact VEC and safety. In this project/thesis, you have to implement one or more PETS (depending on ECTS) in a VANET simulation framework (Plexe/Veins) and analyze its impact.
“A Tool Support for Privacy Threat Modelling,” Master's thesis, Bachelor's thesis, Project, A. Al-Momani (Supervisor), F. Kargl (Examiner), Inst. of. Distr. Sys., Ulm Univ., 2020 – Open.
Privacy engineering and particularly privacy threat modelling have gained a lot of attention in the recent years. Many methodologies have been proposed to model privacy threats. An example of such methods is the widely used LINDDUN method. As some recent (ISO/IEC) standards and regulations (e.g., GDPR) require handling risks associated with the elicited threats, we combined the LINDDUN method with a privacy risk rating method forming a holistic method that takes the system model as input and outputs a list of privacy risks. Your task in this project/thesis work is to implement a tool to support the the deployment of our developed method. Related work to such a tool is the commonly used Microsoft threat modelling tool which is used for security. Another very related example that is considered an extension to the MS tool is the TMTe4PT tool. There are no restrictions on the technologies or languages used in the implementation as long as it achieves the required features similarly to, e.g., TMTe4PT. This project can also be extended to a thesis by including research questions related to the countermeasure selection process.
“Efficient Updating of a Network-Protocol-Model with Message-Format Refinements,” Bachelor's or Master's thesis, S. Kleber (Supervisor), F. Kargl (Examiner), Institut of Distributed Systems, Ulm University, 2019 – Open.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred.After an initial inference procedure, it is desirable to refine the existing protocol model. Additional information gained by recorded network traffic needs to be incorporated by recognizing the appropriate parts of the model. The modeled knowledge is to be extended depending on the applicable information inferable from the new trace.
“Test-Case-Generation Strategies for Network-Protocol-Model Refinements,” Bachelor's or Master's thesis, S. Kleber (Supervisor), F. Kargl (Examiner), Institut of Distributed Systems, Ulm University, 2019 – Open.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred.After an initial inference procedure, it is desirable to refine the existing protocol model. Actively probing an entity for the validity of message syntaxes allows to targetedly enhance the knowledge about the protocol. To do this efficiently a smart method of automatically generating test-cases depending on the current protocol model needs to be developed.
“Using Machine Learning for Misbehavior Detection in CACC,” M. Wolf (Supervisor), F. Kargl (Examiner), Inst. of Distr. Sys., Ulm Univ., 2019 – Open.
Modern vehicles will use communication to increase the safety of its passengers, reduce fuel consumption, travel time, and more. The communication between the vehicles will be mainly beacon messages containing the speed, position, acceleration and other properties. These messages need to be validated, if they contain correct (plausible) information. For example, when a vehicle is suddenly stopping, but sending an increase in speed, the following vehicles may crash into the misbehaving vehicle. In literature, there is already existing work on detecting misbehavior in the data with different techniques such as subjective logic or machine learning. In this project, we will analyze the VeReMi data-set with the help of different machine learning algorithms. The number of algorithms compared is depending on the scope (credits). The student can choose the framework, e.g. PyTorch.

Old news can be found in the archive.

Contact

Secretary's Office

Marion Köhler
Claudia Kastner
E-Mail
Phone: +49 731 50-24140
Fax: +49 731 50-24142

Postal Address

Institute of Distributed Systems
Ulm University
Albert-Einstein-Allee 11
89081 Ulm

Visiting Address

James-Franck-Ring
Gebäude O27, Raum 349
89081 Ulm

Directions

Topics By Degree

Bachelor's Theses

“Designing exercise tasks for Security in IT-Systems lecture,” Bachelor's thesis, Master's thesis, Project, M. Wolf (Supervisor), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
This topic addresses primarily students of the teaching profession, however others may also apply. In this work you should design and create one or more exercise sheets (depending on the ECTS) for the lecture Security in IT-Systems combined with an automated grading system. One such sheet can be about web security where students have to hack a web server launched on a docker image - similar to hackthissite.org. For a list of other topics, please refer to the module description: https://www.uni-ulm.de/in/vs/teach/sec
“Konzeption und Entwicklung interaktiver Lerninhalte in der Rechnernetze-Lehre,” Bachelor's thesis, Master's thesis, B. Erb (Supervisor), F. Kargl (Examiner), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
Diese Abschlussarbeit richtet sich primäre an Studierende des Lehramts. In dieser Arbeit sollen Lerninhalte konzipiert und umgesetzt werden, die die Lehre im Fach 'Grundlagen der Rechnernetze' ergänzen. Im Rahmen des Blended Learning Konzepts der Lehrveranstaltung geht es insbesondere um interaktive Labs, Visualisierungen und Tools zur Vertiefung der Inhalte, die die Studierenden remote verwenden können.
“Test-based Validation of Network Programming Tasks,” Project, D. Meißner (Supervisor), F. Kargl (Examiner), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
We have a collection of Java programming tasks as part of our introduction to computer networks course. In these programming tasks students are instructed to implement network applications matching a strict set of rules. The goal of this project is to implement a rule-based testing framework to aid the grading of such programming tasks and providing immediate feedback to students whether their implementation is correct or not.
“The impact of privacy in Vehicular Edge Computing,” Bachelor's thesis, Master's thesis, Project, M. Wolf (Supervisor), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
Modern vehicles will communicate with their environment using Vehicular Ad Hoc Networks (VANET) sending out regular status beacons or warning messages. Those are collected by Road Side Units (RSU) and will be combined with other data, like weather or information from the backend. With this data certain calculations can be performed (e.g. predicting the vehicle density). Furthermore, vehicles may transfer additional data, which is too resource intensive to calculate for themselves, to the RSUs . This process of transmitting data for expensive calculations is called Edge Computing. Currently a lot of work focuses on the benefits and possible applications of VEC, as well as on how PETS can be implemented. But little research is done how privacy techniques impact VEC and safety. In this project/thesis, you have to implement one or more PETS (depending on ECTS) in a VANET simulation framework (Plexe/Veins) and analyze its impact.
“A Tool Support for Privacy Threat Modelling,” Master's thesis, Bachelor's thesis, Project, A. Al-Momani (Supervisor), F. Kargl (Examiner), Inst. of. Distr. Sys., Ulm Univ., 2020 – Open.
Privacy engineering and particularly privacy threat modelling have gained a lot of attention in the recent years. Many methodologies have been proposed to model privacy threats. An example of such methods is the widely used LINDDUN method. As some recent (ISO/IEC) standards and regulations (e.g., GDPR) require handling risks associated with the elicited threats, we combined the LINDDUN method with a privacy risk rating method forming a holistic method that takes the system model as input and outputs a list of privacy risks. Your task in this project/thesis work is to implement a tool to support the the deployment of our developed method. Related work to such a tool is the commonly used Microsoft threat modelling tool which is used for security. Another very related example that is considered an extension to the MS tool is the TMTe4PT tool. There are no restrictions on the technologies or languages used in the implementation as long as it achieves the required features similarly to, e.g., TMTe4PT. This project can also be extended to a thesis by including research questions related to the countermeasure selection process.
“Efficient Updating of a Network-Protocol-Model with Message-Format Refinements,” Bachelor's or Master's thesis, S. Kleber (Supervisor), F. Kargl (Examiner), Institut of Distributed Systems, Ulm University, 2019 – Open.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred.After an initial inference procedure, it is desirable to refine the existing protocol model. Additional information gained by recorded network traffic needs to be incorporated by recognizing the appropriate parts of the model. The modeled knowledge is to be extended depending on the applicable information inferable from the new trace.
“Test-Case-Generation Strategies for Network-Protocol-Model Refinements,” Bachelor's or Master's thesis, S. Kleber (Supervisor), F. Kargl (Examiner), Institut of Distributed Systems, Ulm University, 2019 – Open.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred.After an initial inference procedure, it is desirable to refine the existing protocol model. Actively probing an entity for the validity of message syntaxes allows to targetedly enhance the knowledge about the protocol. To do this efficiently a smart method of automatically generating test-cases depending on the current protocol model needs to be developed.
“Using Machine Learning for Misbehavior Detection in CACC,” M. Wolf (Supervisor), F. Kargl (Examiner), Inst. of Distr. Sys., Ulm Univ., 2019 – Open.
Modern vehicles will use communication to increase the safety of its passengers, reduce fuel consumption, travel time, and more. The communication between the vehicles will be mainly beacon messages containing the speed, position, acceleration and other properties. These messages need to be validated, if they contain correct (plausible) information. For example, when a vehicle is suddenly stopping, but sending an increase in speed, the following vehicles may crash into the misbehaving vehicle. In literature, there is already existing work on detecting misbehavior in the data with different techniques such as subjective logic or machine learning. In this project, we will analyze the VeReMi data-set with the help of different machine learning algorithms. The number of algorithms compared is depending on the scope (credits). The student can choose the framework, e.g. PyTorch.

Master's Theses

“De-Anonymization Attacks on Empirical Research Data,” Master's thesis, B. Erb (Supervisor), F. Kargl (Examiner), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
Initiatives such as the Open Science Framework promote the publication of raw data sets for empirical research as found in psychology and other related disciplines. Although these data sets are usually pseudonymized or anonymized, there is a risk of de-anonymization due to linkage of data sets and potential external data sources. This work should explore this issue and demonstrate the feasability of such attacks based on synthetic and/or real data sets.
“Designing exercise tasks for Security in IT-Systems lecture,” Bachelor's thesis, Master's thesis, Project, M. Wolf (Supervisor), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
This topic addresses primarily students of the teaching profession, however others may also apply. In this work you should design and create one or more exercise sheets (depending on the ECTS) for the lecture Security in IT-Systems combined with an automated grading system. One such sheet can be about web security where students have to hack a web server launched on a docker image - similar to hackthissite.org. For a list of other topics, please refer to the module description: https://www.uni-ulm.de/in/vs/teach/sec
“Konzeption und Entwicklung interaktiver Lerninhalte in der Rechnernetze-Lehre,” Bachelor's thesis, Master's thesis, B. Erb (Supervisor), F. Kargl (Examiner), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
Diese Abschlussarbeit richtet sich primäre an Studierende des Lehramts. In dieser Arbeit sollen Lerninhalte konzipiert und umgesetzt werden, die die Lehre im Fach 'Grundlagen der Rechnernetze' ergänzen. Im Rahmen des Blended Learning Konzepts der Lehrveranstaltung geht es insbesondere um interaktive Labs, Visualisierungen und Tools zur Vertiefung der Inhalte, die die Studierenden remote verwenden können.
“A Tool Support for Privacy Threat Modelling,” Master's thesis, Bachelor's thesis, Project, A. Al-Momani (Supervisor), F. Kargl (Examiner), Inst. of. Distr. Sys., Ulm Univ., 2020 – Open.
Privacy engineering and particularly privacy threat modelling have gained a lot of attention in the recent years. Many methodologies have been proposed to model privacy threats. An example of such methods is the widely used LINDDUN method. As some recent (ISO/IEC) standards and regulations (e.g., GDPR) require handling risks associated with the elicited threats, we combined the LINDDUN method with a privacy risk rating method forming a holistic method that takes the system model as input and outputs a list of privacy risks. Your task in this project/thesis work is to implement a tool to support the the deployment of our developed method. Related work to such a tool is the commonly used Microsoft threat modelling tool which is used for security. Another very related example that is considered an extension to the MS tool is the TMTe4PT tool. There are no restrictions on the technologies or languages used in the implementation as long as it achieves the required features similarly to, e.g., TMTe4PT. This project can also be extended to a thesis by including research questions related to the countermeasure selection process.
“Efficient Updating of a Network-Protocol-Model with Message-Format Refinements,” Bachelor's or Master's thesis, S. Kleber (Supervisor), F. Kargl (Examiner), Institut of Distributed Systems, Ulm University, 2019 – Open.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred.After an initial inference procedure, it is desirable to refine the existing protocol model. Additional information gained by recorded network traffic needs to be incorporated by recognizing the appropriate parts of the model. The modeled knowledge is to be extended depending on the applicable information inferable from the new trace.
“Test-Case-Generation Strategies for Network-Protocol-Model Refinements,” Bachelor's or Master's thesis, S. Kleber (Supervisor), F. Kargl (Examiner), Institut of Distributed Systems, Ulm University, 2019 – Open.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred.After an initial inference procedure, it is desirable to refine the existing protocol model. Actively probing an entity for the validity of message syntaxes allows to targetedly enhance the knowledge about the protocol. To do this efficiently a smart method of automatically generating test-cases depending on the current protocol model needs to be developed.
“Using Machine Learning for Misbehavior Detection in CACC,” M. Wolf (Supervisor), F. Kargl (Examiner), Inst. of Distr. Sys., Ulm Univ., 2019 – Open.
Modern vehicles will use communication to increase the safety of its passengers, reduce fuel consumption, travel time, and more. The communication between the vehicles will be mainly beacon messages containing the speed, position, acceleration and other properties. These messages need to be validated, if they contain correct (plausible) information. For example, when a vehicle is suddenly stopping, but sending an increase in speed, the following vehicles may crash into the misbehaving vehicle. In literature, there is already existing work on detecting misbehavior in the data with different techniques such as subjective logic or machine learning. In this project, we will analyze the VeReMi data-set with the help of different machine learning algorithms. The number of algorithms compared is depending on the scope (credits). The student can choose the framework, e.g. PyTorch.

Topics By Research Area

Networks

“Konzeption und Entwicklung interaktiver Lerninhalte in der Rechnernetze-Lehre,” Bachelor's thesis, Master's thesis, B. Erb (Supervisor), F. Kargl (Examiner), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
Diese Abschlussarbeit richtet sich primäre an Studierende des Lehramts. In dieser Arbeit sollen Lerninhalte konzipiert und umgesetzt werden, die die Lehre im Fach 'Grundlagen der Rechnernetze' ergänzen. Im Rahmen des Blended Learning Konzepts der Lehrveranstaltung geht es insbesondere um interaktive Labs, Visualisierungen und Tools zur Vertiefung der Inhalte, die die Studierenden remote verwenden können.
“Efficient Updating of a Network-Protocol-Model with Message-Format Refinements,” Bachelor's or Master's thesis, S. Kleber (Supervisor), F. Kargl (Examiner), Institut of Distributed Systems, Ulm University, 2019 – Open.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred.After an initial inference procedure, it is desirable to refine the existing protocol model. Additional information gained by recorded network traffic needs to be incorporated by recognizing the appropriate parts of the model. The modeled knowledge is to be extended depending on the applicable information inferable from the new trace.
“Test-Case-Generation Strategies for Network-Protocol-Model Refinements,” Bachelor's or Master's thesis, S. Kleber (Supervisor), F. Kargl (Examiner), Institut of Distributed Systems, Ulm University, 2019 – Open.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred.After an initial inference procedure, it is desirable to refine the existing protocol model. Actively probing an entity for the validity of message syntaxes allows to targetedly enhance the knowledge about the protocol. To do this efficiently a smart method of automatically generating test-cases depending on the current protocol model needs to be developed.

Mobile Systems

Distributed Computing

Privacy

“De-Anonymization Attacks on Empirical Research Data,” Master's thesis, B. Erb (Supervisor), F. Kargl (Examiner), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
Initiatives such as the Open Science Framework promote the publication of raw data sets for empirical research as found in psychology and other related disciplines. Although these data sets are usually pseudonymized or anonymized, there is a risk of de-anonymization due to linkage of data sets and potential external data sources. This work should explore this issue and demonstrate the feasability of such attacks based on synthetic and/or real data sets.
“The impact of privacy in Vehicular Edge Computing,” Bachelor's thesis, Master's thesis, Project, M. Wolf (Supervisor), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
Modern vehicles will communicate with their environment using Vehicular Ad Hoc Networks (VANET) sending out regular status beacons or warning messages. Those are collected by Road Side Units (RSU) and will be combined with other data, like weather or information from the backend. With this data certain calculations can be performed (e.g. predicting the vehicle density). Furthermore, vehicles may transfer additional data, which is too resource intensive to calculate for themselves, to the RSUs . This process of transmitting data for expensive calculations is called Edge Computing. Currently a lot of work focuses on the benefits and possible applications of VEC, as well as on how PETS can be implemented. But little research is done how privacy techniques impact VEC and safety. In this project/thesis, you have to implement one or more PETS (depending on ECTS) in a VANET simulation framework (Plexe/Veins) and analyze its impact.
“A Tool Support for Privacy Threat Modelling,” Master's thesis, Bachelor's thesis, Project, A. Al-Momani (Supervisor), F. Kargl (Examiner), Inst. of. Distr. Sys., Ulm Univ., 2020 – Open.
Privacy engineering and particularly privacy threat modelling have gained a lot of attention in the recent years. Many methodologies have been proposed to model privacy threats. An example of such methods is the widely used LINDDUN method. As some recent (ISO/IEC) standards and regulations (e.g., GDPR) require handling risks associated with the elicited threats, we combined the LINDDUN method with a privacy risk rating method forming a holistic method that takes the system model as input and outputs a list of privacy risks. Your task in this project/thesis work is to implement a tool to support the the deployment of our developed method. Related work to such a tool is the commonly used Microsoft threat modelling tool which is used for security. Another very related example that is considered an extension to the MS tool is the TMTe4PT tool. There are no restrictions on the technologies or languages used in the implementation as long as it achieves the required features similarly to, e.g., TMTe4PT. This project can also be extended to a thesis by including research questions related to the countermeasure selection process.

IT Security

“Designing exercise tasks for Security in IT-Systems lecture,” Bachelor's thesis, Master's thesis, Project, M. Wolf (Supervisor), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
This topic addresses primarily students of the teaching profession, however others may also apply. In this work you should design and create one or more exercise sheets (depending on the ECTS) for the lecture Security in IT-Systems combined with an automated grading system. One such sheet can be about web security where students have to hack a web server launched on a docker image - similar to hackthissite.org. For a list of other topics, please refer to the module description: https://www.uni-ulm.de/in/vs/teach/sec
“Using Machine Learning for Misbehavior Detection in CACC,” M. Wolf (Supervisor), F. Kargl (Examiner), Inst. of Distr. Sys., Ulm Univ., 2019 – Open.
Modern vehicles will use communication to increase the safety of its passengers, reduce fuel consumption, travel time, and more. The communication between the vehicles will be mainly beacon messages containing the speed, position, acceleration and other properties. These messages need to be validated, if they contain correct (plausible) information. For example, when a vehicle is suddenly stopping, but sending an increase in speed, the following vehicles may crash into the misbehaving vehicle. In literature, there is already existing work on detecting misbehavior in the data with different techniques such as subjective logic or machine learning. In this project, we will analyze the VeReMi data-set with the help of different machine learning algorithms. The number of algorithms compared is depending on the scope (credits). The student can choose the framework, e.g. PyTorch.

Fault Tolerance

Cloud Computing

Multimedia Communication

Miscellaneous Topics

“Konzeption und Entwicklung interaktiver Lerninhalte in der Rechnernetze-Lehre,” Bachelor's thesis, Master's thesis, B. Erb (Supervisor), F. Kargl (Examiner), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
Diese Abschlussarbeit richtet sich primäre an Studierende des Lehramts. In dieser Arbeit sollen Lerninhalte konzipiert und umgesetzt werden, die die Lehre im Fach 'Grundlagen der Rechnernetze' ergänzen. Im Rahmen des Blended Learning Konzepts der Lehrveranstaltung geht es insbesondere um interaktive Labs, Visualisierungen und Tools zur Vertiefung der Inhalte, die die Studierenden remote verwenden können.
“Test-based Validation of Network Programming Tasks,” Project, D. Meißner (Supervisor), F. Kargl (Examiner), Inst. of Distr. Sys., Ulm Univ., 2021 – Open.
We have a collection of Java programming tasks as part of our introduction to computer networks course. In these programming tasks students are instructed to implement network applications matching a strict set of rules. The goal of this project is to implement a rule-based testing framework to aid the grading of such programming tasks and providing immediate feedback to students whether their implementation is correct or not.
“A Tool Support for Privacy Threat Modelling,” Master's thesis, Bachelor's thesis, Project, A. Al-Momani (Supervisor), F. Kargl (Examiner), Inst. of. Distr. Sys., Ulm Univ., 2020 – Open.
Privacy engineering and particularly privacy threat modelling have gained a lot of attention in the recent years. Many methodologies have been proposed to model privacy threats. An example of such methods is the widely used LINDDUN method. As some recent (ISO/IEC) standards and regulations (e.g., GDPR) require handling risks associated with the elicited threats, we combined the LINDDUN method with a privacy risk rating method forming a holistic method that takes the system model as input and outputs a list of privacy risks. Your task in this project/thesis work is to implement a tool to support the the deployment of our developed method. Related work to such a tool is the commonly used Microsoft threat modelling tool which is used for security. Another very related example that is considered an extension to the MS tool is the TMTe4PT tool. There are no restrictions on the technologies or languages used in the implementation as long as it achieves the required features similarly to, e.g., TMTe4PT. This project can also be extended to a thesis by including research questions related to the countermeasure selection process.