Offene Abschlussarbeiten

Auf dieser Seite finden Sie Informationen zu aktuell von uns angebotenen Themen für Abschlussarbeiten. Informationen zu bereits laufenden oder fertiggestellten Arbeiten finden sich auf einer Unterseite. Beachten Sie, dass ausgeschriebene Arbeiten teilweise als Bachelor- und Masterarbeit oder auch als Projektarbeit ausgeschrieben sind. Je nachdem, was Studierende benötigen, wird in der Regel das Thema der gewählten Arbeit in Arbeitsumfang und Schwierigkeitsgrad angepasst.

Hinweis zur Sprache: Im Folgenden werden die verfügbaren Themen hauptsächlich auf Englisch aufgelistet. Bei der Bearbeitung eines Thema steht es Studierenden frei, sich entweder für Deutsch oder Englisch als Sprache für die Ausarbeitung zu entscheiden.

Aktuelle Ausschreibungen

„Confidential Computing via Multiparty Computation and Trusted Computing,“ Projektarbeit oder Masterarbeit, D. Meißner (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2022 – Verfügbar.
Secure multiparty computation and trusted computing are two very different approaches to perform computations on confidential data. MPC relies on provably secure but costly cryptography whereas trusted computing relies on somewhat trustworthy hardware. This difference also affects to the underlying attacker models. Simply put MPC requires non-colluding parties and trusted computer requires uncompromised hardware that was correctly manufactured. The goal of this topic is to explore a combination of both approaches to mitigate each others weaknesses for a specific use case where the computing parties are disjunct from data subjects.
„Intel SGX Application Development with Gramine,“ Projektarbeit oder Bachelorarbeit, A. Heß (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2022 – Verfügbar.
Intel SGX allows to launch tamper-proof enclaves in main memory, which can be used to isolate parts of an application's codebase that have to deal with sensitive data. There is a broad spectrum of possible applications ranging from fault-tolerant systems to privacy-preserving machine learning approaches. Intel's SGX SDK provides functionality to derive C wrapper functions based on a special-purpose Enclave-Definition Language. These wrapper functions can then be used for the interaction between trusted and untrusted parts of C/C++ applications. However, the design of this enclave interface requires special care during the development process. The Gramine project promises to circumvent this step by providing functionality to wrap unmodified linux applications in Intel SGX enclaves. The goal of this thesis/project is to break down the application development process with Gramine, in order to reveal possible limitations or pitfals. Further, a performance evaluation could be conducted to measure the overhead of Gramine in comparison to a native implementation.
„Graph Machine Learning on Evolving Graphs,“ Masterarbeit, B. Erb (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2021 – Verfügbar.
Event-sourced graphs are a concept to capture graphs that are continuously evolving, e.g. based on a stream of live changes. Goal of this thesis is (a) to provide an overview of existing graph machine learning concepts, (b) to assess the applicability of machine learning mechansims on event-sourced graphs, and (c) to prove the feasibility with a prototype implementation. Basic knowledge of general machine learning concepts is a plus for this thesis.
„Library Isolation in Embedded Systems,“ Bachelorarbeit, Masterarbeit, F. Kargl (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2021 – Verfügbar.
Software vulnerabilities pose critical threats to safety-relevant systems like vehicles. For example, a bug in a library embedded into a control program of a braking electronic-control-unit (ECU) inside a vehicle might be exploited by attackers to infiltrate the ECU and disable the breaks. More and more of today's vehicle allow over-the-air update of their software, but this typically requires updating a full firmware or at least a monolitic binary. So even if the mentioned library is patched, it still takes substantial time to integrate the new library version with the binary, and create and distribute a new firmware. In this work, we want to investigate system-level mechanisms to isolate a faulty library by dissecting it from a binary and executing it in a sandboxed environment. Feasibility of the concepts should be demonstrated in a proof-of-concept implementation.
„Test-Case-Generation Strategies for Network-Protocol-Model Refinements,“ Bachelor's oder Masterarbeit, S. Kleber (Betreuung), F. Kargl (Prüfer), Institut of Distributed Systems, Ulm University, 2019 – Verfügbar.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred. After an initial inference procedure, it is desirable to refine the existing protocol model. Actively probing an entity for the validity of message syntaxes allows to targetedly enhance the knowledge about the protocol. To do this efficiently a smart method of automatically generating test-cases depending on the current protocol model needs to be developed.
Kontakt

Sekretariat

Marion Köhler
Emailaddresse Sekretariat
Telefon: +49 731 50-24140
erreichbar jeweils vormittags
Telefax: +49 731 50-24142

Postanschrift

Institut für Verteilte Systeme
Universität Ulm
Albert-Einstein-Allee 11
89081 Ulm

Besucheranschrift

James-Franck-Ring
Gebäude O27, Raum 349
89081 Ulm
Sekretariat Montag bis Donnerstag Vormittag besetzt

Anfahrt

Themen nach Abschluss

Bachelor-Arbeiten

„Intel SGX Application Development with Gramine,“ Projektarbeit oder Bachelorarbeit, A. Heß (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2022 – Verfügbar.
Intel SGX allows to launch tamper-proof enclaves in main memory, which can be used to isolate parts of an application's codebase that have to deal with sensitive data. There is a broad spectrum of possible applications ranging from fault-tolerant systems to privacy-preserving machine learning approaches. Intel's SGX SDK provides functionality to derive C wrapper functions based on a special-purpose Enclave-Definition Language. These wrapper functions can then be used for the interaction between trusted and untrusted parts of C/C++ applications. However, the design of this enclave interface requires special care during the development process. The Gramine project promises to circumvent this step by providing functionality to wrap unmodified linux applications in Intel SGX enclaves. The goal of this thesis/project is to break down the application development process with Gramine, in order to reveal possible limitations or pitfals. Further, a performance evaluation could be conducted to measure the overhead of Gramine in comparison to a native implementation.
„Library Isolation in Embedded Systems,“ Bachelorarbeit, Masterarbeit, F. Kargl (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2021 – Verfügbar.
Software vulnerabilities pose critical threats to safety-relevant systems like vehicles. For example, a bug in a library embedded into a control program of a braking electronic-control-unit (ECU) inside a vehicle might be exploited by attackers to infiltrate the ECU and disable the breaks. More and more of today's vehicle allow over-the-air update of their software, but this typically requires updating a full firmware or at least a monolitic binary. So even if the mentioned library is patched, it still takes substantial time to integrate the new library version with the binary, and create and distribute a new firmware. In this work, we want to investigate system-level mechanisms to isolate a faulty library by dissecting it from a binary and executing it in a sandboxed environment. Feasibility of the concepts should be demonstrated in a proof-of-concept implementation.
„Test-Case-Generation Strategies for Network-Protocol-Model Refinements,“ Bachelor's oder Masterarbeit, S. Kleber (Betreuung), F. Kargl (Prüfer), Institut of Distributed Systems, Ulm University, 2019 – Verfügbar.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred. After an initial inference procedure, it is desirable to refine the existing protocol model. Actively probing an entity for the validity of message syntaxes allows to targetedly enhance the knowledge about the protocol. To do this efficiently a smart method of automatically generating test-cases depending on the current protocol model needs to be developed.

Master-Arbeiten

„Confidential Computing via Multiparty Computation and Trusted Computing,“ Projektarbeit oder Masterarbeit, D. Meißner (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2022 – Verfügbar.
Secure multiparty computation and trusted computing are two very different approaches to perform computations on confidential data. MPC relies on provably secure but costly cryptography whereas trusted computing relies on somewhat trustworthy hardware. This difference also affects to the underlying attacker models. Simply put MPC requires non-colluding parties and trusted computer requires uncompromised hardware that was correctly manufactured. The goal of this topic is to explore a combination of both approaches to mitigate each others weaknesses for a specific use case where the computing parties are disjunct from data subjects.
„Graph Machine Learning on Evolving Graphs,“ Masterarbeit, B. Erb (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2021 – Verfügbar.
Event-sourced graphs are a concept to capture graphs that are continuously evolving, e.g. based on a stream of live changes. Goal of this thesis is (a) to provide an overview of existing graph machine learning concepts, (b) to assess the applicability of machine learning mechansims on event-sourced graphs, and (c) to prove the feasibility with a prototype implementation. Basic knowledge of general machine learning concepts is a plus for this thesis.
„Library Isolation in Embedded Systems,“ Bachelorarbeit, Masterarbeit, F. Kargl (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2021 – Verfügbar.
Software vulnerabilities pose critical threats to safety-relevant systems like vehicles. For example, a bug in a library embedded into a control program of a braking electronic-control-unit (ECU) inside a vehicle might be exploited by attackers to infiltrate the ECU and disable the breaks. More and more of today's vehicle allow over-the-air update of their software, but this typically requires updating a full firmware or at least a monolitic binary. So even if the mentioned library is patched, it still takes substantial time to integrate the new library version with the binary, and create and distribute a new firmware. In this work, we want to investigate system-level mechanisms to isolate a faulty library by dissecting it from a binary and executing it in a sandboxed environment. Feasibility of the concepts should be demonstrated in a proof-of-concept implementation.
„Test-Case-Generation Strategies for Network-Protocol-Model Refinements,“ Bachelor's oder Masterarbeit, S. Kleber (Betreuung), F. Kargl (Prüfer), Institut of Distributed Systems, Ulm University, 2019 – Verfügbar.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred. After an initial inference procedure, it is desirable to refine the existing protocol model. Actively probing an entity for the validity of message syntaxes allows to targetedly enhance the knowledge about the protocol. To do this efficiently a smart method of automatically generating test-cases depending on the current protocol model needs to be developed.

Themen nach Schwerpunkt

Netzwerke

„Test-Case-Generation Strategies for Network-Protocol-Model Refinements,“ Bachelor's oder Masterarbeit, S. Kleber (Betreuung), F. Kargl (Prüfer), Institut of Distributed Systems, Ulm University, 2019 – Verfügbar.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred. After an initial inference procedure, it is desirable to refine the existing protocol model. Actively probing an entity for the validity of message syntaxes allows to targetedly enhance the knowledge about the protocol. To do this efficiently a smart method of automatically generating test-cases depending on the current protocol model needs to be developed.

Mobile Systeme

Distributed Computing

Privacy

„Confidential Computing via Multiparty Computation and Trusted Computing,“ Projektarbeit oder Masterarbeit, D. Meißner (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2022 – Verfügbar.
Secure multiparty computation and trusted computing are two very different approaches to perform computations on confidential data. MPC relies on provably secure but costly cryptography whereas trusted computing relies on somewhat trustworthy hardware. This difference also affects to the underlying attacker models. Simply put MPC requires non-colluding parties and trusted computer requires uncompromised hardware that was correctly manufactured. The goal of this topic is to explore a combination of both approaches to mitigate each others weaknesses for a specific use case where the computing parties are disjunct from data subjects.
„Graph Machine Learning on Evolving Graphs,“ Masterarbeit, B. Erb (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2021 – Verfügbar.
Event-sourced graphs are a concept to capture graphs that are continuously evolving, e.g. based on a stream of live changes. Goal of this thesis is (a) to provide an overview of existing graph machine learning concepts, (b) to assess the applicability of machine learning mechansims on event-sourced graphs, and (c) to prove the feasibility with a prototype implementation. Basic knowledge of general machine learning concepts is a plus for this thesis.

IT-Sicherheit

„Confidential Computing via Multiparty Computation and Trusted Computing,“ Projektarbeit oder Masterarbeit, D. Meißner (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2022 – Verfügbar.
Secure multiparty computation and trusted computing are two very different approaches to perform computations on confidential data. MPC relies on provably secure but costly cryptography whereas trusted computing relies on somewhat trustworthy hardware. This difference also affects to the underlying attacker models. Simply put MPC requires non-colluding parties and trusted computer requires uncompromised hardware that was correctly manufactured. The goal of this topic is to explore a combination of both approaches to mitigate each others weaknesses for a specific use case where the computing parties are disjunct from data subjects.
„Library Isolation in Embedded Systems,“ Bachelorarbeit, Masterarbeit, F. Kargl (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2021 – Verfügbar.
Software vulnerabilities pose critical threats to safety-relevant systems like vehicles. For example, a bug in a library embedded into a control program of a braking electronic-control-unit (ECU) inside a vehicle might be exploited by attackers to infiltrate the ECU and disable the breaks. More and more of today's vehicle allow over-the-air update of their software, but this typically requires updating a full firmware or at least a monolitic binary. So even if the mentioned library is patched, it still takes substantial time to integrate the new library version with the binary, and create and distribute a new firmware. In this work, we want to investigate system-level mechanisms to isolate a faulty library by dissecting it from a binary and executing it in a sandboxed environment. Feasibility of the concepts should be demonstrated in a proof-of-concept implementation.

Fehlertoleranz

Cloud Computing

Multimediakommunikation

Weitere Themen