Projects and Final Theses

If you are interested in projects and final theses in your bachelor or master studies, we are there to give you advise and further information. You can contact us anytime via mail or just come and visit us.

Our bachelor and master projects are situated in the context of cutting-edge research projects. Please have a look at the research section for more information about current research projects at the group and do not hesitate to contact us if something sounds interesting to you. Alternatively, you can also come to the kick-off talks at the beginning of each semester; these are also listed in LSF.



[Master] Ransomware Detection

Ransomware attacks – in contrast to other cyber attacks – must not be detected and especially not blocked or recovered on first sight. This relaxation is supported by the rareness of ransomware attacks. Certainly, the uprising of ransomware families, which are able to circumvent the detection mechanism, integrated into the local machine, prevents the approaches from taking advantage of the relaxation. Justified by the attack isolation, the move to the personal cloud storage is the reasonable way...

Read more

[Master] Design and Analysis of a secure multi-party communication protocol

In the past years digital communication became an important aspect in every day life. Everything is shared and discussed in groups of friends, family or business part- ners without a proper way to protect that information. This master thesis introduces the first secure robust multi-party communication protocol which mimics a physical conversation with the help of a Diffie-Hellman key tree and social behaviours. Robust- ness against offline group members is reached by taking advantage of...

[Bachelor] Mapping different datatypes ensuring secure cloud storage

In this thesis two generic approaches on how to store different datatypes to a cloud storage are proposed, thereby utilizing Treetank. As part of this thesis implementations for the proposed approaches have been implemented to evaluate their practicability and search out strengths as well as weaknesses. Current cloud storage systems, security concerns towards privacy, stability and integrity of data shared with “the Cloud” is discussed. An overview of Treetank, that originally was designed to be...

[Bachelor] A platform-independent iSCSI Target in Java

This Bachelor thesis describes the architecture of an iSCSI target written in Java, investigates the effects of various parameters on the program's performance, and compares the results to those of a native code implementation.