Bachelor and Master Theses

This is a list of current proposed topics and research areas for theses. The degree column serves as an indicator for the expected complexity, but usually it is possible to adjust the scope to also fit other degrees. If you are interested in one of these topics, please get in touch with the indicated contact person. If you would like to write a thesis with us, but don't find a suitable topic on this list (or if you have your own idea), please contact us anyway.

TopicDegreeContact person
An SGX-Enclave for Trustworthy Insurance Questionnaire EvaluationBachelorEsfandiar Mohammadi
Datenschutzfreundliche Veröffentlichung von Business Process Log-DatenBachelorEsfandiar Mohammadi
Security Analysis of Time Shared Intel Arria 10 PACBachelorThore Tiemann
Security Analysis of the SOPR-Demonstrator on an Agilex FPGABachelorThore Tiemann
Secure Extension of the Corona Warn AppBachelorEsfandiar Mohammadi
Privacy Attacks on Decision Trees for psychological and insurance surveysBachelorEsfandiar Mohammadi
Stylometry AttacksBachelorEsfandiar Mohammadi
Runtime Attestation for Open-Source EnclavesBachelorThomas Eisenbarth
Privacy Attacks on Users of Public EV Charging StationsBachelorThomas Eisenbarth
Construction and Evaluation of a Measurement Table for Side-Channel Analysis and Fault InjectionBachelorAlexander Treff
Malware/Cryptominer Detection in Docker ContainersBachelorClaudius Pott
Stealthy kleptographic crypto systemsMasterThomas Eisenbarth
White-box cryptographyMasterAlexander Treff
Securing cryptographic implementationsMasterAlexander Treff
FPGA-based Rowhammer Attacks on DDR4 MemoryMasterThore Tiemann
Privacy-Preserving Federated LearningMasterEsfandiar Mohammadi
Trusted Execution Environments on Open-Source ProcessorsMasterThomas Eisenbarth

Completed Theses


BachelorTimothy ImortAutomated Activation of the Acoustic Scene Classification in the Corona-Warn-App
MasterJohannes LiebenowDifferentially Private Aggregation of Mobility Data
MasterAnna PätschkeCipherleaks Countermeasures
BachelorAlexander HermleMicrowalk framework with QEMU


MasterMoritz KirschteMassively Distributed Privacy-preserving Machine Learning on Large-scale Medical Applications
BachelorLeon DietrichHow to build an FPGA based PCIe fuzzer
BachelorChristopher PeredyMicrowalk framework on RISC-V
BachelorBuesra AytenOptimized Signature Schemes via Compression
BachelorChris VennAlgorithm Substitution Attacks on Matrix
MasterThorsten PeinemannThe Inside Story: Towards Understanding Privacy Leakage of Neural Networks
MasterMoritz WelbergContext Aware Anomaly Detection in Industrial Control Systems via Machine Learning
MasterJonas SanderSecure and Fast Outsourced Machine Learning
MasterAlexander TreffSide-Channel Attacks against Neural Network Hardware Accelerators
MasterMarven KummerfeldtThe Curse of Dimensionality for Additive Noise
BachelorDaniel WidmerTrading Computation Time for Energy
BachelorChristopher KrebsAlgorithms for RSA key recovery
BachelorMoritz DornOptimizing the Picnic Signature Scheme for Small Devices
MasterThéo GiovannaPrivacy-​Preserving Machine Learning for Cyber Insurance
BachelorKevin RichterPrecision of city simulations using publicly available city data
BachelorKilian ZeiseweisEvaluation of Injected Data from an Adapted Smart City Simulation
MasterNiclas KathPrivacy Concerns in Models about Physical Activity
MasterNadja AoutoufLearning advanced differential privacy mechanisms with fixed data order


MasterLucas BergmannAnomaly Detection for Intrusion Detection
BachelorAnja RabichSoftware-based Undervolting Faults in AMD Processors
MasterGilian HenkeAttacks on DDR4 Memory Scrambling
BachelorTim-Henrik TravingPractical Analysis of Algorithm Substitution Attacks
MasterChristoph PeglowSecurity Analysis of Intel's Input/Output Memory Management Unit (IOMMU)
BachelorMoritz NicklasSecurity Analysis of Contact-less Smart Cards on Campus
BachelorJulia GawlikQuantification of information leakages in binaries
MasterLuca WilkeInjection Attacks on Secure Encrypted Virtualization
BachelorTim GellersenSide-Channel Attacks on Post-Quantum Signature Scheme Picnic
BachelorPajam PaulsAn Analysis of Contemporary Attacks on White-Box Implementations
MasterThore TiemannExploiting Cache Side-Channels on CPU-FPGA Cloud Platforms
MasterMalte StoffersAnalysis of microarchitectural attacks on ARM-platforms
BachelorNils GutjahrAttacks on AVX-512
BachelorMichael BrücknerMinimizing The Use of Personal Information in a Given Legacy System Via Data Synthesis


BachelorVolodymyr BezsmertnyiFingerprinting and Secret Extraction in Docker Multi-Container Applications via Memory Deduplication
BachelorAnna PätschkeSecurity Analysis of a JSON RPC API with JavaScript Frontends
BachelorGordon DahlkeLow-Resource Eclipse Attacks on Alternative Ethereum Clients
BachelorOguzhan TekinSide-Channel Analysis of a Compact AES FPGA Implementation
BachelorJohannes LiebenowAnomaly Detection in Login Data
BachelorFabian WestphalSecure Data Transfer and Processing in an Enclave using Intel SGX


MasterNils KlawitterConfidential Data Storage on an IoT-oriented Distributed Ledger
BachelorFlorian DahlmannPKI for Automotive Applications
BachelorJonas SanderMemJam+Abort: Combining Two Microarchitectural Side-Channel Attacks
MasterJacqueline ThaeterGarbled Circuits: From White-Box Cryptography to Zero-Knowledge Proofs
MasterMoritz KrebbelBrowser-basierte Cache-Angriffe auf die RSA-Schlüsselgenerierung