Bachelor and Master Theses

This is a list of current proposed topics and research areas for theses. The degree column serves as an indicator for the expected complexity, but usually it is possible to adjust the scope to also fit other degrees. If you are interested in one of these topics, please get in touch with the indicated contact person. If you would like to write a thesis with us, but don't find a suitable topic on this list (or if you have your own idea), please contact us anyway.

TopicDegreeContact person
Privacy-Preserving Simulation of Smart CitiesBachelorEsfandiar Mohammadi
Security Analysis of Time Shared Intel Arria 10 PACBachelorThore Tiemann
Security Analysis of the SOPR-Demonstrator on an Agilex FPGABachelorThore Tiemann
Runtime Attestation for Open-Source EnclavesBachelorThomas Eisenbarth
Fairness and Backdoors in Federated Learning for Health ApplicationsBachelorThorsten Peinemann
Self-Healing of Neural Networks Against Backdoors in Federated LearningBachelorThorsten Peinemann
Undetectable Backdoors and Neutralisation of Backdoors in Machine LearningBachelorThorsten Peinemann
Black-Box Discovery of Differential Privacy Violations for Neural Network TrainingBachelorThorsten Peinemann
Differentially Private Evolutionary / Genetic AlgorithmsBachelorMarven Kummerfeldt
Smoothed Sensitivity for Differentially Private ClusteringBachelorJohannes Liebenow
Differentially Private Data Range ApproximationBachelorJohannes Liebenow
Privacy Attacks on Users of Modern CarsBachelorAnna Pätschke
Stealthy kleptographic crypto systemsMasterThomas Eisenbarth
White-box cryptographyMasterAlexander Treff
Securing cryptographic implementationsMasterAlexander Treff
FPGA-based Rowhammer Attacks on DDR4 MemoryMasterThore Tiemann
Trusted Execution Environments on Open-Source ProcessorsMasterThomas Eisenbarth
Analyze Profoundness / Tightness of Differentially Private AlgorithmsMasterMoritz Kirschte
Instrumentation and Code Analysis on OS-less DevicesMasterFlorian Sieck
Systematic Analysis of Data Privacy in JavaScript ContextsMasterFlorian Sieck
Detection and Analysis of Cryptographic PrimitivesMasterAnna Pätschke
Optimization of RSA key reconstruction algorithmsMasterFlorian Sieck

Completed Theses


Degree Author Title
Bachelor Nick Mahling Reverse-engineering des Pattern History Tables auf Intel CPUs
Bachelor Andre Edler Experimental Evaluation of Differentially Private Clustering Algorithms
Bachelor Benedict Strunk Privacy Attacks on Users of Public EV Charging Stations
Master Pajam Pauls Extending maskVerif to Advanced Masking Schemes
Bachelor Alexander Heimann Electricity Grid Modelling in a Smart City Simulation
Bachelor Marcel Heisel Implementing Secure Aggregation for mobile devices
Master Volodymyr Bezsmertnyi Hardware-assisted fault injection emulation
Bachelor Till Eifert Implementing Fault Attacks on BIKE
Bachelor Malte Terje Klasen Automatic Generation of Low-Interaction Web Application Honeypots from CVE and CWE Records
Bachelor Valentin von Plata Attacking Disk Encryption in AMD SEV
Bachelor Thilo Beccard Using ZombieLoad for co-location detection between MicroVMs
Bachelor Marcel Pflaeging Variants of DPSGD


Degree Author Title
Master Felix Mächtle Automated vulnerability detection in Java
Bachelor Finn Burmester Retrofitting Remote Control-Flow Attestation for ARM TrustZone
Master Jonah Heller Adapting Lattice-based Attacks to break Diffie-Hellman
Master Anja Rabich Obfuscuro-Reloaded: Obfuscation of binaries using static instrumentation in Intel-SGX
Bachelor Peter Hodgkinson Evaluation of a privacy preserving smart city simulation based on Cities: Skylines
Bachelor Eric Landthaler Analyzing the impact of fine-tuning foundation models on the performance of DP-SGD
Bachelor Max Schulze Privacy-Preserving Process Mining
Bachelor Jannik Westenfeld Estimating Input Distributions of Partial Background Knowledge for Differential Privacy Mechanisms
Master Nils Loose VULPEX: Vulnerable path exploration in dynamic symbolic execution using machine learning
Bachelor Jonas von der Heydt Boosting sequential composition for noiseless privacy via subsampling
Bachelor Julian Grimm lmproving the Corona Warn App with human activity recognition
Bachelor Nico Winkel Implementing Clustering Algorithms with Secure Multiparty Computation using SCALE Framework
Master Julia Tönnies On the Leakage Resilience of the Sponge Construction and its Relation to XMSS by the Usage as a Building Block of SHA-3
Master Sophie Ketelsen Fault Attacks on BIKE
Bachelor Adrian Billen Implementation of Cryptographic Reverse Firewalls
Bachelor Jack Mähl Implementation of covert MPC protocols
Master Paula Arnold Prevention of combined probing and fault attacks using active multiparty computation in the honest-majority setting
Bachelor Olaf Bernhardt Split-Streams - Improving on a scalable mixnet functionality
Bachelor Timothy Imort Automated Activation of the Acoustic Scene Classification in the Corona-Warn-App
Bachelor Krasen Heinemeier Membership Inference Attack on Random Forest Regression Models
Master Johannes Liebenow Differentially Private Aggregation of Mobility Data
Master Anna Pätschke Cipherleaks Countermeasures
Bachelor Frederik Lehmann Analyse der Uniformität von Knapsack-Verteilungen
Bachelor Alexander Hermle Microwalk framework with QEMU


MasterMoritz KirschteMassively Distributed Privacy-preserving Machine Learning on Large-scale Medical Applications
BachelorLeon DietrichHow to build an FPGA based PCIe fuzzer
BachelorChristopher PeredyMAMBO-V: A RISC-V Port of the Microwalk Framework
BachelorBuesra AytenOptimized Signature Schemes via Compression
BachelorChris VennAlgorithm Substitution Attacks on Matrix
MasterThorsten PeinemannThe Inside Story: Towards Understanding Privacy Leakage of Neural Networks
MasterMoritz WelbergContext Aware Anomaly Detection in Industrial Control Systems via Machine Learning
MasterJonas SanderSecure and Fast Outsourced Machine Learning
MasterAlexander TreffSide-Channel Attacks against Neural Network Hardware Accelerators
MasterMarven KummerfeldtThe Curse of Dimensionality for Additive Noise
BachelorDaniel WidmerTrading Computation Time for Energy
BachelorChristopher KrebsAlgorithms for RSA key recovery
BachelorMoritz DornOptimizing the Picnic Signature Scheme for Small Devices
MasterThéo GiovannaPrivacy-​Preserving Machine Learning for Cyber Insurance
BachelorKevin RichterPrecision of city simulations using publicly available city data
BachelorKilian ZeiseweisEvaluation of Injected Data from an Adapted Smart City Simulation
MasterNiclas KathPrivacy Concerns in Models about Physical Activity
MasterNadja AoutoufLearning advanced differential privacy mechanisms with fixed data order


Degree Author Title
Master Lucas Bergmann Anomaly Detection for Intrusion Detection
Bachelor Anja Rabich Software-based Undervolting Faults in AMD Processors
Master Gilian Henke Attacks on DDR4 Memory Scrambling
Bachelor Tim-Henrik Traving Practical Analysis of Algorithm Substitution Attacks
Master Christoph Peglow Security Analysis of Intel's Input/Output Memory Management Unit (IOMMU)
Bachelor Moritz Nicklas Security Analysis of Contact-less Smart Cards on Campus
Bachelor Julia Gawlik Quantification of information leakages in binaries
Master Luca Wilke Injection Attacks on Secure Encrypted Virtualization
Bachelor Tim Gellersen Side-Channel Attacks on Post-Quantum Signature Scheme Picnic
Bachelor Pajam Pauls An Analysis of Contemporary Attacks on White-Box Implementations
Master Thore Tiemann Exploiting Cache Side-Channels on CPU-FPGA Cloud Platforms
Master Malte Stoffers Analysis of microarchitectural attacks on ARM-platforms
Bachelor Nils Gutjahr Attacks on AVX-512
Bachelor Michael Brückner Minimizing The Use of Personal Information in a Given Legacy System Via Data Synthesis


Degree Author Title
Bachelor Volodymyr Bezsmertnyi Fingerprinting and Secret Extraction in Docker Multi-Container Applications via Memory Deduplication
Bachelor Anna Pätschke Security Analysis of a JSON RPC API with JavaScript Frontends
Bachelor Gordon Dahlke Low-Resource Eclipse Attacks on Alternative Ethereum Clients
Bachelor Oguzhan Tekin Side-Channel Analysis of a Compact AES FPGA Implementation
Bachelor Johannes Liebenow Anomaly Detection in Login Data
Bachelor Fabian Westphal Secure Data Transfer and Processing in an Enclave using Intel SGX


Degree Author Title
Master Nils Klawitter Confidential Data Storage on an IoT-oriented Distributed Ledger
Bachelor Florian Dahlmann PKI for Automotive Applications
Bachelor Jonas Sander MemJam+Abort: Combining Two Microarchitectural Side-Channel Attacks
Master Jacqueline Thaeter Garbled Circuits: From White-Box Cryptography to Zero-Knowledge Proofs
Master Moritz Krebbel Browser-basierte Cache-Angriffe auf die RSA-Schlüsselgenerierung