Theses
We are interested in topics concerning IT security and privacy with an emphasis on human factors and empirical approaches. For more general (usable) security topics, you might want to contact Prof. Dürmuth’s Usable Security and Privacy group.
Feel free to take a look at our recent publications for an overview over our groups’s research direction.
Thesis Contact
We do not offer a pre-compiled list of thesis topics, but prefer to find an individual thesis topic based on your interest and skills.
As a foundation for discussing possible thesis topics matching your skills and interests, please include the following information in your email:
- Your experiences in IT security with relevance for a thesis such as attended lectures, previous (programming) projects, or private hobbies related to IT security.
- Please do not include a transcript of your grades for privacy reasons.
- Your programming background (Programming languages you could comfortably use in your thesis).
- Your general idea of your thesis direction, e.g., more theory focused such as a review of existing literature, more study focused such as a tool comparison, or more programming focused such as a software implementation.
Contact: You can contact us via email at theses@sec.uni-hannover.de.
- The LUH requires us to only accept emails from your LUH address (
stud.uni-hannover.de
, see “Verkündungsblatt 10|2021”).- We do accept theses (and emails) in English or German.
Please note: It might take some time to hear back from us, as we receive a large amount of thesis-related emails. If you really want to write a thesis with us, feel free to send a reminder email after a week or so to bump your request back to the top of our stack.
Completed Theses
2024
How Does the Future Work for SOUPS? Evaluating Usable Security and Privacy Future Work Statements
Don’t Crash Just Run: Investigating Game Engines’ Behavior with Security (Mis-)Implementations
Exploring Fuzzing Techniques for Bootloader Security
2023
Do Code Secret Scanners Prevent You from Leaking Secrets? Development of a Code Secret Scanner Benchmark
Analyzing Trends in Usable Security and Privacy Publications at Top Tier Conferences
Detecting Typosquatting in Package Managers: Creating a Dataset and Evaluation Framework at the Example of PyPI
Passwordless Authentication in Local Administrations: Exploring Perceptions and Barriers in German Public Authorities
MPAS: A Modular Passwordless Authentication Server to Enable Usable and Secure Authentication for Web Developers
A Security and Usability Evaluation of AI-Based Coding Assistants
2022
Code Secret Scanner Analyse: Erfahrungen und Erwartungen von Entwickler:innen
Helfen APIs? Interaktionsprobleme für Passwort-Manager auf mobilen Plattformen
New Kid on the Block - Webauthn versus previous 2FA Approaches
RAT-ikale Sicherheit: Betrachtung von Sicherheitsaspekten in Remote Administration Tools
2021
Rust: Usability for a Lifetime? An Empirical Approach
Who is in Charge? - Investigating (In)Security Responsibilities in Machine Learning Pipelines
Controlling Personal Data on End-User-Devices: The Usability of Privacy Settings across multiple Operating Systems
Exploring Authentication on the Web: Crawling Login Websites to Determine their Password Manager Compatibility
Implementierung einer Chrome-Extension zur Erkennung von Interaktionsproblemen zwischen Password-Managern und Webseiten
Identifying Security Issues in Projects Including Machine Learning
Improving Malware Detection: Utilizing Deep Learning, Function Call Graphs, Instruction Sequence Similarity and Binary Data Visualization
A Security Analysis of Mobile Car Apps for Android
Helping Researchers Conduct Developer Studies during COVID-19 - A Usable API and Interface for Remote Study Tooling
Investigation of Security and Misconfiguration for Linux Container Engines
Über die Sicherheit und Angriffsvektoren von Bluetooth Low Energy Implementierungen
An Android App Developer Study on the Use of Privacy-Enhancing Technologies
Framework zur Sicherheitsanalyse von mobilen MQTT-Applikationen
An ACME Broker for Automated Certificate Acquisition in University Environments
Praktische Evaluierung der verhaltensbasierten Benutzerauthentifizierung anhand von Tastaturinteraktionen
Right to Access: Designing and Piloting a Survey on the Usability of GDPR Data Requests
Sichere Paketverwaltung mit Composer? - Eine Analyse der Abhängigkeit populärer PHP-Anwendungen auf GitHub
Comparison of Tools for Docker Security
2020
Usable Network Security Configuration for Android Developers
Analysing Github Commits Based on Security Benchmarks
Konzeption und Evaluation eines automatisierten Abgabesystems im Rahmen der universitären Lehre
BrokenWrt: Vulnerable Router Firmware for Practical Network Attacks
CookieBANner: Implementierung und Evaluation einer Browsererweiterung für automatisierte Cookie-Banner-Interaktion
Privacy and Web Server Logs: An Interview Study on Web Server Log Configurations under Consideration of the GDPR
The Effect of PSD2 on the German Android Banking App Ecosystem
Examining the Privacy and Security of Online Meme Generators: A Parameterized Website Analysis
SSID Snooper: Ein Framework zum Identifizieren datenschutzbezogener Informationen in SSIDs
Analyse des Einsatzes von Anti Ad-Block Ansätzen mittels bildbasierter Verfahren
An Examination of Security Software Developers’ Usability Decisions
Design einer Nutzerstudie zur DSGVO-Compliance von Websites
CTFronted: Management Interface for CTF-Challenges in Security Teaching
Virtualisation-based Infrastructe for Practical IT-Security Exercises
2019
wh173 h47 h4ck1n6: Eine disziplinübergreifende CTF-Challenge zu Lehrzwecken
Zur Sicherheit und Benutzerfreundlichkeit von Zwei-Faktor-Authentifizierung bei bildbasierten One-Time Authentifizierungscides auf mobilen Endgeräten
Automatisches Framework zur Unterstützung von Forschern bei der Durchführung von Mturk Studien
An Empirical Study of Alexa Skills Metadata in the Amazon Store
A Feasibility Study of Classifying Security Advice for Developers
Plattform zur Visualisierung von TLS Parametern
'So I found your Password in this breach...' - Towards Measuring the Effectiveness of Data Driven Password Nudges
An Interview Study to Identify Challenges on Operating Platforms for Investigative Journalism
2018
Eine Sicherheitsanalyse mobiler Krankenkassenapplikationen
Stärkung mentaler Modelle mit Animationen: Eine Fallstudie für Secure Messaging
Traffic Analysis in Home Networks for Botnet Detection
Erkennen von Botnet-Infektionen im Kontext von Local Area Networks
Integration von Zertifikaten für Sicherheitskritische Web-Entwicklung
Crypto-Bot: Anwendungsfall getriebene Generierung sicherer und gut benutzbarer Kryptografischer Code Snippets
Identifying Insecure Internet of Things Devices in a Local Area Network
Design, Implementierung und Evaluation eines Werkzeuges zur benutzerfreundlichen Systemhärtung