All topics are taken.
Topics:
-Machine Learning in Database Intrusion Detection Systems
-Modern problems require modern solutions - 5G IoT Physical Layer Network security
-Spoofing and Manipulation Attacks on Self-Driving cars
-Hackers on four wheels - Security of Automotive CAN (Controller Area Network) systems
-Hypervisor and Trusted Computing - Building a secure IoT architecture
-Eclipse attacks on Blockchain and countermeasures
-Identification of IoT devices through traffic fingerprinting
-Traffic Analysis Attacks on Tor
-Privacy on the Blockchain - How hackers get caught
-Backdoor attacks on Federated Machine Learning & defenses
-Lossless compression of log files for security analysis using Machine Learning
-Deep Learning based Proof-of-Work for Blockchains
We expanded the topic list by another group:
-How to guess better: Machine Learning based guided Fuzzing against Smart Contract vulnerabilities
-Cryptographic apocalypse? - Schemes for Post-Quantum Encryption
-Sophisticated & elusive botnets - Distributed Command & Control architecture
-Identification of IoT devices through radio frequency fingerprinting
-Supply Chain Management using Blockchain
-What you see is not what you get: Visual impersonation and underhanded source code
-Ponzi Schemes on the Blockchain
-Can you get rich? - Predicting Cryptocurrency prices
-Peeping Circuit: Machine Learning and Hardware Security
-Behavioral authentication using keystroke and sensor data using Machine Learning
-Adversarial attack on Machine Learning models
-Information extraction on Machine Learning models
Topics:
-
-
-
-
-
-
-
-
-
-
-
-
We expanded the topic list by another group:
-
-
-
-
-
-
-
-
-
-
-
-
- Dozent: Alexandra Dmitrienko
- Dozent: Torsten Krauß
- Dozent: Christoph Sendner
- Dozent: Peter Ten