Theses
Hey, great that you are interested to write a thesis with us!
Below you can find a list of topic (areas) and the respective supervisor from our group.
Please contact the supervisor(s) of your preferred topics via mail and ideally include some background about yourself such as programming experience or other relevant prior knowledge.
If you already have a idea for your topic that fits to one of the listed topic areas, you can pitch that topic to the respective supervisor as well.
Alternatively, and in case there is no supervisor for a particular topic, write an E-Mail to Mathias Fischer (mathias.fischer"AT"uni-hamburg.de).
Resilient Programmable Networks
- Root cause analysis in Programmable Networks
- Machine Learning-assisted Routing for Time-sensitive Networks
- Fault-tolerant Communication for Time-sensitive Networks
- Security of Time-sensitive Communication Protocols
Adaptive Networks through Programmable Devices, Time-Sensitive Networking for Mission-Critical Systems
- Kubernetes for Mission-Critical Systems
- Fault-tolerant Communication in Time-sensitive Networks
- Security of Time-sensitive Communication Protocols
- Detection of targeted attacks using programmable devices (real-world testing on Uni HH TSN Testbed)
- Resilient Network Design for Critical Infrastructure Using SDN (Software-Defined Networking)
Privacy-preserving Data Collection and Processing
- Design of a Distributed / Federated Data Trustee Services
- QUIC(K) Privacy: Balancing Privacy and Efficiency in Large-Scale Data Communication with State-of-the-Art Techniques like QUIC and Mix-Networks
- Privacy-Preserving Data Processing through Differential Privacy and Multi-Party Computation in Data Trustee Services
Decentralized Overlay, P2P Networks and Software-Defined Networking
- Design of a P2P Mesh System based on Virtual Coordinate Systems (e.g., Vivaldi)
- Pervasive P2P Networks through Spatially Local Proxy Nodes
Security and Integrity in IoT
- End-to-end Integrity-protected Data Aggregation
- Trust based Data Aggregation
- Scalability in Blockchain
Security of Native and Web-based Applications
- Protocol Analysis and Reverse Engineering
- Scraping using Structured Data
- Resilience of Resource Identifiers in Web Scraping (XPath, CSS Selectors, etc.)
- User Interface Aware Web Crawling
Digital Twins
- Fuzz Testing for Digital Twins
- Methods for Combining Digital Twins
- Secure Digital Twin Networks
- Privacy-preserving Digital Twin Networks