Theses and Projects

This page provides an overview of our ongoing research projects with master’s students, as well as selected theses and study projects. We are happy to supervise work in the areas of network security and IT security – a list of topics can be found in the job portal and your own topic proposals are also welcome. Further down this page, we provide tips and templates for writing scientific work and explain the process for completing a thesis with us.

Ongoing and Completed Theses and Projects

InternetSecurityWatch

InternetSecurityWatch consists of three subprojects that investigate Internet services, their security, and attacker behavior. We examine the Internet from several perspectives:

  • As a host with vulnerable services (honeypot)
  • As a host monitoring unused IP addresses (network telescope)
  • As an Internet scanner

The following sections provide a detailed description of all three projects.

Honeypot

A large portion of global Internet communication relies on publicly accessible services, such as web and mail servers. Some of these services are unintentionally exposed to the Internet or are updated only irregularly, making them especially interesting targets for attackers. Researchers are also interested in the diversity of services accessible on the Internet. To gain an overview of Internet services, both attackers and researchers use scanners that probe the IP address space for reachable services.

To study who uses Internet scanners, we have deployed services on Internet-connected servers that exist solely to be scanned and attacked, so-called honeypots. To make the honeypots attractive to scanners and attackers, they are intentionally configured insecurely or simulate infrastructure that is interesting for attackers. All scans and interactions with the honeypots are recorded, allowing us to analyze them afterward. This includes examining who is scanning our honeypots and how the scans are performed, for example, the intervals between scans and which ports are targeted.

 

Publications:

  • M. Schramm, N. Lohmiller, S. Kaniewski, and T. Heer, “I Still Know Who You Scanned Last Summer: An Update on the Landscape of Internet Scanners,” in Computation and Communication for Smart Systems Symposium (C2S3), Esslingen, Germany, Apr. 2025.
  • J. Mayer, M. Schramm, L. Bechtel, N. Lohmiller, S. Kaniewski, M. Menth, and T. Heer, “I Know Who You Scanned Last Summer: Mapping the Landscape of Internet-Wide Scanners,” in IFIP Networking, Thessaloniki, Greece, Jun. 2024, doi: 10.23919/IFIPNetworking62109.2024.10619808. PDF
Network Telescope

Network telescopes monitor unused IP address space. “Unused” means that no packets are expected in this range, as no services are running to process them. In reality, however, packets do arrive. These packets must therefore originate from Internet scans, DDoS backscatter, or misconfigurations. We operate a server that captures incoming packets in this unused IP address space. The captured packets are then analyzed to gain a better understanding of the behavior of Internet scanners and attackers.

Internet Scanner

Anyone operating services such as web or mail servers on the Internet should ensure that these services are always up to date and securely configured. Otherwise, there is a risk that attackers could exploit vulnerabilities to compromise the underlying infrastructure.

In this project, we monitor whether administrators regularly update Internet-facing services and whether updates are applied promptly after a new release or the disclosure of a security vulnerability. We also examine which algorithms are offered by the servers to secure connections (encryption, signatures, etc.) during connection establishment, and whether these meet current best practices or even exceed them. This allows us to draw conclusions about the overall security of services on the Internet. To collect information on Internet services, we use an Internet scanner that is continuously being expanded. One of the main challenges is handling the large volumes of data generated in the process.

 

Publications:

  • R. Müller, J. Ruppert, K. Will, L. Wüsteney, and T. Heer, “Analyzing the Software Patch Discipline Across Different Industries and Countries,” 球探比分网 und Datensicherheit — DuD, vol. 46, no. 5, May 2022, doi: 10.1007/s11623-022-1602-y.
  • R. Müller, J. Ruppert, K. Will, L. Wüsteney, and T. Heer, “Analyzing the Software Patch Discipline Across Different Industries and Countries,” in Sicherheit, Karlsruhe, Germany, Apr. 2022, doi: 10.18420/sicherheit2022_10.

Dependencies in Industrial Networks

With the convergence of IT and OT networks, industrial networks are becoming increasingly complex, making it difficult for administrators to maintain a clear overview. One aspect of this complexity is the dependencies between devices and services within the network. A dependency exists, for example, when the control of an industrial robot relies on information about a part to be processed from another service in the network. Understanding these dependencies is crucial to assess their impact on production in the event of a failure and to implement preventive measures to avoid downtime. If a failure does occur and production is affected, knowledge of these dependencies enables faster identification and resolution, or workarounds, of the problem.

The goal of this project is to analyze the data transmitted within the network to identify and examine communication relationships, and thus dependencies, between devices and services. The focus is on communication standards increasingly used in industrial networks, such as MQTT, OPC UA, and OPC UA PubSub. Additionally, we are developing a testbed with a simulated industrial process to generate network traffic for analysis.


LLM-assisted Vulnerability Detection

The increasing adoption of large language models (LLMs), such as ChatGPT and GitHub Copilot, has improved efficiency in software development, particularly in code generation. Despite their advantages, code generated by LLMs often contains security vulnerabilities that can be exploited by attackers. At the same time, the overall number of vulnerabilities continues to rise: in 2024, over 40,000 publicly disclosed cybersecurity vulnerabilities were reported. Ensuring software quality and security therefore requires efficient and scalable vulnerability management processes. A promising approach is to leverage the language understanding capabilities of LLMs for vulnerability management.

As part of this research project, we investigate methods for using LLMs to detect vulnerabilities in project code. Among other things, we study how to best prepare code and vulnerability data for the language understanding capabilities of LLMs, how to handle the learning of new vulnerabilities, and how to efficiently detect different types of vulnerabilities across diverse code structures and programming styles.

 

Publications:

  • S. Kaniewski, D. Holstein, F. Schmidt, and T. Heer, “Vulnerability Handling of AI-Generated Code – Existing Solutions and Open Challenges,” in Conference on Artificial Intelligence x Science, Engineering, and Technology (AIxSET), Laguna Hills, California, USA, Oct. 2024, doi: 10.1109/AIxSET62544.2024.00026. PDF

Wireless PQC

Wireless communication has become indispensable in many areas, such as the Industrial Internet of Things (IIoT), enterprise networks, and everyday private use. Because data is transmitted over the air, these systems are inherently more vulnerable to eavesdropping and targeted attacks, especially if appropriate security mechanisms are not implemented.

To secure wireless systems, most currently rely on asymmetric cryptographic methods such as RSA, Diffie-Hellman, or elliptic curves, primarily for key exchange and authentication. However, these methods are considered insecure against future quantum computers, which could efficiently solve the underlying mathematical problems using Shor’s algorithm. This creates an urgent need for post-quantum cryptography (PQC) methods.

PQC algorithms are designed to resist attacks by quantum computers but often involve higher computational and communication overhead. This presents a particular challenge for wireless systems with limited resources.

The goal of this project is to investigate which post-quantum cryptography algorithms are best suited for various wireless protocols, such as Wi-Fi, Zigbee, or Bluetooth. Selected PQC alternatives will be implemented and tested within these protocols to gain a better understanding of the practical transition to post-quantum cryptography.

Distribution of Firewall Rules

Current industrial networks consist of multiple subnets separated by routers. These routers are typically equipped with security mechanisms such as firewalls to filter network traffic. Firewalls perform computationally intensive operations on incoming packets, for example by comparing packet headers against predefined rules. The larger the number of rules, the more operations must be applied to each packet on average, which introduces latency. In time-critical networks, such as automated manufacturing systems, these delays can create significant problems, potentially causing damage to products, equipment, or personnel.

In most industrial facilities, however, additional decentralized filtering capabilities often remain unused, such as access control lists (ACLs) on switches. These ACLs operate in real time, meaning they do not introduce latency on passing network traffic, and are therefore a suitable alternative to traditional firewalls for time-critical communication. This research project investigates how rules can be correctly distributed across a network without altering their original semantics. At the same time, the rules must be allocated efficiently to conserve ACL resources, since ACLs have capacity limits and only a certain number of rules can be defined per ACL.

 

Publications:

  • L. Bechtel, S. Müller, M. Menth, and T. Heer, “Transforming the Network into a Filter: Distributed Firewall Rules for Time-Critical Traffic,“ in IEEE International Conference on Factory Communication Systems (WFCS), Rostock, Germany, Jun. 2025, doi: 10.1109/WFCS63373.2025.11077639. PDF

Short summaries of all theses can be found in the IT Innovations publications of the Faculty of Computer Science and Engineering, which are released each semester.

2025
  • Entwicklung eines Reifegradmodells für die Umsetzung von IT-Sicherheitsmaßnahmen an Hochschulen in Baden-Württemberg
  • Vergleich und Implementierung von Konzepten für die Erstellung von Windows Fileless Malware PDF
2024
  • Mapping von IEC 62443 Produktanforderungen auf Security-Gateway Funktionalitäten
  • Implementierung und Vergleich von Zugriffssteuerungen mit NAC-Lösungen in Enterprise-Netzwerken
  • Improving the Session Table Handling of Stateful Firewalls to Achieve Constant-Time Packet Filtering
  • Design and Implementation of a Modular Cyber-Security Attack and Defense Platform PDF
  • Design and Evaluation of an Intrusion Detection System for Time-Sensitive Traffic
2023
  • Analyse und Vergleich der Sicherheit von Backend-, Frontend- und Full-Stack-Web-Frameworks PDF
  • Analysis and Modeling of VPN Stacks for latency-sensitive Environments
  • Einsatz von flussbasierter Programmierung für die dynamische Netzwerkverwaltung in Industrienetzwerken
  • Verwendung von Software-Bill-of-Materials zur automatischen netzwerkweiten Erfassung von Softwarekomponenten
  • Verteilung von zentralen Firewall-Regeln auf dezentrale Filterstellen in einem Netzwerk
2022
  • Evaluierung von Open-Source-Tools IDS, NAC und SIEM
  • Adaptation of the VPP Firewall for Real-Time Packet Processing in Industrial Environments (in Kooperation mit der Universität Tübingen)
  • Modeling and Simulation of the Performance Impact of Network Security (in Kooperation mit der Universität Tübingen)

IoT Firewall

Nowadays, IoT devices are often connected to networks or the Internet without protection, meaning they lack a firewall. This poses security risks, as any host can potentially reach the services running on the device, and the services themselves can reach any host. Attackers may exploit vulnerabilities present in these services. Firewalls provide an additional layer of protection that makes such attacks more difficult. For this reason, this student project focuses on developing a firewall for IoT devices.

The goal of our IoT firewall, called IoTWall, is to enable easy integration into existing IoT projects. Integration is facilitated through the use of hooks in the network stack (lwIP library), which allows only a few lines of code to be added to a project without modifying existing code. Since the implementation of these hooks in lwIP was incomplete for our purposes, additional contributions were made to the lwIP code. Currently, IoTWall supports the Arduino platform (Arduino, ESP8266) and the ESP-IDF platform (ESP32). In the next phase of the project, support for the RIOT microcontroller operating system will also be added.

 

Source Code: GitHub

Publications:

  • M. Schramm, L. Bechtel, F. Hoss, M. Menth, and T. Heer, “IoTWall: An Efficient Host-Based Firewall for Resource-Constrained IoT Devices,” in IEEE International Conference on Factory Communication Systems (WFCS), Rostock, Germany, Jun. 2025, doi: 10.1109/WFCS63373.2025.11077655. PDF

Privacy Assistant

The Privacy Assistant is an analysis tool that automatically scans websites for personal data. A web application provides an overview of all detected information, allowing users to verify whether the data was intentionally published or if it represents false positives. The goal is to enhance privacy protection by identifying and addressing potentially unintended disclosures of personal data. In the long term, the Privacy Assistant is intended to become production-ready and may even be released as open source.

The Privacy Assistant is continuously developed and optimized by students as part of study projects. We are always happy to welcome new contributors to help implement additional features, further improve privacy protection, and make the tool even more user-friendly.


Hacking AG Exercises

The Hacking AG is an initiative of the ISNS where students regularly meet to participate in joint penetration tests, capture-the-flag challenges, and other security-related exercises. The goal is to build expertise in IT security and apply it in practical scenarios. Students who enjoy designing new hacking exercises on a wide range of topics or expanding existing challenges can do so as part of a study project, thereby making a valuable contribution to the learning community.


Wireless Network Security in Urban Areas: An Analysis of Socioeconomic Factors

As part of this student project, the security of publicly accessible as well as privately operated wireless networks in urban areas was investigated. The goal was to identify technical weaknesses in wireless network configurations while also analyzing potential patterns between security levels and the socioeconomic characteristics of individual city districts.

The study began with a systematic survey of wireless networks using standard analysis tools such as Kismet. Only publicly broadcast metadata, including SSID, encryption standard, and signal strength, were collected. Personal data or the content of network traffic was never captured. The networks were then categorized according to their security standard, for example as open networks, WPA/WPA2-encrypted connections, or modern WPA3 networks.

Theses With Us

We are happy to supervise theses, research projects, and study projects. A selection of topics can be found in the job portal. If you have your own topic ideas in the areas of network security and IT security, we welcome your message. This page also provides tips and templates for writing a thesis or other documents. Further down, you can also find the process for completing a thesis with us.

Materials

Here you can find an overview of materials and information that make writing texts, e.g., a thesis and creating posters easier.

Thesis and poster templates: Go to templates

Thesis abstract and brief writing guide (German): abstract.zip

Quick guide to writing clearer and more understandable texts (German): Bessere-Texte-Schreiben.pdf

Book on scientific writing in English (eBook freely accessible for students): Justin Zobel, Writing for Computer Science, Third Edition, ISBN: 9781447166399, Library

Process of Completing a Thesis

The image below shows the process of completing a thesis with us, to help better estimate the timeline and the various tasks involved. Unlike the regular procedure, we require a two-page abstract on the thesis topic before registering the thesis. The abstract ensures that all parties have the same understanding of the topic and helps prevent misunderstandings. In addition, the abstract can serve as a basis for IT innovations, saving significant time during the course of the project.

apply

Interested? Find out more! about our degree programmes