Abgeschlossene Abschlussarbeiten

M. Sc. Kai Jansen

Detection and Localization of Attacks on Satellite-Based Navigation Systems

Christina Pöpper - 03.2019

[PDF.Datei]

M. Sc. Katharina Kohls

Steganographie und Steganalyse für multimedia-basierte Kommunikationskanäle

Christina Pöpper - 07.2019

[PDF.Datei]

Philipp Morgner

Analyzing Location Privacy in GSM Mobile Telephony using Software Radios

Christina Pöpper - 11.2014

Mohamad Nehme

Timed Revocation of User Data

Christina Pöpper - 08.2014

Sebastian Brenza

Exploiting Client Configuration Deficiencies for Identity Theft in Eduroam with Hostapd

Christina Pöpper - 06.2014

Katharina Kohls

Trustworthy and Acknowledged Hidden Data Transmission for Voice-over-IP Covert Channels

Christina Pöpper - 06.2014

Christine Zahn

Construction of a Demonstrator for Man-in-the-Middle Attacks on GSM

Christina Pöpper - 12.2014

Benedikt Echelmeyer

Implementierung eines Steganographie-Verfahrens für den VoIP-Client Skype

Katharina Kohls - 08.2015

Florian Rüchel

Enabling High-Latency Privacy for the Tor Network

Kai Jansen - 08.2015

David Rupprecht

Development of a Framework for Applied LTE Security Analysis

Kai Jansen - 11.2015

Sebastian Brenza

Infrastructure- and Client-side Authentication in Eduroam

Christina Pöpper - 03.2015

Fabian Lincke

Eduroam Validation on Raspberry Pi

Christina Pöpper - 11.2015

[More information]

Thomas Welskopf

Implementation of a Real-Time GPS Spoofing Detection System

Kai Jansen -

Phil Knüfer

Experimental Analysis of an Automotive GPS Tracker (Telematics)

Kai Jansen -

Alexandros Zinelis

Attack and Defense Analysis Framework for Tor

Katharina Kohls -

[Shadow Simulator] [Tor Project]

Sebastian Brendgen

Analysis of Pluggable Transports for Tor

Katharina Kohls -

[Shadow Simulator] [Tor Project] [Pluggable Transports]

Tedongmo Djou Brice Ulrich

Mixing Against Confirmation Attacks in Tor

Katharina Kohls -

[Shadow] [Tor]

Mehdi Dhib

Attacks on Satellite-based Localization Systems Using a Multi-Antenna Setup

Kai Jansen -

Sebastian Rosin

On the Feasibility of Software Side-Channel Attacks Against Fingerprint Matching Algorithms

Markus Dürmuth, Theodor Schnitzler - 01.2018

Johanna Jupke

Concepts of Qualified Electronic Signatures as Remote Electronic Signatures - Usability of a Prototype Implementation

Markus Dürmuth, Theodor Schnitzler - 12.2016

Florian Farke

User Expectations of Digital Forgetting

Markus Dürmuth, Theodor Schnitzler - 10.2017

iOS App for Timing Measurements

Theodor Schnitzler -

Page: