schließen

Themen für Bachelorarbeiten:

  • Analysis and implementation of the iButton/1-Wire protocol (ELECTRONICS SKILLS REQUIRED)

The goal of this bachelor thesis project is to analyze the iButton®/1-Wire® protocol and to build an environment for reading and emulating iButton slave devices.

Kontakt: Michael Roland

  • Analyze the IDS Reports of the Tor exit node

The outgoing traffic of the tor exit node of the institute passes through the intrusion detection system of the university (IDS), which filters out attacks (not only those directed at the university, but everything which clearly malicious). The institute receives a weekly automated report from this IDS. These reports should be analyzed and statistics should be generated: Would it be useful to integrfate a mini IDS into an exit node? How many attacks are performed (in relation to the exit traffic)? How do they change over time? How "new" are the attacks discovered? Investigating the data for own measurements, trends etc is also part of the project.

Kontakt: Michael Sonntag

  • Implement a VoIP tap for Softphones (i.e. VoIP phones implemented as software running on a PS)

This should copy the network traffic and/or the sound output. This should then be run through libraries (to be obtained: Open Source like https://www.informatik.uni-augsburg.de/lehrstuehle/hcm/projects/tools/emovoice/) and speaker detection. This should then show feedback about who is talking how much (e.g. percent) and the mood of the speakers.

Kontakt: Michael Sonntag

  • Reconstructing internet video from a network trace

This should work for IP video telephony, but potentially also for other communications. The main task here is to handle missing parts, e.g. keeping the old picture or replacing it with "white/black screen". The sniffed traffic should then be playable and be accompanied by exact specifications what was found, and what/when there were "holes" filled.

Kontakt: Michael Sonntag

  • Online-Nachsuche

Software zur genauen und beweissicheren Dokumentation von Aktionen und Daten, die z.B. beim forensischen Zugriff auf einen fremden Webmail-Account erfolgen

Kontakt: Michael Sonntag

  • Asterisk als Anonymisierungsserver

Eingehende Telefonate weitervermitteln, ähnlich zu TOR (evtl. mittels VoIP + Ausgangsserver etc.)

Kontakt: Michael Sonntag

  • Traces in Executables

Wie viele/welche Spuren bleiben bei verschiedenen Arten ein Programm zu übersetzen in der ausführbaren Datei zurück, die zum Account/Computer zurückführen? Sowohl direkt ("Das war Benutzeraccount X") als auch bei Zugriff auf diesen Computer ("Wurde sicher auf diesem Computer übersetzt") bzw. allgemein ("Muss Windows 8.1 gewesen sein"). Siehe auch https://freedom-to-tinker.com/2015/12/29/when-coding-style-survives-compilation-de-anonymizing-programmers-from-executable-binaries/

Kontakt: Michael Sonntag