Student Papers
Hint
These topics are proposals. You are welcome to discuss your own ideas.RoboCup – World Modeling
Responsible: Martin Richter
Since 1997 the RoboCup (Robot Soccer World Cup) is held, where different teams of researchers and students are competing in numerous leagues. A game of robot soccer is always played between two equally sized sets of robots, ranging from five to eleven robots per team. Depending on the league, the game is either simulated or conducted physically with real robots.If the game is played physically, multiple mobile robots perceive their environment through sensors (e.g., recognizing enemy player positions) and influence it through actuators (e.g., kicking the ball), a team of robots is classified as a mobile cyber-physical system. Achieving a consistent view of the environment in cyber-physical systems is of paramount importance, to allow the different execution units to collaborate and tackle common tasks.As a RoboCup team has to decide on which moves to take, the state of the game (e.g., player positions) has to be evaluated continuously. For this, a virtual representation of the real world is required and data has to be exchanged between the robots. Your task will be to review different models, which are concerned with the virtual representation of the real world in the RoboCup.
Start: open
Suitable for: Research seminar, Advanced seminar
Isabelle / HOL
Responsible: Matthias Werner
The Isabelle/HOL tool is one of the internationally leading tools for proving correctness of computer systems (theorem prover). E.g., the correctness proof of the seL4 kernel was done by the use of Isabelle. For this seminar topic, the student should give a introduction to Isabelle/HOL and the foundation behind, as well as demonstrate its practical usage by verifying a given protocol.
Start: open
Suitable for: Research seminar
Python Runtime on the Base of Forth
Responsible: Matthias Werner
Forth is a syntax-less, very machine-oriented programming language with a bare-metal run-time system (i.e. without OS). The task is to develop an interpreter for Python byte code on top of a Forth system on a embedded board.
Start: open
Suitable for: Masters thesis
Preparation of Established Crypto Standards
Responsible: Jonas Henschel
Block ciphers with symmetric encryption are used by many highly reliable systems. For example, banks and the Deutsche Bahn rely on modern variants of the Data Encryption Standard (DES) which is based on the principle of Feistel ciphers. Many other applications, on the other hand, rely on the newer Advanced Encryption Standard (AES), which enables the use of longer keys. The basis of the AES is based on SP networks. The fundamentally different structures of these encryption algorithms offer different properties in terms of confidentiality. Your task is to present how the algorithms work, identify the properties of the ciphers, and to analyse both algorithms based on their confidentiality properties and their complexity. Of particular interest are statements about the confidentiality of the algorithms in the post-quantum age.
Start: open
Suitable for: Bachelor thesis, Research project, Research seminar
Ontology of Information Derived from Sensors in Mobile Devices: Analysis of Privacy Threats
Responsible: Maik Benndorf
The increasing prevalence of mobile devices and sensors in our daily lives leads to a vast array of information that can be derived from these devices. For example, in addition to the obvious values such as acceleration, speed, and distance, the accelerometer can also infer information about the user's weight, height, and gender [Hajihassnai et al., 2021]. This research aims to develop an ontology that describes and structures the information derived from sensors in mobile devices, thereby supporting the identification of privacy threats. The ontology will cover the following aspects:
- Definition and structuring of sensors and their measured values
- Definition and structuring of the information that can be derived from the measured values
- Structuring of the relationships between the measured values of different sensors and the derived information
- Extensibility of the ontology to support new types of sensor data and information
- Literature review of ontologies and sensor data from mobile devices
- Analysis of datasets to identify the different types of sensor data and their relationships to other information
- Development of an ontology that covers the identified aspects
- Implementation and evaluation of the ontology
Ontologies:
- Hofweber, T. (2004). Logic and Ontology. https://plato.stanford.edu/entries/ logic-ontology/
- Jones, D., Bench-Capon, T., & Visser, P. (1998). Methodologies for Ontology Development.
- Uschold, M., & Gruninger, M. (1996). Ontologies: Principles, methods, and applications. The Knowledge Engineering Review, 11(2), 93–136. https://doi.org/10.1017/S0269888900007797
Sensoren Android:
- Android Developers (n.d.). Sensors Overview. Android Developers. https://developer.android.com/guide/topics/sensors/ sensors_overview
Sensor Inference:
- Moqurrab, S. A., Naeem, T., Shoaib Malik, M., Fayyaz, A. A., Jamal, A., & Srivastava, G. (2023). UtilityAware: A framework for data privacy protection in e-health. Information Sciences, 643, 119247. https://doi.org/10.1016/j.ins.2023.119247
- Hajihassnai, O., Ardakanian, O., & Khazaei, H. (2021). Obscurenet: Learning attribute-invariant latent representation for anonymizing sensor data. Proceedings of the International Conference on Internet of Things Design and Implementation, 40–52.
- Kröger, J. (2019). Unexpected inferences from sensor data: a hidden privacy threat in the internet of things. In Internet of Things. Information Processing in an Increasingly Connected World: First IFIP International Cross-Domain Conference, IFIPIoT 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-19, 2018, Revised Selected Papers 1 (pp. 147-159). Springer International Publishing.
Start: open
Suitable for: Bachelor thesis, Masters thesis, Research project
Implementation of the Embedded Software Lab in Rust
Responsible: Martin Richter
In the embedded software lab, a serial communication protocol is implemented in C. Goal of the project is to create a reference implementation for the lab in Rust.
Start: open
Suitable for: Research project
Overview of Known Approaches for Quantum Ciphers
Responsible: Jonas Henschel
The principle of quantum key distribution (QKD) is currently a very active field of research. However, QKD only provides a solution for the negotiation of key pairs at quantum level. The actual encryption, on the other hand, is often still carried out at classical bit level. Your task is to research approaches and ideas that allow encryption at quantum level. You summarize these in your written report and evaluate them on the basis of relevant characteristics.
Done by Jan Weißling
Done as Bachelor thesis
Start: open
Preparation of Normative Regulations for Quantum Key Distribution
Responsible: Jonas Henschel
Quantum Key Distribution is a relatively new technology enabling a secure exchange of symmetric keys. Many different institutions try to push this technology from theory into production. Normative regulations for such systems already exist. It is your task to familiarize with these normative regulations and answer the following as well as other questions: Which requirements have to be guarantied? What protocol behavior is defined? Which interfaces are defined? Which properties are guarantied by the standards?
Done by Jonas Lorenz
Done as Advanced seminar
Start: 01.05.2024
Drafting a Secure and Transparent TLS-Tunnel for Using Quantum Keys
Responsible: Jonas Henschel
This bachelor thesis deals with the design of a transparent TLS tunnel. Quantum keys are to be used to encrypt the communication channel between two applications. These are obtained via a REST API described in ETSI QKD GS 014. The use of the tunnel should also be as transparent as possible for applications that communicate unencrypted. At the design level, particular attention should be paid to an information-secure design so as not to jeopardize the security gains achieved through the use of quantum keys.
Done by Marc André Blechschmidt
Done as Bachelor thesis
Start: open
Modeling Communication Protocols
Responsible: Jonas Henschel
Translated with DeepL.com (free version)
Done by Clemens Degenhardt
Done as Research project
Start: 01.05.2025
Virtualization of the Lab for Embedded Systems
Responsible: Martin Richter
Done by Anna Theresa Single, Lukas Kreuz, Janek Seidel, Amos Paul Jantz
Done as Research project
Start: 01.11.2024
Comparison of Constraint-Solving Frameworks
Implementation of an API for Heterogeneous Robot Swarms
RoboCup - Coordination Models
Responsible: Martin Richter
Since 1997 the RoboCup (Robot Soccer World Cup) is held, where different teams of researchers and students are competing in numerous leagues. A game of robot soccer is always played between two equally sized sets of robots, ranging from five to eleven robots per team. Depending on the league, the game is either simulated or conducted physically with real robots.If the game is played physically, multiple mobile robots perceive their environment through sensors (e.g., recognizing enemy player positions) and influence it through actuators (e.g., kicking the ball), a team of robots is classified as a mobile cyber-physical system. Coordination is one of the main challenges for cyber-physical systems, as multiple heterogeneous execution units might have to cooperate to reach a common goal. To ensure a safe and timely operation, the planning of which units fulfill which tasks at which point in time is critical.As a RoboCup team has to be coordinated to conduct complex moves, coordination models are employed. Such models encompass the choice of varying tasks for different robots to reach a common main-goal or possibly multiple sub-goals. Your task will be to review different coordination models, used in the RoboCup.
Done by Leon Rollenhagen
Done as Advanced seminar
Start: 01.12.2023
End: 27.02.2024
Test Objectives in DO-178C
Responsible: Christine Jakobs
Identifying the different test objectives in DO-s178C standard, categorising them and compare the given toolchain regarding its coverage
Done by Reema Thakur
Done as Masters thesis
Start: 14.06.2017
End: 20.11.2017
Reference implementation of DiAO
Responsible: Peter Tröger
Distributed Active Object (DiAO) is a concept to support application execution in distributed mobile systems. A middleware as well as a proof-of-concept application are to implement.
Done by Martin Richter
Done as Bachelor thesis
Start: 01.04.2017
End: 10.11.2017
Framework for Simulation and Performance Analysis of Clock Synchronization Algorithms
Responsible: Jafar Akhundov
The task is to create a framework for simulation and performance analysis of diverse clock synchronization algorithms. Implementation language/tool is irrelevant. To achieve this distributed systems must be parametrized with respect to clock synchronization. As a basis an existing master thesis can be used. The context and big goal of the work is to automatically generate synchronization modules for parametrized spacecraft systems.
Done by Leander Herr
Done as Masters thesis
Start: 20.03.2016
End: 01.02.2018
Modelling a real-time ECU using MPS and mbeddr.
Responsible: Christine Jakobs
Done by Reema Thakur
Done as Research project
Start: 01.09.2016
End: 20.02.2017
Dependability modeling with fuzzy structure formulas
Responsible: Peter Tröger
Done by Christine Jakobs
Done as Masters thesis
Start: 06.07.2015
End: 17.12.2015
Implementation of the Global Physical Time for the Domain Model of the VirtualPath of the DLR Hand-Arm System
Responsible: Matthias Werner
Done by Jafar Akhundov
Done as Masters thesis
Start: 11.07.2013
End: 29.08.2013
Fault Tolerance in Automotive
Responsible: Christine Jakobs
This seminar focusses on fault tolerance mechanisms discussed in current research publications related to the automotive area. The question is which mechanisms are used and in which context.
Done by Georg Seerig
Done as Research seminar
Start: 07.10.2022
End: 30.01.2022
The TLA Theorem Solver
Responsible: Christine Jakobs
Done by Clemens Degenhardt
Done as Advanced seminar
Start: 21.04.2023
End: 01.09.2023
Safety-critical - Definition and Properties
Responsible: Christine Jakobs
This seminar focusses on the definition of the term safety-critical. How is it defined in literature? Where do the authors focus on and what properties and metrics are used.
Done by Felix Bachmann
Done as Advanced seminar
Start: 18.10.2022
End: 07.04.2023
Distributed Constraint Solving for DiAO
Responsible: Matthias Werner
Done by Martin Richter
Done as Research project
Start: 24.10.2018
End: 29.05.2019
Umsetzung von Programmierparadigmen der Objektorientierung zur Realisierung von Function-as-a-Service Systemen mit Microservices
Responsible: Marcus Hilbrich
Micro Services lag abstraction methods. E.g, In case multiple services are needed to process a single transaction, the concept of the transaction is not really present in the code of the services. In a first step a tool was created and evaluated to allow to write the transaction as an object oriented like class and generate services based on the methods of the class. This is not yet a general solution and needs extensions. 1) using a more general programming language (e.G. Java) 2) support additional OO concepts (generalization, polymorphy, …) 3) stronger evaluation 4) multi language support 5) multi Cloud support
Done by Stefan Staude
Done as Masters thesis
Start: 22.09.2019
End: 23.02.2020
Discover and Analysis of architectural patterns in open source projects
Responsible: Marcus Hilbrich
Using architectural patterns is a valuable strategy to increase the quality of software. Architectural patterns can be cousin explicitly or can be enforced by developer environments. Your task is to identify architectural patterns in open source Android applications and analyze whether the patterns are used explicit or implicit.
Done by Ehsan Fanic
Done as Masters thesis
Start: 22.04.2019
End: 23.09.2019
Discover and Analysis of architectural patterns in open source projects
Responsible: Marcus Hilbrich
Using architectural patterns is a valuable strategy to increase the quality of software. Architectural patterns can be cousin explicitly or can be enforced by developer environments. Your task is to identify architectural patterns in open source Android applications and analyze whether the patterns are used explicit or implicit.
Done by Marcel Müller
Done as Masters thesis
Start: 06.05.2019
End: 26.11.2019
Erstellung einer Taxonomie der Einflussfaktoren auf die Softwarearchitektur
Responsible: Marcus Hilbrich
Done by Maximilian Teich
Done as Masters thesis
Start: 22.07.2019
End: 26.11.2019
Evaluation of simulation tools for hybrid automata and extension for LTIHA
Responsible: Antonia Reißner
Three simulation tools shall be compared and one of them chosen. For the chosen simulation tool a plug-in for linear time-invariant hybrid automata shall be written.
Done by Florian Jurklies
Done as Bachelor thesis
Start: 14.08.2019
End: 30.01.2020
Analysis of Tools for Model-Checking
Responsible: Christine Jakobs
Model-checker and proof systems are commonly used tools to support automatic analysis of formal models. The task is to evaluate two of those tools for a given use case and support the analysis by an example
Done by Alina Walzel
Done as Bachelor thesis
Start: 12.04.2023
End: 23.08.2024
Development and Performance Analysis of an OpenACC-based Fast Multipole Method
Responsible: Laura Morgenstern
Research objective is the development and performance analysis of an OpenACC-based Fast Multipole Method (FMM) for the computation of electrostatical interactions in moleculardynamic simulations. The project is based on FMSolvr, a parallel C++ implementation of an FMM. Subsequently, the developed OpenACC-version of FMSolvr shall be analyzed with regard to potential performance optimizations. Furthermore, diverse parallelization strategies and parameter sets could be developed and compared against each other.
Done by Theresa Werner
Done as Research project
Start: 01.07.2021
End: 30.09.2021
Hybrid Testbeds for Educational Purposed - Design of a Computer Science Lab for Master Students
Responsible: Christine Jakobs
Cooperative master thesis with the professorship for operating systems and middleware of Prof. Polze at HPI. The aim is to analyze the impairments for hybrid computer science labs and to transfer an already existing lab into a hybrid one.
Done by Julia Scharsich
Done as Masters thesis
Start: 23.02.2021
End: 04.04.2022
Coordination Models and Languages
Responsible: Martin Richter
Coordination languages allow the programmer to describe concurrent and distributed computations through the concept of "coordination".It allows to integrate many possibly heterogeneous components by providing distribution transparency.The set of all components forms a single application in a way, that it can be executed in a distributed and parallel fashion. Papadopoulos and Arbab give an overview of different coordination languages in "Coordination Models and Languages".It will be your task to review the paper and present the different coordination models and languages, what differentiates them, what their benefits and drawbacks are and to present at least one use-case per paradigm.
Done by Markus Meier
Done as Research project
Start: 05.04.2024
End: 05.08.2024
RoboCup - Simulators
Responsible: Martin Richter
Since 1997 the RoboCup (Robot Soccer World Cup) is held, where different teams of researchers and students are competing in numerous leagues. A game of robot soccer is always played between two equally sized sets of robots, ranging from five to eleven robots per team. Depending on the league, the game is either simulated or conducted physically with real robots. If the game is simulated (i.e., in the 2D-simulation and 3D-simulation leagues), a soccer simulation platform is utilized. Your task will be to review the current simulation platform (either 2D or 3D), used in the RoboCup.
Done by Paul Kapitän und Martin Ziesche
Done as Proseminar
Start: 13.09.2022
End: 13.03.2023
Heuristic Risk Treatment with TLA+
Responsible: Christine Jakobs
Done by Albrecht Stoye
Done as Research project
Start: 19.05.2022
End: 09.10.2022
Formal Modeling of Meta-Functional Properties of the RaSTA Protocol
Responsible: Billy Naumann
Done by Jonas Henschel
Done as Masters thesis
Start: 01.07.2022
End: 13.12.2022
Component Risk Analysis for Automotive Systems
Responsible: Christine Jakobs
The focus of the research internship is on the implementation of the developed component security risk analysis method. Therefore, the student gets the method description and relevant input data. The task is to read and understand the method description and implement the method in a proper programming language, e.g., Python. The research part of the task consists of researching appropriate implementation schemes and missing information for the technique.
Done by Louis Heyne
Done as Research project
Start: 25.10.2022
End: 07.04.2023
Modeling and Analysis of the Babel Routing Protocol
Responsible: Billy Naumann
Done by Norbert Ploner
Done as Advanced seminar
Start: 05.04.2023
End: 01.03.2024
Open-RMF Robot Fleet Management
Responsible: Martin Richter
Done by Martin Ziesche
Done as Proseminar
Start: 01.03.2024
End: 10.10.2024
Comparison of Sensor Data Fusion Methods for Multiple IMUs
Responsible: Martin Richter
Done by Hariraj Rajkumar
Done as Masters thesis
Start: 08.07.2024
End: 13.12.2024
Categorization of Coordination Models for Robot Swarms
Responsible: Martin Richter
Done by Leon Rollenhagen
Done as Bachelor thesis
Start: 09.09.2024
End: 18.08.2025
Overview of QKD and ETSI GS QKD 014
Responsible: Jonas Henschel
This paper provides an overview of the current state of quantum key distribution(QKD) technologies. It explains the basic concepts behind QKD and its benets and problems. In addition, an overview of current standards is given, with a heavy focus on ETSI GS QKD 014, and how they bring QKD closer to being usable on a large scale. The primary question this paper answers is how QKD Key Management Entities can provide a suitable API for Secure Application Entities to request keys delivered over the underlying QKD network that is also easy to use for developers with limited knowledge of the underlying technology.
Done by Anna Theresa Single
Done as Proseminar
Start: 01.03.2025
End: 16.07.2025
Standardization of a Meta Model for the Automotive and Railway Safety-Engineering Processes
Responsible: Jonas Henschel
Standardization is an important need to manage growing complexity of modern information technology systems. Inustry as well as academia utalize models and graphical representations for simple information distribution about complex topics. To aid the readers' understandig it is most important to transform new research into universaly understandable form. Therefore this paper describes the transformation of a meta model from an author-defined form into standardized UML.
Done by Bastian Felix Bachmann
Done as Proseminar
Start: 01.04.2024
End: 09.08.2024
Models for Quantum Machine Learning
Responsible: Jonas Henschel
In the context of the research seminar, the results of the SLR “Quantum Machine Learning for Network Intrusion Detection Systems, a Systematic Literature Review” (2022) will be summarized. The aim is to identify the quantum machine learning models used and to compare them with their classical counterparts based on relevant criteria.
Done by Christopher Wittig
Done as Research seminar
Start: 01.02.2024
End: 03.03.2025
Attack and Attacker Models in the Automotive Secotor
Responsible: Jonas Henschel
This research seminar identifies current attacks on cars of different manufacturers. A selection of the identified reports is analysed with regard to the underlying attacker and attack models. Building on that, a further analysis is conducted on whether the threat catalogue of UNECE R155 covers the exploited weaknesses, or not.
Done by Florian Werner
Done as Research seminar
Start: 01.11.2024
End: 30.06.2025
Security by Design as a concept
Responsible: Jonas Henschel
Done by Marc André Blechschmidt
Done as Advanced seminar
Start: 01.04.2025
End: 27.07.2025