Thesis

To do your thesis in my group you need to have the following:

  1. Hands-on Experience: Practical experience with hardware and software testing tools, development, debugging, and troubleshooting.
  2. Programming Skill: Having good skill in at least one programming language
  3. Interest in Hardware and Software Interaction: A curiosity about how software interfaces with hardware.

Being member of SaarSec CTF team or other CTF teams in Germany is a big plus

Alternatively, you could skip all of the above requirement by simply passing my advance lecture on Reverse Engineering and Exploit Development for Embedded Systems.

Previously supervised thesis:

  1. Hardware-assisted Fuzzing using ARM Core-Sight
  2. High-Speed LPDDR Signal Acquisition And Decoding Using FPGA
  3. Reverse Engineering Satellite Firmware for Security Evaluation
  4. ArduFuzzer: In Situ Fuzzing of Remote Firmware with Coverage Feedback
  5. TwinFuzz: Differential Testing of Hardware Accelerators via Software Proxy
  6. Security Assessment of Drones via Fuzzing Techniques
  7. Emulator-based Coverage Guided Fuzzing for Programmable Logic Controllers (Bsc)
  8. Physics Informed Inter-Satellite Communication Threat Detection
  9. Coverage-guided fuzzing of industrial controllers
  10. Spot the Diff-erence: Investigation of bsdiff
  11. Improving Coverage Guided Fuzzing for Programmable Logic Controllers
  12. In-Depth Exploration of Hardware-based Anti-Debugging Technology on Siemens S7 PLCs
  13. Extending emulation and analysis engines for fuzzing embedded systems
  14. SBOM Parsing for Vulnerability Assessment of Open-Source Libraries
  15. Zer0Day: In-depth User Experience and UI Implementation