To do your thesis in my group you need to have the following:
- Hands-on Experience: Practical experience with hardware and software testing tools, development, debugging, and troubleshooting.
- Programming Skill: Having good skill in at least one programming language
- Interest in Hardware and Software Interaction: A curiosity about how software interfaces with hardware.
Being member of SaarSec CTF team or other CTF teams in Germany is a big plus
Alternatively, you could skip all of the above requirement by simply passing my advance lecture on Reverse Engineering and Exploit Development for Embedded Systems.
Previously supervised thesis:
- Hardware-assisted Fuzzing using ARM Core-Sight
- High-Speed LPDDR Signal Acquisition And Decoding Using FPGA
- Reverse Engineering Satellite Firmware for Security Evaluation
- ArduFuzzer: In Situ Fuzzing of Remote Firmware with Coverage Feedback
- TwinFuzz: Differential Testing of Hardware Accelerators via Software Proxy
- Security Assessment of Drones via Fuzzing Techniques
- Emulator-based Coverage Guided Fuzzing for Programmable Logic Controllers (Bsc)
- Physics Informed Inter-Satellite Communication Threat Detection
- Coverage-guided fuzzing of industrial controllers
- Spot the Diff-erence: Investigation of bsdiff
- Improving Coverage Guided Fuzzing for Programmable Logic Controllers
- In-Depth Exploration of Hardware-based Anti-Debugging Technology on Siemens S7 PLCs
- Extending emulation and analysis engines for fuzzing embedded systems
- SBOM Parsing for Vulnerability Assessment of Open-Source Libraries
- Zer0Day: In-depth User Experience and UI Implementation