Thesis

To do your thesis in my group you need to have the following:

  1. Hands-on Experience: Practical experience with hardware and software testing tools, development, debugging, and troubleshooting.
  2. Programming Skill: Having good skill in at least one programming language
  3. Interest in Hardware and Software Interaction: A curiosity about how software interfaces with hardware.

Being member of SaarSec CTF team or other CTF teams in Germany is a big plus

Alternatively, you could skip all of the above requirement by simply passing my advance lecture on Reverse Engineering and Exploit Development for Embedded Systems.

Previously supervised thesis:

  1. Hardware-assisted Fuzzing using ARM Core-Sight
  2. High-Speed LPDDR Signal Acquisition And Decoding Using FPGA
  3. Reverse Engineering Satellite Firmware for Security Evaluation
  4. TwinFuzz: Differential Testing of Hardware Accelerators via Software Proxy
  5. Security Assessment of Drones via Fuzzing Techniques
  6. Emulator-based Coverage Guided Fuzzing for Programmable Logic Controllers (Bsc)
  7. Physics Informed Inter-Satellite Communication Threat Detection
  8. Coverage-guided fuzzing of industrial controllers
  9. Spot the Diff-erence: Investigation of bsdiff
  10. Improving Coverage Guided Fuzzing for Programmable Logic Controllers
  11. In-Depth Exploration of Hardware-based Anti-Debugging Technology on Siemens S7 PLCs
  12. Extending emulation and analysis engines for fuzzing embedded systems
  13. SBOM Parsing for Vulnerability Assessment of Open-Source Libraries
  14. Zer0Day: In-depth User Experience and UI Implementation