Open Positions
Want to become a cybersecurity researcher? We publish open positions at: https://www.thi.de/en/career/who-we-are-looking-for/
Still a student? We regularly have open positions for students who want to step foot into academia and/or work on cybersecurity topics. Make sure to . No cover letters please, CV is enough!
Thesis Topics
Interested in writing your Bachelor and/or Master thesis in our research group? Feel free to pick a topic from below or bring your own! You will usually be supervised by the PhD students and graded + supervised by one of our professors.
Category | Short description | Contact person |
---|---|---|
Web Security | Analysis of backend services of sharing providers | |
Web Security | Identifying JavaScript libraries in bundled files | |
Low-level Hacking | Firmware analysis of an electric micro-mobility vehicle (E-Scooter) | |
Low-level Hacking | Protocol analysis of an electric micro-mobility vehicle (E-Scooter) | |
Low-level Hacking | Firmware analysis of shared micro-mobility vehicles (E-Scooters) | |
Low-level Hacking | Protocol analysis of shared micro-mobility vehicles (E-Scooters) | |
Compilers | (Cybersecurity enhancing )Compiler Engineering | |
Compilers | (Cybersecurity enhancing )JIT-Compilation Library Engineering [1] | |
Compilers | Comparative analysis of different Intermediate Representation (IR) models for their suitability for platform-independent static analysis | |
Digital Forensics | Analysis of various data classes and categorization of those. The data classes where published in a paper before. | |
Digital Forensics | Exporing if explainable AI is suitable for digital forensics and the requirements attached to court-ready digital forensics investigations. | |
Digital Forensics | Commissioning of third-party infotainment systems and performing digital forensics investigations on those. | |
Automotive | Concept for intercepting Cellular-V2X communication | |
Automotive | Analysis of the attack surface of infotainment systems via the Bluetooth interface | |
Automotive | Analysis of the attack surface of infotainment systems via the USB interface | |
Automotive | Analysis of the attack surface of infotainment systems via the WLAN interface | |
Automotive | Analysis of the attack surface of infotainment systems via the broadcast interface [2] | |
Automotive | Analysis of log files from automotive control units for forensic use | |
Automotive | Fuzzing of Bluetooth implementations (A2DP, PBAP, SDAP, …) |