Open Positions
Want to become a cybersecurity researcher? We publish open positions at: https://www.thi.de/en/career/who-we-are-looking-for/
Still a student? We regularly have open positions for students who want to step foot into academia and/or work on cybersecurity topics. Make sure to . No cover letters please, CV is enough!
Thesis Topics
Interested in writing your Bachelor and/or Master thesis in our research group? Feel free to pick a topic from below or bring your own! You will usually be supervised by the PhD students and graded + supervised by one of our professors.
Category | Short description | Contact person |
---|---|---|
Software Analysis | Binary Fuzzing Harness Generation | |
Charging | Building a fake electric vehicle for (pen-)testing charging stations | |
Charging | Analysis of different charging stations, their certificates, encryption and protocol capabilities | |
Charging | Analysis of Volkswagens proprietary bidirectional charging protocol | |
Charging | Analysis of Teslas proprietary charging protocol | |
Charging | ISO15118 charging protocol pentesting | |
Charging | ISO15118 charging protocol fuzzing | |
Charging | ISO15118 charging protocol implementation fingerprinting | |
Web Security | Identifying JavaScript libraries in bundled files | |
Compilers | (Cybersecurity enhancing )Compiler Engineering | |
Compilers | (Cybersecurity enhancing )JIT-Compilation Library Engineering [1] | |
Compilers | Comparative analysis of different Intermediate Representation (IR) models for their suitability for platform-independent static analysis | |
Software Analysis | A Systematic Comparison and Analysis of Typesetting System Projects | |
Software Analysis | A Systematic Mapping Study of Intrusion Detection Approaches for Automotive Networks | |
Software Analysis | On Using Large Language Models for Compositional Program Analysis |