Semester
|
Title
|
SoSe25
|
Security Test Case Assessment with Code Summarization
|
WiSe24-25
|
Exploit generation and repair of ReDoS Vulnerabilities
|
WiSe24-25
|
Fixing Java deserialization vulnerabilities using LLMs
|
SoSe24
|
Security Analysis of Self-Admitted Technical Debt
|
SoSe24
|
Attacks to Software Supply Chain
|
SoSe24
|
Evaluation of Code Similarity Metrics for Java Test Cases
|
SoSe24
|
Experimentation with "Commit Embedding" Techniques to Predict Vulnerabilities in Commits
|
SoSe24
|
Identify threats in LLM applications
|
SoSe24
|
Rapid Review on Privacy-as-Code Tools
|
SoSe24
|
Attacks to LLM
|
SoSe24
|
Finetuning LLMs for vulnerability localization
|
SoSe24
|
Finetuning LLms for vulnerability prediction
|
SoSe24
|
MicroSecFixer: Automatically Fixing Architectural Security Rules for Microservice Applications on the Model-level
|
WiSe23-24
|
Porting automatic vulnerability repair from C/C++ to Java
|
SoSe23
|
Systematic Literature Review of Prompt Engineering Techniques for Secure Code Generation
|
SoSe23
|
Intrusion detection using AutoEncoders: Replication Study
|
SoSe23
|
Identification of security-relevant commit messages in large open-source projects unsing topic modeling
|
SoSe23
|
Analysis of natural language code summaries to detect software vulnerabilities
|
SoSe23
|
Applying LINDDUN to European Covid proximity detection protocols
|
SoSe23
|
Privacy threats of RFID implants: A user-centered study
|
WiSe23-24
|
Identifying Security relevant Source Code using Large Language Models
|
WiSe22-23
|
Security Best-Practices in Open-Source Microservice Applications
|
WiSe22-23
|
Security threats and countermeasures for AI-based systems
|
WiSe22-23
|
Security Best-Practices in Open-Source Microservice Applications
|
WiSe22-23
|
Privacy in Human-Robot Interaction: Exploring the Role of Anthropomorphism on Curiosity and Information Disclosure
|
SoSe22
|
An empirical analysis of privacy preferences in Metaverse
|
SoSe22
|
Analysis of Kura and comparison to NodeRED
|
WiSe21-22
|
Adversarial Machine Learning Attacks: Current Trends and Future Research Directions
|
SoSe21
|
Security analysis of IoT edge frameworks (NodeRED - Kura - Flogo)
|
SoSe21
|
Security inspection guidelines for micro-services
|