Completed Master's Theses

Semester Title
SoSe25 GraphT5: Vulnerability Dependence Graph-Driven Transformer for Automated Source Code Repair
WiSe24/25 An Empirical Study of Remediation Techniques for Third-Party Library Vulnerabilities in Java
SoSe24 Using LLM's to create novel vulnerability datasets
SoSe24 A Machine Learning Model to Detect Software Vulnerabilities using Natural Language Processing
SoSe24 Comparative Analysis of Methods for Threat Analysis and Risk Assessment for AI-based Systems
SoSe24 Evaluating SAST tools for software-security localization
WiSe23-24 Testcase generation using ChatGPT
SoSe23 Enhancing vulnerability-introducing commits identification by leveraging common fix patterns
WiSe22 Security evaluation of code generated by code generation models
WiSe22-23 Identifying security features in open source software using Latent Dirichlet Allocation (LDA)
WiSe22-23 Empirical study on static code analysis tools for security in Terraform IaC scripts
WiSe22-23 Social distncing at airport (NXP)
WiSe22-23 Design and implementation of a conversational DevBot for supporting the analysis of security-annotated DFDs
SoSe22 Dark Patterns for Developer-Centered Security Applications
SoSe22 Topic Modelling Analysis of Microservice Security Discussions in StackOverflow
SoSe22 Injecting and fixing Dockerfile security smells
WiSe21-22 Identifying Security features in source code using code2vec
SoSe21 Automated identification of security features in micro-services

Completed Bachelor's Theses

Semester Title
SoSe25 Security Test Case Assessment with Code Summarization
WiSe24-25 Exploit generation and repair of ReDoS Vulnerabilities
WiSe24-25 Fixing Java deserialization vulnerabilities using LLMs
SoSe24 Security Analysis of Self-Admitted Technical Debt
SoSe24 Attacks to Software Supply Chain
SoSe24 Evaluation of Code Similarity Metrics for Java Test Cases
SoSe24 Experimentation with "Commit Embedding" Techniques to Predict Vulnerabilities in Commits
SoSe24 Identify threats in LLM applications
SoSe24 Rapid Review on Privacy-as-Code Tools
SoSe24 Attacks to LLM
SoSe24 Finetuning LLMs for vulnerability localization
SoSe24 Finetuning LLms for vulnerability prediction
SoSe24 MicroSecFixer: Automatically Fixing Architectural Security Rules for Microservice Applications on the Model-level
WiSe23-24 Porting automatic vulnerability repair from C/C++ to Java
SoSe23 Systematic Literature Review of Prompt Engineering Techniques for Secure Code Generation
SoSe23 Intrusion detection using AutoEncoders: Replication Study
SoSe23 Identification of security-relevant commit messages in large open-source projects unsing topic modeling
SoSe23 Analysis of natural language code summaries to detect software vulnerabilities
SoSe23 Applying LINDDUN to European Covid proximity detection protocols
SoSe23 Privacy threats of RFID implants: A user-centered study
WiSe23-24 Identifying Security relevant Source Code using Large Language Models
WiSe22-23 Security Best-Practices in Open-Source Microservice Applications
WiSe22-23 Security threats and countermeasures for AI-based systems
WiSe22-23 Security Best-Practices in Open-Source Microservice Applications
WiSe22-23 Privacy in Human-Robot Interaction: Exploring the Role of Anthropomorphism on Curiosity and Information Disclosure
SoSe22 An empirical analysis of privacy preferences in Metaverse
SoSe22 Analysis of Kura and comparison to NodeRED
WiSe21-22 Adversarial Machine Learning Attacks: Current Trends and Future Research Directions
SoSe21 Security analysis of IoT edge frameworks (NodeRED - Kura - Flogo)
SoSe21 Security inspection guidelines for micro-services