{"id":106,"date":"2015-03-08T11:10:11","date_gmt":"2015-03-08T16:10:11","guid":{"rendered":"https:\/\/fbreitinger.de\/?page_id=106"},"modified":"2026-02-04T15:08:44","modified_gmt":"2026-02-04T20:08:44","slug":"theses-projects","status":"publish","type":"page","link":"https:\/\/fbreitinger.de\/?page_id=106","title":{"rendered":"Theses \/ Projects"},"content":{"rendered":"<h2>Current thesis \/ project offerings<\/h2>\n<p>Unfortunately I cannot describe possible topics here, as several of my ideas were &#8216;copied&#8217; in the past. Thus, if you are interested in doing your thesis \/ project in the area of cybersecurity \/ digital forensics, please feel free to contact me via email. You can either work on a topic suggested by me or present your own idea.<\/p>\n<hr \/>\n<h2>Currently supervised PhD students (working titles):<\/h2>\n<ul style=\"list-style-type: circle;\">\n<li>Ga\u00ebtan Michelet (since 9\/2021) &#8211; Automation for digital forensics<\/li>\n<li>Aruna Withanage (since 7\/2025) &#8211; Federated Learning in digital forensics<\/li>\n<\/ul>\n<hr \/>\n<h2>Successfully completed &#8211; congratulations!<\/h2>\n<h3>PhD<\/h3>\n<ul style=\"list-style-type: circle;\">\n<li>Jenny Ottmann &#8211; Formulating and Applying Quality Criteria in Forensic Live Data Acquisition (4\/2024, 2nd supervisor)<\/li>\n<li>Martin Karresand &#8211; Digital Forensic Usage of the Inherent Structures in NTFS (06\/2023, 1st opponent)<\/li>\n<li>Miguel Mart\u00edn P\u00e9rez &#8211; Effectiveness of Similarity Digest Algorithms for Binary Code Similarity in Memory Forensic Analysis (03\/2022, committee member)<\/li>\n<\/ul>\n<h3>Masterthesis<\/h3>\n<ul style=\"list-style-type: circle;\">\n<li>Rachelle Choufani &#8211; Proactive Approach: Vulnerability signature creation from Ethical Hacker reports to scale vulnerability detection in Web applications (industry sponsor: Bug Bounty Switzerland) (09\/2023 &#8211; 08\/2024)<\/li>\n<li>Vladimir Pfister &#8211; NASA Operational Simulator for Small Satellites (NOS3) (09\/2023 &#8211; 08\/2024)<\/li>\n<li>Evan Blezinger &#8211; Attacks on NTP and their impact on event reconstruction (09\/2023 &#8211; 07\/2024)<\/li>\n<li>Elise Misso &#8211; Title withheld due to NDA (industry sponsor: Seculabs SA) (09\/2023 &#8211; 07\/2024)<\/li>\n<li>Laetitia Gaillard &#8211; Title withheld due to NDA (industry sponsor: wearin\u2019) (09\/2023 &#8211; 07\/2024)<\/li>\n<li>Sarah Lacour &#8211; Characteristics and impacts of Artificial Intelligence-related incidents on the digital forensic investigation (09\/2022 &#8211; 06\/2023)<\/li>\n<li>Charlotte Merceron &#8211; Electronic Signatures in PDF Documents: An analysis of embedded artefacts in PDFs generated by scanners and selected software (02\/2022 &#8211; 01\/2023)<\/li>\n<li>L\u00e9o\u00a0Giannardi &#8211; Windows Server forensics and incident response for the ProxyShell Exploit (10\/2021 &#8211; 06\/2022).<\/li>\n<li>Leo Irudayam &#8211; Integrating Blockchain Technology into a upper secondary school curriculum (02\/2021 &#8211; 06\/2021).<\/li>\n<li>Karoline Leo &#8211; Bringing Cybersecurity into High School Curricula: Gender-based Differences in the Perception and Understanding of Cybersecurity\u00a0(02\/2021 &#8211; 06\/2021).<\/li>\n<li>Stephen Niemann &#8211; Challenges and Opportunities for Consumer Cybersecurity Insurances\u00a0(02\/2021 &#8211; 06\/2021).<\/li>\n<li>Jan Huck &#8211; Ransomware countermeasures in the extended Rhine valley A comparative analysis of companies\u2019 implemented ransomware strategies (02\/2020 &#8211; 06\/2020)*.<\/li>\n<li>Vikram\u00a0Harichandran &#8211;\u00a0Approximate matching for Template detection (05\/2016 &#8211; 10\/2017).<\/li>\n<li>Lorenz Liebler &#8211;\u00a0Approximate matching for malware detection in memory (03\/2016 &#8211; 09\/2016)*.<\/li>\n<li>Tobias Huppertz: An indexing approach for approximate matching using Bloom filters (08\/2014 &#8211; 02\/2015).<\/li>\n<li>Vikas Gupta: File fragment detection on network traffic using similarity hashing (01\/2013 &#8211;\u00a006\/2013)*.<\/li>\n<li>Simon Thurner: Methods for identification of encryption data and its application in digital forensics (08\/2012 &#8211; 02\/2013).<\/li>\n<li>Tim V\u00f6lpel: Forensic-Chatlog-Parser (02\/2012 &#8211; 08\/2012).<\/li>\n<li>Knut Petter Asteb\u00f8l: mvHash \u00a0&#8211; a new approach for fuzzy hashing (01\/2012 &#8211; 07\/2012)*.<\/li>\n<li>Jesse Beckingham: Security analysis of sdhash (08\/2011 &#8211; 03\/2012)*.<\/li>\n<\/ul>\n<h3>Bachelorthesis<\/h3>\n<ul style=\"list-style-type: circle;\">\n<li>Amina Ambrosini &#8211; An overview of machine learning and deep learning applications in digital and traditional forensic domains (11\/2023-05\/2024).<\/li>\n<li>Thi\u00ean-Ch\u00e2u Tran &#8211; Impacts of artificial intelligence on eletronic discovery (11\/2023-05\/2024).<\/li>\n<li>Juliette Aerni &#8211; New IoT Authentication Protocols and their Impact on Digital Forensics (11\/2023-05\/2024).<\/li>\n<li>Marc Pirovino &#8211; Ransomware Detection Methods: A Review of Literature (11\/2023-05\/2024).<\/li>\n<li>Manon Buret &#8211; The potential impact of Explainable Artificial Intelligence (XAI) on Digital Forensics (11\/2023-05\/2024).<\/li>\n<li>Samuele Mombelli &#8211; FAIRness of Metadata in the Computer Forensic Reference DataSet Portal (11\/2022-05\/2023)*.<\/li>\n<li>Romain Vuillemier &#8211; Identifying personal identifiable information (11\/2022-05\/2023).<\/li>\n<li>Loris Vaccaro &#8211; Overview of Explainable AI and Digital Forensics (11\/2022-05\/2023).<\/li>\n<li>Dounia Challandes &#8211; Timestamp Tampering Protection (11\/2022 &#8211; 05\/2023).<\/li>\n<li>Sofya Yokoyama &#8211; Anonymization of data within Digital Forensics (11\/2021 &#8211; 05\/2021).<\/li>\n<li>Alexia Schmid &#8211; Cryptocurrencies usage in illegal financial activities and money laundering : emerging tendencies, impact and countermeasure (11\/2021 &#8211; 05\/2021).<\/li>\n<li>Ga\u00eblle Barth &#8211; Les m\u00e9thodes de G\u00e9olocalisation d\u2019un Appareil de T\u00e9l\u00e9phonie mobile (11\/2021 &#8211; 05\/2021).<\/li>\n<li>Florin Sch\u00e4dler &#8211; Der Einfluss von App-Berechtigungsanfragen auf nutzergenerierte Ratings und Rezensionen (02\/2020 &#8211; 05\/2020).<\/li>\n<li>Dario Cundari: Software tools for testing similarity preserving algorithms (03\/2012 &#8211; 07\/2012).<\/li>\n<li>Georg Ziroff: Approaches for similarity preserving hashing (08\/2011 &#8211; 02\/2012)*.<\/li>\n<\/ul>\n<h3>Projects \/ independent research<\/h3>\n<ul style=\"list-style-type: circle;\">\n<li>David Palmbach: Artifacts for detecting timestamp manipulation in NTFS on Windows and their reliability (2019, Masterproject)*<\/li>\n<li>Victoria Oliveira, Kyle Pinder, Louis Notarino, Cinthya Grajeda, Kevin Gonzalez: Business Intelligence Dashboard (2016, Senior project with <a href=\"https:\/\/www.docuware.com\" target=\"_blank\" rel=\"noopener noreferrer\">DocuWare<\/a>)<\/li>\n<li>Joseph Bisch, Kyle Combs, Ardian Caban, Nicholas Wereszczak: Personal Cloud Storage\u00a0(2016, Senior project)<\/li>\n<li>Benjamin Beisel:\u00a0Analysis of URL-based image exchange from Android smartphone messenger ooVoo (2015, independent research, collaboration with Hochschule Darmstadt).<\/li>\n<li>Mike Yang: CAPIL: Component-API Linkage for Android Malware Detection\u00a0(2015, master project).<\/li>\n<li>Justin Labrecque, William Putnam, Michael Barone, Viet Le and Chris Harris: iNodeKey &#8211; An Innovative Approach To Securing Data\u00a0(2015, senior project).<\/li>\n<li>Benjamin Baylis: Nutritional Tracker Mobile App\u00a0(2015, senior project).<\/li>\n<\/ul>\n<p>* Works marked with a star was published in a peer reviewed journal \/ conference and is listed in\u00a0<a href=\"https:\/\/fbreitinger.de\/?page_id=15\">publication section<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Current thesis \/ project offerings Unfortunately I cannot describe possible topics here, as several of my ideas were &#8216;copied&#8217; in the past. Thus, if you are interested in doing your thesis \/ project in the area of cybersecurity \/ digital forensics, please feel free to contact me via email. You can either work on a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":81,"menu_order":20,"comment_status":"closed","ping_status":"closed","template":"page-full-width.php","meta":{"footnotes":""},"class_list":["post-106","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/fbreitinger.de\/index.php?rest_route=\/wp\/v2\/pages\/106","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fbreitinger.de\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fbreitinger.de\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fbreitinger.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fbreitinger.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=106"}],"version-history":[{"count":45,"href":"https:\/\/fbreitinger.de\/index.php?rest_route=\/wp\/v2\/pages\/106\/revisions"}],"predecessor-version":[{"id":1340,"href":"https:\/\/fbreitinger.de\/index.php?rest_route=\/wp\/v2\/pages\/106\/revisions\/1340"}],"up":[{"embeddable":true,"href":"https:\/\/fbreitinger.de\/index.php?rest_route=\/wp\/v2\/pages\/81"}],"wp:attachment":[{"href":"https:\/\/fbreitinger.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}