Master's theses of year 2024
Theses and projects (PhD, MSc, BSc, Project)
-
Single Common Information Service Provider for Constrained Networks.
1
2024.
BibTeX Entry
@misc{holg24, author = {Thomas Holger}, title = {{Single} {Common} {Information} {Service} {Provider} for {Constrained} {Networks}}, year = {2024}, key = {holg24}, month = {1}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Corinna Schmitt}, type = {Masterthesis}, } -
Real-Time Global Illumination in VR - A Comparison of Real-Time Lighting Algorithms and their Perception.
2
2024.
BibTeX Entry
@misc{li24, author = {Qinzi Li}, title = {{Real-Time} {Global} {Illumination} in {VR} - A {Comparison} of {Real-Time} {Lighting} {Algorithms} and their {Perception}}, year = {2024}, key = {li24}, month = {2}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Thomas Odaker and Elisabeth Mayer}, type = {Masterthesis}, } -
Image-Depth Map Inpainting for Occlusion Completion.
3
2024.
BibTeX Entry
@misc{sent24, author = {Willyam Sentosa}, title = {{Image-Depth} {Map} {Inpainting} for {Occlusion} {Completion}}, year = {2024}, key = {sent24}, month = {3}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Simone Müller and Daniel Kolb}, type = {Masterthesis}, } -
Algorithm Comparison for Local Misbehavior Detection in Intelligent Transport Systems - Traditional versus Machine Learning.
4
2024.
BibTeX Entry
@misc{adam24, author = {Philip Adamczyk}, title = {{Algorithm} {Comparison} for {Local} {Misbehavior} {Detection} in {Intelligent} {Transport} {Systems} - {Traditional} versus {Machine} {Learning}}, year = {2024}, key = {adam24}, month = {4}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Fabian Dreer}, type = {Masterthesis}, } -
Personalisierung von VR-Anwendungen auf Basis physiologischer Sensordaten.
5
2024.
BibTeX Entry
@misc{linn24, author = {Oliver Linne}, title = {{Personalisierung} von {VR-Anwendungen} auf {Basis} physiologischer {Sensordaten}}, year = {2024}, key = {linn24}, month = {5}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Fabio Genz}, type = {Masterthesis}, } -
Evaluating Trust Solution in Digital Aeronautical Communications Systems.
7
2024.
BibTeX Entry
@misc{sudm24, author = {Niklas Sudmann}, title = {{Evaluating} {Trust} {Solution} in {Digital} {Aeronautical} {Communications} {Systems}}, year = {2024}, key = {sudm24}, month = {7}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Corinna Schmitt}, type = {Masterthesis}, } -
Secure Routing in Aeronautical Ad-Hoc Networks.
7
2024.
BibTeX Entry
@misc{moor24, author = {Adrian Moore}, title = {{Secure} {Routing} in {Aeronautical} {Ad-Hoc} {Networks}}, year = {2024}, key = {moor24}, month = {7}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Corinna Schmitt}, type = {Masterthesis}, } -
Analysis of Tracker Network APIs.
7
2024.
BibTeX Entry
@misc{maio24, author = {Simona Maiolo}, title = {{Analysis} of {Tracker} {Network} {APIs}}, year = {2024}, key = {maio24}, month = {7}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Corinna Schmitt}, type = {Masterthesis}, } -
Implementation of an ETSI-compliant Object Recognition MEC App with Focus on Communication to Edge Devices.
7
2024.
BibTeX Entry
@misc{webe24, author = {Yannick Weber}, title = {{Implementation} of an {ETSI-compliant} {Object} {Recognition} {MEC} {App} with {Focus} on {Communication} to {Edge} {Devices}}, year = {2024}, key = {webe24}, month = {7}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Corinna Schmitt}, type = {Masterthesis}, } -
Investigating Evolving Ansatz VQE Algorithms for Job Shop Scheduling.
7
2024.
BibTeX Entry
@misc{leid24, author = {Daniel Alexander Leidreiter}, title = {{Investigating} {Evolving} {Ansatz} {VQE} {Algorithms} for {Job} {Shop} {Scheduling}}, year = {2024}, key = {leid24}, month = {7}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Korbinian Staudacher and Xiao-Ting Michelle To}, type = {Masterthesis}, } -
Evaluation of medium-sized networks based on an original implementation of the MEADcast Router.
9
2024.
BibTeX Entry
@misc{schm24b, author = {Adrian Schmidt}, title = {{Evaluation} of medium-sized networks based on an original implementation of the {MEADcast} {Router}}, year = {2024}, key = {schm24b}, month = {9}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Daniel Diefenthaler and Fabian Dreer}, type = {Masterthesis}, } -
Simulating Measurement Based Quantum Computing using Tensor Networks.
10
2024.
BibTeX Entry
@misc{ritt24, author = {Jakob Ritter}, title = {{Simulating} {Measurement} {Based} {Quantum} {Computing} using {Tensor} {Networks}}, year = {2024}, key = {ritt24}, month = {10}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Korbinian Staudacher and Florian Krötz}, type = {Masterthesis}, } -
Reducing Attack Surfaces in Containerized Environments Through Threat Modeling.
10
2024.
BibTeX Entry
@misc{grei24, author = {Dennis Greiwe}, title = {{Reducing} {Attack} {Surfaces} in {Containerized} {Environments} {Through} {Threat} {Modeling}}, year = {2024}, key = {grei24}, month = {10}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Corinna Schmitt}, type = {Masterthesis}, } -
Non-Intrusive Full Body Tracking in Large-Scale Immersive Installations - Usability, Benefits and Challenges.
10
2024.
BibTeX Entry
@misc{maye24, author = {Elisabeth Mayer}, title = {{Non-Intrusive} {Full} {Body} {Tracking} in {Large-Scale} {Immersive} {Installations} - {Usability,} {Benefits} and {Challenges}}, year = {2024}, key = {maye24}, month = {10}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Thomas Odaker}, type = {Masterthesis}, } -
An optimized risk/threat handling process based on ISO27001.
10
2024.
BibTeX Entry
@misc{bier24, author = {Julian Bierwirth}, title = {{An} optimized risk/threat handling process based on {ISO27001}}, year = {2024}, key = {bier24}, month = {10}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Stefan Metzger and Michael Schmidt}, type = {Masterthesis}, } -
CacheHound: Automated Reverse-Engineering of CPU Cache Policies in Modern Multiprocessors.
9
2024.
PDF
Abstract
In modern multiprocessors, hardware manufacturers employ a hierarchy of CPU caches to mitigate the considerable latency associated with accessing main memory. These CPU caches leverage the temporal and spatial locality of an application's data access patterns to serve a portion of the main memory at significantly reduced latencies. The operation of CPU caches is governed by cache policies. While this solution is effective in the majority of scenarios, an application may encounter difficulties in performing optimally under a given cache policy, potentially leading to issues such as thrashing. Awareness of the policy would facilitate the restructuring of the application to align with it. Such knowledge can be further applied to the domain of cache-based side-channels, from both a hardening and an attacker perspective. However, manufacturers typically refrain from disclosing the details of their cache policies, particularly those pertaining to the placement and replacement of data within the cache. Prior research has focused on the reverse-engineering of replacement policies, yet we are not aware of any investigation into placement policies. Moreover, to the best of our knowledge, there is currently no generic framework for the reverse-engineering of CPU caches. In this work, we devise such a framework and also develop a methodology for the reverse-engineering of placement policies. We provide a corresponding open-source implementation, called CacheHound, and benchmark it on several x86- and ARM-based systems. Finally, we employ the gained knowledge to explore use cases in the fields of security and high-performance computing (HPC).BibTeX Entry
@misc{hilc24, author = {Simon Hilchenbach}, title = {{CacheHound:} {Automated} {Reverse-Engineering} of {CPU} {Cache} {Policies} in {Modern} {Multiprocessors}}, year = {2024}, pdf = {https://bib.nm.ifi.lmu.de/pdf/hilc24.pdf}, abstract = {In modern multiprocessors, hardware manufacturers employ a hierarchy of CPU caches to mitigate the considerable latency associated with accessing main memory. These CPU caches leverage the temporal and spatial locality of an application's data access patterns to serve a portion of the main memory at significantly reduced latencies. The operation of CPU caches is governed by cache policies. While this solution is effective in the majority of scenarios, an application may encounter difficulties in performing optimally under a given cache policy, potentially leading to issues such as thrashing. Awareness of the policy would facilitate the restructuring of the application to align with it. Such knowledge can be further applied to the domain of cache-based side-channels, from both a hardening and an attacker perspective. However, manufacturers typically refrain from disclosing the details of their cache policies, particularly those pertaining to the placement and replacement of data within the cache. Prior research has focused on the reverse-engineering of replacement policies, yet we are not aware of any investigation into placement policies. Moreover, to the best of our knowledge, there is currently no generic framework for the reverse-engineering of CPU caches. In this work, we devise such a framework and also develop a methodology for the reverse-engineering of placement policies. We provide a corresponding open-source implementation, called CacheHound, and benchmark it on several x86- and ARM-based systems. Finally, we employ the gained knowledge to explore use cases in the fields of security and high-performance computing (HPC).}, key = {hilc24}, month = {9}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Karl Fuerlinger and Sergej Breiter}, type = {Masterthesis}, }
Disclaimer:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

