MNM-Team

Publication list

LMU
Home Contact

Master's theses of year 2024

Theses and projects (PhD, MSc, BSc, Project)

  1. Thomas Holger. Single Common Information Service Provider for Constrained Networks. 1 2024. Link to this entry
    BibTeX Entry
    @misc{holg24, author = {Thomas Holger}, title = {{Single} {Common} {Information} {Service} {Provider} for {Constrained} {Networks}}, year = {2024}, key = {holg24}, month = {1}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Corinna Schmitt}, type = {Masterthesis}, }
  2. Qinzi Li. Real-Time Global Illumination in VR - A Comparison of Real-Time Lighting Algorithms and their Perception. 2 2024. Link to this entry
    BibTeX Entry
    @misc{li24, author = {Qinzi Li}, title = {{Real-Time} {Global} {Illumination} in {VR} - A {Comparison} of {Real-Time} {Lighting} {Algorithms} and their {Perception}}, year = {2024}, key = {li24}, month = {2}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Thomas Odaker and Elisabeth Mayer}, type = {Masterthesis}, }
  3. Willyam Sentosa. Image-Depth Map Inpainting for Occlusion Completion. 3 2024. Link to this entry
    BibTeX Entry
    @misc{sent24, author = {Willyam Sentosa}, title = {{Image-Depth} {Map} {Inpainting} for {Occlusion} {Completion}}, year = {2024}, key = {sent24}, month = {3}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Simone Müller and Daniel Kolb}, type = {Masterthesis}, }
  4. Philip Adamczyk. Algorithm Comparison for Local Misbehavior Detection in Intelligent Transport Systems - Traditional versus Machine Learning. 4 2024. Link to this entry
    BibTeX Entry
    @misc{adam24, author = {Philip Adamczyk}, title = {{Algorithm} {Comparison} for {Local} {Misbehavior} {Detection} in {Intelligent} {Transport} {Systems} - {Traditional} versus {Machine} {Learning}}, year = {2024}, key = {adam24}, month = {4}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Fabian Dreer}, type = {Masterthesis}, }
  5. Oliver Linne. Personalisierung von VR-Anwendungen auf Basis physiologischer Sensordaten. 5 2024. Link to this entry
    BibTeX Entry
    @misc{linn24, author = {Oliver Linne}, title = {{Personalisierung} von {VR-Anwendungen} auf {Basis} physiologischer {Sensordaten}}, year = {2024}, key = {linn24}, month = {5}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Fabio Genz}, type = {Masterthesis}, }
  6. Niklas Sudmann. Evaluating Trust Solution in Digital Aeronautical Communications Systems. 7 2024. Link to this entry
    BibTeX Entry
    @misc{sudm24, author = {Niklas Sudmann}, title = {{Evaluating} {Trust} {Solution} in {Digital} {Aeronautical} {Communications} {Systems}}, year = {2024}, key = {sudm24}, month = {7}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Corinna Schmitt}, type = {Masterthesis}, }
  7. Adrian Moore. Secure Routing in Aeronautical Ad-Hoc Networks. 7 2024. Link to this entry
    BibTeX Entry
    @misc{moor24, author = {Adrian Moore}, title = {{Secure} {Routing} in {Aeronautical} {Ad-Hoc} {Networks}}, year = {2024}, key = {moor24}, month = {7}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Corinna Schmitt}, type = {Masterthesis}, }
  8. Simona Maiolo. Analysis of Tracker Network APIs. 7 2024. Link to this entry
    BibTeX Entry
    @misc{maio24, author = {Simona Maiolo}, title = {{Analysis} of {Tracker} {Network} {APIs}}, year = {2024}, key = {maio24}, month = {7}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Corinna Schmitt}, type = {Masterthesis}, }
  9. Yannick Weber. Implementation of an ETSI-compliant Object Recognition MEC App with Focus on Communication to Edge Devices. 7 2024. Link to this entry
    BibTeX Entry
    @misc{webe24, author = {Yannick Weber}, title = {{Implementation} of an {ETSI-compliant} {Object} {Recognition} {MEC} {App} with {Focus} on {Communication} to {Edge} {Devices}}, year = {2024}, key = {webe24}, month = {7}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Corinna Schmitt}, type = {Masterthesis}, }
  10. Daniel Alexander Leidreiter. Investigating Evolving Ansatz VQE Algorithms for Job Shop Scheduling. 7 2024. Link to this entry
    BibTeX Entry
    @misc{leid24, author = {Daniel Alexander Leidreiter}, title = {{Investigating} {Evolving} {Ansatz} {VQE} {Algorithms} for {Job} {Shop} {Scheduling}}, year = {2024}, key = {leid24}, month = {7}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Korbinian Staudacher and Xiao-Ting Michelle To}, type = {Masterthesis}, }
  11. Adrian Schmidt. Evaluation of medium-sized networks based on an original implementation of the MEADcast Router. 9 2024. Link to this entry
    BibTeX Entry
    @misc{schm24b, author = {Adrian Schmidt}, title = {{Evaluation} of medium-sized networks based on an original implementation of the {MEADcast} {Router}}, year = {2024}, key = {schm24b}, month = {9}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Daniel Diefenthaler and Fabian Dreer}, type = {Masterthesis}, }
  12. Jakob Ritter. Simulating Measurement Based Quantum Computing using Tensor Networks. 10 2024. Link to this entry
    BibTeX Entry
    @misc{ritt24, author = {Jakob Ritter}, title = {{Simulating} {Measurement} {Based} {Quantum} {Computing} using {Tensor} {Networks}}, year = {2024}, key = {ritt24}, month = {10}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Korbinian Staudacher and Florian Krötz}, type = {Masterthesis}, }
  13. Dennis Greiwe. Reducing Attack Surfaces in Containerized Environments Through Threat Modeling. 10 2024. Link to this entry
    BibTeX Entry
    @misc{grei24, author = {Dennis Greiwe}, title = {{Reducing} {Attack} {Surfaces} in {Containerized} {Environments} {Through} {Threat} {Modeling}}, year = {2024}, key = {grei24}, month = {10}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Corinna Schmitt}, type = {Masterthesis}, }
  14. Elisabeth Mayer. Non-Intrusive Full Body Tracking in Large-Scale Immersive Installations - Usability, Benefits and Challenges. 10 2024. Link to this entry
    BibTeX Entry
    @misc{maye24, author = {Elisabeth Mayer}, title = {{Non-Intrusive} {Full} {Body} {Tracking} in {Large-Scale} {Immersive} {Installations} - {Usability,} {Benefits} and {Challenges}}, year = {2024}, key = {maye24}, month = {10}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Thomas Odaker}, type = {Masterthesis}, }
  15. Julian Bierwirth. An optimized risk/threat handling process based on ISO27001. 10 2024. Link to this entry
    BibTeX Entry
    @misc{bier24, author = {Julian Bierwirth}, title = {{An} optimized risk/threat handling process based on {ISO27001}}, year = {2024}, key = {bier24}, month = {10}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Stefan Metzger and Michael Schmidt}, type = {Masterthesis}, }
  16. Simon Hilchenbach. CacheHound: Automated Reverse-Engineering of CPU Cache Policies in Modern Multiprocessors. 9 2024. Link to this entry PDF
    Abstract
    In modern multiprocessors, hardware manufacturers employ a hierarchy of CPU caches to mitigate the considerable latency associated with accessing main memory. These CPU caches leverage the temporal and spatial locality of an application's data access patterns to serve a portion of the main memory at significantly reduced latencies. The operation of CPU caches is governed by cache policies. While this solution is effective in the majority of scenarios, an application may encounter difficulties in performing optimally under a given cache policy, potentially leading to issues such as thrashing. Awareness of the policy would facilitate the restructuring of the application to align with it. Such knowledge can be further applied to the domain of cache-based side-channels, from both a hardening and an attacker perspective. However, manufacturers typically refrain from disclosing the details of their cache policies, particularly those pertaining to the placement and replacement of data within the cache. Prior research has focused on the reverse-engineering of replacement policies, yet we are not aware of any investigation into placement policies. Moreover, to the best of our knowledge, there is currently no generic framework for the reverse-engineering of CPU caches. In this work, we devise such a framework and also develop a methodology for the reverse-engineering of placement policies. We provide a corresponding open-source implementation, called CacheHound, and benchmark it on several x86- and ARM-based systems. Finally, we employ the gained knowledge to explore use cases in the fields of security and high-performance computing (HPC).
    BibTeX Entry
    @misc{hilc24, author = {Simon Hilchenbach}, title = {{CacheHound:} {Automated} {Reverse-Engineering} of {CPU} {Cache} {Policies} in {Modern} {Multiprocessors}}, year = {2024}, pdf = {https://bib.nm.ifi.lmu.de/pdf/hilc24.pdf}, abstract = {In modern multiprocessors, hardware manufacturers employ a hierarchy of CPU caches to mitigate the considerable latency associated with accessing main memory. These CPU caches leverage the temporal and spatial locality of an application's data access patterns to serve a portion of the main memory at significantly reduced latencies. The operation of CPU caches is governed by cache policies. While this solution is effective in the majority of scenarios, an application may encounter difficulties in performing optimally under a given cache policy, potentially leading to issues such as thrashing. Awareness of the policy would facilitate the restructuring of the application to align with it. Such knowledge can be further applied to the domain of cache-based side-channels, from both a hardening and an attacker perspective. However, manufacturers typically refrain from disclosing the details of their cache policies, particularly those pertaining to the placement and replacement of data within the cache. Prior research has focused on the reverse-engineering of replacement policies, yet we are not aware of any investigation into placement policies. Moreover, to the best of our knowledge, there is currently no generic framework for the reverse-engineering of CPU caches. In this work, we devise such a framework and also develop a methodology for the reverse-engineering of placement policies. We provide a corresponding open-source implementation, called CacheHound, and benchmark it on several x86- and ARM-based systems. Finally, we employ the gained knowledge to explore use cases in the fields of security and high-performance computing (HPC).}, key = {hilc24}, month = {9}, school = {Ludwig-Maximilians-Universität München}, supervisors = {Karl Fuerlinger and Sergej Breiter}, type = {Masterthesis}, }

Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Last modified: Thu Oct 16 12:44:29 2025 CEST