BSc/MSc/PhD Supervision Topics

DEFSYS (Design Theory Framework for the Science of Security) Topics

  • Applied (discrete) mathematics for disaster research:
    • Structural modelling of critical disaster aspects
    • Discrete mathematical assessment of disaster domains
    • Data analysis and information extraction for mathematical modelling
    • Scenario generation/development
    • Simulation and experiments
      • Example topic: Cyber crisis modelling from a combinatorial perspective
  • Applied (discrete) mathematics for research in finance:
    • Structural modelling of financial instruments and processes
    • Data analysis and information extraction for mathematical modelling
    • Scenario generation/development
    • Simulation and experiments
      • Example topic: Discrete mathematics for financial instrument performance
  • Applied (discrete) mathematics for information security:
    • Structural modelling of vulnerabilities, attacks and information security protocols
    • Mathematical assessment of privacy aspects of modern society
    • Data analysis and information extraction for mathematical modelling
      • Example topic: Combinatorial assessment of crypto software

CALGO (Covering Arrays, Algorithms and Optimization) Topics

  • Algorithms for Combinatorial Array Generation:
    • Neural Networks for generating Covering Arrays and related structures
    • Formal Methods (SAT, CSP, ASP, …) for generating combinatorial fault locating arrays (related work existing)
    • Formal Methods for post-optimization of CAs
    • Quantum (inspired) Algorithms for CA generation
    • Nature inspired algorithms for CA generation
    • Algebraic models for CAs
  • Algorithms for Combinatorial Sequence Generation:
    • Automata (Theory) for Combinatorial Sequences
    • Optimization Algorithms for Combinatorial Sequences
  • Tool development integrating existing algorithms:
    • Develop a new web application tool realising an existing algorithm
    • Benchmarking of existing tools
  • Theoretical Computer Science and Covering Arrays:
    • Computational Complexity of optimal Covering Array generation
    • Analytic Combinatorics for Covering Array generation
  • XAI for CT: Combinatorial Fault Localization/Pattern Recognition:
    • ML and AI for identifying failure inducing interactions in combinatorial test sets
    • Compare to: ML and AI for identifying failure inducing interactions in random test sets
  • Connections between combinatorial testing and debugging:
    • From failure inducing t-way interactions to program slices or bugs
      • Case study: TCAS
  • CT for XAI (Combinatorial Testing methods for Explainable AI):
    • Solving Bongard problems
      • Case study: feature detection in pictures of Bongard problems; two classes are given; we look for a unique t-way interaction of one of the classes
    • Empirical studies on the applicability of Combinatorial Testing methods for XAI
      • T-way interactions as explanations of machine generated output
      • T-way interactions as explanations for human users
  • Combinatorial Test Generation for Hardware Testing:
    • Combinatorial Testing applied for Hardware Trojan Testing

CST (Combinatorial Security Testing) Topics

  • Learning-based enhancements to combinatorial security testing:
    • Automated oracles for security testing (also offered as PhD topic)
  • Security testing of protocols and web applications:
    • Quantum software faults and vulnerabilities
    • Security analysis/review of DBMS connectors
    • Testing of RF communications protocols
    • Combinatorial security testing for DOM XSS
  • Development workflow integration:
    • Embedding combinatorial testing into development lifecycles (focus on CI/CD)
    • Embedding combinatorial test generation into fuzzing workflows
  • Case studies for state-of-the-art techniques:
    • Combinatorial (security) testing of web applications
  • Emerging topics:
    • Combinatorial testing of mobile applications (also offered as PhD topic)
    • Security testing of quantum computing applications (also offered as PhD topic)
    • Combinatorial Testing of Tor Network
    • Combinatorial Security Testing for PGP
    • Testing of PQC Implementations submitted to NIST Competition