Next Seminar on 01.03.2023 (Updated: Session A starts at 14:30)

Written on 26.02.2023 11:00 by Niklas Medinger

Dear All,

The next seminar(s) take place on 01.03.2023 at 14:30 (Session A) and 14:00 (Session B).

Session A: (14:30-15:30)
Ahmad Hajy Omar, Moaz Airan

Meeting-ID: 967 8620 5841
Kenncode: BT!u5=


Session B: (14:00-14:30)

Johanna Girndt

Meeting-ID: 990 2598 9421
Kenncode: 3mZyE$


Session A:

14:30 - 15:00

Speaker: Ahmad Hajy Omar
Type of talk: Bachelor Intro
Advisor_1: Dr. Cristian-Alexander Staicu
Advisor_2: Dr. Dolière Francis Somé
Title: Web scrapping of Content Security Policy for Desktop and Mobile browsers with different browsers settings
Research Area: RA3

Abstract :
Content Security Policy (CSP) is one of the most important HTTP response headers that is
supported by most of the modern Mobile and Desktop-Browsers, it helps to improve the security of
web pages by restricting and detecting many types of attacks like the famous attack Cross Site
Scripting (XSS).
CSP play the role like an officer who gives the instructions how the browser can load things like
sources throw a specific directives with specific values.
Unfortunately the csp header can be affected by multiple reasons like the user agent, for example
visiting a website with tow different devices i.e. Samsung device and iPhone device might lead us to
see tow different csp headers with two different level of safety, moreover the various browsers and
the various browser versions can cause the same problem as previously.
We aim to collect more information and results by running tests using playwright method to scrape
the response headers and search for the content security policy header and even searching in the
meta tag for the csp by visiting a large set of ulrs (especially the famous urls) using different user
agents and devices with different viewports and different types of browsers with various versions.
We will run the tests on different operating systems (windows, ubuntu and mac ), at the end we want
to compare the results and analyze them to find out which is the most reason that cause or lead to
different csp headers with different level of safety options and if there is a solution to avoid this

15:00 - 15:30

Speaker: Moaz Airan
Type of talk: Bachelor Intro
Advisor: Dr. Cristian-Alexandru Staicu
Title: Exploring User Data Protection Provided by Firefox-based Web Browsers
Research Area: RA3
Abstract: User sensitive data stored by browsers should be properly secured and protected from stealing attacks such as cross-site scripting (XSS) for stealing cookies and Man-in-the-Middle attack for stealing passwords. Browsers implement different security mechanisms and encryption algorithms to manage eliminating these types of attacks, where the attacker try to steal data from a running browser session on the victim machine, in other words the attacker is connected "online" to the victim. A different way to reach the sensitive data is if a malware was installed on the user machine. This opens a lot of possibilities to steal and manipulate the data "offline" directly from the victim machine bypassing most of the protection provided by browsers. This thesis explores different exploitations and methods that could lead to leaking sensitive data like passwords and session tokens. Focusing on Firefox-based browsers, we also examine how the user data gets stored and how these browsers interact with operating systems, in our case it's Windows.


Session B:

14:00 - 14:30

Speaker: Johanna Girndt
Type of talk: Bachelor Final
Advisor: Prof. Andreas Zeller, Dr. Dominic Steinhoefel
Title: Conversion of ISLa Constraints into Binary Templates
Research Area: RA5
Grammar-based fuzzing is an effective method to generate structured inputs for testing programs. Efficient fuzzers exist for this purpose, but they are usually not precise enough since context-free grammars are not sufficient to specify all input formats. To overcome this lack of precision, the input description language ISLa was built. It is easy to adapt for developers, due to the fact that it is based on context-free grammars, but the existing ISLa solver has a slow working speed.
In turn, the grammar-based fuzzer and parser generator Format Fuzzer is much more time efficient, but the binary template language used by Format Fuzzer is complicated for humans to write.
In order to provide both, a commonly accepted way to describe a broad variety of input formats and provide efficient file generation, this work is dedicated to the translation of ISLa constraints to binary template language based on an existing LL1 parser generator that generates binary templates from context-free grammars.
For the presented tool, the tests have shown that the structure of the constraint and the language used have a large impact on the generation speed, but that the generated files cover a high number of k-paths in every test case.


We investigate whether Trusted Execution Environments (TEEs) can be used to protect motor control code in the presence of parallel running attacker code. We focus on analyzing the feasibility of detecting manipulation and whether it is possible to guarantee that the system can terminate its operation in a safe state in response to these manipulations. Additionally, we discuss a proof-of-concept implementation of motor control code and monitoring code protected by ARM Trustzone.

Privacy Policy | Legal Notice
If you encounter technical problems, please contact the administrators.