You are here: Home Teaching/Lehre Oberseminar Rechnernetze und …

Oberseminar Rechnernetze und Telematik (WiSe 2024/2025)

Das Oberseminar findet regelmäßig Mittwochs von 14-16 Uhr in 051-02-007 statt. Hier werden aktuelle Forschungsthemen diskutiert, sowie finden Kickoff- und Abschlusspräsentationen von Bachelor/Master-Projekten/Arbeiten statt.

In the oberseminar, lectures are held on selected topics, as well as final presentations of master's and bachelor's theses, as well as projects. The seminar is hybrid in room 051-02-007 as well as over this Zoom-link.(Meeting-ID: 879 6692 5056, Kenncode: WR6RriwYD)

 

Next oberseminar(s):

  • 07.09.2024, 14:00-16:00 (tbd)

Last oberseminar(s):

  • 25.09.2024, 14:00-14:45.: Ahmet Bulut, Master Thesis final presentation
     
    Title: Efficient ZK Argument for Shuffle Implementation in RustAbstract:

    Abstract: A shuffle operation in cryptography is an operation that takes a committed, anonymous series of values and returns the original series modified with a permuted order. It is an important operation in many real world scenarios (e-voting, mental card games). Due to the plaintexts or data being encrypted for privacy, the correctness of a shuffle of commitments is not straightforward to verify. While there are algorithms to construct such arguments, we are providing the first comprehensive pure Rust library for the Correctness of a Shuffle Operation.
    The library is built over elliptic curve prime order groups to commit and encrypt data for privacy, while exploiting the homomorphism of the elliptic curves for efficiency.
    This argument for correctness combines two separate arguments (Multi-exponentiation Argument, Product Argument) to produce a Shuffle Argument for correctness. Utilizing the Rust programming language, which has enormous support from the cryptography community, with its efficiency in runtime and security in memory, we aim to provide an extensive and easy to use zero-knowledge proof framework that can be seamlessly incorporated and used by other proof schemes, or used to construct complex arguments.

  • 18.09.2024 14:00-14:45: Alex Lenitschek, Bachelor Thesis final presentation

    Title: Design, Implementation, Simulation and Evaluation of a Density based Clustering Algorithm for Indoor Localization based on Directed and Reflected Signals
    Abstract: The Indoor Localization based on Directed and Reflected Signals (ILDARS) project aims to create a device capable of locating sound-emitting sources within unknown room environments by analysing sound emissions like direct sounds or reflected sounds and the time difference between their arrival.
    This thesis focuses on a critical early stage of the ILDARS pipeline: clustering signals to determine wall positions. Specifically, a for the ILDARS adapted version of the Hierarchical Density-Based Spatial Clustering of Applications with Noise (HDBSCAN) algorithm is designed and implemented to effectively cluster the input data. The motivation behind this work lies in the crucial role accurate clustering plays in the overall ILDARS pipeline, as all subsequent algorithms rely on the precision of these initial clustering results for accurate source localization.
    To achieve this, the HDBSCAN algorithm is designed, implemented, simulated, and its performance across diverse virtual environments evaluated. The analysis considers various factors, such as room size, shape, and the presence of noise in the signal data, to assess the algorithm's robustness and effectiveness in clustering the data.


  • 18.09.2024 14:45-15:15: Peter Gillessen, Bachelor Project final presentation

    Title: Investigating HTTP/3 Request Smuggling Vulnerabilities in nginx 
    Abstract: This project investigates potential HTTP/3 request smuggling vulnerabilities in the popular reverse-proxy nginx. Following the methodology proposed by Pisu et al., tests were conducted using an environment that forces HTTP/3 to HTTP/1.1 conversions. Out of 203 malformed HTTP/3 requests, successfully rejected or modified 201, adhering to RFC 9114. However, two requests containing disallowed ASCII characters (0x20 and 0x9) in header values were forwarded unmodified to the backend, indicating a potential risk for request smuggling. These findings highlight the need for further investigation into specific edge cases, despite the overall robustness of nginx in handling such vulnerabilities.

     




There are currently no items in this folder.