Lars Wüstrich, M. Sc.
Research Associate
Postal address
- Institut für Informatik der
- Technischen Universität München
- Lehrstuhl I8
- Boltzmannstr. 3
- 85748 Garching bei München - Germany
Contact
- Tel: +49 89 289 - 18021
- e-Mail: wuestrichnet.in.tum.de
- Building/Room: MI Building, 03.05.043
Consultation hours
By arrangement
Research
- Security in IoT networks
Teaching
- since Summer 2019: Lab course iLab: Build your own Internet
- since Summer 2016: Involved in creating iLabX: The Internet Masterclass
Supervised Theses
In progress
Student | Title | Type | Advisors | Year | Links |
Alexander Stephan | Matching Ingress Traffic to Processes Using Linux eBPF | IDP | Lars Wüstrich, Sebastian Gallenmüller | 2024 | |
Lorenz Lehle | Traffic Correlation Graphs | MA | Kilian Holzinger, Lars Wüstrich | 2024 | |
TBA | Cloud Based eID User Identification | BA, MA | Stefan Genchev, Lars Wüstrich | 2024 |
Finished
Author | Title | Type | Advisors | Year | Links |
Matthias Kirstein | Happy Eyeballs: A Comprehensive Analysis of the Deployment and Configuration Across Various Versions and Implementations | BA | Patrick Sattler, Johannes Zirngibl, Lars Wüstrich | 2024 | |
Bechir Boujelbene | Analyzing the Characteristics of Shop Floor Networks | BA | Lars Wüstrich | 2024 | |
Peter Fam | An Analysis of the Effects of Cyber Attacks on the Network Traffic Characteristics of Shop Floor Networks | MA | Lars Wüstrich, Holger Kinkelin | 2024 | |
Marco Rubin | Exploring the viability of Large Language Models for the assessment of free text answers in an educational environment | MA | Christoph Schwarzenberg, Lars Wüstrich, Christian Lübben | 2024 | |
Tien Doan Viet | Interactive and Continuous Visualization of Traffic Causality Graphs | BA | Lars Wüstrich | 2024 | |
Aida Begzadic | Performance Optimization Strategies for Source-Accessible Web Applications | BA | Florian Wiedner, Lars Wüstrich | 2024 | |
Vera Wesselkamp | Security Aspects of the MLS Protocol beyond Building Blocks | MA | Cas Cremers, Lars Wüstrich | 2024 | |
Benjamin Schaible | Ensuring the Integrity of Submissions in Digital eLearning Platforms | BA | Florian Wiedner, Lars Wüstrich | 2024 | |
Robin Wölfel | Correction Workflow Optimizations for Practical Network Courses | BA | Florian Wiedner, Lars Wüstrich | 2024 | |
Stefan Genchev | Trustworthy Remote Signing | MA | Lars Wüstrich | 2023 | |
Jessica Jivanjee | Local AI-based Network Anomaly Detection | BA | Christian Lübben, Holger Kinkelin, Lars Wüstrich | 2023 | |
Uros Maletic | Evaluating the Impact of Data Pre-Processing to Improve Data Privacy on Machine Learning | BA | Lars Wüstrich, Holger Kinkelin | 2023 | |
Simon Wessling | Development And Application of a Hybrid Security Assessment Methodology For Source-Accessible Web Applications | MA | Lars Wüstrich, Florian Wiedner | 2023 | |
Mika Mampe | eID User Guidance for Service Providers | BA | Lars Wüstrich, Stefan Genchev | 2023 | |
Lilo Walter | Collaborative Experiment Result Collection in Hardware-Based Lab Courses | IDP | Lars Wüstrich, Florian Wiedner | 2023 | |
Julian Gassner | Performance Monitoring for the iLab-Labsystem | BA | Lars Wüstrich, Florian Wiedner | 2023 | |
Florian Hoppe | Partially Automated Plagiarism Detection for University Courses with Continuous Free Text Tasks | BA | Lars Wüstrich, Florian Wiedner, Christoph Schwarzenberg | 2023 | |
Tobias Wothge | Egress Node Behavior in iCloud Private Relay | IDP | Patrick Sattler, Johannes Zirngibl, Lars Wüstrich, Lion Steger | 2023 | |
Timm Bauer | User Guidance for Remote Qualified Electronic Signatures | BA | Lars Wüstrich | 2023 | |
Roland Reif | Developing a Methodology for Reproducible and Comparable Penetration Testing | MA | Lars Wüstrich | 2023 | |
Maximilian Eder | Analyzing eLearning statistics to improve digital teaching methods | MA | Christoph Schwarzenberg, Christian Lübben, Florian Wiedner, Lars Wüstrich | 2022 | |
Lorenz Nickel | Validation of Physical Properties in Networked Systems via Acoustic Side-Channels | BA | Lars Wüstrich, Stephan Günther | 2022 | |
Markus Schacherbauer | Designing a Database-Structure for Hardware-Based Lab Courses | IDP | Lars Wüstrich, Florian Wiedner, Christoph Schwarzenberg | 2022 | |
Lorenz Lehle | Implementation of an Interactive Import and Export Tool for Hardware-Based Lab Courses | IDP | Lars Wüstrich, Florian Wiedner | 2022 | |
Anna Wimbauer | Role Based Qualified Electronic Signatures | IDP | Lars Wüstrich, Filip Rezabek | 2022 | |
Markus Schacherbauer | Profiling Applications via their Network Flows | MA | Lars Wüstrich, Sebastian Gallenmüller | 2022 | |
Tin Raic | Threshold Cryptography enabled QES | MA | Filip Rezabek, Lars Wüstrich | 2022 | |
Elias Nechwatal | Online Traffic Causality Graphs | BA | Kilian Holzinger, Lars Wüstrich | 2022 | |
Jan Oesterle | Survey on AI-based Methods for Network Anomaly Detection | BA | Christian Lübben, Dr. Holger Kinkelin, Lars Wüstrich | 2021 | |
Markus Budeus | Mapping Network Flows to Applications for Profile Creation | BA | Lars Wüstrich, Sebastian Gallenmüller | 2021 | |
Nadja Schricker | Creating Traffic Causality Graphs from Network Captures and Application Logic | MA | Lars Wüstrich, Christian Lübben, Holger Kinkelin, Marc-Oliver Pahl | 2021 | |
Stefan Genchev | Online Identification Using the German eID Scheme - Practical Analysis Based on a Certificate Issuance Use Case | BA | Lars Wüstrich, Holger Kinkelin | 2021 | |
Janik Nier | Analysis and Comparison of Attack Sequences | BA | Lars Wüstrich, Christian Lübben | 2021 | |
Achref Aloui | Traffic Causality Graphs for Industrial Networks | BA | Lars Wüstrich, Christian Lübben, Holger Kinkelin | 2021 | |
Florian Wachter | Explainable AI for Anomaly Detection | MA | Christian Lübben, Lars Wüstrich, Holger Kinkelin | 2021 | |
Rafi Al Attrach | Similarity Detection for Free-Text Input | BA | Lars Wüstrich, Florian Wiedner | 2021 | |
Stefan Janker | Similarity Detection for Databases | BA | Lars Wüstrich, Florian Wiedner | 2021 | |
Lorenz Lehle | Efficient Processing of Large Network Captures | BA | Lars Wüstrich, Johannes Zirngibl, Christian Lübben | 2021 | |
Dominik Freiherr von Künßberg | Mapping Network Flows to Local Processes Efficiently | BA | Lars Wüstrich, Sebastian Gallenmüller | 2021 | |
Krutav Shah | Enhancing NIDS with End-Host Information | MA | Lars Wüstrich, Sebastian Gallenmüller | 2021 | |
Tobias Wothge | Industrial Control Systems (ICS) Protocol Detection | BA | Patrick Sattler, Lars Wüstrich, Johannes Zirngibl | 2021 | |
Stefan Schrott | Anonymization of Network Captures | BA | Lars Wüstrich, Filip Rezabek | 2021 | |
Pooja Parasuraman | Hardware-Supported Packet Monitoring on a Single Host | IDP | Lars Wüstrich, Sebastian Gallenmüller | 2021 | |
Justus Fries | Graph-based Analysis of Server TLS Parameters | IDP | Markus Sosnowski, Patrick Sattler, Lars Wüstrich | 2020 | |
Hande Akin | Self-Learning Models for Anomaly Detection in Smart Spaces | MA | Christian Lübben, Lars Wüstrich, Marc-Oliver Pahl | 2020 | |
Oliver Scheit | Enabling Collaborative Labsystem Workflow | BA | Lars Wüstrich, Marc-Oliver Pahl | 2020 | |
Muhammed Sahin | Analysis of Servers use of TLS Parameters | IDP | Patrick Sattler, Markus Sosnowski, Lars Wüstrich, Max Helm | 2020 | |
Umur Mert | Modeling the IIoT Inter-dependencies in Smart Factories | MA | Lars Wüstrich, Marc-Oliver Pahl | 2020 | |
Michael Stehling | Rechtliche Rahmenbedingungen für das Internet der Dinge am Beispiel der Technologie LoRaWAN (Abschlussarbeit) | BA | Marc-Oliver Pahl, Lars Wüstrich | 2020 | |
Lukas Schröder | Fingerprinting IoT Devices via Their Physical Properties | BA | Lars Wüstrich, Marc-Oliver Pahl | 2020 | |
Mohammed Said Derbel | AI-based anomaly classification | BA | Christian Lübben, Lars Wüstrich, Dr. Holger Kinkelin | 2020 | |
Leon Imhof | Secure BLE beacons with additional data | BA | Lars Wüstrich | 2019 | |
Daniel Meint | Reliable Caching for the Internet of Things | BA | Stefan Liebald, Lars Wüstrich, Marc-Oliver Pahl | 2019 | |
Alessandro Piccoli | Secure Group Key Update in IoT | MA | Lars Wüstrich, Marc-Oliver Pahl | 2019 |