Student Thesis Topics (2023)

I will supervise BSc thesis projects in Spring 2023. Since I have limited supervision capacity, I typically take the first N students following more or less a first-come, first-served strategy. I like to form clusters of students working on related topics, and I organize weekly (online) meetings with the clusters. We use a collaborative note taking tool to track progress. The work itself is taking place in two phases. In the first phase, students will dive into the state of the art of their topic, and they produce a state of the art report.

Student Thesis Topics (2021/2022)

Below is a collection of ideas for student projects. I am mostly writing down topic clusters I am interested in as I strongly prefer to have multiple students working on related topics within a topic cluster. If you are interested in systems-oriented computer science and computer security, talk to me in person. In general I expect that students have a solid understanding of operating systems and computer networks and that they are able to handle programming tasks well and that they can work independently.

Dagstuhl Seminar: Towards Climate-Friendly Internet Research

We had the pleasure to be part of the Dagstuhl seminar Towards Climate-Friendly Internet Research, which took place on July 7–9, 2021. This was the first online Dagstuhl seminar we attended. While the online format was caused by the Corona pandemic, it actually made a lot of sense to hold the seminar in an online format given that the event was largely focused on the question how we can reduce the carbon footprint of the academic community, the network operator communities, and the standardization communities.

Accreditation BSc Computer Science

The German Accreditation Council has accredited our Computer Science BSc program on its meeting on September 29th, 2020. The accreditation is valid for the period from October 1st, 2020 to September 30th, 2028. Obtaining program accreditation is an intense process, a huge amount of documentation has to be produced and a group of independent evaluators visit the university to talk with leadership and administration, faculty and students. The process took about two years, and it did consume quite some resources.

Student Project and Thesis Topics (2020/2021)

Below is a collection of ideas for student projects. Some are half-backed, some are not even written down. If you are interested in systems-oriented computer science and computer security, talk to me in person. In general I expect that students have a solid understanding of operating systems and computer networks and that they are able to handle programming tasks well. Trusted Execution Environments Trusted Execution Environments (TEEs) such as ARM's Trustzone or Intel's Enclave are secure areas inside a main processor.

Offline - The Second Wave Arrived?

It started on Thursday (around 8am) when our (meanwhile outsourced) email service started to refuse to authenticate me with a somewhat cryptic temporary failure error message during the SMTP authentication dialogue. I first hoped that this might be indeed a temporary failure. (Trust me, outsourced services do not work 24/7, at least not for me.) After roughly 24 hours, I lost patience and I engineered a different way to submit my emails (via some legacy local SMTP servers that still exist and were willing to accept my emails).

Student Project and Thesis Topics (2019/2020)

Below is a collection of ideas for student projects. Some are half-backed, some are not even written down. If you are interested in systems-oriented computer science and computer security, talk to me in person. In general I expect that students have a solid understanding of operating systems and computer networks and that they are able to handle programming tasks well. Trusted Execution Environments Trusted Execution Environments (TEEs) such as ARM's Trustzone or Intel's Enclave are secure areas inside a main processor.

Offline

Last Friday, our central IT infrastructure, mostly running on Microsoft Windows, got infected by ransomware. All central systems were shutdown and a process started to reset them to the last (presumably) safe backup. Three days have passed since then and systems providing mail service (the communication service I rely on) are still not operational. It is amazing that it takes several days to restore regular service after such an attack.

20 Years Network Management Research Group

The Network Management Research Group of the Internet Research Task Force got 20 years old, it was approved on March 14th, 1999. We had a short retrospective at the 104th meeting of the Internet Engineering Task Force in Prague today. It is interesting to reflect on which problems we made progress and which problems are still largely unsolved. We surely have much better network management technologies in place today compared to what we had 20 years back.

Network Management Datastore Architecture Protocols Published

The network management datastore architecture (NMDA) has been published about a year ago and this work has now been completed with the publication of the NMDA extensions for the NETCONF protocol and the NMDA extensions for the RESTCONF protocol. The work on the protocol extensions also required an update of the YANG Library. The definition of a common model describing how configuration data is conceptually processed to finally determine the behaviour of devices took a bit longer than expected but it feels good to have this piece of work finished (and we will soon forget about some of the roadblocks we had to deal with).