Thomas Bella
Replacing Proprietary IoT Firmware with Open Source Firmware

PDF - 2.2 MB
[asc] [SHA256]
(locked until 06/2024)
Work on request
Master Thesis
The Internet of Things is not only found in industrial plants, but also in private households. The products range from IP cameras to smart TVs to sockets and light bulbs. All these products are networked and connected to the Internet so that they can be controlled via the manufacturer's app. A permanent Internet connection is used to enable control from outside the local network. Thus, the IoT device is permanently connected to a central point on the Internet, the manufacturer's server. In addition to use in private households, these IoT devices can also be used in companies. Here, it is necessary to allow the devices access to the Internet by creating releases in the firewall. If access to the Internet is granted in this way, the manufacturer would have the opportunity to access internal network resources of the company, provided that no further network security measures have been taken. The same also applies to a private household, where it is highly likely that the network is not separated. In addition to the espionage risk, there is also the risk that the device can become part of a botnet by exploiting security vulnerabilities. The available bandwidth of the IoT device is misused for attacks. These include DDoS attacks and the distribution of malware. If the firmware is infected, there is usually no way to remove the infection.
For this reason, this work deals with the security of IoT devices with manufacturer firmware, as well as an alternative open source firmware. In addition to security, the performance impact that can arise from using an open source firmware is also analyzed. The attempt is rounded off by rebuilding and providing cloud functionality for the open source firmware, which enables control of the IoT device over the Internet. ...

Original title: Austausch proprietärer IoT-Firmware mit Open Source Firmware
The document is only available in German.
Performance Problems with Recommended SSL Ciphers

PDF - 1.4 MB
[asc] [SHA256]
Work on request
2nd Bachelor Thesis
Data theft is just one of the many risks on the Internet. When using a public (W)LAN, there is a risk that data entered on websites can be read or manipulated by third parties without the user noticing.
For this reason, encryption is increasingly used to protect transmitted data from being viewed and manipulated. Without encryption, an attacker could read sensitive information or transmit malicious code to a website user.
The cryptographic functions used for encryption are characterized by their complexity, which makes them difficult to break. This complexity, in turn, affects the performance of the server and the client, as the use of an outdated, poorly implemented, or too complex cipher suite increases the computational effort. ...

Original title: Performanceprobleme bei empfohlenen SSL-Ciphers
The document is only available in German.
Performance Analysis of Web Server Technologies

PDF - 1.6 MB
[asc] [SHA256]
Work on request
1st Bachelor Thesis
Slowly responding websites are often a nuisance for many consumers and interfere with the consumption of content. But not only the consumer is affected by slow websites, but also the provider of the content.
While the consumer perceives sluggish website calls as unbearable, they are usually not noticed by the company. Performance problems manifest themselves through constant monitoring of response times, declining customer numbers, lower sales figures, or in rarer cases through complaints. ...

Original title: Performanceanalyse von Webserver-Technologien
The document is only available in German.