Fachgruppe Angewandte Informatik Göttingen

The COOKIE-Seminar

Warning: This is only the archive. For currently scheduled talks see here.

Previous Talks

Seminar Date Author Title
13.11.2014 Mathias Velten "A practical Introduction to Docker Containers"
Christoph Rauterberg "Android Malware Detection using Machine Learning and Feature Analysis"
18.12.2014 Robin Martinjak "I did an Internship at Google ... and All I Got Was this Stupid T-Shirt"
Fabian Yamaguchi Mining for Bugs with Graph Database Queries
15.01.2015 Azat Khuziyakhmetov & Bakhodir Ashirmatov "Competitive programming and algorithms"
Kevin Freeman "A small insight into Anti-Virus scanners"
12.03.2015 Kevin Freeman Gaining access to other processes memory
Steffen Herbold Intuition vs. Truth: Evaluation of Common Myths about StackOverflow Posts
25.06.2015 Omar Shaya Just Do it! Entrepreneurship and Computer Science. How to start and grow.
16.07.2015 Salke Hartung The Warez Scene - Get An Insight
Mathias Velten Software Operability - Dreams of a Sysadmin
12.11.2015 Jan Michal Gründungstreffen einer Hochschulgruppe der Gesellschaft für Informatik
Dr. Marco Buechler Digital Humanities for Computer Scientists … or: How I became infected with the Indiana Jones virus
10.12.2015 Arne Bochem Sensors, Networks and RC Cars
Felix Schelle "The awesome Shakespeare Programming Language"
14.04.2016 Christian Roth Reverse Engineering the Software of Life
Ole Reglitzki NodeBB - Plugin development for a modern forum platform
09.06.2016 Bryan Virtual Reality
14.07.2016 Kevin Freeman Coming from kernel space
Azat Khuziyakhmetov Graphs and Game of Throne
24.11.2016 Hauke Kaulbersch Extended Object tracking
Marc Zöller Event Correlation and Root Cause Analysis
19.01.2016 Ole Reglitzki Markdown
Jan Michal Schwefelwasser und Polarlichter und woran man sich nicht gewöhnt. A semester in Iceland.
Anna Bösemann Computação no Brasil - Computer Science in Brazil
09.02.2017 Linus Weber Presentations with reveal.js & markdown
Felix Schelle Taxi
26.10.2017 Lorenz Glißmann cool stuff about linux
09.11.2017 Antonio Text Generation with LSTM Units
07.12.2017 Felix Schelle, Ole Reglitzki JSFuck
11.01.2017 Fabiola Buschendorf Building an Intrusion Detection System - Internship in Canada
Benjamin Leiding The (Mystical) World of Blockchain Technology
16.02.2018 Wiebke Dirks Studying Computer Science in Ireland
Danny Cooper Working as a Software Developer in Ireland
15.03.2018 David Funktionale Programmierung in C
Troll Dein Compiler hat in Mathe besser aufgepasst als du - eine Einführung in Compileroptimierung und x86 Assembly
05.04.2018 Prof. Delphine Reinhardt From Electrical Engineering to Privacy
Jan Maximilian Michal How to encrypt your Mail with PGP with Key-signing party afterwards

Abstracts of previous talks

Coming from kernel space

In the previous cookie talk "Gaining access to other processes memory", we saw how easy it this can be. Nevertheless, there are mechanisms to block simple accesses. At the sIT talk "ProxyDLL and Clientless - Emulating the engine of online applications" we faced some of these mechanisms and found a way into the address space of the process by letting it load our own library. However, new mechanisms prevent accesses from user space. Therefore, this talk shows methods to gain access to any address in user space by writing an own kernel mode driver for Windows. This is useful, as it is the same way how anti-virus scanners scan memory. Hereby, it will circumvent all restrictions and is undetectable by other programs.

Graph Theory and Game of Thrones

You might have already read many articles about various statistics in Game of Thrones and speculations of who is going to die next in the story. Here is another one, based on graph theory. In the following research I’m not using the TV show rather it will be based on the main source - the first 5 books of epic fantasy novels of George R. R. Martin, “A Song of Ice and Fire” (ASOIAF). But well, don’t be disappointed if you only watch TV shows, they intersect a lot and hopefully the show will continue to take advises from the author. I have used the most popular algorithms in the Graph Theory to find out some interesting statistics and predict most popular or vulnerable characters in the whole story.

Virtual Reality - The Vision Becomes Reality

When Facebook announced the acquisition of Virtual Reality Startup Oculus for 2 billion dollars in March 2014, many observers were confused about this bold move. In his statement Facebook's founder and CEO Mark Zuckerberg drew up a vision of the enormous potential of this technology and predicted that VR will develop into a platform, a medium for many more experiences. Text, pictures and videos already enable us to experience situations and events, but this effect reaches a whole new level with VR. Using VR headsets like the Oculus Rift, we feel like we are right in the middle of events, as if we were a witness or even participating.

In early 2014 the vision still sounded pretty incredible, but is slowly turning into reality ever since. After four years of development, the Oculus Rift finally enters the mass market in 2016, as well as its main competitors HTC Vive and Playstation VR. Today, VR is one of the hottest topics in technology with the likes of Facebook, Google and Amazon hopping on the bandwagon. The presentation will give an overview over the development of the hype, the state of the technology, the potential of the market and fascinating applications.

Reverse Engineering the Software of Life

Just like computers, organisms have to be programmed. Although being developed for about five billion years, the operating system of life and all required software is completely free of charge and we are allowed to share it with others as often as we want. But there is a catch: the code is messy, the developers didn’t bother to document - there is not a single line of comment in the code… Welcome to biology, the biggest reverse engineering challenge of the 21st century!

Biologists now generate an incredible volume of high dimensional data. A meaningful analysis is not possible without advanced skills in computer science and statistics. In my talk I give a quick introduction into the field of genomics and cherry-pick interesting biological and medical questions that can be answered by sequencing experiments. Biology is now rapidly transforming into a quantitative science. My goal is to give a glimpse into the current state and the future of medicine and biology.

The awesome Shakespeare Programming Language

Wolltest du schon immer mal literarische Werke wie Shakespeare schreiben? Aber du studierst keine Literaturwissenschaft? Mit der Programmiersprache Shakespear kannst du jetzt deinen literarischen Fähigkeiten ausdruck verleihen. Und dein Drama sieht nicht nur toll aus, sondern es ist sogar funktionierender Programmcode! In diesem Vortrag bekommst du eine Einführung in diese Sprache.

Sensors, Networks and RC Cars

Wireless sensor networks (WSNs) allow gathering various data about environments in which they are deployed, but there is little point to the data if the location at which it was measured is unknown. Different approaches to localization in WSNs allow estimating the positions, but they vary in cost, efficiency and effectiveness. This short talk gives some information on an approach called sensor assisted monte carlo localization (SA-MCL) and how we used RC cars for science.

Gründungstreffen einer Hochschulgruppe der Gesellschaft für Informatik

Wir treffen uns, um eine Hochschulgruppe der Gesellschaft für Informatik hier an unserem Institut in Göttingen zu gründen. Worum soll es gehen: Was kommt da auf uns zu? Wer ist eigentlich die GI? Was haben wir davon? Was habe ich davon? Was wollen wir machen? Ein Vortrag zum warm werden beantwortet genau diese Fragen. Anschließend geht’s ans Eingemachte und wir müssen uns entscheiden, was die ersten Projekte der GI HSG Göttingen sein sollen und wer dabei sein will.

Digital Humanities for Computer Scientists … or: How I became infected with the Indiana Jones virus

Many definitions have been formulated to describe the Digital Humanities, driven either by political interests or born out of one's own approach to it. This cookie talk describes my understanding of the Digital Humanities as an IT person and aims to show what computer scientists can contribute to our cultural heritage. The talk summarises several applications and developments that have been designed by my teams and me since 2008.

I did an Internship at Google ... and All I Got Was this Stupid T-Shirt

Somewhat off-topic, because instead of talking about the project work I did, I'll focus more on the overall experience. If you have a question, let me know at https://docs.google.com/document/d/16Nzecw_X45xdGbu15sDAV02ZXSxhdc3pYg1VClwDMPQ/edit?usp=sharing so I can prepare. (DISCLAIMER: the title is quite the opposite of the truth; go and play The Secret of Monkey Island if you didn't understand the reference).

Mining for Bugs with Graph Database Queries

While graph databases are primarily known as the backbone of the modern dating world, this nerd has found a much more interesting application for them: program analysis. This talk aims to demonstrate that graph databases and the typical program representations developed in compiler construction are a match made in heaven, allowing large code bases to be mined for vulnerabilities using complex bug descriptions encoded in simple, and not so simple graph database queries.

Competitive programming and algorithms

Why is it so popular? Do we really need efficient algorithms in software industry?

A small insight into Anti-Virus scanners

Many people make use of anti-virus scanners to detect malicious software. But how do they actually work and what are they actually detecting? The detection methods and databases are commonly not publicly accessible. What if we could gain an insight into these by analyzing the programs inspected by an AV scanner?

Gaining access to other processes memory

Is it easy to influence other processes or read out their memory? What methods exist to gain access to arbitrary memory parts of processes? We will see how easy it is to modify own programs and will also have a look at other processes.

Intuition vs. Truth: Evaluation of Common Myths about StackOverflow Posts

Posting and answering questions on StackOverflow (SO) is everyday business for many developers. We asked a group of developers what they expect to be true about questions and answers on SO. Most of their expectations were related to the likelyhood of getting an answer or to voting behavior. From their comments, we formulated nine myths that they think are true about the platform. Then, we proceeded to use rather simple methods from statistics to check if these myths are supported by the data in the SO dump provided. Through our analysis, we determined that there is an effect for eight of the nine myths the developers believed in. However, for only four of the myths the effect size is large enough to actually make a difference. Hence, we could bust five myths the developers believed in.

Just Do it! Entrepreneurship and Computer Science. How to start and grow.

If you came to study Computer Science. You probably think about working for a giant tech company. But have you thought that these companies were once started by people just like you now. From his experience, Omar will tell you all about it. How to start a tech company and what are the essentials to grow your company and succeed.

Software Operability - Dreams of a Sysadmin

A short introduction to the problems of operating Software in a production Environment and some suggestions, what Developers could do, to make the life of a Sysadmin easier by looking on real world examples.

Might contain traces of swearing.

The Warez Scene - Get an Insight

Disclaimer: This talk will be in German!

Die Warez-Szene ist eine Vereinigung von Schwarzkopierern, die aus der BBS-Szene der 80er entstanden ist. Erdacht als elitärer Kreis weniger Eingeweihter hatte sie den Anspruch die bestmögliche Qualität von Schwarzkopien zu liefern. Dabei stand stets der Wettbewerbsgedanke im Vordergrund und nicht das zugänglich machen von Schwarzkopien für die breite Masse. Dieser Talk gibt einen kleinen Einblick in diese Szene und stellt Teile der Infrastruktur vor. Gespickt ist der Talk mit der ein oder anderen Anekdote und schließt mit der Auflistung von Gründen, warum der Niedergang besiegelt ist.

Extended Object tracking - Kekse scannen und erkennen im EM Ansatz

Heutzutage gibt es viele Anwendung die versuchen einem System ein Verständnis seiner Umgebung zu ermöglichen. Scanner werden präziser und man hat nicht wie früher eine Einzelmessung eines Objekts sondern ganze Punktwolken dessen. Die Ziele haben sich somit stark erweitert. Von "Wo ist dieses Ding" und "Wie schnell ist" es hin zu der Frage "Wie sieht es eigentlich aus". Das Hauptproblem: Die Messungen sind leider rauschbehaftet und auf größere Entfernung nicht sehr dicht. Der Vortrag gibt Einsichten in die Grundlagen meiner Masterarbeit und erklärt Anhand von Keksen, wie ich versuche Objekte zu erkennen.

Event Correlation and Root Cause Analysis

Modern Computersysteme sind sehr komplex. Zur einfacheren Wartung und Pflege bieten die meisten Systeme Informationen über den inneren Zustand an - oft in Form von Logging. Das Ziel meiner Masterarbeit ist es an Hand von Log Dateien Zusammenhänge und Abhängigkeit im System zu finden. Dadurch kann zukünftiges Verhalten vorhergesagt und Ursachen von Fehlern leichter gefunden werden.


"Let's be honest here, what does a programmer fundamentally do? A programmer moves data from one memory location to another. Over and over. In this respect, a programmer is not unlike a taxi driver. A taxi driver moves people from place to place all day long. The people get dropped off, do their things, and new people get loaded back up to be taken someplace else - except unlike programmers, the things taxi drivers shuffle around all day pay them for the service! Well programmers no longer need to put up with that kind of ingratitude from their data: introducting the Taxi Programming Language!" -Sean Heber

Text Generation with LSTM Units

One of the cool things one can do with neural networks is making them learn from text in an unsupervised manner. The text could be English text, but it could also be any other kind of text, like for example source code. After learning, the neural network should be able to produce new text that is remarkably similar to the text which it learned from. The talk is about a project where this was experimented with.


jsfuck is a subset of javascript and a special technique wich can be used to perform XSS. In jsfuck there are only 6 different characters that can be used. We explain and show how this technique works.

Building an Intrusion Detection System - Internship in Canada

Industry computer networks are a vulnerable but attractive target by attacks. Supervisory Control and Data Acquisition (SCADA) network protocols lack of common security means and are exposed to modern threats. In the need of protection, an Intrusion Detection System (IDS) can identify malicious actions and classify network data into harmful or normal packets. A Honeypot can be deployed to attract attacker and gather data, which was analyzed using machine learning algorithms. I will refer about research and life in Canada and possibilities for students to go abroad for the next summer.

The (Mystical) World of Blockchain Technology

Blockchain technology is probably the most confusing term since Bitcoin. Most people have no real clue what a blockchain or a Bitcoin actually is, except that they should have invested in Bitcoins some years ago. Depending on who you ask, blockchains are either the greatest innovation since the Internet or a hyped bubble. Nevertheless, governments as well as private companies are rushing to implement blockchain technology in a range of areas that might change the future of our daily lives within a few years - but the question remains, is blockchain technology really one of the greatest technological revolutions in history? This presentations provides an introduction to the mystical world of blockchains, its applications and cryptocurrencies such as Bitcoins. We will also talk about the potential of blockchain applications as well as current blockchain-related phenomena such as smart contracts, decentralized applications, ICOs and the advantages and disadvantages of blockchain technology.

Studying Computer Science in Ireland

Wiebke will talk about studying computer science in Maynooth, Ireland. She will compare the different educational systems in Ireland and Germany, and talk about advantages and disadvantages of doing a year abroad. Computer science lectures in Ireland are more hands-on and praxis-oriented but focus less on maths. She will also talk about student life in genreal and offer advice for anyone interested in studying in Ireland.

Working as a Software Developer in Ireland

Danny will talk about working as a software developer in Dublin, Ireland where he currently works for Bank of America. He did mostly Python in his previous job and has switched to Scala recently. He will talk about work routines, how to find a job and living in Ireland in gerneral. He will also briefly compare this job to his previous job in London. If you are interested in working in the UK/Ireland, this is a good oportunity to ask questions.

Dein Compiler hat in Mathe besser aufgepasst als du - eine Einführung in Compileroptimierung und x86 Assembly.

Moderne C/C++ Compiler optimieren deinen Code, wenn du sie nett darum bittest, wie zum Beispiel das Entfernen ungenutzter Variablen oder überflüssiger Programmpfade. Aber wie gut ist das Ergebnis wirklich? Helfen micro-optimizations beim Programmieren oder sind das Überbleibsel aus den 90ern? Für diesen Vortrag sind keine Assembly Vorkenntnisse nötig.

Funktionale Programmierung in C

Immer mehr Sprachen greifen heutzutage Ideen aus der funktionalen Programmierung auf. Wie diese Konzepte auch in C verwendet werden können, soll dieser Vortrag zeigen. (Knüpft an den C-Programmierkurs an)

From Electrical Engineering to Privacy

Prof. Delphine Reinhardt will first talk about her motivations to teach and do research on privacy. She will then present selected research areas and topics she has addressed in the past years and also projects she is currently working on.

PGP and Cryptoparty

There will be a short talk about the "Pretty Good Privacy" encryption sheme, how and why it works and a "Cryptoparty", an opportunity to exchange and sign each others keys for secure communication. Bring your laptop!