Supervision
PhD theses
| Name | Title of the PhD thesis | at | 
|---|---|---|
| Gianluca Turin | Exploiting Abstract Data-Access Patterms for Better Data Locality in Parallel Processing | UiO | 
| Farzane Karami | Language-based Approaches for Enforcing Privacy and Security Policies | UiO | 
| Daniel Fava | Relaxed Memory Models and Data-Race Detection tailored for Shared-Memory Message-Passing Systems | UiO | 
| Shukun Tokas | Analysis and Enforcement of {GDPR}-related Privacy Principles in Object-Oriented Distributed Systems | UiO | 
| Bjørnar Luteberget | Automated Reasoning for Planning Railway Infrastructure | UiO | 
| Johanna Beate Stumpf | Virtually Timed Ambients: A Calculus for Resource Management in Cloud Computing | UiO | 
| Violet Ka I Pun | Behavioural Static Analysis for Deadlock Checking | UiO | 
| Silvia Lizeth Tapia Tarifa | Executable Modeling Deployment Decisions for Resource-Aware Distributed Applications | UiO | 
| Thi Mai Thuong Tran | Compositional Formal Analysis for Concurrent Object-Oriented Languages | UiO | 
| Arild B. Torjusen | Specification-Based Verification and Testing of Open Distributed Systems | UiO | 
| Erika Ábrahám | An Assertional Proof System for Multithreaded Java - Theory and Tool Support | U. Leiden | 
| Andreas Grüner | Testing Concurrent Objects | U. Leiden | 
| Immo Grabe | Static Analysis of Unbounded Structures in Object-Oriented Programs” | U. Leiden | 
Opponent / Examinor / Defense committee member / adjudication of PhD theses
| Name | Title of the PhD thesis | defended at | 
|---|---|---|
| Malte Hansen | UiO | |
| Ratan Bhadur Thapa | Elevating Standards: Mapping and Querying Relational Data on the Semantic Web | UiO | 
| André Büttner | Security of Evolving Authentication Technologies. Multi-Factor Authentication, Passwordless Authentication, and Self-Sovereign Identity | UiO | 
| Marta Różańska | Utility Based Optimization Of Cloud Application Resources | UiO | 
| Tamas Bisztray | Investigating Privacy Aspects of Identity Management: From Data Protection Impact Assessment for Biometric Applications to Privacy-Centric Password Testing | UiO | 
| Kai Arne Schröder Myklebust | Ecotoxicological Effect Prediction using a Tailored Knowledge Graph | UiO | 
| Johanna Johansen | Towards Making Privacy Usable | UiO | 
| Francisco Ramón (Kiko) Fernández Reyes | Abstractions to Control the Future | U. Uppsala | 
| Hendrik Maarand | Operational Semantics of Weak Sequential Composition | Tallinn U. of Technology | 
| Seray Fayyad | Measurable Security for Systems Built upon Internet of Things | UiO | 
| Muhammad Zohaib Zafar Iqbal | Environment Model-Based System Testing of Real-Time Systems | UiO | 
| Rudolf Schlatte | Passive Testing with Parallel Object-Oriented Software Models | U. Graz | 
| Joachim Klein | Compositional Synthesis and Most General Controllers | TU Dresden | 
| Ingrid Yu | Type Safety for Distributed, Concurrent Programs with Class Upgrades | UiO | 
| Xuedon Liang | QoS Provisioning for Wireless Sensor Networks: Algorithms, Protocols and Modeling | UiO | 
| Anders Moen Hagalisletto | Automated support for the design and analysis of security protocols | UiO | 
Third semester evaluation
| Name | year | 
|---|---|
| Riccardo Sieve | 2025 | 
| Åsmund Aqissiaq Arild Kløvstad | 2024 | 
| Malte Hansen | 2023 | 
| Tobias John | 2023 | 
| Chinmayi Prabhu Baramashetru | 2022 | 
| Mateusz Zych | 2022 | 
| Robert Chetwyn | 2022 | 
| Andre Büttner | 2022 | 
| Johanna Johansen | 2020 | 
| Marius Gaute | 2020 | 
| Hamed Arshad | 2019 | 
| Lars Tveito | 2018 | 
| Daniel Bakkelund | 2018 | 
| Shiji Bijo | 2014 | 
Master thesis supervision
See also the extra webpages for completed and for ongoing theses for more information for some of the theses
Ongoing
| Name | Title of the thesis | 
|---|---|
| Magnus Økstad | Distributed Data Structures with Dependent Types | 
| Mohamed Hocein el Morabeti | Developing a Verification Tool for Concurrent Software in Modern Programming Languages (working title) | 
| Sean Amaury Lapalus | A Domain-Specific Language for Real-Estate Floor Plans (working title) | 
| Jakob Konrad Hansen | |
| Jakub Wasylków | Verification software for concurrent software written in C using GCD (working title) | 
| Sebastian Max Sjøvoll Kingston | Automated Refactoring of Test Suites in Python | 
Finished (including also ``study-theses’’ and diploma theses (Diplomarbeiten and Studienarbeiten))
Opponent for master defenses
| Name | title | 
|---|---|
| Julian Ihsan Alsemanni | Microsoft Orleans vs Akka.NET: Scalability and Fault Tolerance in Distributed Systems | 
| Jonas Lien Sampaio da Silva | Building Language Servers by Extracting Grammars and Semantics from Code Examples | 
| Tobias Hallingstad | Graph-Based Decompilation Using Neural Networks | 
| Trieri Gashi | Clear Programming Language: Connecting Refinement Types With Generators for Property-Based Testing | 
| Sophie Adeline Solheim Bosio | Contra: Automatically Finding Algebraic Counterexamples to Property-Based Tests | 
| Sergey Jakobsen | Psnodig: Converting Source Code to Pseudocode | 
| Mads Bårvåg Nesse | Axiom based testing in Java | 
| Martin Toft | Solving Large Combinatorial Optimization Problems Using Tensor Network Quantum Circuit Simulations of QAOA | 
| Nasir Abdi Awed | Towards integrating static code analysis and hybrid fuzzing for more efficient bug detection | 
| Krishant Pokharel | Agile and Secure Softwre Development. An extension of XP to build secure software | 
| Marlen Jarholt | Frog: Functions for ontologies. An extension for the OTTR-framework | 
| Namrah Azam | Attack scenarios on AMI that Compromise Human Behaviour and Cellular Networks | 
| Fredrik Rømming | Learning to Reason | 
| Anastasia Orishchenko | Towards Safety Standard Compliance of IoT Software Systems Using Modelling and Verification with DCR Graphs | 
| Anders Jakob Sivesind | Community Coordinated Artificial Intelligence. Towards a unified framework for the democratisation of AI | 
| Ugur Bayram | Semantic Attribute-based Access Control. Developing an Access Control solution for IoT Gateways applied to Smart Home Care | 
| Benjamin Oliver | Equality Preprocessing in Connection Calculi | 
| Kudakwashe Chambwe | Model-based Secure Software Engineering using UMLsec applied to Assisted Living and Home Care | 
| Manoj Upadhaya | Process Modelling Based on Smart Home System Using JBoss | 
| Subhash Neupane | Modeling Smart Home Processes unsing the Event-Based Modelling Language Tools of DCR graph | 
| Sigurd Kittilsen | Partitioning {0,1,…,r} into m subsets of equal sum | 
| Aulon Mujaj | A comparison of secure messaging protocols and implementation | 
| Lars Kristian Maron Telle | An Exploration into Goodstein Sequences and Hydra Games | 
| Andreas R. Askeland | Investigations in complexity theory related to the space hierarchy problem | 
| Simen Heggestøl | Visual Query formulation and subclass reasoning for linked open data | 
| Marius Standhaug | An R2RML mapping management API in Java | 
| Wenlu Zhang | Formal moddeling and analysis of the CANopen protocol in full Maude |