Aditya Oak M.Sc.

Reactive Software Systems


work +49 6151 16-21363

Work S2|02 A222
Hochschulstraße 10
64289 Darmstadt

I am a PhD student in the Reactive Programming Group. My research interests include Programming Languages and Software Engineering. I currently work on Language-based security for Distributed Systems under the project CROSSING.

I am also member of the Programming Group.


I am a member of the project E5 – Privacy-Aware Distributed Computation of the collaborative research center CROSSING. In this project, we are developing a privacy-aware distributed computing model that provides language-level support for different privacy-enhancing technologies (PETs).


Term Courses
Winter 2020/21
  • Advisor for the project course “Design and Implementation of Programming Languages”
Winter 2019/20
  • Teaching Assistant 'Concepts of Programming Languages'
Winter 2018/19
  • Teaching Assistant 'Concepts of Programming Languages'

Currently no items available.

  • Bachelor Thesis

    Trusted Execution Environments –e.g. Intel SGX– provide a means to protect code and data from the system software. This allows performing private computations on untrusted third-party machines. This thesis explores the possibility of securing IoT stream processing using Intel SGX. The goal of the thesis is to develop a secure stream processing framework that seamlessly integrates Intel SGX and other privacy-preserving mechanisms to provide end-to-end data privacy in the presence of untrusted computing hosts.

    Examiner: Prof. Dr.-Ing. Mira Mezini

    Supervisor: Aditya Oak, M.Sc.

  • Bachelor Thesis

    Trusted Execution Environments like Intel SGX provide a secure computing environment to perform private computations. The goal of this thesis is to partition and run some popular Java applications (with privacy-sensitive partitions inside the SGX enclave) and assess the performance impact.

    Examiner: Prof. Dr.-Ing. Mira Mezini

    Supervisor: Aditya Oak, M.Sc.

  • Master Thesis

    Data privacy is a major concern in the design of distributed systems where data is processed by different machines that are not necessarily under the control of the same organization. In this setting, there is a concrete possibility of private data leaks which, e.g., in the case of medical data, can lead to catastrophic consequences. To tackle such privacy issues, recent generations of processors support trusted execution environments such as Intel SGX. Such systems provide isolated processing and memory storage functionalities for privacy preserving computations even when the OS and the rest of the infrastructure cannot be trusted – such as in the case of Cloud providers.

    Unfortunately, secure enclaves remain challenging to program and require programmers to interface with a low level API that does not fit with modern managed programming languages such as Java or Scala.


    This work involves implementing a high-level programming model in Java that supports computations within secure enclaves. The model allows programmers to annotate the parts of a Java program to be run inside the trusted environment. The compiler splits the program and the runtime executes it in distributed fashion as specified by the annotations. The programming model will be tested for performance and security by implementing suitable test cases.

    Examiner: Prof. Dr.-Ing. Mira Mezini

    Supervisor: Aditya Oak, M.Sc.


Loading data from TUbiblio…

Error on loading data

An error has occured when loading publications data from TUbiblio. Please try again later.

  • {{ year }}

    • ({{,4) }}):
      {{ publication.title }}. ({{ labels[publication.doc_status] }})
      In: {{ publication.book_title }}, {{ publication.number}} ({{ publication.journal_volume }}), {{ publication.volume }}, In: {{ publication.series }}, {{ publication.volume }}, ppp. {{ publication.pagerange }}, {{ publication.place_of_pub }}, {{ publication.publisher }}, {{ publication.institution }}, {{ publication.event_location }}, {{ publication.event_dates }}, ISSN: {{ publication.issn }}, ISBN: {{ publication.isbn }}, [{{ labels[publication.type]?labels[publication.type]:publication.type }}]
    • […]

Number of items in this list: {{ publicationsList.length }}
Only the {{publicationsList.length}} latest publications are displayed here.

View complete list at TUbiblio View this list at TUbiblio