Publications

Our interdisciplinary research is reflected in the outstanding publications of KASTEL Security Research Labs.

Dec 04, 2023
Cryptography

Practically Efficient Private Set Intersection From Trusted Hardware with Side-Channels

Dörre, F.; Mechler, J.; Müller-Quade, J.
2023. Advances in Cryptology – ASIACRYPT 2023 – 29th International Conference on the Theory and Application of Cryptology and Information Security, Springer Verlag

Publication
Nov 27, 2023
Decentralized Systems

ABCperf: Performance Evaluation of Fault Tolerant State Machine Replication Made Simple: Demo Abstract

Spannagel, T.; Leinweber, M.; Castro, A.; Hartenstein, H.
2023. Proceedings of the 24th International Middleware Conference Demos, Posters and Doctoral Symposium, 35–36, Association for Computing Machinery (ACM).

Publication
Nov 15, 2023
Legal Informatics Societal Security

Online-Bundestagswahlen – Verfassungsrechtliche Grenzen und technische Herausforderungen

Gutjahr, A.; Spiecker gen. Döhmann, I.; Volkamer, M.
2023. Computer und Recht, 767–776

Publication
Nov 15, 2023
Cryptography Privacy

Universally Composable Auditable Surveillance

Fetzer, V.; Klooß, M.; Müller-Quade, J.; Raiber, M.; Rupp, A.
2023. ASIACRYPT 2023, 4th – 8th December 2023, 145, Springer Verlag

Publication
Nov 15, 2023
Human-Centered IT Security Privacy Usable Security

“I just stopped using one and started using the other”: Motivations, Techniques, and Challenges When Switching Password Managers

Munyendo, C. W.; Mayer, P.; Aviv, A. J. 2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3123–3137, Association for Computing Machinery (ACM).

Publication
Nov 14, 2023
Legal Informatics Privacy

How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Noti-fication Study Reveals Diverse Circumstances and Challenges

Spiecker genannt Döhmann, I.; Stöver, A.; Gerber, N.; Pridöhl, H.; Maass, M.; Bretthauer, S.; Hollick, M.; Herrmann, D.
2023. Proceedings on privacy enhancing technologies, 2023, 251–264.

Publication
Nov 14, 2023
Legal Informatics

Geschlechtergerechtigkeit im Spannungsfeld von nachhaltiger und digitaler Transformation – eine interdisziplinäre Annäherung

Spiecker genannt Döhmann, I.; Ohde, F.; Blättel-Mink, B.; Draude, C.
2023. Gender, (2), 132–147

Publication
Nov 02, 2023
Network Security

SAFFIRRE: Selective Aggregate Filtering Through Filter Rule Refinement

Heseding, H.; Bachmann, F.; Bien, P. S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), Izmir, 4th-06th October 2023, 42–46, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 31, 2023
Human-Centered IT Security Privacy

Human-Centered Design for Data-Sparse Tailored Privacy Information Provision

Goram, M.; Dehling, T.; Morsbach, F.; Sunyaev, A.
2023. Human Factors in Privacy Research. Ed.: N. Gerber, 283–298, Springer International Publishing.

Publication
Oct 31, 2023
Privacy Usable Security

Awareness, Intention, (In)Action: Individuals’ Reactions to Data Breaches

Mayer, P.; Zou, Y.; Lowens, B. M.; Dyer, H. A.; Le, K.; Schaub, F.; Aviv, A. J.
2023. ACM Transactions on Computer-Human Interaction, 30 (5), 1–53.

Publication
Oct 30, 2023
Usable Security

Encouraging Organisational Information Security Incident Reporting

Ballreich, F. L.; Volkamer, M.; Müllmann, D.; Berens, B. M.; Häußler, E. M.; Renaud, K. V.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 224–236, Association for Computing Machinery (ACM).

Publication
Oct 30, 2023
Economic Security Trustworthy Internet Technologies

The Future of Enterprise Information Systems

Sunyaev, A.; Dehling, T.; Strahringer, S.; Da Xu, L.; Heinig, M.; Perscheid, M.; Alt, R.; Rossi, M.
2023. Business & Information Systems Engineering.

Publication
Oct 29, 2023
Cryptography

Composable Long-Term Security with Rewinding

Berger, R. M.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
2023. Theory of Cryptography. 21th International Conference, TCC 2023. Proceedings, Part 1. Ed.: G. Rothblum, Springer Verlag

Publication
Oct 16, 2023
Usable Security

Influence of URL Formatting on Users’ Phishing URL Detection

Mossano, M.; Kulyk, O.; Berens, B. M.; Häußler, E. M.; Volkamer, M.
2023. Proceedings of the 2023 European Symposium on Usable Security, 318–333, Association for Computing Machinery (ACM).

Publication
Oct 09, 2023
Energy Systems Security

A new hybrid risk assessment process for cyber security design of smart grids using fuzzy analytic hierarchy processes

Canbolat, S.; Elbez, G.; Hagenmeyer, V.
2023. Automatisierungstechnik.

Publication
Oct 06, 2023
Network Services Privacy

Brief Announcement: Let It TEE: Asynchronous Byzantine Atomic Broadcast with n ≥ 2f+1

Leinweber, M.; Hartenstein, H.
2023. 37th International Symposium on Distributed Computing (DISC 2023). Ed.: R. Oshman, 43:1–43:7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (LZI).

Publication
Oct 04, 2023
Network Security

eMinD: Efficient and Micro-Flow Independent Detection of Distributed Network Attacks

Kopmann, S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), 159–167, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 03, 2023
Societal Security Usable Security

Voter Perception of Cast-as-Intended Verifiability in the Estonian I-Vote Protocol

Hilt, T.; Sein, K.; Mällo, T.; Willemson, J.; Volkamer, M.
2023. E-Vote-ID 2023

Publication
Sep 27, 2023
Dependability Network Services

Investigating the Role of Computing Education for Informed Usage Decision-Making

Gebhardt, L.; Leinweber, M.; Michaeli, T.
2023. WiPSCE ’23: The 18th WiPSCE Conference on Primary and Secondary Computing Education Research Cambridge United Kingdom September 27 – 29, 2023. Ed.: S. Sentance, 1–2, Association for Computing Machinery (ACM).

Publication
Sep 26, 2023
Legal Informatics

§ 20: Digitalisierung, Informationsgesellschaft, Massendaten

Spiecker genannt Döhmann, I.
2023. Handbuch des Staatsrechts, Band I: Grundlagen, Wandel und Herausforderungen. Hrsg.: Uwe Kischel, Hanno Kube, 899–934, C.F. Müller

Publication
Sep 25, 2023
Cyber Physical Systems Process Security

Labeling NIDS Rules with MITRE ATT&CK Techniques using ChatGPT

Daniel, N.; Kaiser, F. K.; Dzega, A.; Elyashar, A.; Puzis, R.
2023. 4th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection

Publication
Sep 19, 2023
Legal Informatics

Article-by-Article Commentary on the European General Data Protection Regulation

Papakonstantinou, V.; Hornung, G.
2023. (P. De Hert & I. Spiecker genannt Döhmann, Hrsg.), Nomos

Publication
Sep 18, 2023
Machine Learning Production Security

Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models

Borcherding, A.; Morawetz, M.; Pfrang, S.
2023. Sensors, 23 (18), Art.-Nr.: 7864.

Publication
Sep 12, 2023
Network Security Production Security

Towards Self-learning Industrial Process Behaviour from Payload Bytes for Anomaly Detection

Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA), Sinaia, Romania, 12-15 September 2023, Institute of Electrical and Electronics Engineers (IEEE). 

Publication
Sep 08, 2023
Dependability Software Engineering

Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents

Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Architecture. Ed.: B. Tekinerdogan, 37–53, Springer Nature Switzerland AG.

Publication
Sep 06, 2023
Decentralized Systems Dependability

Static Capability-Based Security for Smart Contracts

Schiffl, J.; Weigl, A.; Beckert, B.
2023. 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 110 – 117, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 04, 2023
Privacy Usable Security

Zu Risiken und Anonymisierungen von Verhaltensbiometrie

Hanisch, S.; Todt, J.; Volkamer, M.; Strufe, T.
2023. Daten-Fairness in einer globalisierten Welt. Ed.: M. Friedewald, 423–444, Nomos Verlagsgesellschaft.

Publication
Sep 03, 2023
Societal Security Trustworthy Internet Technologies

Nutzerzentrierter Ansatz zur Vereinfachung des Auffindens von Security Policies

Aldag, L.; Ballreich, F.; Berens, B.; Volkamer, M.
2023. Mensch und Computer 2023, Gesellschaft für Informatik (GI)

Publication
Aug 28, 2023
Software Engineering

True Variability Shining Through Taxonomy Mining

König, C.; Rosiak, K.; Cleophas, L.; Schaefer, I.
2023. Proceedings of the 27th ACM International Systems and Software Product Line Conference – Volume A, 182–193, Association for Computing Machinery (ACM).

Publication
Aug 28, 2023
Mobility Systems Security Software Engineering

Continuous T-Wise Coverage

Pett, T.; Heß, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2023. SPLC ’23: Proceedings of the 27th ACM International Systems and Software Product Line Conference. Vol. A. Ed.: P. Arcaini, 87–98, Association for Computing Machinery (ACM).

Publication
Aug 17, 2023
Software Engineering

A Toolchain for Simulation Component Specification and Identification

Koch, S.; Reiche, F.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 75–89, Springer International Publishing.

Publication
Aug 10, 2023
Mobility Systems Security Modeling Software Engineering

Establishing a Benchmark Dataset for Traceability Link Recovery Between Software Architecture Documentation and Models

Fuchß, D.; Corallo, S.; Keim, J.; Speit, J.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops, Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 455–464, Springer International Publishing.

Publication
Jul 25, 2023
Network Security

Toward Joining DDoS Mitigation and Image Segmentation – Leveraging Computer Vision for Network Security

Kopmann, S.; Heseding, H.; Zitterbart, M.
2023. Datenschutz und Datensicherheit – DuD, 47 (8), 475–477.

Publication
Jul 25, 2023
Legal Informatics

Abschreckungseffekte und Überwachungsgefühl im Datenschutzrecht. Auswirkungen auf betroffene Personen

Spiecker genannt Döhmann, I.; Büscher, M.; Gutjahr, A.; Hornung, G.; Schindler, S.; Selzer, A.; Stummer, S.; Wilmer, T.; Zurawski, P.
2023. Datenschutz und Datensicherheit, 503–512

Publication
Jul 22, 2023
Dependability

A Classification of Software-Architectural Uncertainty Regarding Confidentiality

Hahner, S.; Seifermann, S.; Heinrich, R.; Reussner, R.
2023. E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, 139–160, Springer International Publishing.

Publication
Jul 18, 2023
Communication Security Network Security

TRUST: Transparent Redundancy for UDP STreams

Neumeister, F.; Göckel, M.; Zitterbart, M.
2023. IEEE 21st International Conference on Industrial Informatics (INDIN 2023), 7 S., Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jul 17, 2023
Dependability Software Engineering

Tool-Based Attack Graph Estimation and Scenario Analysis for Software Architectures

Walter, M.; Reussner, R.
2023. Software Architecture : ECSA 2022 Tracks and Workshops. Ed.: T. Batista, 45–61, Springer International Publishing.

Publication
Jul 10, 2023
IT Security Privacy

SoK: Differentially Private Publication of Trajectory Data

Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies, 496–516, De Gruyter.

Publication
Jul 10, 2023
Privacy

Understanding person identification via gait

Hanisch, S.; Muschter, E.; Chatzipanagioti, A.; Li, S.-C.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs)

Publication
Jul 10, 2023
Human-Centered IT Security Privacy

“Surprised, Shocked, Worried”: User Reactions to Facebook Data Collection from Third Parties

Arias-Cabarcos, P.; Kjalili, S.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open

Publication
Jun 30, 2023
Dependability Software Engineering

Investigating Software Engineering Artifacts in DevOps Through the Lens of Boundary Objects

Matthies, C.; Heinrich, R.; Wohlrab, R.
2023. EASE ’23: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 12–21, Association for Computing Machinery (ACM).

Publication
Jun 27, 2023
Production Security Software Engineering

Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0

Walter, M.; Hahner, S.; Bureš, T.; Hnětynka, P.; Heinrich, R.; Reussner, R.
2023. at – Automatisierungstechnik, 71 (6), 443–452.

Publication
Jun 20, 2023
Privacy Trustworthy Internet Technologies

A design theory for transparency of information privacy practices

Dehling, T.; Sunyaev, A.
2023. Information Systems Research, accepted manusript, 1–45.

Publication
Jun 16, 2023
Legal Informatics

Neue alte Entwicklungen für das Verwaltungsrecht: Von Kooperation und Dreiecksverhältnissen zur Konfliktbefriedung und Vertrauensbildung im Wirtschaftsverwaltungs- und Gesundheitsrecht

Spiecker genannt Döhmann, I.
2023. Schutz des Individuums durch das Recht: Festschrift für Professor Rainer Hofmann zum 70. Geburtstag. Bd.2. Hrsg.: Philipp B. Donath, Alexnader Heger, Moritz Malkmus, Orhan Bayrak, 1135–1150, Springer

Publication
Jun 15, 2023
Legal Informatics

Governance Foundations for the European Cybersecurity Community

Spiecker genannt Döhmann, I.; Ferreira, A.; Wintzingerode, C. von; Müllmann, D.; Benzekri, A.; Cros, P.-H.; Prochilo, E.
2023. Digital Sovereignty in Cyber Security: New Challenges in Future Vision: First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers, 132–148, Springer Nature Switzerland AG

Publication
Jun 13, 2023
Dependability Verification

Reconstructing z3 proofs in KeY: There and back again

Pfeifer, W.; Schiffl, J.; Ulbrich, M.
2021. Proceedings of the 23rd ACM International Workshop on Formal Techniques for Java-like Programs : 23rd ACM International Workshop on Formal Techniques for Java-Like Programs, FTfJP 2021, co-located with ECOOP/ISSTA 2021, Online, 13 July 2021 – null, 24–31, Association for Computing Machinery (ACM).

Publication
May 13, 2023
Dependability Software Engineering

Model-based Confidentiality Analysis under Uncertainty

Hahner, S.; Bitschi, T.; Walter, M.; Bureš, T.; Hnětynka, P.; Heinrich, R.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), 256–263, Institute of Electrical and Electronics Engineers (IEEE).

Publication
May 12, 2023
Privacy Usable Security

Manipulative Designs von Cookies – Manipulative Designs von Cookies Tricks, um die Einwilligung von Website-Besucherinnen und -Besuchern zum Sammeln und Auswerten von Nutzerdaten über Cookies zu erhalten

Lehr, F.; Dietmann, H.; Krisam, C.; Volkamer, M.
2022. Datenschutz und Datensicherheit – DuD, 46 (5), 296–300.

Publication
May 11, 2023
Privacy Usable Security

Cookie-Nutzung nach Inkrafttreten des TTDSG – Zur Datenschutzkonformität des Cookie-Einsatzes auf den meistgenutzten deutschen Websites

Bohlender, M.; Dietmann, H.; Volkamer, M.
2023. Datenschutz und Datensicherheit – DuD, 47 (5), 283–288.

Publication
May 07, 2023
Cryptography

Sender-binding Key Encapsulation

Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.

Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I. Ed.: A. Boldyreva, Springer Nature Switzerland AG

May 05, 2023
Decentralized Systems Network Services

On Extend-Only Directed Posets and Derived Byzantine-Tolerant Replicated Data Types

Jacob, F.; Hartenstein, H.
2023. PaPoC ’23: 10th Workshop on Principles and Practice of Consistency for Distributed Data Rome Italy 8 May 2023.Ed.: E. Gonzalez Boix, 63–69, Association for Computing Machinery (ACM).

Publication
May 03, 2023
Energy Systems Security Network Security

Early Attack Detection for Securing GOOSE Network Traffic

Elbez, G.; Nahrstedt, K.; Hagenmeyer, V.
2023. IEEE Transactions on Smart Grid.

Publication
Apr 19, 2023
Privacy

A Survey on Privacy-Preserving Electronic Toll Collection Schemes for Intelligent Transportation Systems

Adavoudi Jolfaei, A.; Boualouache, A.; Rupp, A.; Schiffner, S.; Engel, T.
2023. IEEE Transactions on Intelligent Transportation Systems, 24 (9), 8945–8962.

Publication
Apr 18, 2023
Human-Centered IT Security Privacy

BrainNet: Improving Brainwave-based Biometric Recognition with Siamese Networks

Fallahi, M.; Strufe, T.; Arias-Cabarcos, P.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications (PerCom), 53–60, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Apr 01, 2023
Legal Informatics

Intelligente Verkehrssysteme – IT-Sicherheit in offenen Infrastrukturen Teil 2

Sterz, L.; Werner, C.; Raabe, O.
2023. Recht der Datenverarbeitung, 39 (2), 97–105

Publication
Mar 13, 2023
Modeling Software Engineering

Automatic Derivation of Vulnerability Models for Software Architectures

Kirschner, Y. R.; Walter, M.; Bossert, F.; Heinrich, R.; Koziolek, A.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), L’Aquila, Italy, 13-17 March 2023, 276–283, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 13, 2023
Human-Centered IT Security Privacy

Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices

Arias-Cabarcos, P.; Fallahi, M.; Habrich, T.; Schulze, K.; Becker, C.; Strufe, T.
2023. ACM Transactions on Privacy and Security.

Publication
Mar 13, 2023
Communication Security Privacy Production Security

Applying Differential Privacy to Medical Questionnaires

Appenzeller, A.; Terzer, N.; Philipp, P.; Beyerer, J.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 608–613, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 11, 2023
Legal Informatics

Dienstleistungsroboter im Handel: Einsatzmöglichkeiten und verantwortungsbewusster Einsatz

Spiecker genannt Döhmann, I.; Stock-Homburg, R.; Knof, M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; David, K.; Wendt, J.; Stryk, O. von; Hannig, M.
2023. L. Binckebanck, R. Elste & A. Haas (Hrsg.), Digitalisierung im Vertrieb : Strategien zum Einsatz neuer Technologien in Vertriebsorganisationen / Lars Binckebanck, Rainer Elste, Alexander Haas, 533–568, Springer

Publication
Mar 03, 2023
Software Engineering

Immutability and Encapsulation for Sound OO Information Flow Control

Runge, T.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. ACM Transactions on Programming Languages and Systems, 45 (1), Art.Nr. 3.

Publication
Feb 22, 2023
Privacy Production Security

SWaTEval: An Evaluation Framework for Stateful Web Application Testing

Borcherding, A.; Penkov, N.; Giraud, M.; Beyerer, J.
2023. Proceedings of the 9th International Conference on Information Systems Security and Privacy – ICISSP, 430–441, SciTePress.

Publication
Feb 20, 2023
Dependability Software Engineering

Identifizierung von Vertraulichkeitsproblemen mithilfe von Angriffsausbreitung auf Architektur

Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Engineering 2023. Hrsg.: R. Engels, 123–124, Gesellschaft für Informatik (GI)

Publication
Feb 02, 2023
Applied Informatics Software Engineering

Dynamic Access Control in Industry 4.0 Systems

Heinrich, R.; Seifermann, S.; Walter, M.; Hahner, S.; Reussner, R.; Bureš, T.; Hnětynka, P.; Pacovský, J.
2023. Digital Transformation. Ed.: B. Vogel-Heuser, 143–170, Springer Vieweg.

Publication
Jan 26, 2023
Legal Informatics

Die Zukunft der Gesundheitsberufe in Bildung und Migration

Spiecker gen. Döhmann, I.; Lehner, R.
2023. Lang

Publication
Jan 17, 2023
Decentralized Systems Usable Security

Decentralizing Watchtowers for Payment Channels using IPFS

Bonisch, H.; Grundmann, M.
2022. 2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW), 27–32, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jan 13, 2023
Privacy Usable Security

SMILE – Smart eMaIl Link Domain Extractor

Mossano, M.; Berens, B.; Heller, P.; Beckmann, C.; Aldag, L.; Mayer, P.; Volkamer, M.
2022. Computer Security. ESORICS 2021 International Workshops – CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers. Ed.: S. Katsikas, 403–412, Springer International Publishing.

Publication
Jan 04, 2023
Communication Security Network Security

Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph

Kaiser, F. K.; Dardik, U.; Elitzur, A.; Zilberman, P.; Daniel, N.; Wiens, M.; Schultmann, F.; Elovici, Y.; Puzis, R.
2023. IEEE transactions on dependable and secure computing, 1–17.

Publication
Jan 01, 2023
Privacy Usable Security

How to Effectively Communicate Benefits of Introducing a Modern Password Policy to Employees in Companies

Christmann, M.; Mayer, P.; Volkamer, M.
2021. Eighteenth Symposium on Usable Privacy and Security, August 7–9, 2022, Boston, MA, USA

Publication
Jan 01, 2023
Human-Centered IT Security Privacy Societal Security

“Healthy surveillance”: Designing a concept for privacy-preserving mask recognition AI in the age of pandemics

Kühl, N.; Martin, D.; Wolff, C.; Volkamer, M.
2021. Hawaii International Conference on Systems Sciences (HICSS-54), January 5-8, 2021

Publication
Jan 01, 2023
Legal Informatics Privacy

Roboter im Supermarkt – Eine Betrachtung haftungs- und datenschutzrechtlicher Probleme beim Einsatz von Robotern im Einzelhandel

Ebert, A.; Busch, P.; Spiecker genannt Döhmann, I.; Wendt, J.
2023. Zeitschrift für Product Compliance, (1), 16–29

Publication
Dec 21, 2022
Economic Security Quantification

Weighted attack graphs and behavioral cyber game theory for cyber risk quantification

Kaiser, F. K.; Wiens, M.; Schultmann, F.
2022. Advances in Cyber Security and Intelligent Analytics. Ed.: A. Verma, 27–42, CRC Press-Taylor & Francis Group

Publication
Dec 19, 2022
Cyber Physical Systems Modeling Software Engineering

Uncertainty in coupled models of cyber-physical systems

Acosta, M.; Hahner, S.; Koziolek, A.; Kühn, T.; Mirandola, R.; Reussner, R.
2022. Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 569–578, Association for Computing Machinery (ACM).

Publication
Dec 19, 2022
Software Engineering

Token-based plagiarism detection for metamodels

Sağlam, T.; Hahner, S.; Wittler, J. W.; Kühn, T.
2022. MODELS ’22: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion ProceedingsOctober 2022, 138–141, Association for Computing Machinery (ACM).

Publication
Dec 17, 2022
Machine Learning System Security

How to Protect the Public Opinion Against New Types of Bots?

Reubold, J. L.; Escher, S. C.; Wressnegger, C.; Strufe, T.
2022. IEEE International Conference on Big Data

Publication
Dec 16, 2022
Production Security

Secure Provisioning of OPC UA Applications Using the Asset Administration Shell

Meier, D.; Vogl, J.; Kohnhäuser, F.; Beyerer, J.
2023. 2022 IEEE 17th Conference on Industrial Electronics and Applications (ICIEA), 144–149, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Dec 15, 2022
Legal Informatics Mobility Systems Security

Intelligente Verkehrssysteme – IT-Sicherheit in offenen Infrastrukturen Teil 1

Sterz, L.; Werner, C.; Raabe, O.
2022. Recht der Datenverarbeitung, 2022 (6), 291–299

Publication
Dec 05, 2022
Human-Centered IT Security Privacy

Privacy and Utility of Private Synthetic Data for Medical Data Analyses

Appenzeller, A.; Leitner, M.; Philipp, P.; Krempel, E.; Beyerer, J.
2022. Applied Sciences, 12 (23), Article no: 12320.

Publication
Dec 05, 2022
Legal Informatics

Ein Netzwerk für Europas Cybersicherheit

Wintzingerode, C. von; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (10), 690–695

Publication
Dec 02, 2022
Legal Informatics Societal Security

Meldepflicht von Mitarbeitenden bei IT Sicherheits- und Datenschutzvorfällen Betrachtung möglicher arbeitsrechtlicher Konsequenzen

Müllmann, D.; Volkamer, M.
2021. Zeitschrift für Datenschutz, 11 (1), 8–13

Publication
Dec 01, 2022
Legal Informatics

Grundlagen für ein gesetzliches IT-Sicherheitsrisikomanagement : Ansätze zur Vereinheitlichung von Rollenmodell, Risikomanagement und Definitionen für das IT-Sicherheitsrecht

Werner, C.; Brinker, N.; Raabe, O.
2022. Computer und Recht, 38 (12), 817–824.

Publication
Nov 30, 2022
Dependability Societal Security

Why is Online Voting Still Largely a Black Box

Kirsten, M.; Volkamer, M.; Beckert, B.
2022

Publication
Nov 30, 2022
IT Security Privacy

On the Privacy–Utility Trade-Off in Differentially Private Hierarchical Text Classification

Wunderlich, D.; Bernau, D.; Aldà, F.; Parra-Arnau, J.; Strufe, T.
2022. Applied Sciences, 12 (21), Art.-Nr.: 11177.

Publication
Nov 23, 2022
Communication Security Quantification

Sharp: Short Relaxed Range Proofs

Couteau, G.; Goudarzi, D.; Klooß, M.; Reichle, M.
2022. CCS ’22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Ed.: H. Yin Conference: CCS ’22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA November 7 – 11, 2022, 609–622, Association for Computing Machinery (ACM).

Publication
Nov 18, 2022
Legal Informatics Privacy

Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Security Gründen

Müllmann, D.; Veit, M.; Volkamer, M.
2022. Informatik 2022. Hrsg.: D. Demmler, 601–615, Gesellschaft für Informatik (GI).

Publication
Nov 08, 2022
Legal Informatics Usable Security

Insights on Data Sensitivity from the Technical, Legal and the Users’ Perspectives — Practical suggestions on how to raise more awareness for the assumed exercise of informational self-determination

Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Computer law review international, 22 (1), 8–15.

Publication
Nov 07, 2022
Cryptography

Anonymous Whistleblowing over Authenticated Channels

Agrikola, T.; Couteau, G.; Maier, S.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Ed.: E. Kiltz, 685–714, Springer Nature Switzerland AG.

Publication
Oct 31, 2022
Legal Informatics Privacy

A Model-Based Framework for Simplified Collaboration of Legal and Software Experts in Data Protection Assessments

Boltz, N.; Sterz, L.; Gerking, C.; Raabe, O.
2022. INFORMATIK 2022, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik. Ed.: D. Demmler, 521–532, Gesellschaft für Informatik (GI).

Publication
Oct 31, 2022
Decentralized Systems Network Services

Grasping the Concept of Decentralized Systems for Instant Messaging

Gebhardt, L.; Leinweber, M.; Jacob, F.; Hartenstein, H.
2022. Proceedings of the 17th Workshop in Primary and Secondary Computing Education, Art.-Nr. 10, Association for Computing Machinery (ACM).

Publication
Oct 27, 2022
Decentralized Systems Network Services

Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network

Grundmann, M.; Amberg, H.; Baumstark, M.; Hartenstein, H.
2022. Financial Cryptography and Data Security – 26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers. Ed.: I. Eyal, 694–704, Springer International Publishing.

Publication
Oct 25, 2022
Cyber Physical Systems System Security

Early Detection of GOOSE Denial of Service (DoS) Attacks in IEC 61850 Substations

Elbez, G.; Nahrstedt, K.; Hagenmeyer, V.
2022. IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids 2022.

Publication
Oct 22, 2022
Dependability Software Engineering

Attuning Adaptation Rules via a Rule-Specific Neural Network

Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Proceedings. Vol. 3. Ed.: T. Margaria, 215–230, Springer Nature Switzerland AG.

Publication
Oct 22, 2022
Dependability Verification

A Refactoring for Data Minimisation Using Formal Verification

Lanzinger, F.; Ulbrich, M.; Weigl, A.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 345–364, Springer Nature Switzerland AG.

Publication
Oct 20, 2022
Decentralized Systems Mobility Systems Security Network Services

On the Applicability of Payment Channel Networks for Allocation of Transport Ticket Revenues

Grundmann, M.; von Zastrow-Marcks, O.; Hartenstein, H.
2022. Proceedings – International Conference on Computer Communications and Networks, ICCCN : 31st International Conference on Computer Communications and Networks, ICCCN 2022, Virtual, Online, 25 – 28 July 2022, 7 S., Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 19, 2022
Cryptography IT Security Privacy

La Publicación de Trayectorias: un Estudio sobre la Protección de la Privacidad

Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2022. Proceedings of the XVII Spanish Meeting on Cryptology and Information Security (RECSI), Santader, 19th – 21st October, 2022.

Publication
Oct 19, 2022
Applied Informatics Legal Informatics

Die EU als Trendsetter weltweiter KI-Regulierung: Der Kommissionsentwurf für eine KI-Verordnung der EU

Ebert, A.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (16), 1188–1193

Publication
Oct 17, 2022
Verification

Towards a Usable and Sustainable Deductive Verification Tool

Beckert, B.; Bubel, R.; Hähnle, R.; Ulbrich, M.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 281–300, Springer Nature Switzerland AG.

Publication
Oct 12, 2022
Societal Security Usable Security

Individual Verifiability with Return Codes: Manipulation Detection Efficacy

Thürwächter, P. T.; Volkamer, M.; Kulyk, O.
2022. Electronic Voting – 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4–7, 2022, Proceedings. Ed.: R. Krimmer, 139–156, Springer International Publishing.

Publication
Oct 10, 2022
IT Security Network Security

Efficient Public Verification of Confidential Supply-Chain Transactions

Becher, K.; Schäfer, M.; Schropfer, A.; Strufe, T.
2022. 2022 IEEE Conference on Communications and Network Security (CNS), 308–316, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 10, 2022
Privacy Usable Security

Shoulder-Surfing Resistant Authentication for Augmented Reality

Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Nordic Human Computer Interaction Conference (NordiCHI ’22), Art.Nr. 29, ACM Digital Library.

Publication
Oct 07, 2022
Cryptography

Fiat-Shamir Transformation of Multi-round Interactive Proofs

Attema, T.; Fehr, S.; Klooß, M.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Ed.: E. Kiltz, 113–142, Springer Nature Switzerland AG.

Publication
01 / 03