Publications

Our interdisciplinary research is reflected in the outstanding publications of KASTEL Security Research Labs.

Jun 22, 2026
Software Engineering

Architecture in the Cradle: Early Warning of Architectural Decay with ArchGuard

Liu, H.; Fuchß, D.; Corallo, S.; Hummel, M.; Keim, J.; Hey, T.
2026. 23rd IEEE International Conference on Software Architecture (ICSA 2026), Institute of Electrical and Electronics Engineers (IEEE)

Publication
Apr 12, 2026
Artificial Intelligence Software Engineering

An Experience Report on a Pedagogically Controlled, Curriculum-Constrained AI Tutor for SE Education

Happe, L.; Fuchß, D.; Hüttner, L.; Marquardt, K.; Koziolek, A.
2026. Proceedings of the 48th International Conference on Software Engineering: Software Engineering Education and Training; Rio de Janeiro, Brasilien, 12.-18.04.2026, Association for Computing Machinery (ACM).

Publication
Mar 27, 2026
Artificial Intelligence Software Engineering

Leveraging Large Language Models for supporting Cyber Threat Analysis

Rybinski, Fabian; Schiefer, Gunther; Frister, Demian; Malekzadeh Mahani, Marzieh
1th 2025 International Conference on Recent Advances in Information Systems (2025), Pointe aux Piments, Mauritius, 10.09.2025 – 12.09.2025

Publication
Feb 27, 2026
Societal Security

“I found the text to be encouraging” – Evaluating Different Password Strength Calculator Designs

Doneva, R.; Hennig, A.; Mayer, P.
2026. Symposium on Usable Security and Privacy (USEC) 2026, 27 February 2026, San Diego, CA, USA. Ed.: K. Seamons.

Publication
Feb 27, 2026
Privacy Societal Security

From Matrix to Metrics: Introducing and Applying a Configuration Matrix to Evaluate DMARC Policies

Länge, T.; Ballreich, F. L.; Hennig, A.; Mayer, P.; Volkamer, M.
2026. Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2026 : Co-located with NDSS Symposium 2026, San Diego, CA, 23rd February – 27th February 2026.

Publication
Jan 30, 2026
Artificial Intelligence Software Engineering

A Research Roadmap for Augmenting Software Engineering Processes and Software Products with Generative AI

Amalfitano, D.; Metzger, A.; Autili, M.; Fulcini, T.; Hey, T.; Keim, J.; Pelliccione, P.; Scotti, V.; Koziolek, A.; Mirandola, R.; Vogelsang, A.
2026. ACM Transactions on Software Engineering and Methodology.

Publication
Jan 06, 2026
Trustworthy Internet Technologies

A Taxonomy of Collusion in Information Systems

Armbruster, K.; Kannengießer, N.; Beyene, M.; Ciolacu, G.; Sunyaev, A.
2026. Proceedings of the 59th Hawaii International Conference on System Sciences, Maui, HI, 6th-9th January 2026, 5663–5672

Publication
Jan 02, 2026
Economic Security Process Security

Improving disaster preparedness through public-private collaboration – dual-use warehouses for food supply

Löffel, M.; Diehlmann, F.; Zienau, A.; Lüttenberg, M.; Wiens, M.; Wagner, S. M.; Schultmann, F.
2026. Production Planning and Control, 1–25.

Publication
Jan 01, 2026
Legal Informatics Public Law

Comentário ao Art. 24 da LGPD

Gasiola, G. G.; Venturini, O.
2026. Lei Geral de Proteção de Dados Pessoais Comentada: Eds.: Mendes, Laura Schertel; Rosal, Isabela Maria; Fernandes, Elora, 552–558, Forense

Publication
Jan 01, 2026
Legal Informatics Public Law

Comentário ao Art. 23 da LGPD

Gasiola, G. G.; Venturini, O.
2026. Lei Geral de Proteção de Dados Pessoais Comentada: Eds.: Mendes, Laura Schertel; Rosal, Isabela Maria; Fernandes, Elora, 540–550, Forense

Publication
Dec 23, 2025
Human-Centered IT Security Privacy

Beyond gaze points: augmenting eye movement with brainwave data for multimodal user authentication in extended reality

Fallahi, M.; Arias-Cabarcos, P.; Strufe, T.
2026. Complex & Intelligent Systems, 12 (1), 39.

Publication
Dec 16, 2025
Legal Informatics

Enabling a Model-Driven Workflow for Ongoing Interdisciplinary Collaboration in Legal Threat Modeling

Boltz, N.; Sterz, L.; Raabe, O.; Gerking, C.
2025. Information & software technology

Publication
Dec 10, 2025
Software Engineering

Towards dynamic views on heterogeneous models – the NeoJoin view definition language

König, L.; Stickling, T.; Burger, E.
2025. Joint Proceedings of the STAF 2025 Workshops: OCL, OOPSLE, LLM4SE, ICMM, AgileMDE, AI4DPS, and TTC co-located with the International Conference on Software Technologies: Applications and Foundations (STAF 2025), CEUR-WS

Publication
Dec 08, 2025
Usable Security

Fix it – If you Can! Towards Understanding the Impact of Tool Support and Domain Owners’ Reactions to SSHFP Misconfigurations

Hennig, A.; Neef, S.; Mayer, P.
2025. Kapil Singh, Gianluca Stringhini, Nick Nikiforakis, 104682, Elsevier

Publication
Dec 08, 2025
Cryptography

Laconic Cryptography with Preprocessing

Bhadauria, R.; Döttling, N.; Hazay, C.; Lin, C.
2026. Advances in Cryptology – ASIACRYPT 2025 – 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part V. Ed.: G. Hanaoka, 228–261, Springer Nature Singapore.

Publication
Nov 28, 2025
Cyber Physical Systems

Axiomatization of Compact Initial Value Problems: Open Properties

Platzer, A.; Qian, L.
2025. 
Journal of the ACM, 72 (6), Art.-Nr.: 41.

Publication
Nov 22, 2025
Communication Security Privacy

Sabot: Efficient and Strongly Anonymous Bootstrapping of Communication Channels

Coijanovic, C.; Hetz, L.; Paterson, K. G.; Strufe, T.
2025. Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, Taipeh, 13th-17th October 2025, 558–572, Association for Computing Machinery (ACM).

Publication
Nov 18, 2025
Decentralized Systems Trustworthy Internet Technologies

On the Trade-Off between Degree of Decentralization and Scalability in Proof-of-Stake–based Blockchain Systems

Normann, F. von; Aliyu, M. M.; Kannengießer, N.; Le, L. B. Q.; Heinrich, R.; Sunyaev, A.
2025. 2025 7th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Zürich, 18th-21st November 2025, 1–9, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Nov 17, 2025
Decentralized Systems Network Services

Security of the Lightning Network: Model Checking a Stepwise Refinement with TLA+

Grundmann, M.; Hartenstein, H.
2025. 20th International Conference on Integrated Formal Methods, iFM 2025, Paris, 17th-21st November 2025, Springer

Publication
Nov 16, 2025
Cyber Physical Systems

Safe Temperature Regulation: Formally Verified and Real-World Validated

Isasa, C.; Abou El Wafa, N.; Gomes, C.; Larsen, P. G.; Platzer, A.
2026. Integrated Formal Methods – 20th International Conference, iFM 2025, Paris, France, November 19–21, 2025, Proceedings. Ed.: F. Damiani, 143–161, Springer Nature Switzerland.

Publication
Nov 06, 2025
Decentralized Systems

Price Oracle Accuracy Across Blockchains: A Measurement and Analysis

Gansäuer, R.; Ben Aoun, H.; Droll, J.; Hartenstein, H.
2025. Financial Cryptography and Data Security. FC 2025 International Workshops. Ed.: B. Haslhofer, 32–46, Springer Nature.

Publication
Nov 04, 2025
Software Engineering

Towards Bringing Vitruvius into the Cloud II: Against Attacks from the Internet

Armbruster, M.; Chebbi, F.; Weber, T.; Koziolek, A.
2025. Softwaretechnik-Trends, Gesellschaft für Informatik, Gesellschaft für Informatik (GI)

Publication
Nov 04, 2025
Societal Security

The whos, whats, and whys of issues related to personal data and data protection in open-source projects on GitHub

Hennig, A.; Schulte, L.; Herbold, S.; Kulyk, O.; Mayer, P.
2025. Empirical Software Engineering, 31 (1), 9.

Publication
Nov 04, 2025
Software Engineering

Generation of Checkpoints for Hardware Architecture Simulators

Weber, S.; Weber, L.; Weber, T.; Henß, J.; Heinrich, R.
2025. Softwaretechnik-Trends, Gesellschaft für Informatik (GI)

Publication
Nov 04, 2025
Machine Learning Software Engineering

Machine Learning Surrogate Models for Performance Prediction with Architectural Models

Weber, S.; Pace, V.; Weber, T.; Henß, J.; Heinrich, R.
2025. Softwaretechnik-Trends, Gesellschaft für Informatik (GI)

Publication
Nov 02, 2025
Software Engineering

HubLink: A Novel Question Answering Retrieval Approach over Knowledge Graphs

Kaplan, A.; Keim, J.; Schneider, M.; Reussner, R. H.
2025. RAGE-KG 2025: The Second International Workshop on Retrieval-Augmented Generation Enabled by Knowledge Graphs, co-located with ISWC 2025, November 2–6, 2025, Nara, Japan. Ed.: Jennifer D., CEUR-WS

Publication
Nov 01, 2025
Artificial Intelligence Robotics

Erklärbarkeit von KI‑Systemen unter der KI‑Verordnung — Vorgaben der KI‑VO für Hochrisiko-KI‑Systeme im Lichte aktueller Erklärverfahren aus dem Feld der Explainable AI (XAI)

Becker, M.; Birnstill, P.; Ebert, A.
2025. Computer und Recht, 41 (11), 701–708.

Publication
Oct 25, 2025
Artificial Intelligence Machine Learning Trustworthy Internet Technologies

Quest for quality: a review of design knowledge on gamified AI training data annotation systems

Krohmann, S.; Rank, S.; Schmidt-Kraepelin, M.; Thiebes, S.; Sunyaev, A.
2025. Behaviour & Information Technology, 1–26.

Publication
Oct 17, 2025
Software Engineering

How Toxic Can You Get? Search-based Toxicity Testing for Large Language Models

Corbo, S.; Bancale, L.; Gennaro, V. D.; Lestingi, L.; Scotti, V.; Camilli, M.
2025. IEEE Transactions on Software Engineering.

Publication
Oct 15, 2025
Legal Informatics

Offene und subkutane Zielkonflikte zwischen KI-VO und DSGVO – Das Zusammenspiel zwischen Vertrauenswürdigkeit von KI und Vertrauen in Datenverarbeitung als grundlegende Herausforderung

Winau, M.; Spiecker genannt Döhmann, I.
2025. Computer und Recht : CR ; Zeitschrift für die Praxis des Rechts der Informationstechnologien, (10), 647–654

Publication
Oct 15, 2025
Software Engineering

Proactive self-adaptation and assurance of explainable Human–Machine Teaming

Lestingi, L.; Bersani, M. M.; Camilli, M.; Mirandola, R.; Rossi, M.; Scandurra, P.
2026. Journal of Systems and Software, 232, Art.-Nr.: 112657.

Publication
Oct 13, 2025
Privacy

BFId: Identity Inference Attacks Utilizing Beamforming Feedback Information

Todt, J.; Morsbach, F.; Strufe, T.
2025. Proceedings of 32nd ACM SIGSAC Conference on Computer and Communications Security (CCS ’25), Taipei, October 13–17, 2025, Association for Computing Machinery (ACM).

Publication
Oct 13, 2025
Network Security

Feedback-driven Autonomous Data Set Labeling for Denial-of-Service Attack Traffic

Kopmann, S.; Lachos, D.; Zitterbart, M.
2025. 2025 IEEE 50th Conference on Local Computer Networks (LCN), Sydney, Australia, 13-16 October 2025, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 12, 2025
Mobility Systems Security Network Security

NOTHORG; A digital twin for ECU security testing

Wehmer, M.; Diestl, J.; Waibel, D.; Baumgart, I.
2025. Proceedings of the 2025 Cyber Security in CarS Workshop (CSCS ’25), 9 S., Association for Computing Machinery (ACM).

Publication
Oct 10, 2025
Modeling Software Engineering

Towards the Derivation of Encryption Rules for Encryption-Based Access Control for Delta-Based Model Representations — The DEBAC Approach

Weber, T.; Quellmalz, K.; Benz, L.; Weber, S.; Burger, E.; Reussner, R.
2025. Second International Workshop on Model Management (MoM), co-located with the 28th International Conference on Model Driven Engineering Languages and Systems (MODELS 2025), Grand Rapids, MI, 5th-10th October 2025, Institute of Electrical and Electronics Engineers (IEEE)

Publication
Oct 10, 2025
Artificial Intelligence Privacy

PETs and AI: Privacy Washing and the Need for a PETs Evaluation Framework (Dagstuhl Seminar 25112)

Cristofaro, E. De; Shrishak, K.; Strufe, T.; Troncoso, C.; Morsbach, F.
2025. Dagstuhl Reports, 15 (3), 77–93.

Publication
Oct 09, 2025
Software Engineering

X-by-Construction: Towards Ensuring Non-functional Properties in by-Construction Engineering

Kodetzki, M.; Bordis, T.; Potanin, A.; Schaefer, I.
2025. Proceedings of the 2025 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software, 99–115, Association for Computing Machinery (ACM).

Publication
Oct 09, 2025
Modeling Software Engineering

An Initial Exploration of MULTI Level Modeling for Model-Based Systems Engineering

Lange, A.; Cederbladh, J.; Feichtinger, K.; Weber, T.
2025. INCOSE International Symposium, 348–363.

Publication
Oct 06, 2025
Artificial Intelligence Cyber Physical Systems

Can Large Language Models Autoformalize Kinematics?

Kabra, A.; Laurent, J.; Bharadwaj, S.; Martins, R.; Mitsch, S.; Platzer, A.
2025. A. Irfan & D. Kaufmann (Hrsg.), Proceedings of the 25th Conference on Formal Methods in Computer-Aided Design – FMCAD 2025, Menlo Park, 6th-10th October 2025, TU Wien.

Publication
Oct 05, 2025
Software Engineering

What can we learn from other Domains – An exploratory process for the extension of a language based on cross-domain knowledge transfer

Jutz, B.; Zacouris, Z.; Weber, T.; Acosta, M.; Reussner, R.; Burger, E.
2025. Proceedings of the ACM/IEEE 28th International Conference on Model Driven Engineering Languages and Systems, Grand Rapids, MI, USA, 5th-10th October 2025, Institute of Electrical and Electronics Engineers (IEEE)

Publication
Oct 05, 2025
Modeling Software Engineering

Modeling the MoM 2025 Satellite Configuration Challenge with Vitruvius

Jutz, B.; Weber, T.; Lange, A.; Dehghani, R.; Jiang, B.; Armbruster, M.; Feichtinger, K.; Hagel, N.; Kaushik, M.; König, L.; Mazkatli, M.; Minhas, M. A.; Neumann, D.; Burger, E.; Koziolek, A.; Reussner, R.
2025. Second International Workshop on Model Management (MoM), co-located with the 28th International Conference on Model Driven Engineering Languages and Systems (MODELS 2025), Grand Rapids, MI, 5th-10th October 2025, Institute of Electrical and Electronics Engineers (IEEE)

Publication
Oct 05, 2025
Machine Learning

Runtime Safety Monitoring of Deep Neural Networks for Perception: A Survey

Schotschneider, A.; Pavlitska, S.; Zöllner, M.
2025. IEEE International Conference on Systems, Man, and Cybernetics (SMC 2025), Institute of Electrical and Electronics Engineers (IEEE)

Publication
Oct 05, 2025
Modeling Software Engineering

How and Why is Change Modeled? – A Scoping Literature Review

Weber, T.; Cederbladh, J.; Weber, S.; Lange, A.; Cicchetti, A.; Reussner, R.
2025. Models and Evolution Workshop, Institute of Electrical and Electronics Engineers (IEEE)

Publication
Oct 05, 2025
Software Engineering

Transforming Relational Model Queries to Triple Graph Grammars

König, L.; Ritz, D.; Burger, E.
2025. 2025 ACM/IEEE 28th International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C); Grand Rapids, MI, USA, 05.-10.10.2025, 752–761, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 01, 2025
Legal Informatics Societal Security

Die Regulierung von OTT-Diensten im Wandel der Zeit – Von der ersten E-Mail zum allgegenwärtigen Kommunikationsmedium

Hunter, J.; Heun, S.-E.
2025. Computer und Recht / International, (10), 682–689

Publication
Oct 01, 2025
Societal Security

On a Study of Mechanisms for End-to-End Verifiable Online Voting (StuVe)

Cortier, V.; Debant, A.; Küsters, R.; Moser, F.; Müller, J.; Volkamer, M.
2025. Electronic Voting – 10th International Joint Conference, E-Vote-ID 2025, Nancy, France, October 1–3, 2025, Proceedings, Gesellschaft für Informatik (GI)

Publication
Sep 30, 2025
Legal Informatics

Die gemeinsame Verantwortlichkeit staatlicher Akteure bei der Nutzung sozialer Netzwerke

Dieler, P.
2025. Kommunikation & Recht, 28 (10), 608–614

Publication
Sep 30, 2025
Legal Informatics

From Data-Compliance to Model-Introspection: Challenges in AV Rule Compliance Monitoring

Rakow, A.; Gasiola, G. G.; Grundt, D.; Collenette, J.; Möhlmann, E.; Schwammberger, M.
2025. 2025 IEEE International Automated Vehicle Validation Conference, 30 September – 2 October, Baden-Baden, Institute of Electrical and Electronics Engineers (IEEE)

Publication
Sep 30, 2025
Machine Learning Mobility Systems Security

Exploring Semantic Clustering and Similarity Search for Heterogeneous Traffic Scenario Graphs

Mütsch, F.; Zipf, M.; Polley, N.; Zöllner, J. M.
2025. 2025 IEEE International Automated Vehicle Validation Conference (IAVVC), Baden-Baden, 30th September – 02nd October 2025, 1–7, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 30, 2025
Machine Learning Mobility Systems Security

DigiT4TAF – Bridging Physical and Digital Worlds for Future Transportation Systems

Zipfl, M.; Zwick, P.; Schulz, P.; Zofka, M. R.; Schotschneider, A.; Gremmelmaier, H.; Marschall, S.; Stark, A.; Müller, M.; Wehmer, M.; Viehl, A.; Zöllner, J. M.; Polley, N.; Mütsch, F.; Simon, K.; Gottselig, F.; Frey, M.; Kocsis, M.; Waldenmayer, D.; Schnepf, F.; Heinrich, E.; Pletz, S.; Zöllner, R.; Kölle, M.; Langbein-Euchner, K.
2025. 2025 IEEE International Automated Vehicle Validation Conference (IAVVC), 30th September 2025 – 2nd October 2025, Baden-Baden, 1–8, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 26, 2025
Software Engineering

Modeling the composition of analysis components and automatic constraint checking for semantic soundness

Taghavi, B.; Weber, S.; Marin, A.; Rumpe, B.; Stüber, S.; Henss, J.; Weber, T.; Heinrich, R.
2025. The journal of systems and software, 231.

Publication
Sep 25, 2025
Cyber Physical Systems

Semi-competitive Differential Game Logic

Butte, J.; Platzer, A.
2026. Automated Reasoning with Analytic Tableaux and Related Methods – 34th International Conference, TABLEAUX 2025, Reykjavik, Iceland, September 27–29, 2025, Proceedings. Ed.: G. Pozzato, 278–295, Springer Nature Switzerland.

Publication
Sep 22, 2025
Energy Systems Security

HADES: Detecting and Investigating Active Directory Attacks via Whole Network Provenance Analytics

Liu, Qi; Bao, Kaibin; Hassan, Wajih Ul; Hagenmeyer, Veit

Publication
Sep 22, 2025
Machine Learning Mobility Systems Security

Towards a Systematic Risk Assessment of Deep Neural Network Limitations in Autonomous Driving Perception

Pavlitska, S.; Gerking, C.; Zöllner, J. M.
2025. “European Symposium on Research in Computer Security (ESORICS) – Workshops”

Publication
Sep 16, 2025
Legal Informatics Process Security

Das integrierte Konformitätsbewertungsverfahren der KI-VO am Beispiel eines KMU im medizinischen Sektor

Dieler, P.; Wiens, M.
2025. INFORMATIK 2025. Hrsg.: U. Lucke, 113, Gesellschaft für Informatik (GI).

Publication
Sep 16, 2025
Legal Informatics

Datenschutzkonforme Altersverifikation im Internet: Zuverlässiger Jugendschutz bei datenschutzfreundlicher Ausgestaltung

Hunter, J.; Steinebach, M.; Yannikos, Y.
2025. INFORMATIK 2025: The Wide Open: Offenheit von Source bis Science, Potsdam, 16th – 19th September 2025, Gesellschaft für Informatik (GI).

Publication
Sep 16, 2025
Software Engineering

An Overview of Competency Areas in Artifact Evaluation

Armbruster, M.; Bernoth, J.
2025. INFORMATIK 2025. Hrsg.: U. Lucke, 1249–1253, Gesellschaft für Informatik (GI).

Publication
Sep 15, 2025
Legal Informatics

Towards Legal Knowledge Transfer Based on Software Architecture

Boltz, N.; Wagner, J.; Sterz, L.; Raabe, O.; Gerking, C.
2025. Software Architecture : 19th European Conference (ECSA 2025), Limassol, CY, September 15–19, 2025

Publication
Sep 12, 2025
Privacy

Grand Challenges in Human-Centered Privacy

Abu-Salma, R.; Anthonysamy, P.; Benenson, Z.; Berens, B.; Coopamootoo, K. P. L.; Gutmann, A.; Jenkins, A.; Patil, S.; Preibusch, S.; Schaub, F.; Seymour, W.; Such, J.; Tahaei, M.; Tuncdogan, A.; Kleek, M. V.; Wilkinson, D.
2025. IEEE Security & Privacy, 23 (4), 103–110.

Publication
Sep 12, 2025
Societal Security

“It sounds like automation” – Towards Users’ Understanding of Adaptive Systems

Hennig, A.; Mossano, M.; Aldag, L.; Veit, M. F.; Volkamer, M.
2025. Proceedings of the 2025 Conference on Mensch und Computer (MuC’25), Association for Computing Machinery (ACM)

Publication
Sep 11, 2025
Societal Security

Development and Expert Evaluation of an Informative Video Concerning Verifiable Internet Voting

Hilt, T.; Moser, F.; Matheis, P.; Volkamer, M.
2026. Electronic Voting – 10th International Joint Conference, E-Vote-ID 2025, Nancy, France, October 1–3, 2025, Proceedings. Ed.: D. Duenas-Cid, 107–123, Springer Nature Switzerland.

Publication
Sep 11, 2025
Cryptography Quantification Societal Security

Attack Once, Compromise All? On the Scalability of Attacks

Hetzel, E.; Nemes, M.; Müller-Quade, J.
2025. Electronic Voting – 10th International Joint Conference, E-Vote-ID 2025, Nancy, France, October 1–3, 2025, Proceedings. Ed.: D. Duenas-Cid, 90–106, Springer Nature Switzerland.

Publication
Sep 11, 2025
Societal Security

Voting Under Pressure: Perceptions of Counter-Strategies in Internet Voting

Nissen, C.; Hilt, T.; Budurushi, J.; Volkamer, M.; Kulyk, O.
2026. Electronic Voting – 10th International Joint Conference, E-Vote-ID 2025, Nancy, France, October 1–3, 2025, Proceedings. Ed.: D. Duenas-Cid, 158–174, Springer Nature Switzerland.

Publication
Sep 10, 2025
Societal Security

Do (Not) Tell Me About My Insecurities: Assessing the Status Quo of Coordinated Vulnerability Disclosure in Germany Amid New EU Cybersecurity Regulations

Neef, S.; Schlunke, C.; Hennig, A.
2025. Proceedings of the 2025 European Symposium on Usable Security (EuroUSEC ’25)

Publication
Sep 10, 2025
Cyber Physical Systems Software Engineering

Counterfactual Self-adaptation in Cyber-Physical Systems

Elahi, E.; Camilli, M.; Mirandola, R.
2025. DSD/SEAA 2025, Springer

Publication
Sep 10, 2025
Production Security

Towards Graph-based Self-learning of Industrial Process Behaviour for Anomaly Detection

Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2025. Procedia Computer Science, 270, 3913–3923.

Publication
Sep 10, 2025
Artificial Intelligence Usable Security

“I tell him everything that I do”: An investigation of privacy and safety implications of AI companion usage

Henriksen, A.; Asadi, R.; Gerdes, A.; Kulyk, O.; Mayer, P.
2025. 2025 European Symposium on Usable Security – Digital Security Hub (DiSH), Institute of Electrical and Electronics Engineers (IEEE)

Publication
Sep 08, 2025
Software Engineering

FAIR4EDTECH: Towards an Artifact Evaluation Track

Bernoth, J.; Heinemann, B.; Ehlenz, M.; Armbruster, M.; Lucke, U.
2025. 23. Fachtagung Bildungstechnologien (DELFI 2025). Hrsg.: V. Köppen, 245–249, Gesellschaft für Informatik (GI).

Publication
Sep 08, 2025
Network Security

Portest: Port Scan Detection on Non-Programmable Switches using TCAM and Randomized Algorithm

Krack, T.; Zitterbart, M.
2025. Proceedings of the 1st Workshop on Next-Generation Network Observability, SIGCOMM 2025, 51–57, Association for Computing Machinery (ACM).

Publication
Sep 04, 2025
Privacy

Balancing Privacy and Utility in Correlated Data: A Study of Bayesian Differential Privacy

Lange, M.; Guerra-Balboa, P.; Parra-Arnau, J.; Strufe, T.
2025. Proceedings of the VLDB Endowment, 18 (11), 4090–4103.

Publication
Sep 02, 2025
Economic Security Process Security

A game theory approach in hydrogen supply chain resilience: focus on pricing, sourcing, and transmission security

Rajabzadeh, H.; Shaya, N.; Shirafkan, N.; Glöser-Chahoud, S.; Wiens, M.
2025. Annals of Operations Research.

Publication
Sep 02, 2025
Mobility Systems Security

Sensor Fusion for Collaborative Mobile Agent Localization using Stationary Roadside Perception Sensors

Fleck, T.; Burger, J.; Ochs, S.; Heinrich, M.; Schotschneider, A.; Polley, N.; Boualili, Y.; Mütsch, F.; Schörner, P.; Zofka, M. R.; Zöllner, J. M.
2025. 2025 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI), College Station, 2nd-4th September 2025, 1–8, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 01, 2025
Software Engineering

Beyond Retrieval: A Study of Using LLM Ensembles for Candidate Filtering in Requirements Traceability

Fuchß, D.; Schwedt, S.; Keim, J.; Hey, T.
2025. 2025 IEEE 33rd International Requirements Engineering Conference Workshops (RE)

Publication
Sep 01, 2025
Legal Informatics Societal Security

Die EU-Verordnung über Targeting und politische Werbung – Ein Papiertiger?

Gutjahr, A.
2025. Neue Zeitschrift für Verwaltungsrecht, 2025 (17), 1307–1313

Publication
Sep 01, 2025
Artificial Intelligence Machine Learning

Exploiting Contexts of LLM-based Code-Completion

Noppel, M.; Wressnegger, C.; Rubel, K.
2025. KI 2025: Advances in Artificial Intelligence : 48th German Conference on AI, Potsdam, Germany, September 16–19, 2025, Proceedings. Ed. T. Braun, 298–302, Springer.

Publication
Sep 01, 2025
Artificial Intelligence Machine Learning

Makrut Attacks Against Black-Box Explanations

Hedge, A.; Noppel, M.; Wressnegger, C.
2025. KI 2025: Advances in Artificial Intelligence. Ed.: T. Braun, 289–293, Springer.

Publication
Sep 01, 2025
Privacy Usable Security

Replication Study: Cross-Country Evaluation of the Recognition-Based Graphical Authentication Scheme in AR and VR Environments

Noah, N.; Mayer, P.; Das, S.
2025. 2025 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 496–507, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Aug 31, 2025
Software Engineering

Investigating the Effects of T-Wise Interaction Sampling for Vulnerability Discovery in Highly-Configurable Software Systems

Bächle, T.; Hofmayer, E.; König, C.; Pett, T.; Schaefer, I.
2025. Proceedings of the 29th ACM International Systems and Software Product Line Conference – Volume A. Ed.: M.R. Luaces, 45–56, Association for Computing Machinery (ACM).

Publication
Aug 30, 2025
Artificial Intelligence Public Law

Rebuilding the pyramid: The AI Act’s risk-based approach using a binary decision diagram

Gasiola, G. G.
2025. Computer Law & Security Review, 58, Art.-Nr.: 106189.

Publication
Aug 25, 2025
Software Engineering

L1RA: Dynamic Rank Assignment in LoRA Fine-Tuning

Singh, R.; Brunello, N.; Scotti, V.; Carman, M.
2025. Proceedings of the 8th International Conference on Natural Language and Speech Processing (ICNLSP-2025). Hrsg.: M. Abbas, 360–373, Association for Computational Linguistics (ACL)

Publication
Aug 25, 2025
Cyber Physical Systems Production Security

FASER-IN: Evasion of Network Intrusion Detection Systems in Industrial Networks

Shetty, P.; Meshram, A.; Karch, M.; Haas, C.; Tippenhauer, N. O.
2025. Proceedings of the 11th ACM Cyber-Physical System Security Workshop, 87–102, Association for Computing Machinery (ACM).

Publication
Aug 24, 2025
Artificial Intelligence Machine Learning

Generalized Adversarial Code-Suggestions: Exploiting Contexts of LLM-based Code-Completion

Rubel, K.; Noppel, M.; Wressnegger, C.
2025. ASIA CCS ’25: Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 358–374, Association for Computing Machinery (ACM).

Publication
Aug 20, 2025
Software Engineering

LLMs for Software Architecture Knowledge: A Comparative Analysis Among Seven LLMs

Soliman, M.; Ashraf, E.; Abdelsalam, K. M. K.; Keim, J.; Venkatesh, A. P. S.
2026. Software Architecture – 19th European Conference, ECSA 2025, Limassol, Cyprus, September 15–19, 2025, Proceedings. Ed.: V. Andrikopoulos, 99–115, Springer Nature Switzerland.

Publication
Aug 20, 2025
Healthcare Privacy

Challenges of identification and anonymity in time-continuous data from medical environments

Hammer, F.; Strufe, T.
2025. Frontiers in Digital Health, 7. 

Publication
Aug 14, 2025
Decentralized Systems

Supply-Chain-Aligned Software Auditing and Usage Justification via Distributed Ledgers

Stengele, O.; Droll, J.; Hartenstein, H.
2025. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Pisa, Italy, 02-06 June 2025, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Aug 11, 2025
System Security

ConfuSense: Sensor Reconfiguration Attacks for Stealthy UAV Manipulation

Erba, A.; Castellanos, J. H.; Sihag, S.; Zonouz, S.; Tippenhauer, N. O.
2025. Proceedings of the 3rd USENIX Symposium on Vehicle Security and Privacy (VehicleSec ’25) : August 11-12, 2025, Seattle, WA, USA, 45–62, USENIX Association

Publication
Aug 11, 2025
Machine Learning

LeaX : Class-Focused Explanations for Locating Leakage in Learning-Based Profiling Attacks

Lei, Q.; Wressnegger, C.
2025. Availability, Reliability and Security. Ed.: M.D. Preda, 321–342, Springer Nature Switzerland.

Publication
Aug 10, 2025
IT Security Societal Security

The more accounts I use, the less I have to think’: A Longitudinal Study on the Usability of Password Managers for Novice Users

Cabarcos, P. A.; Mayer, P.
2025. Proceedings of the Twenty-First Symposium on Usable Privacy and Security (SOUPS 2025), August 11–12, 2025, Seattle, WA, USA, 351–369, Advanced Computing Systems Association (USENIX)

Publication
Aug 04, 2025
IoT Security Machine Learning

Technological Framework for a Secure and Resilient Food Supply Chain

Fischer, M.; Tönjes, R.; Bohara, R.; Ross, M.; Hedge, A.; Wressnegger, C.; Brunner, M.
2025. IEEE International Conference on Cyber Security and Resilience (CSR 2025), 146–152, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Aug 01, 2025
Societal Security Usable Security

RFC 9116 („security.txt“) an deutschen Hochschulservern

Eckstein, F.; Rosenauer, R.; Huppert, P.; Volkamer, M.; Herrmann, D.
2025. Datenschutz und Datensicherheit, (8), 522–526

Publication
Jul 30, 2025
IT Security Machine Learning

Adversarial Subspace Generation for Outlier Detection in High-Dimensional Data

Cribeiro-Ramallo, J.; Matteucci, F.; Enciu, P.; Jenke, A.; Arzamasov, V.; Strufe, T.; Böhm, K.
2025. Transactions on Machine Learning Research, 7

Publication
Jul 30, 2025
Cyber Physical Systems

A Real-Analytic Approach to Differential-Algebraic Dynamic Logic

Hellwig, J.; Platzer, A.
2025. Automated Deduction – CADE 30 – 30th International Conference on Automated Deduction, Stuttgart, Germany, July 28-31, 2025, Proceedings. Ed.: C. Barrett, 696–714, Springer Nature Switzerland.

Publication
Jul 27, 2025
Privacy

Can a Large Language Model Keep My Secrets? A Study on LLM-Controlled Agents

Hemken, N.; Koneru, S.; Jacob, F.; Hartenstein, H.; Niehues, J.
2025. Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics. Vol 4: Student Research Workshop, 746–759, Association for Computational Linguistics (ACL)

Publication
Jul 23, 2025
Economic Security Process Security

Energy Supply Chain Resilience and Sustainability Practices: Insights on Sourcing and Pricing Strategies

Rajabzadeh, H.; Wiens, M.
2025. Operations Research Proceedings 2023 : Selected Papers of the Annual International Conference of the German Operations Research Society (GOR), Germany, August 29 – September 1, 2023. Ed.: G. Voigt, 403–413, Springer Nature Switzerland.

Publication
Jul 16, 2025
Software Engineering

Detecting Information Flow Security Vulnerabilities by Analysis Coupling

Reiche, F.; Reussner, R.; Heinrich, R.
2025. IEEE Transactions on Software Engineering, 1–33.

Publication
Jul 14, 2025
Cryptography Machine Learning

AlphaFL: Secure Aggregation with Malicious2 Security for Federated Learning against Dishonest Majority

Jiang, Y.; Zarezadeh, M.; Dai, T.; Köpsell, S.
2025. Proceedings on Privacy Enhancing Technologies, 2025 (4), 348–368.

Publication
Jul 14, 2025
Privacy

Aimless Onions: Mixing without Topology Information

Schadt, D.; Coijanovic, C.; Strufe, T.
2025. Proceedings on Privacy Enhancing Technologies, 2025 (4), 293–307.

Publication
Jul 09, 2025
Artificial Intelligence Machine Learning

POMELO : Black-Box Feature Attribution with Full-Input, In-Distribution Perturbations

Ademi, L.; Noppel, M.; Wressnegger, C.
2025. Explainable Artificial Intelligence. Ed.: R. Guidotti. Pt. 2, 219–243, Springer Nature Switzerland

Publication
Jul 07, 2025
Cryptography Privacy

POBA: Privacy-Preserving Operator-Side Bookkeeping and Analytics

Faut, D.; Fetzer, V.; Müller-Quade, J.; Raiber, M.; Rupp, A.
2025. IACR Communications in Cryptology, 2 (2).

Publication
Jul 07, 2025
Decentralized Systems Network Services

A Policy-Based Mitigation of Transaction Exclusion in Ethereum

Spiesberger, P.; Droll, J.; Hartenstein, H.
2025. Proceedings of the 30th ACM Symposium on Access Control Models and Technologies (SACMAT 2025), 127–132, Association for Computing Machinery (ACM).

Publication
01 / 08