Publications

Our interdisciplinary research is reflected in the outstanding publications of KASTEL Security Research Labs.

Apr 12, 2026
Artificial Intelligence

An Experience Report on a Pedagogically Controlled, Curriculum-Constrained AI Tutor for SE Education

Happe, L.; Fuchß, D.; Hüttner, L.; Marquardt, K.; Koziolek, A.
2026. Proceedings of the 48th International Conference on Software Engineering: Software Engineering Education and Training; Rio de Janeiro, Brasilien, 12.-18.04.2026, Association for Computing Machinery (ACM).

Publication
Jan 06, 2026
Trustworthy Internet Technologies

A Taxonomy of Collusion in Information Systems

Armbruster, K.; Kannengießer, N.; Beyene, M.; Ciolacu, G.; Sunyaev, A.
2026. Proceedings of the 59th Hawaii International Conference on System Sciences, Maui, HI, 6th-9th January 2026, 5663–5672

Publication
Jan 02, 2026
Process Security

Improving disaster preparedness through public-private collaboration – dual-use warehouses for food supply

Löffel, M.; Diehlmann, F.; Zienau, A.; Lüttenberg, M.; Wiens, M.; Wagner, S. M.; Schultmann, F.
2026. Production Planning and Control, 1–25.

Publication
Dec 10, 2025
Software Engineering

Towards dynamic views on heterogeneous models – the NeoJoin view definition language

König, L.; Stickling, T.; Burger, E.
2025. Joint Proceedings of the STAF 2025 Workshops: OCL, OOPSLE, LLM4SE, ICMM, AgileMDE, AI4DPS, and TTC co-located with the International Conference on Software Technologies: Applications and Foundations (STAF 2025), CEUR-WS

Publication
Dec 08, 2025
Usable Security

Fix it – If you Can! Towards Understanding the Impact of Tool Support and Domain Owners’ Reactions to SSHFP Misconfigurations

Hennig, A.; Neef, S.; Mayer, P.
2025. Kapil Singh, Gianluca Stringhini, Nick Nikiforakis, 104682, Elsevier

Publication
Dec 08, 2025
Cryptography

Laconic Cryptography with Preprocessing

Bhadauria, R.; Döttling, N.; Hazay, C.; Lin, C.
2026. Advances in Cryptology – ASIACRYPT 2025 – 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part V. Ed.: G. Hanaoka, 228–261, Springer Nature Singapore.

Publication
Nov 28, 2025
Cyber Physical Systems

Axiomatization of Compact Initial Value Problems: Open Properties

Platzer, A.; Qian, L.
2025. 
Journal of the ACM, 72 (6), Art.-Nr.: 41.

Publication
Nov 22, 2025
Communication Security Privacy

Sabot: Efficient and Strongly Anonymous Bootstrapping of Communication Channels

Coijanovic, C.; Hetz, L.; Paterson, K. G.; Strufe, T.
2025. Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, Taipeh, 13th-17th October 2025, 558–572, Association for Computing Machinery (ACM).

Publication
Nov 18, 2025
Decentralized Systems Trustworthy Internet Technologies

On the Trade-Off between Degree of Decentralization and Scalability in Proof-of-Stake–based Blockchain Systems

Normann, F. von; Aliyu, M. M.; Kannengießer, N.; Le, L. B. Q.; Heinrich, R.; Sunyaev, A.
2025. 2025 7th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Zürich, 18th-21st November 2025, 1–9, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Nov 17, 2025
Decentralized Systems Network Services

Security of the Lightning Network: Model Checking a Stepwise Refinement with TLA+

Grundmann, M.; Hartenstein, H.
2025. 20th International Conference on Integrated Formal Methods, iFM 2025, Paris, 17th-21st November 2025, Springer

Publication
Nov 04, 2025
Software Engineering

Towards Bringing Vitruvius into the Cloud II: Against Attacks from the Internet

Armbruster, M.; Chebbi, F.; Weber, T.; Koziolek, A.
2025. Softwaretechnik-Trends, Gesellschaft für Informatik, Gesellschaft für Informatik (GI)

Publication
Nov 04, 2025
Societal Security

The whos, whats, and whys of issues related to personal data and data protection in open-source projects on GitHub

Hennig, A.; Schulte, L.; Herbold, S.; Kulyk, O.; Mayer, P.
2025. Empirical Software Engineering, 31 (1), 9.

Publication
Nov 02, 2025
Software Engineering

HubLink: A Novel Question Answering Retrieval Approach over Knowledge Graphs

Kaplan, A.; Keim, J.; Schneider, M.; Reussner, R. H.
2025. RAGE-KG 2025: The Second International Workshop on Retrieval-Augmented Generation Enabled by Knowledge Graphs, co-located with ISWC 2025, November 2–6, 2025, Nara, Japan. Ed.: Jennifer D., CEUR-WS

Publication
Oct 25, 2025
Artificial Intelligence Machine Learning Trustworthy Internet Technologies

Quest for quality: a review of design knowledge on gamified AI training data annotation systems

Krohmann, S.; Rank, S.; Schmidt-Kraepelin, M.; Thiebes, S.; Sunyaev, A.
2025. Behaviour & Information Technology, 1–26.

Publication
Oct 17, 2025
Software Engineering

How Toxic Can You Get? Search-based Toxicity Testing for Large Language Models

Corbo, S.; Bancale, L.; Gennaro, V. D.; Lestingi, L.; Scotti, V.; Camilli, M.
2025. IEEE Transactions on Software Engineering.

Publication
Oct 15, 2025
Legal Informatics

Offene und subkutane Zielkonflikte zwischen KI-VO und DSGVO – Das Zusammenspiel zwischen Vertrauenswürdigkeit von KI und Vertrauen in Datenverarbeitung als grundlegende Herausforderung

Winau, M.; Spiecker genannt Döhmann, I.
2025. Computer und Recht : CR ; Zeitschrift für die Praxis des Rechts der Informationstechnologien, (10), 647–654

Publication
Oct 15, 2025
Software Engineering

Proactive self-adaptation and assurance of explainable Human–Machine Teaming

Lestingi, L.; Bersani, M. M.; Camilli, M.; Mirandola, R.; Rossi, M.; Scandurra, P.
2026. Journal of Systems and Software, 232, Art.-Nr.: 112657.

Publication
Oct 13, 2025
Privacy

BFId: Identity Inference Attacks Utilizing Beamforming Feedback Information

Todt, J.; Morsbach, F.; Strufe, T.
2025. Proceedings of 32nd ACM SIGSAC Conference on Computer and Communications Security (CCS ’25), Taipei, October 13–17, 2025, Association for Computing Machinery (ACM).

Publication
Oct 13, 2025
Network Security

Feedback-driven Autonomous Data Set Labeling for Denial-of-Service Attack Traffic

Kopmann, S.; Lachos, D.; Zitterbart, M.
2025. 2025 IEEE 50th Conference on Local Computer Networks (LCN), Sydney, Australia, 13-16 October 2025, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 12, 2025
Mobility Systems Security Network Security

NOTHORG; A digital twin for ECU security testing

Wehmer, M.; Diestl, J.; Waibel, D.; Baumgart, I.
2025. Proceedings of the 2025 Cyber Security in CarS Workshop (CSCS ’25), 9 S., Association for Computing Machinery (ACM).

Publication
Oct 10, 2025
Modeling Software Engineering

Towards the Derivation of Encryption Rules for Encryption-Based Access Control for Delta-Based Model Representations — The DEBAC Approach

Weber, T.; Quellmalz, K.; Benz, L.; Weber, S.; Burger, E.; Reussner, R.
2025. Second International Workshop on Model Management (MoM), co-located with the 28th International Conference on Model Driven Engineering Languages and Systems (MODELS 2025), Grand Rapids, MI, 5th-10th October 2025, Institute of Electrical and Electronics Engineers (IEEE)

Publication
Oct 10, 2025
Artificial Intelligence Privacy

PETs and AI: Privacy Washing and the Need for a PETs Evaluation Framework (Dagstuhl Seminar 25112)

Cristofaro, E. De; Shrishak, K.; Strufe, T.; Troncoso, C.; Morsbach, F.
2025. Dagstuhl Reports, 15 (3), 77–93.

Publication
Oct 09, 2025
Software Engineering

X-by-Construction: Towards Ensuring Non-functional Properties in by-Construction Engineering

Kodetzki, M.; Bordis, T.; Potanin, A.; Schaefer, I.
2025. Proceedings of the 2025 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software, 99–115, Association for Computing Machinery (ACM).

Publication
Oct 09, 2025
Modeling Software Engineering

An Initial Exploration of MULTI Level Modeling for Model-Based Systems Engineering

Lange, A.; Cederbladh, J.; Feichtinger, K.; Weber, T.
2025. INCOSE International Symposium, 348–363.

Publication
Oct 06, 2025
Artificial Intelligence Cyber Physical Systems

Can Large Language Models Autoformalize Kinematics?

Kabra, A.; Laurent, J.; Bharadwaj, S.; Martins, R.; Mitsch, S.; Platzer, A.
2025. A. Irfan & D. Kaufmann (Hrsg.), Proceedings of the 25th Conference on Formal Methods in Computer-Aided Design – FMCAD 2025, Menlo Park, 6th-10th October 2025, TU Wien.

Publication
Oct 05, 2025
Software Engineering

What can we learn from other Domains – An exploratory process for the extension of a language based on cross-domain knowledge transfer

Jutz, B.; Zacouris, Z.; Weber, T.; Acosta, M.; Reussner, R.; Burger, E.
2025. Proceedings of the ACM/IEEE 28th International Conference on Model Driven Engineering Languages and Systems, Grand Rapids, MI, USA, 5th-10th October 2025, Institute of Electrical and Electronics Engineers (IEEE)

Publication
Oct 05, 2025
Modeling Software Engineering

Modeling the MoM 2025 Satellite Configuration Challenge with Vitruvius

Jutz, B.; Weber, T.; Lange, A.; Dehghani, R.; Jiang, B.; Armbruster, M.; Feichtinger, K.; Hagel, N.; Kaushik, M.; König, L.; Mazkatli, M.; Minhas, M. A.; Neumann, D.; Burger, E.; Koziolek, A.; Reussner, R.
2025. Second International Workshop on Model Management (MoM), co-located with the 28th International Conference on Model Driven Engineering Languages and Systems (MODELS 2025), Grand Rapids, MI, 5th-10th October 2025, Institute of Electrical and Electronics Engineers (IEEE)

Publication
Oct 05, 2025
Machine Learning

Runtime Safety Monitoring of Deep Neural Networks for Perception: A Survey

Schotschneider, A.; Pavlitska, S.; Zöllner, M.
2025. IEEE International Conference on Systems, Man, and Cybernetics (SMC 2025), Institute of Electrical and Electronics Engineers (IEEE)

Publication
Oct 05, 2025
Modeling Software Engineering

How and Why is Change Modeled? – A Scoping Literature Review

Weber, T.; Cederbladh, J.; Weber, S.; Lange, A.; Cicchetti, A.; Reussner, R.
2025. Models and Evolution Workshop, Institute of Electrical and Electronics Engineers (IEEE)

Publication
Oct 01, 2025
Legal Informatics Societal Security

Die Regulierung von OTT-Diensten im Wandel der Zeit – Von der ersten E-Mail zum allgegenwärtigen Kommunikationsmedium

Hunter, J.; Heun, S.-E.
2025. Computer und Recht / International, (10), 682–689

Publication
Oct 01, 2025
Societal Security

On a Study of Mechanisms for End-to-End Verifiable Online Voting (StuVe)

Cortier, V.; Debant, A.; Küsters, R.; Moser, F.; Müller, J.; Volkamer, M.
2025. Electronic Voting – 10th International Joint Conference, E-Vote-ID 2025, Nancy, France, October 1–3, 2025, Proceedings, Gesellschaft für Informatik (GI)

Publication
Sep 30, 2025
Legal Informatics

Die gemeinsame Verantwortlichkeit staatlicher Akteure bei der Nutzung sozialer Netzwerke

Dieler, P.
2025. Kommunikation & Recht, 28 (10), 608–614

Publication
Sep 30, 2025
Legal Informatics

From Data-Compliance to Model-Introspection: Challenges in AV Rule Compliance Monitoring

Rakow, A.; Gasiola, G. G.; Grundt, D.; Collenette, J.; Möhlmann, E.; Schwammberger, M.
2025. 2025 IEEE International Automated Vehicle Validation Conference, 30 September – 2 October, Baden-Baden, Institute of Electrical and Electronics Engineers (IEEE)

Publication
Sep 30, 2025
Machine Learning Mobility Systems Security

Exploring Semantic Clustering and Similarity Search for Heterogeneous Traffic Scenario Graphs

Mütsch, F.; Zipf, M.; Polley, N.; Zöllner, J. M.
2025. 2025 IEEE International Automated Vehicle Validation Conference (IAVVC), Baden-Baden, 30th September – 02nd October 2025, 1–7, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 26, 2025
Software Engineering

Modeling the composition of analysis components and automatic constraint checking for semantic soundness

Taghavi, B.; Weber, S.; Marin, A.; Rumpe, B.; Stüber, S.; Henss, J.; Weber, T.; Heinrich, R.
2025. The journal of systems and software, 231.

Publication
Sep 22, 2025
Energy Systems Security

HADES: Detecting and Investigating Active Directory Attacks via Whole Network Provenance Analytics

Liu, Qi; Bao, Kaibin; Hassan, Wajih Ul; Hagenmeyer, Veit

Publication
Sep 22, 2025
Machine Learning Mobility Systems Security

Towards a Systematic Risk Assessment of Deep Neural Network Limitations in Autonomous Driving Perception

Pavlitska, S.; Gerking, C.; Zöllner, J. M.
2025. “European Symposium on Research in Computer Security (ESORICS) – Workshops”

Publication
Sep 16, 2025
Legal Informatics Process Security

Das integrierte Konformitätsbewertungsverfahren der KI-VO am Beispiel eines KMU im medizinischen Sektor

Dieler, P.; Wiens, M.
2025. INFORMATIK 2025. Hrsg.: U. Lucke, 113, Gesellschaft für Informatik (GI).

Publication
Sep 16, 2025
Legal Informatics

Datenschutzkonforme Altersverifikation im Internet: Zuverlässiger Jugendschutz bei datenschutzfreundlicher Ausgestaltung

Hunter, J.; Steinebach, M.; Yannikos, Y.
2025. INFORMATIK 2025: The Wide Open: Offenheit von Source bis Science, Potsdam, 16th – 19th September 2025, Gesellschaft für Informatik (GI).

Publication
Sep 16, 2025
Software Engineering

An Overview of Competency Areas in Artifact Evaluation

Armbruster, M.; Bernoth, J.
2025. INFORMATIK 2025. Hrsg.: U. Lucke, 1249–1253, Gesellschaft für Informatik (GI).

Publication
Sep 15, 2025
Legal Informatics

Towards Legal Knowledge Transfer Based on Software Architecture

Boltz, N.; Wagner, J.; Sterz, L.; Raabe, O.; Gerking, C.
2025. Software Architecture : 19th European Conference (ECSA 2025), Limassol, CY, September 15–19, 2025

Publication
Sep 12, 2025
Privacy

Grand Challenges in Human-Centered Privacy

Abu-Salma, R.; Anthonysamy, P.; Benenson, Z.; Berens, B.; Coopamootoo, K. P. L.; Gutmann, A.; Jenkins, A.; Patil, S.; Preibusch, S.; Schaub, F.; Seymour, W.; Such, J.; Tahaei, M.; Tuncdogan, A.; Kleek, M. V.; Wilkinson, D.
2025. IEEE Security & Privacy, 23 (4), 103–110.

Publication
Sep 12, 2025
Societal Security

“It sounds like automation” – Towards Users’ Understanding of Adaptive Systems

Hennig, A.; Mossano, M.; Aldag, L.; Veit, M. F.; Volkamer, M.
2025. Proceedings of the 2025 Conference on Mensch und Computer (MuC’25), Association for Computing Machinery (ACM)

Publication
Sep 11, 2025
Societal Security

Development and Expert Evaluation of an Informative Video Concerning Verifiable Internet Voting

Hilt, T.; Moser, F.; Matheis, P.; Volkamer, M.
2026. Electronic Voting – 10th International Joint Conference, E-Vote-ID 2025, Nancy, France, October 1–3, 2025, Proceedings. Ed.: D. Duenas-Cid, 107–123, Springer Nature Switzerland.

Publication
Sep 11, 2025
Cryptography Quantification Societal Security

Attack Once, Compromise All? On the Scalability of Attacks

Hetzel, E.; Nemes, M.; Müller-Quade, J.
2025. Electronic Voting – 10th International Joint Conference, E-Vote-ID 2025, Nancy, France, October 1–3, 2025, Proceedings. Ed.: D. Duenas-Cid, 90–106, Springer Nature Switzerland.

Publication
Sep 11, 2025
Societal Security

Voting Under Pressure: Perceptions of Counter-Strategies in Internet Voting

Nissen, C.; Hilt, T.; Budurushi, J.; Volkamer, M.; Kulyk, O.
2026. Electronic Voting – 10th International Joint Conference, E-Vote-ID 2025, Nancy, France, October 1–3, 2025, Proceedings. Ed.: D. Duenas-Cid, 158–174, Springer Nature Switzerland.

Publication
Sep 10, 2025
Societal Security

Do (Not) Tell Me About My Insecurities: Assessing the Status Quo of Coordinated Vulnerability Disclosure in Germany Amid New EU Cybersecurity Regulations

Neef, S.; Schlunke, C.; Hennig, A.
2025. Proceedings of the 2025 European Symposium on Usable Security (EuroUSEC ’25)

Publication
Sep 10, 2025
Cyber Physical Systems Software Engineering

Counterfactual Self-adaptation in Cyber-Physical Systems

Elahi, E.; Camilli, M.; Mirandola, R.
2025. DSD/SEAA 2025, Springer

Publication
Sep 10, 2025
Production Security

Towards Graph-based Self-learning of Industrial Process Behaviour for Anomaly Detection

Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2025. Procedia Computer Science, 270, 3913–3923.

Publication
Sep 10, 2025
Artificial Intelligence Usable Security

“I tell him everything that I do”: An investigation of privacy and safety implications of AI companion usage

Henriksen, A.; Asadi, R.; Gerdes, A.; Kulyk, O.; Mayer, P.
2025. 2025 European Symposium on Usable Security – Digital Security Hub (DiSH), Institute of Electrical and Electronics Engineers (IEEE)

Publication
Sep 08, 2025
Software Engineering

FAIR4EDTECH: Towards an Artifact Evaluation Track

Bernoth, J.; Heinemann, B.; Ehlenz, M.; Armbruster, M.; Lucke, U.
2025. 23. Fachtagung Bildungstechnologien (DELFI 2025). Hrsg.: V. Köppen, 245–249, Gesellschaft für Informatik (GI).

Publication
Sep 04, 2025
Privacy

Balancing Privacy and Utility in Correlated Data: A Study of Bayesian Differential Privacy

Lange, M.; Guerra-Balboa, P.; Parra-Arnau, J.; Strufe, T.
2025. Proceedings of the VLDB Endowment, 18 (11), 4090–4103.

Publication
Sep 02, 2025
Economic Security Process Security

A game theory approach in hydrogen supply chain resilience: focus on pricing, sourcing, and transmission security

Rajabzadeh, H.; Shaya, N.; Shirafkan, N.; Glöser-Chahoud, S.; Wiens, M.
2025. Annals of Operations Research.

Publication
Sep 02, 2025
Mobility Systems Security

Sensor Fusion for Collaborative Mobile Agent Localization using Stationary Roadside Perception Sensors

Fleck, T.; Burger, J.; Ochs, S.; Heinrich, M.; Schotschneider, A.; Polley, N.; Boualili, Y.; Mütsch, F.; Schörner, P.; Zofka, M. R.; Zöllner, J. M.
2025. 2025 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI), College Station, 2nd-4th September 2025, 1–8, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 01, 2025
Software Engineering

Beyond Retrieval: A Study of Using LLM Ensembles for Candidate Filtering in Requirements Traceability

Fuchß, D.; Schwedt, S.; Keim, J.; Hey, T.
2025. 2025 IEEE 33rd International Requirements Engineering Conference Workshops (RE)

Publication
Sep 01, 2025
Legal Informatics Societal Security

Die EU-Verordnung über Targeting und politische Werbung – Ein Papiertiger?

Gutjahr, A.
2025. Neue Zeitschrift für Verwaltungsrecht, 2025 (17), 1307–1313

Publication
Sep 01, 2025
Artificial Intelligence Machine Learning

Exploiting Contexts of LLM-based Code-Completion

Noppel, M.; Wressnegger, C.; Rubel, K.
2025. KI 2025: Advances in Artificial Intelligence : 48th German Conference on AI, Potsdam, Germany, September 16–19, 2025, Proceedings. Ed. T. Braun, 298–302, Springer.

Publication
Sep 01, 2025
Artificial Intelligence Machine Learning

Makrut Attacks Against Black-Box Explanations

Hedge, A.; Noppel, M.; Wressnegger, C.
2025. KI 2025: Advances in Artificial Intelligence. Ed.: T. Braun, 289–293, Springer.

Publication
Aug 31, 2025
Software Engineering

Investigating the Effects of T-Wise Interaction Sampling for Vulnerability Discovery in Highly-Configurable Software Systems

Bächle, T.; Hofmayer, E.; König, C.; Pett, T.; Schaefer, I.
2025. Proceedings of the 29th ACM International Systems and Software Product Line Conference – Volume A. Ed.: M.R. Luaces, 45–56, Association for Computing Machinery (ACM).

Publication
Aug 25, 2025
Software Engineering

L1RA: Dynamic Rank Assignment in LoRA Fine-Tuning

Singh, R.; Brunello, N.; Scotti, V.; Carman, M.
2025. Proceedings of the 8th International Conference on Natural Language and Speech Processing (ICNLSP-2025). Hrsg.: M. Abbas, 360–373, Association for Computational Linguistics (ACL)

Publication
Aug 25, 2025
Cyber Physical Systems Production Security

FASER-IN: Evasion of Network Intrusion Detection Systems in Industrial Networks

Shetty, P.; Meshram, A.; Karch, M.; Haas, C.; Tippenhauer, N. O.
2025. Proceedings of the 11th ACM Cyber-Physical System Security Workshop, 87–102, Association for Computing Machinery (ACM).

Publication
Aug 24, 2025
Communication Security System Security

Generalized Adversarial Code-Suggestions: Exploiting Contexts of LLM-based Code-Completion

Rubel, K.; Noppel, M.; Wressnegger, C.
2025. ASIA CCS ’25: Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 358–374, Association for Computing Machinery (ACM).

Publication
Aug 20, 2025
Software Engineering

LLMs for Software Architecture Knowledge: A Comparative Analysis Among Seven LLMs

Soliman, M.; Ashraf, E.; Abdelsalam, K. M. K.; Keim, J.; Venkatesh, A. P. S.
2026. Software Architecture – 19th European Conference, ECSA 2025, Limassol, Cyprus, September 15–19, 2025, Proceedings. Ed.: V. Andrikopoulos, 99–115, Springer Nature Switzerland.

Publication
Aug 14, 2025
Decentralized Systems

Supply-Chain-Aligned Software Auditing and Usage Justification via Distributed Ledgers

Stengele, O.; Droll, J.; Hartenstein, H.
2025. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Pisa, Italy, 02-06 June 2025, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Aug 11, 2025
System Security

ConfuSense: Sensor Reconfiguration Attacks for Stealthy UAV Manipulation

Erba, A.; Castellanos, J. H.; Sihag, S.; Zonouz, S.; Tippenhauer, N. O.
2025. Proceedings of the 3rd USENIX Symposium on Vehicle Security and Privacy (VehicleSec ’25) : August 11-12, 2025, Seattle, WA, USA, 45–62, USENIX Association

Publication
Aug 11, 2025
Machine Learning

LeaX : Class-Focused Explanations for Locating Leakage in Learning-Based Profiling Attacks

Lei, Q.; Wressnegger, C.
2025. Availability, Reliability and Security. Ed.: M.D. Preda, 321–342, Springer Nature Switzerland.

Publication
Aug 10, 2025
IT Security Societal Security

The more accounts I use, the less I have to think’: A Longitudinal Study on the Usability of Password Managers for Novice Users

Cabarcos, P. A.; Mayer, P.
2025. Proceedings of the Twenty-First Symposium on Usable Privacy and Security (SOUPS 2025), August 11–12, 2025, Seattle, WA, USA, 351–369, Advanced Computing Systems Association (USENIX)

Publication
Aug 04, 2025
IoT Security Machine Learning

Technological Framework for a Secure and Resilient Food Supply Chain

Fischer, M.; Tönjes, R.; Bohara, R.; Ross, M.; Hedge, A.; Wressnegger, C.; Brunner, M.
2025. IEEE International Conference on Cyber Security and Resilience (CSR 2025), 146–152, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Aug 01, 2025
Societal Security Usable Security

RFC 9116 („security.txt“) an deutschen Hochschulservern

Eckstein, F.; Rosenauer, R.; Huppert, P.; Volkamer, M.; Herrmann, D.
2025. Datenschutz und Datensicherheit, (8), 522–526

Publication
Jul 30, 2025
IT Security Machine Learning

Adversarial Subspace Generation for Outlier Detection in High-Dimensional Data

Cribeiro-Ramallo, J.; Matteucci, F.; Enciu, P.; Jenke, A.; Arzamasov, V.; Strufe, T.; Böhm, K.
2025. Transactions on Machine Learning Research, 7

Publication
Jul 30, 2025
Cyber Physical Systems

A Real-Analytic Approach to Differential-Algebraic Dynamic Logic

Hellwig, J.; Platzer, A.
2025. Automated Deduction – CADE 30 – 30th International Conference on Automated Deduction, Stuttgart, Germany, July 28-31, 2025, Proceedings. Ed.: C. Barrett, 696–714, Springer Nature Switzerland.

Publication
Jul 27, 2025
Privacy

Can a Large Language Model Keep My Secrets? A Study on LLM-Controlled Agents

Hemken, N.; Koneru, S.; Jacob, F.; Hartenstein, H.; Niehues, J.
2025. Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics. Vol 4: Student Research Workshop, 746–759, Association for Computational Linguistics (ACL)

Publication
Jul 23, 2025
Economic Security Process Security

Energy Supply Chain Resilience and Sustainability Practices: Insights on Sourcing and Pricing Strategies

Rajabzadeh, H.; Wiens, M.
2025. Operations Research Proceedings 2023 : Selected Papers of the Annual International Conference of the German Operations Research Society (GOR), Germany, August 29 – September 1, 2023. Ed.: G. Voigt, 403–413, Springer Nature Switzerland.

Publication
Jul 16, 2025
Software Engineering

Detecting Information Flow Security Vulnerabilities by Analysis Coupling

Reiche, F.; Reussner, R.; Heinrich, R.
2025. IEEE Transactions on Software Engineering, 1–33.

Publication
Jul 14, 2025
Cryptography Machine Learning

AlphaFL: Secure Aggregation with Malicious2 Security for Federated Learning against Dishonest Majority

Jiang, Y.; Zarezadeh, M.; Dai, T.; Köpsell, S.
2025. Proceedings on Privacy Enhancing Technologies, 2025 (4), 348–368.

Publication
Jul 14, 2025
Privacy

Aimless Onions: Mixing without Topology Information

Schadt, D.; Coijanovic, C.; Strufe, T.
2025. Proceedings on Privacy Enhancing Technologies, 2025 (4), 293–307.

Publication
Jul 09, 2025
Artificial Intelligence Machine Learning

POMELO : Black-Box Feature Attribution with Full-Input, In-Distribution Perturbations

Ademi, L.; Noppel, M.; Wressnegger, C.
2025. Explainable Artificial Intelligence. Ed.: R. Guidotti. Pt. 2, 219–243, Springer Nature Switzerland

Publication
Jul 07, 2025
Cryptography Privacy

POBA: Privacy-Preserving Operator-Side Bookkeeping and Analytics

Faut, D.; Fetzer, V.; Müller-Quade, J.; Raiber, M.; Rupp, A.
2025. IACR Communications in Cryptology, 2 (2).

Publication
Jul 07, 2025
Decentralized Systems Network Services

A Policy-Based Mitigation of Transaction Exclusion in Ethereum

Spiesberger, P.; Droll, J.; Hartenstein, H.
2025. Proceedings of the 30th ACM Symposium on Access Control Models and Technologies (SACMAT 2025), 127–132, Association for Computing Machinery (ACM).

Publication
Jul 04, 2025
Economic Security Process Security

Competitive dynamics in blockchain-based supply chains under cryptocurrency volatility: a game theory approach

Shirafkan, N.; Rajabzadeh, H.; Wiens, M.
2025. International Journal of Production Research, 63 (19), 7339–7362.

Publication
Jul 01, 2025
Artificial Intelligence Software Engineering

Bridging Explanations and Logics: Opportunities for Multimodal Language Models

Schuler, Nicolas Sebastian, Scotti, Vincenzo, Camilli, Matteo  Mirandola  Raffaela Bridging Explanations and Logics: Opportunities for Multimodal Language Models, Preprint, Accepted for Formal Methods for Intersymbolic AI (AISoLA 2025 · FMIAI)

Publication
Jun 24, 2025
Software Engineering

Traceability Support for Engineering Reviews of Horizontal Model Evolution

Cederbladh, J.; Kamburjan, E.; Manrique-Negrin, D. A.; Mittal, R.; Weber, T.
2025. Systems Engineering, e70001.

Publication
Jun 23, 2025
Cryptography

Security Analysis of Forward Secure Log Sealing in Journald

Dörre, F.; Ottenhues, A.
2025. International Conference on Applied Cryptography and Network Security, 27 S

Publication
Jun 23, 2025
Cryptography

Protection Against Subversion Corruptions via Reverse Firewalls in the Plain Universal Composability Framework

Ottenhues, A.; Müller-Quade, J.; Arnold, P.; Berndt, S.
2025. International Conference on Applied Cryptography and Network Security, München, 23rd-26th June 2025

Publication
Jun 23, 2025
Privacy Software Engineering

Quantifying Privacy Risk with Gaussian Mixtures

Rønneberg, R. C.; Randone, F.; Pardo, R.; Wąsowski, A.
2025. Software and Systems Modeling.

Publication
Jun 23, 2025
Privacy System Security

Privacy from 5 PM to 6 AM: Tracking and Transparency Mechanisms in the HbbTV Ecosystem

Böttger, C.; Hosseini, H.; Utz, C.; Demir, N.; Hörnemann, J.; Wressnegger, C.; Hupperich, T.; Pohlmann, N.; Große-Kampmann, M.; Urban, T.
2025. 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2025), Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jun 22, 2025
Machine Learning Mobility Systems Security

Fool the Stoplight: Realistic Adversarial Patch Attacks on Traffic Light Detectors

Pavlitska, S.; Robb, J.; Polley, N.; Yazgan, M.; Zöllner, J. M.
2025. 2025 IEEE Intelligent Vehicles Symposium (IV), 734–741, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jun 22, 2025
Machine Learning Mobility Systems Security

The ATLAS of Traffic Lights: A Reliable Perception Framework for Autonomous Driving

Polley, R.; Polley, N.; Heid, D.; Heinrich, M.; Ochs, S.; Zöllner, J. M.
2025. 2025 IEEE Intelligent Vehicles Symposium (IV), Cluj-Napoca, 22nd-25th June 2025, 2215–2222, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jun 18, 2025
Software Engineering

Efficient Self-Adaptation through Explanation-Driven White-Box Optimization

Negri, F.; Nicolosi, N.; Camilli, M.; Mirandola, R.
2025. ACM Transactions on Autonomous and Adaptive Systems.

Publication
Jun 17, 2025
Energy Systems Security

Enhancing Situational Awareness in Smart Grids through Event Correlation for ATT&CK Mapping

Canbolat Kaya, S.; Elbez, G.; Hagenmeyer, V.
2025. ACM International Conference on Future and Sustainable Energy Systems (ACM e-Energy 2025), Association for Computing Machinery (ACM).

Publication
Jun 17, 2025
Energy Systems Security

Advanced Persistent Threats on Consumer Energy Resources in Decentralized Energy Systems

Bao, K.; Chau, S. C.-K.; Elbez, G.; Liu, Q.; Hagenmeyer, V.
2025. Proceedings of the 16th ACM International Conference on Future and Sustainable Energy Systems (E-ENERGY ’25), 838–845, Association for Computing Machinery (ACM).

Publication
Jun 17, 2025
Energy Systems Security

Insights and Lessons Learned from a Realistic Smart Grid Testbed for Cybersecurity Research

Elbez, Ghada; Sanchez, Gustavo; Canbolat, Sine; Corallo, Sophie; Fruböse, Clemens; Lanzinger, Florian; Kellerer, Nicolai; Keppler, Gustav; Neumeister, Felix; Beckert, Bernhard; Koziolek, Anne; Zitterbart, Martina; Hagenmeyer, Veit

Publication
Jun 17, 2025
Energy Systems Security

Insights and Lessons Learned from a Realistic Smart Grid Testbed for Cybersecurity Research

Elbez, Ghada; Sanchez, Gustavo; Canbolat, Sine; Corallo, Sophie; Fruböse, Clemens; Lanzinger, Florian; Kellerer, Nicolai; Keppler, Gustav; Neumeister, Felix; Beckert, Bernhard; Koziolek, Anne; Zitterbart, Martina; Hagenmeyer, Veit

Publication
Jun 17, 2025
Cyber Physical Systems Energy Systems Security

Masquerading IEC 61850 GOOSE Protocol: Cyber-Physical Experiments and Detection

Alberto, H. da C.; Sánchez Collado, G.; DEMBELE, J. M.; DIOP, I.; Elbez, G.; Hagenmeyer, V.
2025. E-ENERGY ’25, Rotterdam, Netherlands, Association for Computing Machinery (ACM).

Publication
Jun 17, 2025
Energy Systems Security

Physical Impact Analysis of Cyberattacks on Inverter-based Consumer Energy Resources

Engel, S. M.; Bao, K.; Attar, A. A.; Rudolph, R.; Hagenmeyer, V.
2025. E-Energy ’25: Proceedings of the 16th ACM International Conference on Future and Sustainable Energy Systems, 820–829, Association for Computing Machinery (ACM).

Publication
Jun 16, 2025
Energy Systems Security

Attacks on the Siemens S7 Protocol Using an Industrial Control System Testbed

Kellerer, N.; Sanchez, G.; Alberto, H.; Hagenmeyer, V.; Elbez, G.
2025. E-Energy ’25: Proceedings of the 16th ACM International Conference on Future and Sustainable Energy Systems, 770–779, Association for Computing Machinery (ACM).

Publication
Jun 12, 2025
Human-Centered IT Security Privacy

Anonymization Techniques for Behavioral Biometric Data: A Survey

Hanisch, S.; Arias-Cabarcos, P.; Parra-Arnau, J.; Strufe, T.
2025. ACM Computing Surveys, 57.

Publication
Jun 11, 2025
Software Engineering

Scaling Information Flow Control By-Construction to Component-Based Software Architectures

Rønneberg, R. C.; Bordis, T.; Gerking, C.; Tabar, A. H.; Schaefer, I.
2025. Formal Techniques for Distributed Objects, Components, and Systems Techniques. Ed.: C. Ferreira, 55–74, Springer Nature Switzerland.

Publication
Jun 11, 2025
Cryptography

Honorific Security: Efficient Two-Party Computation with Offloaded Arbitration and Public Verifiability

Dai, T.; Jiang, Y.; Li, Y.; Müller-Quade, J.; Rupp, A.
2025. Proceedings of the 22nd International Conference on Security and Cryptography – Volume 1, Bilbao, June 11-13, 2025, 49–60, SciTePress.

Publication
Jun 05, 2025
Societal Security

The relationship between cybersecurity awareness, cybersecurity supply chain risk management and firm performance

Stentoft, J.; Peressotti, M.; Mayer, P.; Wickstrøm, K. A.; Schmitt, O.; Keating, V. C.; Theussen, A.; Tumchewics, L. A.; Kankam-Boateng, J.
2025. Supply Chain Management: An International Journal, 30 (5), 497–517.

Publication
01 / 08