Publications

Our interdisciplinary research is reflected in the outstanding publications of KASTEL Security Research Labs.

Nov 20, 2024
Machine Learning

Collaborative Distributed Machine Learning

Jin, D.; Kannengießer, N.; Rank, S.; Sunyaev, A.
2024. ACM Computing Surveys.

Publication
Nov 09, 2024
Machine Learning

A kinematic dataset of locomotion with gait and sit-to-stand movements of young adults

Hanisch, S.; Pogrzeba, L.; Muschter, E.; Li, S.-C.; Strufe, T.
2024. Scientific Data, 11 (1), Art.-Nr.: 1209.

Publication
Oct 31, 2024
Modeling Software Engineering

Towards Deep Reactions in Multi-Level, Multi-View Modeling

Weber, T.; Ojha, M.; Sadeghi, M.; König, L.; Armbruster, M.; Lange, A.; Burger, E.; Atkinson, C.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, Linz Austria, 22nd – 27th September 2024, 760–769, Association for Computing Machinery (ACM).

Publication
Oct 16, 2024
Healthcare Legal Informatics

Sharing for Caring? A Patients’ and Clinicians’ View on Handling Personal Medical Data in the Context of Digitization: An Exploratory Study

Frank, K.; Mengesdorf, T.; Radić, M.; Herrmann, P.; Appenzeller, A.; Mucha, H.; Orak, B.; Spiecker gen. Döhmann, I.; Rüping, S.; Burkhardt, H.; Köhm, M.; Dauth, S.
2024. Healthcare, 12 (20), Art.-Nr.: 2053.

Publication
Oct 14, 2024
Communication Security Privacy

Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling Concepts

Khaloopour, L.; Su, Y.; Raskob, F.; Meuser, T.; Bless, R.; Janzen, L.; Abedi, K.; Andjelkovic, M.; Chaari, H.; Chakraborty, P.; Kreutzer, M.; Hollick, M.; Strufe, T.; Franchi, N.; Jamali, V.
2023. IEEE Access, 11.

Publication
Oct 08, 2024
Communication Security Network Security

Evaluating Drill-Down DDoS Destination Detection

Krack, T.; Kopmann, S.; Zitterbart, M.
2024. 2024 IEEE 49th Conference on Local Computer Networks (LCN), Normandy, France, 08-10 October 2024, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 02, 2024
Societal Security

Recommendations for Implementing Independent Individual Verifiability in Internet Voting

Moser, F.; Grimm, R.; Hilt, T.; Kirsten, M.; Niederbudde, C.; Volkamer, M.
2024. 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024), Gesellschaft für Informatik (GI)

Publication
Oct 02, 2024
Verification

SoK: Mechanisms Used in Practice for Verifiable Internet Voting

Moser, F.; Kirsten, M.; Dörre, F.
2024. 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024), Gesellschaft für Informatik (GI)

Publication
Sep 22, 2024
Software Engineering

A Collaborative Uncertainty Collection to Address the Awareness Problem of Model-Based Confidentiality Analysis

Hahner, S.; Niehues, N.; Boltz, N.; Fuksa, M.; Heinrich, R.
2024. ACM / IEEE 27th International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C)

Publication
Sep 22, 2024
Software Engineering

ARC³N: A Collaborative Uncertainty Catalog to Address the Awareness Problem of Model-Based Confidentiality Analysis

Hahner, S.; Niehues, N.; Boltz, N.; Fuksa, M.; Heinrich, R.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 640–644, Association for Computing Machinery (ACM).

Publication
Sep 22, 2024
Software Engineering

Model Everything but with Intellectual Property Protection – The Deltachain Approach

Weber, T.; Weber, S.
2024. MODELS ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 49–56, Association for Computing Machinery (ACM).

Publication
Sep 17, 2024
Energy Systems Security Machine Learning

Machine Learning-Based Feature Selection for Intrusion Detection Systems in IEC 61850-Based Digital Substations

Eynawi, A.; Mumrez, A.; Elbez, G.; Hagenmeyer, V.
2024. 2024 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 7 S., Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 13, 2024
Network Security

Importance Analysis of Micro-Flow Independent Features for Detecting Distributed Network Attacks

Kopmann, S.; Zitterbart, M.
2024. IEEE Transactions on Network and Service Management, 1.

Publication
Sep 11, 2024
Trustworthy Internet Technologies

HybCBDC: A Design for Central Bank Digital Currency Systems Enabling Digital Cash

Lamberty, R.; Kirste, D.; Kannengießer, N.; Sunyaev, A.
2023. IEEE Access.

Publication
Sep 07, 2024
Communication Security Software Engineering

How Do Asynchronous Communication Models Impact the Composability of Information Flow Security?

Gerlach, L.; Gerking, C.
2024. Formal Aspects of Component Software – 20th International Conference, FACS 2024, Milan, Italy, September 9–10, 2024, Proceedings. Ed.: D. Marmsoler, 127 – 145, Springer Nature Switzerland.

Publication
Sep 04, 2024
Privacy

An overview of proposals towards the privacy-preserving publication of trajectory data

Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2024. International Journal of Information Security, 23, 3711–3747.

Publication
Sep 01, 2024
Societal Security

Usability and Understanding of Individual Verifiability in the 2023 GI-Election

Hilt, T.; Matheis, P.; Volkamer, M.
2024. Mensch und Computer 2024 – Workshopband, September 2024, Karlsruhe, Germany, Gesellschaft für Informatik e.V.

Publication
Aug 30, 2024
Machine Learning

A Brief Systematization of Explanation-Aware Attacks

Noppel, M.; Wressnegger, C.
2024. KI 2024: Advances in Artificial Intelligence – 47th German Conference on AI, Würzburg, Germany, September 25–27, 2024, Proceedings. Ed.: A. Hotho, 350–354, Springer Nature Switzerland.

Publication
Aug 28, 2024
Privacy

Composition in Differential Privacy for General Granularity Notions

Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Strufe, T.
2024. 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 8th-12th July 2024.

Publication
Aug 17, 2024
Cryptography

Quantum Lattice Enumeration in Limited Depth

Bindel, N.; Bonnetain, X.; Tiepelt, M.; Virdia, F.
2024. Advances in Cryptology – CRYPTO 2024 – 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2024, Proceedings, Part VI. Ed.: L. Reyzin, 72 – 106, Springer Nature Switzerland.

Publication
Aug 15, 2024
Communication Security

7D: Demonstrating Drill-Down DDoS Destination Detection

Kopmann, S.; Krack, T.; Zitterbart, M.
2024. 2024 IEEE International Conference on Machine Learning for Communication and Networking (ICMLCN), Stockholm, 5th-8th May 2024, 1–2, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Aug 11, 2024
Privacy Usable Security

Of Mothers and Managers – The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field

Gerber, N.; Stöver, A.; Mayer, P.
2024. Proceedings of the Twentieth Symposium on Usable Privacy and Security, Advanced Computing Systems Association (USENIX)

Publication
Aug 09, 2024
Trustworthy Internet Technologies

On the influence of conventional and automated market makers on market quality in cryptoeconomic systems

Kirste, D.; Poddey, A.; Kannengießer, N.; Sunyaev, A.
2024. Electronic Markets, 34 (1), Art.-Nr.: 42.

Publication
Jul 31, 2024
Dependability

A conceptual and architectural characterization of antifragile systems

Grassi, V.; Mirandola, R.; Perez-Palacin, D.
2024. Journal of Systems and Software, 213, Art.-Nr.: 112051.

Publication
Jul 30, 2024
Human-Centered IT Security Production Security

DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote Attestation

Wagner, P. G.; Birnstill, P.; Beyerer, J.
2024. Proceedings of the 19th International Conference on Availability, Reliability and Security, Art.-Nr.: 159, Association for Computing Machinery (ACM).

Publication
Jul 30, 2024
Privacy Usable Security

Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent Banners

Kriecherbauer, T.; Schwank, R.; Krauss, A.; Neureither, K.; Remme, L.; Volkamer, M.; Herrmann, D.
2024. ARES ’24: Proceedings of the 19th International Conference on Availability, Reliability and Security, 1–7, Association for Computing Machinery (ACM).

Publication
Jul 27, 2024
Cryptography

Compact FE for unbounded attribute-weighted sums for logspace from SXDH

Datta, P.; Pal, T.; Takashima, K.
2024. Designs, Codes, and Cryptography.

Publication
Jul 24, 2024
Software Engineering

Automated Reverse Engineering for MoM-Based Microservices (ARE4MOM) Using Static Analysis

Singh, S.; Koziolek, A.
2024. 2024 IEEE 21st International Conference on Software Architecture (ICSA), Hyderabad, 4th-8th June 2024, 12–22, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jul 18, 2024
Human-Centered IT Security IT Security

NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research

Chaurasia, A. K.; Fallahi, M.; Strufe, T.; Terhörst, P.; Cabarcos, P. A.
2024. Journal of Information Security and Applications, 85, Article no: 103832.

Publication
Jul 17, 2024
Software Engineering

Explainability Engineering Challenges: Connecting Explainability Levels to Run-time Explainability

Schwammberger, M.; Mirandola, R.; Wenninghoff, N.
2024. Proceedings of 2nd World Conference on Explainable Artificial Intelligence Conference (XAI2024), Springer

Publication
Jul 17, 2024
Energy Systems Security

Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids

Canbolat, S.; Fruböse, C.; Elbez, G.; Hagenmeyer, V.
2024. 21st Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA ’24)

Publication
Jul 17, 2024
Legal Informatics

Data sovereignty requirements for patient-oriented AI-driven clinical research in Germany; [Anforderungen an die Datensouveränität in der patientenorientierten und KI-gestützten klinischen Forschung in Deutschland]

Radic, M.; Busch-Casler, J.; Vosen, A.; Herrmann, P.; Appenzeller, A.; Mucha, H.; Philipp, P.; Frank, K.; Dauth, S.; Köhm, M.; Orak, B.; Spiecker genannt Döhmann, I.; Böhm, P.
2024. Ethik in der Medizin.

Publication
Jul 16, 2024
Cryptography

HiddenΔ-Fairness: A Novel Notion for Fair Secure Two-Party Computation

Bayreuther, S.; Berger, R.; Dörre, F.; Mechler, J.; Müller-Quade, J.
2024. Information Security and Privacy. Ed.: T. Zhu. Pt. 2, 330–349, Springer Nature Singapore.

Publication
Jul 15, 2024
Privacy

Provable Security for the Onion Routing and Mix Network Packet Format Sphinx

Scherer, P.; Weis, C.; Strufe, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (4), 755–783.

Publication
Jul 15, 2024
Privacy

Fantômas: Understanding Face Anonymization Reversibility

Todt, J.; Hanisch, S.; Strufe, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (4), 24–43.

Publication
Jul 15, 2024
Privacy

Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure

Adavoudi Jolfaei, A.; Rupp, A.; Schiffner, S.; Engel, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (1), 232–257.

Publication
Jul 08, 2024
Applied Informatics Cyber Physical Systems

Complete Game Logic with Sabotage

Abou El Wafa, N.; Platzer, A.
2024. Proceedings of the 39th Annual ACM/IEEE Symposium on Logic in Computer Science, 1–15, Association for Computing Machinery (ACM).

Publication
Jul 02, 2024
Cyber Physical Systems

Uniform Substitution for Differential Refinement Logic

Prebet, E.; Platzer, A.
2024. Automated Reasoning. IJCAR 2024. Part 2. Ed.: C. Benzmüller, 196–215, Springer Nature Switzerland.

Publication
Jul 01, 2024
Legal Informatics

Effektive Datenschutzaufsicht für effektiven Grundrechtsschutz – aber bitte nicht sofort und nicht gegen den Staat? : Zur Unionsrechtswidrigkeit des Ausschlusses der Anordnung der sofortigen Vollziehbarkeit gem. § BDSG § 20 BDSG § 20 Absatz VII BDSG

Winau, M.; Kemmler, K. J.
2024. Neue Zeitschrift für Verwaltungsrecht, 42 (13), 945–1040

Publication
Jul 01, 2024
Legal Informatics

Effektive Datenschutzaufsicht für effektiven Grundrechtsschutz – aber bitte nicht sofort und nicht gegen den Staat? : Zur Unionsrechtswidrigkeit des Ausschlusses der Anordnung der sofortigen Vollziehbarkeit gem. § 20 VII BDSG

Winau, M.; Kemmler, K. J.
2024. Neue Zeitschrift für Verwaltungsrecht, 42 (13), 945–1040

Publication
Jun 25, 2024
Energy Systems Security

Effiziente Cyber-Resilienz

Bao, K.; Elbez, G.
2024. Forschung für ein resilientes Energiesystem in Zeiten globaler Krisen: Jahrestagung 2023 des ForschungsVerbunds Erneuerbare Energien 10. und 11. Oktober 2023

Publication
Jun 24, 2024
Modeling Software Engineering

Requirements Classification for Traceability Link Recovery

Hey, T.; Keim, J.; Corallo, S.
2024. 2024 IEEE 32nd International Requirements Engineering Conference (RE’24), Institute of Electrical and Electronics Engineers (IEEE)

Publication
Jun 19, 2024
Privacy

A Framework for Provably Secure Onion Routing against a Global Adversary

Scherer, P.; Weis, C.; Strufe, T.
2024. 
Proceedings on Privacy Enhancing Technologies, 2024 (2), 141–159.

Publication
Jun 07, 2024
Software Engineering

RAMSES: An Artifact Exemplar for Engineering Self-Adaptive Microservice Applications

Riccio, V.; Sorrentino, G.; Zamponi, E.; Camilli, M.; Mirandola, R.; Scandurra, P.
2024. Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Lissabon, 15th-16th April, 2024, 161 – 167, Association for Computing Machinery (ACM).

Publication
Jun 07, 2024
Dependability

Uncertainty Flow Diagrams: Towards a Systematic Representation of Uncertainty Propagation and Interaction in Adaptive Systems

Camara, J.; Hahner, S.; Perez-Palacin, D.; Vallecillo, A.; Acosta, M.; Bencomo, N.; Calinescu, R.; Gerasimou, S.
2024. SEAMS ’24: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems; New York, 37 – 43, Association for Computing Machinery (ACM).

Publication
Jun 04, 2024
Energy Systems Security

Interoperability Assessment of IEC 61850 Devices in a Multivendor Digital Substation

Keppler, G.; Bonetti, A.; Canbolat, S.; Mumrez, A.; Hagenmeyer, V.; Elbez, G.
2024. 6th Global Power, Energy and Communication Conference (GPECOM2024), Institute of Electrical and Electronics Engineers (IEEE)

Publication
May 21, 2024
Energy Systems Security

Attacking Learning-based Models in Smart Grids: Current Challenges and New Frontiers

Sanchez, G.; Elbez, G.; Hagenmeyer, V.
2024. e-Energy ’24: Proceedings of the 15th ACM International Conference on Future and Sustainable Energy Systems, 589–595, Association for Computing Machinery (ACM).

Publication
May 21, 2024
Energy Systems Security Network Security

Who Controls Your Power Grid? On the Impact of Misdirected Distributed Energy Resources on Grid Stability

Goerke, N.; Märtz, A.; Baumgart, I.
2024. e-Energy ’24: Proceedings of the 15th ACM International Conference on Future and Sustainable Energy Systems, 46–54, Association for Computing Machinery (ACM).

Publication
May 20, 2024
Machine Learning

SoK: Explainable Machine Learning in Adversarial Environments

Noppel, M.; Wressnegger, C.
2024. Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P), San Francisco, 20th-22nd May 2024, Institute of Electrical and Electronics Engineers (IEEE).

Publication
May 20, 2024
IT Security Privacy

PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support

Schadt, D.; Coijanovic, C.; Weis, C.; Strufe, T.
2024. 2024 IEEE Symposium on Security and Privacy (SP), 44–44, IEEE Computer Society.

Publication
May 11, 2024
Societal Security Usable Security

Better Together: The Interplay Between a Phishing Awareness Video and a Link-centric Phishing Support Tool

Berens, B. M.; Schaub, F.; Mossano, M.; Volkamer, M.
2024. Proceedings of the CHI Conference on Human Factors in Computing Systems, 1–60, Association for Computing Machinery (ACM).

Publication
May 06, 2024
IT Security

Improving Resilience of Future Mobile Network Generations Implementing Zero Trust Paradigm

Abedi, K.; Nguyen, G. T.; Strufe, T.
2024. NOMS 2024-2024 IEEE Network Operations and Management Symposium, 06th-10th May 2024, Seoul, Korea, 1–5, Institute of Electrical and Electronics Engineers (IEEE).

Publication
May 01, 2024
Machine Learning Software Engineering

A data-driven active learning approach to reusing ML solutions in scientific applications

Hajiabadi, H.; Gerking, C.; Hilbert, L.; Koziolek, A.
2024. Journal of Systems and Software, 211, Article no: 111986.

Publication
Apr 22, 2024
Decentralized Systems

Logical Clocks and Monotonicity for Byzantine-Tolerant Replicated Data Types

Jacob, F.; Hartenstein, H.
2024. PaPoC ’24: Proceedings of the 11th Workshop on Principles and Practice of Consistency for Distributed Data, 37–43, Association for Computing Machinery (ACM).

Publication
Apr 16, 2024
Machine Learning

Explanation-driven Self-adaptation using Model-agnostic Interpretable Machine Learning

Negri, F. R.; Nicolosi, N.; Camilli, M.; Mirandola, R.
2024. IEEE/ACM proceedings of the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS2024)

Publication
Apr 15, 2024
Software Engineering

RAMSES: An Exemplar for Engineering Self-Adaptive Microservice Applications

Riccio, V.; Sorrentino, G.; Zamponi, E.; Camilli, M.; Mirandola, R.; Scandurra, P.
2024. IEEE/ACM proceedings of the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS2024), Institute of Electrical and Electronics Engineers (IEEE)

Publication
Apr 14, 2024
Software Engineering

Recovering Trace Links Between Software Documentation And Code

Keim, J.; Corallo, S.; Fuchß, D.; Hey, T.; Telge, T.; Koziolek, A.
2024. Proceedings of 46th International Conference on Software Engineering (ICSE 2024)

Publication
Apr 14, 2024
Software Engineering

Detecting Automatic Software Plagiarism via Token Sequence Normalization

Sağlam, T.; Brödel, M.; Schmid, L.; Hahner, S.
2024. Proceedings of the 46th International Conference on Software Engineering, ICSE ’24, Lissabon, April 14-20, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Apr 14, 2024
Software Engineering

Multi-requirement Parametric Falsification

Camilli, M.; Mirandola, R.
2024. 46th International Conference on Software Engineering (ICSE 2024), Lissabon, Portugal, 14.–20. April 2024

Publication
Apr 14, 2024
Software Engineering

Automated Detection of AI-Obfuscated Plagiarism in Modeling Assignments

Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. Proceedings of the 46th International Conference on Software Engineering: Software Engineering Education and Training, ICSE SEET ’24, Lissabon, 14th-20th April 2024, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Apr 14, 2024
Cryptography

Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions

Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Gröll, R.; Müller, M.; Müller-Quade, J.
2024. Public-Key Cryptography – PKC 2024 : 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings. Part IV. Ed.: Q. Tang, 257–288, Springer Nature Switzerland. 

Publication
Apr 09, 2024
Cryptography

Post-Quantum Ready Key Agreement for Aviation

Tiepelt, M.; Martin, C.; Maeurer, N.
2024. IACR Communications in Cryptology, 1 (1), 17.

Publication
Apr 08, 2024
Software Engineering Verification

Quantifying Software Correctness by Combining Architecture Modeling and Formal Program Analysis

Lanzinger, F.; Martin, C.; Reiche, F.; Teuber, S.; Heinrich, R.; Weigl, A.
2024. SAC ’24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing. Ed.: J. Hong, 1702–1711, Association for Computing Machinery (ACM).

Publication
Apr 07, 2024
Verification

A Practical Notion of Liveness in Smart Contract Applications

Schiffl, J.; Beckert, B.
2024. 5th International Workshop on Formal Methods for Blockchains (FMBC 2024). Ed.: B. Bernardo, 8:1–8:13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (LZI).

Publication
Apr 04, 2024
Applied Informatics Cyber Physical Systems

CESAR: Control Envelope Synthesis via Angelic Refinements

Kabra, A.; Laurent, J.; Mitsch, S.; Platzer, A.
2024. Tools and Algorithms for the Construction and Analysis of Systems – 30th International Conference (TACAS 2024). Held as Part of the European Joint Conferences on Theory and Practice of Software (ETAPS 2024) Luxembourg City, LU, April 6–11, 2024, Proceedings., Part 1. Ed.: B. Finkbeiner, 144–164, Springer Nature Switzerland.

Publication
Apr 01, 2024
Legal Informatics

Die Reform des australischen Privacy Act

Ebert, A.
2024. Zeitschrift für Datenschutz (ZD), 14 (4), 181–240

Publication
Mar 25, 2024
Communication Security Network Security

TRUST Issues: Multicast and Integrity Protection for the TRUST Redundancy Mechanism

Neumeister, F.; Zitterbart, M.
2024. 2024 IEEE International Conference on Industrial Technology (ICIT), 1–6, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 12, 2024
Economic Security

Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT

Daniel, N.; Kaiser, F. K.; Dzega, A.; Elyashar, A.; Puzis, R.
2024. Computer Security. ESORICS 2023 International Workshops – CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II. Ed.: S. Katsikas, 76 – 91, Springer Nature Switzerland.

Publication
Mar 08, 2024
Privacy Societal Security Usable Security

Systematic User Evaluation of a Second Device based cast-as-intended verifiability Approach

Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.; Volkamer, M.
2024. Voting’24, Springer

Publication
Mar 01, 2024
Cryptography

Two-Party Decision Tree Training from Updatable Order-Revealing Encryption

Berger, R.; Dörre, F.; Koch, A.
2024. Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings. Part I. Ed.: C. Pöpper, 288–317, Springer International Publishing.

Publication
Feb 26, 2024
Software Engineering

Architecture-based Propagation Analyses Regarding Security

Hahner, S.; Walter, M.; Heinrich, R.; Reussner, R.
2024. Software Engineering 2024 (SE 2024), Gesellschaft für Informatik e.V.

Publication
Feb 26, 2024
Privacy Societal Security Usable Security

Exploring Phishing Threats through QR Codes in Naturalistic Settings

Sharevski, F.; Mossano, M.; Veit, M. F.; Schiefer, G.; Volkamer, M.
2024. Symposium on Usable Security and Privacy (USEC) 2024.

Publication
Feb 26, 2024
Privacy Usable Security

Vision: Towards Fully Shoulder-Surfing Resistant and Usable Authentication for Virtual Reality

Länge, T.; Matheis, P.; Düzgün, R.; Volkamer, M.; Mayer, P.
2024. Symposium on Usable Security and Privacy (USEC) 2024 : Co-located with NDSS Symposium 2024, San Diego, CA, 26th February – 1st March 2024.

Publication
Feb 07, 2024
Software Engineering

Kfeature: Rendering the Kconfig System into Feature Models

Yaman, K. B.; Wittler, J. W.; Gerking, C.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 134 – 138, Association for Computing Machinery (ACM).

Publication
Feb 06, 2024
Human-Centered IT Security Production Security

RIXA – Explaining Artificial Intelligence in Natural Language

Becker, M.; Vishwesh, V.; Birnstill, P.; Schwall, F.; Wu, S.; Beyerer, J.
2024. 2023 IEEE International Conference on Data Mining Workshops (ICDMW), Shanghai, 1st-4th December 2023, 875–884, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jan 29, 2024
Software Engineering

Obfuscation-Resilient Software Plagiarism Detection with JPlag

Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. 46th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jan 12, 2024
Cryptography Quantification

Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements

Tiepelt, M.; Eaton, E.; Stebila, D.
2024. Computer Security – ESORICS 2023. Ed.: G. Tsudik. Pt. 1, 168–188, Springer Nature Switzerland.

Publication
Jan 11, 2024
Privacy

Panini — Anonymous Anycast and an Instantiation

Coijanovic, C.; Weis, C.; Strufe, T.
2024. Computer Security – ESORICS 2023 – 28th European Symposium on Research in Computer Security : The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II. Ed.: G. Tsudik, 193 – 211, Springer, Cham.

Publication
Jan 08, 2024
Energy Systems Security

Verifiable Certificateless Signcryption Scheme for Smart Grids

Ramadan, M.; Elbez, G.; Hagenmeyer, V.
2024. 2023 7th International Conference on System Reliability and Safety (ICSRS), 181–189, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jan 08, 2024
Trustworthy Internet Technologies

Exploring Contrasting Effects of Trust in Organizational Security Practices and Protective Structures on Employees’ Security-Related Precaution Taking

Greulich, M.; Lins, S.; Pienta, D.; Thatcher, J. B.; Sunyaev, A.
2024. Information systems research.

Publication
Jan 01, 2024
Legal Informatics

DGRI-Jahrestagung 2023: KI, Cybersicherheit/Cyberresilienz, Datenökonomie

Dieler, P.
2024. Computer und Recht, 40 (1), R9-R11

Publication
Dec 31, 2023
Societal Security Usable Security

Online-Wahlen und digitale Abstimmungen – eine Einordnung aktueller Entwicklungen

Volkamer, M.; Mayer, A.; Neumann, S.; Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Müller-Quade, J.
2023. DGRI Jahrbuch 2021/2022, 141–160, Verlag Dr. Otto Schmidt.

Publication
Dec 15, 2023
Legal Informatics

“Complete” Independence of the ICO and Strategic Priorities of the UK Government?

Winau, M.
2023. Computer law & security review, (6), 180–187

Publication
Dec 11, 2023
Decentralized Systems

ABCperf: Performance Evaluation of Fault Tolerant State Machine Replication Made Simple: Demo Abstract

Spannagel, T.; Leinweber, M.; Castro, A.; Hartenstein, H.
2023. Proceedings of the 24th International Middleware Conference Demos, Posters and Doctoral Symposium, 35–36, Association for Computing Machinery (ACM).

Publication
Dec 04, 2023
Cryptography

Practically Efficient Private Set Intersection From Trusted Hardware with Side-Channels

Dörre, F.; Mechler, J.; Müller-Quade, J.
2023. Advances in Cryptology – ASIACRYPT 2023 – 29th International Conference on the Theory and Application of Cryptology and Information Security, Springer Verlag

Publication
Dec 04, 2023
Cryptography Privacy

Universally Composable Auditable Surveillance

Fetzer, V.; Klooß, M.; Müller-Quade, J.; Raiber, M.; Rupp, A.
2023. ASIACRYPT 2023, 4th – 8th December 2023, 145, Springer Verlag

Publication
Dec 01, 2023
Legal Informatics Privacy

Technische und datenschutzrechtliche Einordnung von Weiterleitungs-URLs in E-Mails—Was bei Weiterleitungs-URLs in E-Mails aus Marketinggründen zu beachten ist

Veit, M.; Müllmann, D.; Volkamer, M.
2023. Computer und Recht, 39 (12), 810–816.

Publication
Nov 30, 2023
Software Engineering

A Survey of Analysis Composition Operators in the Context of Palladio

Taghavi, B.; Weber, S.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 8–10, Gesellschaft für Informatik (GI).

Publication
Nov 30, 2023
Software Engineering

Multi-level Hardware Simulation in Palladio

Weber, S.; Taghavi, B.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 32–34, Gesellschaft für Informatik (GI).

Publication
Nov 29, 2023
Usable Security

Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video

Berens, B. M.; Mossano, M.; Volkamer, M.
2024. Computers & Security, 137, Art.-Nr.: 103620.

Publication
Nov 27, 2023
Cryptography

Composable Long-Term Security with Rewinding

Berger, R. M.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
2023. Theory of Cryptography. 21th International Conference, TCC 2023. Proceedings, Part 1. Ed.: G. Rothblum, Springer Verlag

Publication
Nov 26, 2023
IT Security Privacy

BAZAAR: Anonymous Resource Sharing

Coijanovic, C.; Schadt, D.; Weis, C.; Strufe, T.
2023. WPES ’23: Proceedings of the 22nd Workshop on Privacy in the Electronic Society, Kopenhagen, 26th November 2023, 135–139, Association for Computing Machinery (ACM).

Publication
Nov 21, 2023
IT Security Privacy

Poster: Towards Practical Brainwave-based User Authentication

Fallahi, M.; Arias-Cabarcos, P.; Strufe, T.
2023. CCS’ 23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Kopenhagen, 26th-30th November 2023, 3627–3629, Association for Computing Machinery (ACM).

Publication
Nov 20, 2023
Software Engineering

Engineering Self-adaptive Microservice Applications: An Experience Report

Riccio, V.; Sorrentino, G.; Camilli, M.; Mirandola, R.; Scandurra, P.
2023. Service-Oriented Computing – 21st International Conference, ICSOC 2023, Rome, Italy, November 28 – December 1, 2023, Proceedings, Part I. Ed.: F. Monti, 227–242, Springer Nature Switzerland.

Publication
Nov 15, 2023
Legal Informatics Societal Security

Online-Bundestagswahlen – Verfassungsrechtliche Grenzen und technische Herausforderungen

Gutjahr, A.; Spiecker gen. Döhmann, I.; Volkamer, M.
2023. Computer und Recht, 767–776

Publication
Nov 15, 2023
Human-Centered IT Security Privacy Usable Security

“I just stopped using one and started using the other”: Motivations, Techniques, and Challenges When Switching Password Managers

Munyendo, C. W.; Mayer, P.; Aviv, A. J. 2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3123–3137, Association for Computing Machinery (ACM).

Publication
Nov 15, 2023
Machine Learning

Poster: Fooling XAI with Explanation-Aware Backdoors

Noppel, M.; Wressnegger, C.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3612–3614, Association for Computing Machinery (ACM).

Publication
Nov 15, 2023
IT Security System Security

Load-and-Act: Increasing Page Coverage of Web Applications

Weidmann, N.; Barber, T.; Wressnegger, C.
2023. Information Security – 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15–17, 2023, Proceedings. Ed.: E. Athanasopoulos, 163–182, Springer Nature Switzerland.

Publication
Nov 07, 2023
Dependability Software Engineering

Generating adaptation rule-specific neural networks

Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2023. International Journal on Software Tools for Technology Transfer, 25, 733–746.

Publication
Nov 06, 2023
Cyber Physical Systems Dependability Software Engineering

Identifying Performance Challenges in Consistency Preserving View-Based Environments

König, L.; Weber, T.
2023. Softwaretechnik-Trends, 14th Symposium on Software Performance 2023, Karlsruhe, 6th – 8th November 2023, 26–28, Gesellschaft für Informatik (GI).

Publication
01 / 05