Publications

Our interdisciplinary research is reflected in the outstanding publications of KASTEL Security Research Labs.

Aug 28, 2024
Privacy

Composition in Differential Privacy for General Granularity Notions

Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Strufe, T.
2024. 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 8th-12th July 2024.

Publication
Jul 31, 2024
Dependability

A conceptual and architectural characterization of antifragile systems

Grassi, V.; Mirandola, R.; Perez-Palacin, D.
2024. Journal of Systems and Software, 213, Art.-Nr.: 112051.

Publication
Jun 24, 2024
Modeling Software Engineering

Requirements Classification for Traceability Link Recovery

Hey, T.; Keim, J.; Corallo, S.
2024. 2024 IEEE 32nd International Requirements Engineering Conference (RE’24), Institute of Electrical and Electronics Engineers (IEEE)

Publication
May 20, 2024
Machine Learning

SoK: Explainable Machine Learning in Adversarial Environments

Noppel, M.; Wressnegger, C.
2024. Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P), San Francisco, 20th-22nd May 2024, Institute of Electrical and Electronics Engineers (IEEE).

Publication
May 20, 2024
IT Security Privacy

PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support

Schadt, D.; Coijanovic, C.; Weis, C.; Strufe, T.
2024. 2024 IEEE Symposium on Security and Privacy (SP), 44–44, IEEE Computer Society.

Publication
May 11, 2024
Societal Security Usable Security

Better Together: The Interplay Between a Phishing Awareness Video and a Link-centric Phishing Support Tool

Berens, B. M.; Schaub, F.; Mossano, M.; Volkamer, M.
2024. Proceedings of the CHI Conference on Human Factors in Computing Systems, 1–60, Association for Computing Machinery (ACM).

Publication
Apr 16, 2024
Machine Learning

Explanation-driven Self-adaptation using Model-agnostic Interpretable Machine Learning

Negri, F. R.; Nicolosi, N.; Camilli, M.; Mirandola, R.
2024. IEEE/ACM proceedings of the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS2024)

Publication
Apr 15, 2024
Software Engineering

RAMSES: An Exemplar for Engineering Self-Adaptive Microservice Applications

Riccio, V.; Sorrentino, G.; Zamponi, E.; Camilli, M.; Mirandola, R.; Scandurra, P.
2024. IEEE/ACM proceedings of the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS2024), Institute of Electrical and Electronics Engineers (IEEE)

Publication
Apr 14, 2024
Software Engineering

Detecting Automatic Software Plagiarism via Token Sequence Normalization

Sağlam, T.; Brödel, M.; Schmid, L.; Hahner, S.
2024. Proceedings of the 46th International Conference on Software Engineering, ICSE ’24, Lissabon, April 14-20, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Apr 14, 2024
Software Engineering

Multi-requirement Parametric Falsification

Camilli, M.; Mirandola, R.
2024. 46th International Conference on Software Engineering (ICSE 2024), Lissabon, Portugal, 14.–20. April 2024

Publication
Mar 08, 2024
Privacy Societal Security Usable Security

Systematic User Evaluation of a Second Device based cast-as-intended verifiability Approach

Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.; Volkamer, M.
2024. Voting’24, Springer

Publication
Mar 05, 2024
Cryptography

Two-Party Decision Tree Training from Updatable Order-Revealing Encryption

Berger, R.; Dörre, F.; Koch, A.
2024. Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings. Part I. Ed.: C. Pöpper, 288–317, Springer International Publishing.

Publication
Feb 26, 2024
Software Engineering

Architecture-based Propagation Analyses Regarding Security

Hahner, S.; Walter, M.; Heinrich, R.; Reussner, R.
2024. Software Engineering 2024 (SE 2024), Gesellschaft für Informatik e.V.

Publication
Feb 26, 2024
Privacy Societal Security Usable Security

Exploring Phishing Threats through QR Codes in Naturalistic Settings

Sharevski, F.; Mossano, M.; Veit, M. F.; Schiefer, G.; Volkamer, M.
2024. Symposium on Usable Security and Privacy (USEC) 2024.

Publication
Jan 12, 2024
Cryptography Quantification

Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements

Tiepelt, M.; Eaton, E.; Stebila, D.
2024. Computer Security – ESORICS 2023. Ed.: G. Tsudik. Pt. 1, 168–188, Springer Nature Switzerland.

Publication
Jan 11, 2024
IT Security Privacy

Panini — Anonymous Anycast and an Instantiation

Coijanovic, C.; Weis, C.; Strufe, T.
2024. Computer Security – ESORICS 2023 – 28th European Symposium on Research in Computer Security : The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II. Ed.: G. Tsudik, 193 – 211, Springer, Cham.

Publication
Jan 08, 2024
Energy Systems Security

Verifiable Certificateless Signcryption Scheme for Smart Grids

Ramadan, M.; Elbez, G.; Hagenmeyer, V.
2024. 2023 7th International Conference on System Reliability and Safety (ICSRS), 181–189, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jan 01, 2024
Legal Informatics

DGRI-Jahrestagung 2023: KI, Cybersicherheit/Cyberresilienz, Datenökonomie

Dieler, P.
2024. Computer und Recht, 40 (1), R9-R11

Publication
Dec 31, 2023
Societal Security Usable Security

Online-Wahlen und digitale Abstimmungen – eine Einordnung aktueller Entwicklungen

Volkamer, M.; Mayer, A.; Neumann, S.; Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Müller-Quade, J.
2023. DGRI Jahrbuch 2021/2022, 141–160, Verlag Dr. Otto Schmidt.

Publication
Dec 21, 2023
Software Engineering

Recovering Trace Links Between Software Documentation And Code

Keim, J.; Corallo, S.; Fuchß, D.; Hey, T.; Telge, T.; Koziolek, A.
2024. Proceedings of 46th International Conference on Software Engineering (ICSE 2024)

Publication
Dec 15, 2023
Legal Informatics

“Complete” Independence of the ICO and Strategic Priorities of the UK Government?

Winau, M.
2023. Computer law & security review, (6), 180–187

Publication
Dec 04, 2023
Cryptography

Practically Efficient Private Set Intersection From Trusted Hardware with Side-Channels

Dörre, F.; Mechler, J.; Müller-Quade, J.
2023. Advances in Cryptology – ASIACRYPT 2023 – 29th International Conference on the Theory and Application of Cryptology and Information Security, Springer Verlag

Publication
Nov 27, 2023
Decentralized Systems

ABCperf: Performance Evaluation of Fault Tolerant State Machine Replication Made Simple: Demo Abstract

Spannagel, T.; Leinweber, M.; Castro, A.; Hartenstein, H.
2023. Proceedings of the 24th International Middleware Conference Demos, Posters and Doctoral Symposium, 35–36, Association for Computing Machinery (ACM).

Publication
Nov 26, 2023
IT Security Privacy

BAZAAR: Anonymous Resource Sharing

Coijanovic, C.; Schadt, D.; Weis, C.; Strufe, T.
2023. WPES ’23: Proceedings of the 22nd Workshop on Privacy in the Electronic Society, Kopenhagen, 26th November 2023, 135–139, Association for Computing Machinery (ACM).

Publication
Nov 21, 2023
IT Security Privacy

Poster: Towards Practical Brainwave-based User Authentication

Fallahi, M.; Arias-Cabarcos, P.; Strufe, T.
2023. CCS’ 23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Kopenhagen, 26th-30th November 2023, 3627–3629, Association for Computing Machinery (ACM).

Publication
Nov 20, 2023
Software Engineering

Engineering Self-adaptive Microservice Applications: An Experience Report

Riccio, V.; Sorrentino, G.; Camilli, M.; Mirandola, R.; Scandurra, P.
2023. Service-Oriented Computing – 21st International Conference, ICSOC 2023, Rome, Italy, November 28 – December 1, 2023, Proceedings, Part I. Ed.: F. Monti, 227–242, Springer Nature Switzerland.

Publication
Nov 15, 2023
Legal Informatics Societal Security

Online-Bundestagswahlen – Verfassungsrechtliche Grenzen und technische Herausforderungen

Gutjahr, A.; Spiecker gen. Döhmann, I.; Volkamer, M.
2023. Computer und Recht, 767–776

Publication
Nov 15, 2023
Cryptography Privacy

Universally Composable Auditable Surveillance

Fetzer, V.; Klooß, M.; Müller-Quade, J.; Raiber, M.; Rupp, A.
2023. ASIACRYPT 2023, 4th – 8th December 2023, 145, Springer Verlag

Publication
Nov 15, 2023
Human-Centered IT Security Privacy Usable Security

“I just stopped using one and started using the other”: Motivations, Techniques, and Challenges When Switching Password Managers

Munyendo, C. W.; Mayer, P.; Aviv, A. J. 2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3123–3137, Association for Computing Machinery (ACM).

Publication
Nov 15, 2023
Machine Learning

Poster: Fooling XAI with Explanation-Aware Backdoors

Noppel, M.; Wressnegger, C.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3612–3614, Association for Computing Machinery (ACM).

Publication
Nov 15, 2023
IT Security System Security

Load-and-Act: Increasing Page Coverage of Web Applications

Weidmann, N.; Barber, T.; Wressnegger, C.
2023. Information Security – 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15–17, 2023, Proceedings. Ed.: E. Athanasopoulos, 163–182, Springer Nature Switzerland.

Publication
Nov 14, 2023
Legal Informatics Privacy

How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Noti-fication Study Reveals Diverse Circumstances and Challenges

Spiecker genannt Döhmann, I.; Stöver, A.; Gerber, N.; Pridöhl, H.; Maass, M.; Bretthauer, S.; Hollick, M.; Herrmann, D.
2023. Proceedings on privacy enhancing technologies, 2023, 251–264.

Publication
Nov 14, 2023
Legal Informatics

Geschlechtergerechtigkeit im Spannungsfeld von nachhaltiger und digitaler Transformation – eine interdisziplinäre Annäherung

Spiecker genannt Döhmann, I.; Ohde, F.; Blättel-Mink, B.; Draude, C.
2023. Gender, (2), 132–147

Publication
Nov 06, 2023
Cyber Physical Systems Dependability Software Engineering

Identifying Performance Challenges in Consistency Preserving View-Based Environments

König, L.; Weber, T.
2023. Softwaretechnik-Trends, 14th Symposium on Software Performance 2023, Karlsruhe, 6th – 8th November 2023, 26–28, Gesellschaft für Informatik (GI).

Publication
Nov 02, 2023
Network Security

SAFFIRRE: Selective Aggregate Filtering Through Filter Rule Refinement

Heseding, H.; Bachmann, F.; Bien, P. S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), Izmir, 4th-06th October 2023, 42–46, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 31, 2023
Human-Centered IT Security Privacy

Human-Centered Design for Data-Sparse Tailored Privacy Information Provision

Goram, M.; Dehling, T.; Morsbach, F.; Sunyaev, A.
2023. Human Factors in Privacy Research. Ed.: N. Gerber, 283–298, Springer International Publishing.

Publication
Oct 31, 2023
Privacy Usable Security

Awareness, Intention, (In)Action: Individuals’ Reactions to Data Breaches

Mayer, P.; Zou, Y.; Lowens, B. M.; Dyer, H. A.; Le, K.; Schaub, F.; Aviv, A. J.
2023. ACM Transactions on Computer-Human Interaction, 30 (5), 1–53.

Publication
Oct 31, 2023
Energy Systems Security Machine Learning

On Evasion of Machine Learning-based Intrusion Detection in Smart Grids

Mumrez, A.; Sánchez, G.; Elbez, G.; Hagenmeyer, V.
2023. IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids

Publication
Oct 30, 2023
Usable Security

Encouraging Organisational Information Security Incident Reporting

Ballreich, F. L.; Volkamer, M.; Müllmann, D.; Berens, B. M.; Häußler, E. M.; Renaud, K. V.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 224–236, Association for Computing Machinery (ACM).

Publication
Oct 30, 2023
Economic Security Trustworthy Internet Technologies

The Future of Enterprise Information Systems

Sunyaev, A.; Dehling, T.; Strahringer, S.; Da Xu, L.; Heinig, M.; Perscheid, M.; Alt, R.; Rossi, M.
2023. Business & Information Systems Engineering.

Publication
Oct 29, 2023
Cryptography

Composable Long-Term Security with Rewinding

Berger, R. M.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
2023. Theory of Cryptography. 21th International Conference, TCC 2023. Proceedings, Part 1. Ed.: G. Rothblum, Springer Verlag

Publication
Oct 16, 2023
Usable Security

Influence of URL Formatting on Users’ Phishing URL Detection

Mossano, M.; Kulyk, O.; Berens, B. M.; Häußler, E. M.; Volkamer, M.
2023. Proceedings of the 2023 European Symposium on Usable Security, 318–333, Association for Computing Machinery (ACM).

Publication
Oct 09, 2023
Energy Systems Security

A new hybrid risk assessment process for cyber security design of smart grids using fuzzy analytic hierarchy processes

Canbolat, S.; Elbez, G.; Hagenmeyer, V.
2023. Automatisierungstechnik.

Publication
Oct 06, 2023
Network Services Privacy

Brief Announcement: Let It TEE: Asynchronous Byzantine Atomic Broadcast with n ≥ 2f+1

Leinweber, M.; Hartenstein, H.
2023. 37th International Symposium on Distributed Computing (DISC 2023). Ed.: R. Oshman, 43:1–43:7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (LZI).

Publication
Oct 04, 2023
Network Security

eMinD: Efficient and Micro-Flow Independent Detection of Distributed Network Attacks

Kopmann, S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), 159–167, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 03, 2023
Societal Security Usable Security

Voter Perception of Cast-as-Intended Verifiability in the Estonian I-Vote Protocol

Hilt, T.; Sein, K.; Mällo, T.; Willemson, J.; Volkamer, M.
2023. E-Vote-ID 2023

Publication
Oct 01, 2023
Cyber Physical Systems Dependability Software Engineering

Co-Evolving Meta-Models and View Types in View-Based Development

Muctadir, H. M.; König, L.; Weber, T.; Amrani, M.; Cleophas, L.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), 954–963, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 27, 2023
Dependability Network Services

Investigating the Role of Computing Education for Informed Usage Decision-Making

Gebhardt, L.; Leinweber, M.; Michaeli, T.
2023. WiPSCE ’23: The 18th WiPSCE Conference on Primary and Secondary Computing Education Research Cambridge United Kingdom September 27 – 29, 2023. Ed.: S. Sentance, 1–2, Association for Computing Machinery (ACM).

Publication
Sep 26, 2023
Legal Informatics

§ 20: Digitalisierung, Informationsgesellschaft, Massendaten

Spiecker genannt Döhmann, I.
2023. Handbuch des Staatsrechts, Band I: Grundlagen, Wandel und Herausforderungen. Hrsg.: Uwe Kischel, Hanno Kube, 899–934, C.F. Müller

Publication
Sep 26, 2023
Machine Learning

Explanation-Aware Backdoors in a Nutshell

Noppel, M.; Wressnegger, C.
2023. Proc. of 46th German Conference on Artificial Intelligence (KI)

Publication
Sep 25, 2023
Cyber Physical Systems Process Security

Labeling NIDS Rules with MITRE ATT&CK Techniques using ChatGPT

Daniel, N.; Kaiser, F. K.; Dzega, A.; Elyashar, A.; Puzis, R.
2023. 4th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection

Publication
Sep 25, 2023
IT Security Privacy

Panini – Anonymous Anycast and an Instantiation

Coijanovic, C.; Weis, C.; Strufe, T.
2024. 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Springer Verlag

Publication
Sep 19, 2023
Legal Informatics

Article-by-Article Commentary on the European General Data Protection Regulation

Papakonstantinou, V.; Hornung, G.
2023. (P. De Hert & I. Spiecker genannt Döhmann, Hrsg.), Nomos

Publication
Sep 18, 2023
Machine Learning Production Security

Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models

Borcherding, A.; Morawetz, M.; Pfrang, S.
2023. Sensors, 23 (18), Art.-Nr.: 7864.

Publication
Sep 12, 2023
Network Security Production Security

Towards Self-learning Industrial Process Behaviour from Payload Bytes for Anomaly Detection

Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA), Sinaia, Romania, 12-15 September 2023, Institute of Electrical and Electronics Engineers (IEEE). 

Publication
Sep 08, 2023
Dependability Software Engineering

Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents

Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Architecture. Ed.: B. Tekinerdogan, 37–53, Springer Nature Switzerland AG.

Publication
Sep 06, 2023
Decentralized Systems Dependability

Static Capability-Based Security for Smart Contracts

Schiffl, J.; Weigl, A.; Beckert, B.
2023. 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 110 – 117, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 06, 2023
Machine Learning

Lessons Learned on Machine Learning for Computer Security

Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2023. 
IEEE Security & Privacy, 21 (5), 72–77.

Publication
Sep 04, 2023
Privacy Usable Security

Zu Risiken und Anonymisierungen von Verhaltensbiometrie

Hanisch, S.; Todt, J.; Volkamer, M.; Strufe, T.
2023. Daten-Fairness in einer globalisierten Welt. Ed.: M. Friedewald, 423–444, Nomos Verlagsgesellschaft.

Publication
Sep 04, 2023
Machine Learning Network Security

Impact of Adaptive Packet Sampling on ML-based DDoS Detection

Kopmann, S.; Zitterbart, M.
2023. 2nd Workshop “Machine Learning & Networking” (MaLeNe) Proceedings Co-Located with the 5th International Conference on Networked Systems (NETSYS 2023) Potsdam, Germany, September 4, 2023 (MaLeNe). Ed.: M. Seufert

Publication
Sep 04, 2023
Energy Systems Security Machine Learning

Comparative Study on Smart Grid Security Testbeds Using MITRE ATT&CK Matrix

Mumrez, A.; Muhammad M. Roomi; Heng Chuan Tan; Daisuke Mashima; Elbez, G.; Hagenmeyer, V.
2023. 14th IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, Institute of Electrical and Electronics Engineers (IEEE)

Publication
Sep 04, 2023
Machine Learning Network Security

Reducing memory footprints in purity estimations of volumetric DDoS traffic aggregates

Heseding, H.; Krack, T.; Zitterbart, M.
2023. M. Seufert, A. Blenk & O. Landsiedel (Hrsg.), 2nd Workshop on Machine Learning & Netwoking (MaLeNe) with the 5th International Conference on Networked Systems (NetSys 2023), Potsdam, 4th – 8th September 2023

Publication
Sep 03, 2023
Societal Security Trustworthy Internet Technologies

Nutzerzentrierter Ansatz zur Vereinfachung des Auffindens von Security Policies

Aldag, L.; Ballreich, F.; Berens, B.; Volkamer, M.
2023. Mensch und Computer 2023, Gesellschaft für Informatik (GI)

Publication
Aug 28, 2023
Software Engineering

True Variability Shining Through Taxonomy Mining

König, C.; Rosiak, K.; Cleophas, L.; Schaefer, I.
2023. Proceedings of the 27th ACM International Systems and Software Product Line Conference – Volume A, 182–193, Association for Computing Machinery (ACM).

Publication
Aug 28, 2023
Mobility Systems Security Software Engineering

Continuous T-Wise Coverage

Pett, T.; Heß, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2023. SPLC ’23: Proceedings of the 27th ACM International Systems and Software Product Line Conference. Vol. A. Ed.: P. Arcaini, 87–98, Association for Computing Machinery (ACM).

Publication
Aug 17, 2023
Software Engineering

A Toolchain for Simulation Component Specification and Identification

Koch, S.; Reiche, F.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 75–89, Springer International Publishing.

Publication
Aug 10, 2023
Mobility Systems Security Modeling Software Engineering

Establishing a Benchmark Dataset for Traceability Link Recovery Between Software Architecture Documentation and Models

Fuchß, D.; Corallo, S.; Keim, J.; Speit, J.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops, Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 455–464, Springer International Publishing.

Publication
Aug 09, 2023
Cryptography

Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from VOLE-in-the-Head

Baum, C.; Braun, L.; Saint Guilhem, C. D. De; Klooß, M.; Orsini, E.; Roy, L.; Scholl, P.
2023. Advances in Cryptology – CRYPTO 2023 – 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V. Ed.: H. Handschuh, 581–615, Springer Nature Switzerland.

Publication
Aug 08, 2023
Cryptography

Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version)

Attema, T.; Fehr, S.; Klooß, M.
2023. Journal of Cryptology, 36 (4), Art.-Nr.: 36.

Publication
Jul 25, 2023
Network Security

Toward Joining DDoS Mitigation and Image Segmentation – Leveraging Computer Vision for Network Security

Kopmann, S.; Heseding, H.; Zitterbart, M.
2023. Datenschutz und Datensicherheit – DuD, 47 (8), 475–477.

Publication
Jul 25, 2023
Legal Informatics

Abschreckungseffekte und Überwachungsgefühl im Datenschutzrecht. Auswirkungen auf betroffene Personen

Spiecker genannt Döhmann, I.; Büscher, M.; Gutjahr, A.; Hornung, G.; Schindler, S.; Selzer, A.; Stummer, S.; Wilmer, T.; Zurawski, P.
2023. Datenschutz und Datensicherheit, 503–512

Publication
Jul 22, 2023
Dependability

A Classification of Software-Architectural Uncertainty Regarding Confidentiality

Hahner, S.; Seifermann, S.; Heinrich, R.; Reussner, R.
2023. E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, 139–160, Springer International Publishing.

Publication
Jul 21, 2023
Machine Learning

Disguising Attacks with Explanation-Aware Backdoors

Noppel, M.; Peter, L.; Wressnegger, C.
2023. 2023 IEEE Symposium on Security and Privacy (SP), 664 – 681, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jul 18, 2023
Communication Security Network Security

TRUST: Transparent Redundancy for UDP STreams

Neumeister, F.; Göckel, M.; Zitterbart, M.
2023. IEEE 21st International Conference on Industrial Informatics (INDIN 2023), 7 S., Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jul 17, 2023
Dependability Software Engineering

Tool-Based Attack Graph Estimation and Scenario Analysis for Software Architectures

Walter, M.; Reussner, R.
2023. Software Architecture : ECSA 2022 Tracks and Workshops. Ed.: T. Batista, 45–61, Springer International Publishing.

Publication
Jul 13, 2023
Dependability Verification

Reconstructing z3 proofs in KeY: There and back again

Pfeifer, W.; Schiffl, J.; Ulbrich, M.
2021. Proceedings of the 23rd ACM International Workshop on Formal Techniques for Java-like Programs : 23rd ACM International Workshop on Formal Techniques for Java-Like Programs, FTfJP 2021, co-located with ECOOP/ISSTA 2021, Online, 13 July 2021 – null, 24–31, Association for Computing Machinery (ACM).

Publication
Jul 10, 2023
IT Security Privacy

SoK: Differentially Private Publication of Trajectory Data

Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies, 496–516, De Gruyter.

Publication
Jul 10, 2023
Privacy

Understanding person identification via gait

Hanisch, S.; Muschter, E.; Chatzipanagioti, A.; Li, S.-C.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs)

Publication
Jul 10, 2023
Privacy

Understanding Person Identification through Gait

Hanisch, S.; Muschter, E.; Hatzipanayioti, A.; Li, S.-C.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), 177–189.

Publication
Jun 30, 2023
Dependability Software Engineering

Investigating Software Engineering Artifacts in DevOps Through the Lens of Boundary Objects

Matthies, C.; Heinrich, R.; Wohlrab, R.
2023. EASE ’23: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 12–21, Association for Computing Machinery (ACM).

Publication
Jun 27, 2023
Production Security Software Engineering

Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0

Walter, M.; Hahner, S.; Bureš, T.; Hnětynka, P.; Heinrich, R.; Reussner, R.
2023. at – Automatisierungstechnik, 71 (6), 443–452.

Publication
Jun 20, 2023
Privacy Trustworthy Internet Technologies

A design theory for transparency of information privacy practices

Dehling, T.; Sunyaev, A.
2023. Information Systems Research, accepted manusript, 1–45.

Publication
Jun 16, 2023
Legal Informatics

Neue alte Entwicklungen für das Verwaltungsrecht: Von Kooperation und Dreiecksverhältnissen zur Konfliktbefriedung und Vertrauensbildung im Wirtschaftsverwaltungs- und Gesundheitsrecht

Spiecker genannt Döhmann, I.
2023. Schutz des Individuums durch das Recht: Festschrift für Professor Rainer Hofmann zum 70. Geburtstag. Bd.2. Hrsg.: Philipp B. Donath, Alexnader Heger, Moritz Malkmus, Orhan Bayrak, 1135–1150, Springer

Publication
Jun 15, 2023
Legal Informatics

Governance Foundations for the European Cybersecurity Community

Spiecker genannt Döhmann, I.; Ferreira, A.; Wintzingerode, C. von; Müllmann, D.; Benzekri, A.; Cros, P.-H.; Prochilo, E.
2023. Digital Sovereignty in Cyber Security: New Challenges in Future Vision: First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers, 132–148, Springer Nature Switzerland AG

Publication
May 13, 2023
Dependability Software Engineering

Model-based Confidentiality Analysis under Uncertainty

Hahner, S.; Bitschi, T.; Walter, M.; Bureš, T.; Hnětynka, P.; Heinrich, R.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), 256–263, Institute of Electrical and Electronics Engineers (IEEE).

Publication
May 11, 2023
Privacy Usable Security

Cookie-Nutzung nach Inkrafttreten des TTDSG – Zur Datenschutzkonformität des Cookie-Einsatzes auf den meistgenutzten deutschen Websites

Bohlender, M.; Dietmann, H.; Volkamer, M.
2023. Datenschutz und Datensicherheit – DuD, 47 (5), 283–288.

Publication
May 07, 2023
Cryptography

Sender-binding Key Encapsulation

Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.

Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I. Ed.: A. Boldyreva, Springer Nature Switzerland AG

May 05, 2023
Decentralized Systems Network Services

On Extend-Only Directed Posets and Derived Byzantine-Tolerant Replicated Data Types

Jacob, F.; Hartenstein, H.
2023. PaPoC ’23: 10th Workshop on Principles and Practice of Consistency for Distributed Data Rome Italy 8 May 2023.Ed.: E. Gonzalez Boix, 63–69, Association for Computing Machinery (ACM).

Publication
May 03, 2023
Energy Systems Security Network Security

Early Attack Detection for Securing GOOSE Network Traffic

Elbez, G.; Nahrstedt, K.; Hagenmeyer, V.
2023. IEEE Transactions on Smart Grid.

Publication
May 01, 2023
Machine Learning

Holistic Adversarially Robust Pruning

Zhao, Q.; Wressnegger, C.
2023. 11th International Conference on Learning Representations (ICLR), Kigali, 1st-5th May 2023

Apr 19, 2023
Privacy

A Survey on Privacy-Preserving Electronic Toll Collection Schemes for Intelligent Transportation Systems

Adavoudi Jolfaei, A.; Boualouache, A.; Rupp, A.; Schiffner, S.; Engel, T.
2023. IEEE Transactions on Intelligent Transportation Systems, 24 (9), 8945–8962.

Publication
Apr 18, 2023
Human-Centered IT Security Privacy

BrainNet: Improving Brainwave-based Biometric Recognition with Siamese Networks

Fallahi, M.; Strufe, T.; Arias-Cabarcos, P.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications (PerCom), 53–60, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Apr 01, 2023
Legal Informatics

Intelligente Verkehrssysteme – IT-Sicherheit in offenen Infrastrukturen Teil 2

Sterz, L.; Werner, C.; Raabe, O.
2023. Recht der Datenverarbeitung, 39 (2), 97–105

Publication
Mar 13, 2023
Modeling Software Engineering

Automatic Derivation of Vulnerability Models for Software Architectures

Kirschner, Y. R.; Walter, M.; Bossert, F.; Heinrich, R.; Koziolek, A.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), L’Aquila, Italy, 13-17 March 2023, 276–283, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 13, 2023
Human-Centered IT Security Privacy

Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices

Arias-Cabarcos, P.; Fallahi, M.; Habrich, T.; Schulze, K.; Becker, C.; Strufe, T.
2023. ACM Transactions on Privacy and Security.

Publication
Mar 13, 2023
Communication Security Privacy Production Security

Applying Differential Privacy to Medical Questionnaires

Appenzeller, A.; Terzer, N.; Philipp, P.; Beyerer, J.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 608–613, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 11, 2023
Legal Informatics

Dienstleistungsroboter im Handel: Einsatzmöglichkeiten und verantwortungsbewusster Einsatz

Spiecker genannt Döhmann, I.; Stock-Homburg, R.; Knof, M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; David, K.; Wendt, J.; Stryk, O. von; Hannig, M.
2023. L. Binckebanck, R. Elste & A. Haas (Hrsg.), Digitalisierung im Vertrieb : Strategien zum Einsatz neuer Technologien in Vertriebsorganisationen / Lars Binckebanck, Rainer Elste, Alexander Haas, 533–568, Springer

Publication
Feb 27, 2023
Machine Learning

Machine Unlearning of Features and Labels

Warnecke, A.; Pirch, L.; Wressnegger, C.; Rieck, K.
2023Network and Distributed System Security (NDSS) Symposium 2023: 27 February – 3 March 2023, San Diego, CA, USA.

Publication
Feb 22, 2023
Privacy Production Security

SWaTEval: An Evaluation Framework for Stateful Web Application Testing

Borcherding, A.; Penkov, N.; Giraud, M.; Beyerer, J.
2023. Proceedings of the 9th International Conference on Information Systems Security and Privacy – ICISSP, 430–441, SciTePress.

Publication
Feb 20, 2023
Dependability Software Engineering

Identifizierung von Vertraulichkeitsproblemen mithilfe von Angriffsausbreitung auf Architektur

Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Engineering 2023. Hrsg.: R. Engels, 123–124, Gesellschaft für Informatik (GI)

Publication
01 / 04