Publications

Our interdisciplinary research is reflected in the outstanding publications of KASTEL Security Research Labs.

Sep 19, 2023
Legal Informatics

Article-by-Article Commentary on the European General Data Protection Regulation

Papakonstantinou, V.; Hornung, G.
2023. (P. De Hert & I. Spiecker genannt Döhmann, Hrsg.), Nomos

Publication
Sep 19, 2023
Legal Informatics

General Data Protection Regulation. Article-by-Article Commentary

Papakonstantinou, V.; Hornung, G.
2023. (P. De Hert & I. Spiecker genannt Döhmann, Hrsg.), Nomos

Publication
Sep 18, 2023
Dependability Software Engineering

An Extensible Framework for Architecture-Based Data Flow Analysis for Information Security

Boltz, N.; Hahner, S.; Gerking, C.; Heinrich, R.
2024. Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral Symposium : Istanbul, Turkey, September 18–22, 2023, Revised Selected Papers. Ed.: B. Tekinerdoğan, 342–358, Springer.

Publication
Sep 15, 2023
Cryptography Energy Systems Security

Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems

Ramadan, M.; Raza, S.
2023. IEEE Internet of Things Journal, 10 (18), 16594–16604.

Publication
Sep 13, 2023
Machine Learning Production Security

Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models

Borcherding, A.; Morawetz, M.; Pfrang, S.
2023. Sensors, 23 (18), Art.-Nr.: 7864.

Publication
Sep 12, 2023
Network Security Production Security

Towards Self-learning Industrial Process Behaviour from Payload Bytes for Anomaly Detection

Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA), Sinaia, Romania, 12-15 September 2023, Institute of Electrical and Electronics Engineers (IEEE). 

Publication
Sep 10, 2023
Machine Learning System Security

On the Similarity of Web Measurements Under Different Experimental Setups

Demir, N.; Hörnemann, J.; Große-Kampmann, M.; Urban, T.; Holz, T.; Pohlmann, N.; Wressnegger, C.
2023. Proceedings of the 23nd ACM Internet Measurement Conference, 23nd ACM Internet Measurement Conference (2023) Montreal, Kanada, 24.10.2023–26.10.2023, 356 – 369, Association for Computing Machinery (ACM).

Publication
Sep 08, 2023
Dependability Software Engineering

Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents

Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Architecture. Ed.: B. Tekinerdogan, 37–53, Springer Nature Switzerland AG.

Publication
Sep 08, 2023
Energy Systems Security

A new hybrid risk assessment process for cyber security design of smart grids using fuzzy analytic hierarchy processes

Canbolat, S.; Elbez, G.; Hagenmeyer, V.
2023. Automatisierungstechnik.

Publication
Sep 08, 2023
Software Engineering

Automated Reverse Engineering of the Technology-Induced Software System Structure

Kirschner, Y. R.; Keim, J.; Peter, N.; Koziolek, A.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 283–291, Springer Nature Switzerland.

Publication
Sep 08, 2023
Software Engineering

Automated Integration of Heteregeneous Architecture Information into a Unified Model

Jordan, S.; König, C.; Linsbauer, L.; Schaefer, I.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 83 – 99, Springer Nature Switzerland.

Publication
Sep 06, 2023
Machine Learning

Lessons Learned on Machine Learning for Computer Security

Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2023. 
IEEE Security & Privacy, 21 (5), 72–77.

Publication
Sep 04, 2023
Privacy Usable Security

Zu Risiken und Anonymisierungen von Verhaltensbiometrie

Hanisch, S.; Todt, J.; Volkamer, M.; Strufe, T.
2023. Daten-Fairness in einer globalisierten Welt. Ed.: M. Friedewald, 423–444, Nomos Verlagsgesellschaft.

Publication
Sep 04, 2023
Machine Learning Network Security

Impact of Adaptive Packet Sampling on ML-based DDoS Detection

Kopmann, S.; Zitterbart, M.
2023. 2nd Workshop “Machine Learning & Networking” (MaLeNe) Proceedings Co-Located with the 5th International Conference on Networked Systems (NETSYS 2023) Potsdam, Germany, September 4, 2023 (MaLeNe). Ed.: M. Seufert

Publication
Sep 04, 2023
Machine Learning Network Security

Reducing memory footprints in purity estimations of volumetric DDoS traffic aggregates

Heseding, H.; Krack, T.; Zitterbart, M.
2023. M. Seufert, A. Blenk & O. Landsiedel (Hrsg.), 2nd Workshop on Machine Learning & Netwoking (MaLeNe) with the 5th International Conference on Networked Systems (NetSys 2023), Potsdam, 4th – 8th September 2023

Publication
Sep 03, 2023
Societal Security Trustworthy Internet Technologies

Nutzerzentrierter Ansatz zur Vereinfachung des Auffindens von Security Policies

Aldag, L.; Ballreich, F.; Berens, B.; Volkamer, M.
2023. Mensch und Computer 2023, Gesellschaft für Informatik (GI)

Publication
Sep 03, 2023
Societal Security Usable Security

A user-centred approach to facilitate locating company security policies : Nutzerzentrierter Ansatz zur Vereinfachung des Auffindens von Security Policies

Aldag, L.; Ballreich, F.; Berens, B.; Volkamer, M.
2023. MuC ’23: Proceedings of Mensch und Computer. Ed.: M. Stolze, 173–185, Association for Computing Machinery (ACM).

Publication
Aug 28, 2023
Software Engineering

True Variability Shining Through Taxonomy Mining

König, C.; Rosiak, K.; Cleophas, L.; Schaefer, I.
2023. Proceedings of the 27th ACM International Systems and Software Product Line Conference – Volume A, 182–193, Association for Computing Machinery (ACM).

Publication
Aug 28, 2023
Mobility Systems Security Software Engineering

Continuous T-Wise Coverage

Pett, T.; Heß, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2023. SPLC ’23: Proceedings of the 27th ACM International Systems and Software Product Line Conference. Vol. A. Ed.: P. Arcaini, 87–98, Association for Computing Machinery (ACM).

Publication
Aug 18, 2023
Machine Learning

Personalized Explanations

Becker, M.
2023. Proceedings of the 2022 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer, 1–10, KIT Scientific Publishing

Publication
Aug 17, 2023
Software Engineering

A Toolchain for Simulation Component Specification and Identification

Koch, S.; Reiche, F.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 75–89, Springer International Publishing.

Publication
Aug 09, 2023
Cryptography

Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from VOLE-in-the-Head

Baum, C.; Braun, L.; Saint Guilhem, C. D. De; Klooß, M.; Orsini, E.; Roy, L.; Scholl, P.
2023. Advances in Cryptology – CRYPTO 2023 – 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V. Ed.: H. Handschuh, 581–615, Springer Nature Switzerland.

Publication
Aug 08, 2023
Privacy Trustworthy Internet Technologies

A design theory for transparency of information privacy practices

Dehling, T.; Sunyaev, A.
2023. Information Systems Research, accepted manusript, 1–45.

Publication
Aug 08, 2023
Cryptography

Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version)

Attema, T.; Fehr, S.; Klooß, M.
2023. Journal of Cryptology, 36 (4), Art.-Nr.: 36.

Publication
Aug 01, 2023
Legal Informatics

Areas of Tension in the Application of AI and Data Protection Law

Winau, M.
2023. European Data Protection Law Review, 9 (2), 123 – 135.

Publication
Jul 25, 2023
Network Security

Toward Joining DDoS Mitigation and Image Segmentation – Leveraging Computer Vision for Network Security

Kopmann, S.; Heseding, H.; Zitterbart, M.
2023. Datenschutz und Datensicherheit – DuD, 47 (8), 475–477.

Publication
Jul 25, 2023
Legal Informatics

Abschreckungseffekte und Überwachungsgefühl im Datenschutzrecht. Auswirkungen auf betroffene Personen

Spiecker genannt Döhmann, I.; Büscher, M.; Gutjahr, A.; Hornung, G.; Schindler, S.; Selzer, A.; Stummer, S.; Wilmer, T.; Zurawski, P.
2023. Datenschutz und Datensicherheit, 503–512

Publication
Jul 21, 2023
Machine Learning

Disguising Attacks with Explanation-Aware Backdoors

Noppel, M.; Peter, L.; Wressnegger, C.
2023. 2023 IEEE Symposium on Security and Privacy (SP), 664 – 681, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jul 19, 2023
Machine Learning Mobility Systems Security

Adversarial Attacks on Traffic Sign Recognition: A Survey

Pavlitska, S.; Lambing, N.; Zöllner, J. M.
2023. 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Tenerife, Spain, 19-21 July 2023, 1–6, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jul 18, 2023
Communication Security Network Security

TRUST: Transparent Redundancy for UDP STreams

Neumeister, F.; Göckel, M.; Zitterbart, M.
2023. IEEE 21st International Conference on Industrial Informatics (INDIN 2023), 7 S., Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jul 17, 2023
Decentralized Systems Dependability

Static Capability-Based Security for Smart Contracts

Schiffl, J.; Weigl, A.; Beckert, B.
2023. 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 110 – 117, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jul 17, 2023
Network Security

Protocol-Agnostic Detection of Stealth Attacks on Networked Control Systems

Heseding, H.; Dieing, M.; Meshram, A.; Zitterbart, M.
2023. 2023 IEEE 21st International Conference on Industrial Informatics (INDIN), Lemgo, Germany, 17-20 2023, 1–7, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jul 17, 2023
Production Security

Counterfactual Root Cause Analysis via Anomaly Detection and Causal Graphs

Rehak, J.; Sommer, A.; Becker, M.; Pfrommer, J.; Beyerer, J.
2023. 2023 IEEE 21st International Conference on Industrial Informatics (INDIN), Lemgo, Germany, 17-20 July 2023, 1–7, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jul 13, 2023
Dependability Verification

Reconstructing z3 proofs in KeY: There and back again

Pfeifer, W.; Schiffl, J.; Ulbrich, M.
2021. Proceedings of the 23rd ACM International Workshop on Formal Techniques for Java-like Programs : 23rd ACM International Workshop on Formal Techniques for Java-Like Programs, FTfJP 2021, co-located with ECOOP/ISSTA 2021, Online, 13 July 2021 – null, 24–31, Association for Computing Machinery (ACM).

Publication
Jul 10, 2023
IT Security Privacy

SoK: Differentially Private Publication of Trajectory Data

Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies, 496–516, De Gruyter.

Publication
Jul 10, 2023
Privacy

Understanding person identification via gait

Hanisch, S.; Muschter, E.; Chatzipanagioti, A.; Li, S.-C.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs)

Publication
Jul 10, 2023
Legal Informatics Privacy

How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Noti-fication Study Reveals Diverse Circumstances and Challenges

Spiecker genannt Döhmann, I.; Stöver, A.; Gerber, N.; Pridöhl, H.; Maass, M.; Bretthauer, S.; Hollick, M.; Herrmann, D.
2023. Proceedings on privacy enhancing technologies, 2023, 251–264.

Publication
Jul 10, 2023
Privacy

Understanding Person Identification through Gait

Hanisch, S.; Muschter, E.; Hatzipanayioti, A.; Li, S.-C.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), 177–189.

Publication
Jul 05, 2023
Human-Centered IT Security Privacy

Usability for Data Sovereignty – Evaluation of Privacy Risk Quantification Interfaces

Appenzeller, A.; Balduf, F.; Beyerer, J.
2023. Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments, 206–214, Association for Computing Machinery (ACM).

Publication
Jul 03, 2023
Production Security

The Bandit’s States: Modeling State Selection for Stateful Network Fuzzing as Multi-armed Bandit Problem

Borcherding, A.; Giraud, M.; Fitzgerald, I.; Beyerer, J.
2023. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 345–350, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jul 02, 2023
Verification

QIn: Enabling Formal Methods to Deal with Quantum Circuits

Klamroth, J.; Beckert, B.; Scheerer, M.; Denninger, O.
2023. 2023 IEEE International Conference on Quantum Software (QSW), Chicago, IL, 2nd – 8th July 2023, 175 – 185, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jul 01, 2023
Software Engineering

Evaluating Model Differencing for the Consistency Preservation of State-based Views

Wittler, J. W.; Saglam, T.; Kühn, T.
2023. The Journal of Object Technology, 22 (2), 2:1–14.

Publication
Jul 01, 2023
Cyber Physical Systems

Uniform Substitution for Dynamic Logic with Communicating Hybrid Programs

Brieger, M.; Mitsch, S.; Platzer, A.
2023. Automated Deduction – CADE 29 – 29th International Conference on Automated Deduction, Rome, Italy, July 1–4, 2023, Proceedings. Ed.: B. Pientka, 96 – 115, Springer Nature Switzerland.

Publication
Jun 27, 2023
Production Security Software Engineering

Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0

Walter, M.; Hahner, S.; Bureš, T.; Hnětynka, P.; Heinrich, R.; Reussner, R.
2023. at – Automatisierungstechnik, 71 (6), 443–452.

Publication
Jun 22, 2023
Legal Informatics

Geschlechtergerechtigkeit im Spannungsfeld von nachhaltiger und digitaler Transformation – eine interdisziplinäre Annäherung

Spiecker genannt Döhmann, I.; Ohde, F.; Blättel-Mink, B.; Draude, C.
2023. Gender, (2), 132–147

Publication
Jun 18, 2023
Machine Learning

Sparsely-gated Mixture-of-Expert Layers for CNN Interpretability

Pavlitska, S.; Hubschneider, C.; Struppek, L.; Zöllner, J. M.
2023. 2023 International Joint Conference on Neural Networks (IJCNN), 1–10, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jun 16, 2023
Legal Informatics

Neue alte Entwicklungen für das Verwaltungsrecht: Von Kooperation und Dreiecksverhältnissen zur Konfliktbefriedung und Vertrauensbildung im Wirtschaftsverwaltungs- und Gesundheitsrecht

Spiecker genannt Döhmann, I.
2023. Schutz des Individuums durch das Recht: Festschrift für Professor Rainer Hofmann zum 70. Geburtstag. Bd.2. Hrsg.: Philipp B. Donath, Alexnader Heger, Moritz Malkmus, Orhan Bayrak, 1135–1150, Springer

Publication
Jun 15, 2023
Legal Informatics

Governance Foundations for the European Cybersecurity Community

Spiecker genannt Döhmann, I.; Ferreira, A.; Wintzingerode, C. von; Müllmann, D.; Benzekri, A.; Cros, P.-H.; Prochilo, E.
2023. Digital Sovereignty in Cyber Security: New Challenges in Future Vision: First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers, 132–148, Springer Nature Switzerland AG

Publication
Jun 14, 2023
Dependability Software Engineering

Investigating Software Engineering Artifacts in DevOps Through the Lens of Boundary Objects

Matthies, C.; Heinrich, R.; Wohlrab, R.
2023. EASE ’23: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 12–21, Association for Computing Machinery (ACM).

Publication
Jun 07, 2023
Software Engineering

Flexible Correct-by-Construction Programming

Runge, T.; Bordis, T.; Potanin, A.; Thüm, T.; Schaefer, I.
2023. Logical Methods in Computer Science, Volume 19, Issue 2 (2), 16:1 – 16:36.

Publication
May 29, 2023
IT Security

Analysis and Prevention of Averaging Attacks Against Obfuscation Protocols

Becher, K.; Lagodzinski, J. A. G.; Parra-Arnau, J.; Strufe, T.
2023. Applied Cryptography and Network Security – 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part I. Ed.: M. Tibouchi, 451 – 475, Springer Nature Switzerland.

Publication
May 25, 2023
Machine Learning Production Security

Finding optimal decision boundaries for human intervention in one-class machine-learning models for industrial inspection

Zander, T.; Pan, Z.; Birnstill, P.; Beyerer, J.
2023. tm – Technisches Messen, 90 (7-8), 478–488.

Publication
May 24, 2023
Decentralized Systems Privacy Robotics

Poster: How to Raise a Robot – Beyond Access Control Constraints in Assistive Humanoid Robots

Hemken, N.; Jacob, F.; Peller-Konrad, F.; Kartmann, R.; Asfour, T.; Hartenstein, H.
2023. Proceedings of the 28th ACM Symposium on Access Control Models and Technologies. Ed.: Silvio Ranise, 55–57, Association for Computing Machinery (ACM).

Publication
May 15, 2023
Cyber Physical Systems

Refinements of Hybrid Dynamical Systems Logic

Platzer, A.
2023. Rigorous State-Based Methods – 9th International Conference, ABZ 2023, Nancy, France, May 30–June 2, 2023, Proceedings. Ed.: U. Glässer, 3 – 14, Springer Nature Switzerland.

Publication
May 15, 2023
Software Engineering

Architecture-Based Uncertainty Impact Analysis to Ensure Confidentiality

Hahner, S.; Heinrich, R.; Reussner, R.
2023. 2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 126–132, Institute of Electrical and Electronics Engineers (IEEE).

Publication
May 13, 2023
Dependability Software Engineering

Model-based Confidentiality Analysis under Uncertainty

Hahner, S.; Bitschi, T.; Walter, M.; Bureš, T.; Hnětynka, P.; Heinrich, R.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), 256–263, Institute of Electrical and Electronics Engineers (IEEE).

Publication
May 11, 2023
Privacy Usable Security

Cookie-Nutzung nach Inkrafttreten des TTDSG – Zur Datenschutzkonformität des Cookie-Einsatzes auf den meistgenutzten deutschen Websites

Bohlender, M.; Dietmann, H.; Volkamer, M.
2023. Datenschutz und Datensicherheit – DuD, 47 (5), 283–288.

Publication
May 11, 2023
Societal Security

Weiterleitungs-URLs in E-Mails – Technische und rechtliche Aspekte

Müllmann, D.; Veit, M. F.; Volkamer, M.
2023. Datenschutz und Datensicherheit – DuD, 47 (5), 275–282.

Publication
May 08, 2023
Decentralized Systems Network Services

On Extend-Only Directed Posets and Derived Byzantine-Tolerant Replicated Data Types

Jacob, F.; Hartenstein, H.
2023. PaPoC ’23: 10th Workshop on Principles and Practice of Consistency for Distributed Data Rome Italy 8 May 2023.Ed.: E. Gonzalez Boix, 63–69, Association for Computing Machinery (ACM).

Publication
May 03, 2023
Energy Systems Security Network Security

Early Attack Detection for Securing GOOSE Network Traffic

Elbez, G.; Nahrstedt, K.; Hagenmeyer, V.
2023. IEEE Transactions on Smart Grid.

Publication
May 02, 2023
Cryptography

Sender-binding Key Encapsulation

Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.

Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I. Ed.: A. Boldyreva, Springer Nature Switzerland AG

May 01, 2023
Machine Learning

Holistic Adversarially Robust Pruning

Zhao, Q.; Wressnegger, C.
2023. 11th International Conference on Learning Representations (ICLR), Kigali, 1st-5th May 2023

Apr 19, 2023
Privacy

A Survey on Privacy-Preserving Electronic Toll Collection Schemes for Intelligent Transportation Systems

Adavoudi Jolfaei, A.; Boualouache, A.; Rupp, A.; Schiffner, S.; Engel, T.
2023. IEEE Transactions on Intelligent Transportation Systems, 24 (9), 8945–8962.

Publication
Apr 18, 2023
Human-Centered IT Security Privacy

BrainNet: Improving Brainwave-based Biometric Recognition with Siamese Networks

Fallahi, M.; Strufe, T.; Arias-Cabarcos, P.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications (PerCom), 53–60, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Apr 16, 2023
Modeling Software Engineering

Automating GUI-based Software Testing with GPT-3

Zimmermann, D.; Koziolek, A.
2023. 2023 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 62 – 65, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Apr 15, 2023
Software Engineering

Design-time Performability Evaluation of Runtime Adaptation Strategies (Work In Progress Paper)

Rapp, M.; Scheerer, M.; Reussner, R.
2023. Companion of the 2023 ACM/SPEC International Conference on Performance Engineering, 9–15, Association for Computing Machinery (ACM).

Publication
Apr 01, 2023
Legal Informatics

Intelligente Verkehrssysteme – IT-Sicherheit in offenen Infrastrukturen Teil 2

Sterz, L.; Werner, C.; Raabe, O.
2023. Recht der Datenverarbeitung, 39 (2), 97–105

Publication
Mar 13, 2023
Modeling Software Engineering

Automatic Derivation of Vulnerability Models for Software Architectures

Kirschner, Y. R.; Walter, M.; Bossert, F.; Heinrich, R.; Koziolek, A.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), L’Aquila, Italy, 13-17 March 2023, 276–283, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 13, 2023
Communication Security Privacy Production Security

Applying Differential Privacy to Medical Questionnaires

Appenzeller, A.; Terzer, N.; Philipp, P.; Beyerer, J.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 608–613, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 13, 2023
Software Engineering

Detecting Inconsistencies in Software Architecture Documentation Using Traceability Link Recovery

Keim, J.; Corallo, S.; Fuchß, D.; Koziolek, A.
2023. 20th IEEE International Conference on Software Architecture (ICSA), 141–152, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 11, 2023
Legal Informatics

Dienstleistungsroboter im Handel: Einsatzmöglichkeiten und verantwortungsbewusster Einsatz

Spiecker genannt Döhmann, I.; Stock-Homburg, R.; Knof, M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; David, K.; Wendt, J.; Stryk, O. von; Hannig, M.
2023. L. Binckebanck, R. Elste & A. Haas (Hrsg.), Digitalisierung im Vertrieb : Strategien zum Einsatz neuer Technologien in Vertriebsorganisationen / Lars Binckebanck, Rainer Elste, Alexander Haas, 533–568, Springer

Publication
Mar 10, 2023
Human-Centered IT Security Privacy

Human-Centered Design for Data-Sparse Tailored Privacy Information Provision

Goram, M.; Dehling, T.; Morsbach, F.; Sunyaev, A.
2023. Human Factors in Privacy Research. Ed.: N. Gerber, 283–298, Springer International Publishing.

Publication
Mar 08, 2023
Verification

Combining rule- and SMT-based reasoning for verifying floating-point Java programs in KeY

Abbasi, R.; Schiffl, J.; Darulova, E.; Ulbrich, M.; Ahrendt, W.
2023. International Journal on Software Tools for Technology Transfer, 25 (2), 185–204.

Publication
Feb 27, 2023
Machine Learning

Machine Unlearning of Features and Labels

Warnecke, A.; Pirch, L.; Wressnegger, C.; Rieck, K.
2023Network and Distributed System Security (NDSS) Symposium 2023: 27 February – 3 March 2023, San Diego, CA, USA.

Publication
Feb 22, 2023
Privacy Production Security

SWaTEval: An Evaluation Framework for Stateful Web Application Testing

Borcherding, A.; Penkov, N.; Giraud, M.; Beyerer, J.
2023. Proceedings of the 9th International Conference on Information Systems Security and Privacy – ICISSP, 430–441, SciTePress.

Publication
Feb 20, 2023
Dependability Software Engineering

Identifizierung von Vertraulichkeitsproblemen mithilfe von Angriffsausbreitung auf Architektur

Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Engineering 2023. Hrsg.: R. Engels, 123–124, Gesellschaft für Informatik (GI)

Publication
Feb 20, 2023
Modeling Software Engineering

Evaluation Methods and Replicability of Software Architecture Research Objects

Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), Honolulu, HI, USA, 12-15 March 2022, 157–168, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Feb 03, 2023
Applied Informatics Software Engineering

Dynamic Access Control in Industry 4.0 Systems

Heinrich, R.; Seifermann, S.; Walter, M.; Hahner, S.; Reussner, R.; Bureš, T.; Hnětynka, P.; Pacovský, J.
2023. Digital Transformation. Ed.: B. Vogel-Heuser, 143–170, Springer Vieweg.

Publication
Jan 31, 2023
Cyber Physical Systems Verification

Formally Verified Next-generation Airborne Collision Avoidance Games in ACAS X

Cleaveland, R.; Mitsch, S.; Platzer, A.
2023. ACM Transactions on Embedded Computing Systems, 22, Article no: 10.

Publication
Jan 26, 2023
Legal Informatics

Die Zukunft der Gesundheitsberufe in Bildung und Migration

Spiecker gen. Döhmann, I.; Lehner, R.
2023. Lang

Publication
Jan 18, 2023
Human-Centered IT Security Privacy

Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices

Arias-Cabarcos, P.; Fallahi, M.; Habrich, T.; Schulze, K.; Becker, C.; Strufe, T.
2023. ACM Transactions on Privacy and Security.

Publication
Jan 11, 2023
Cyber Physical Systems

A First Complete Algorithm for Real Quantifier Elimination in Isabelle/HOL

Kosaian, K.; Tan, Y. K.; Platzer, A.
2023. Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs, 211–224, Association for Computing Machinery (ACM).

Publication
Jan 04, 2023
Communication Security Network Security

Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph

Kaiser, F. K.; Dardik, U.; Elitzur, A.; Zilberman, P.; Daniel, N.; Wiens, M.; Schultmann, F.; Elovici, Y.; Puzis, R.
2023. IEEE transactions on dependable and secure computing, 1–17.

Publication
Jan 03, 2023
Machine Learning

Randomness is the Root of All Evil: More Reliable Evaluation of Deep Active Learning

Ji, Y.; Kaestner, D.; Wirth, O.; Wressnegger, C.
2023. 2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 3932–3941, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jan 01, 2023
Legal Informatics Privacy

Roboter im Supermarkt – Eine Betrachtung haftungs- und datenschutzrechtlicher Probleme beim Einsatz von Robotern im Einzelhandel

Ebert, A.; Busch, P.; Spiecker genannt Döhmann, I.; Wendt, J.
2023. Zeitschrift für Product Compliance, (1), 16–29

Publication
Jan 01, 2023
Trustworthy Internet Technologies

HybCBDC: A Design for Central Bank Digital Currency Systems Enabling Digital Cash

Lamberty, R.; Kirste, D.; Kannengießer, N.; Sunyaev, A.
2023. IEEE Access.

Publication
Dec 30, 2022
Machine Learning

Suppress with a Patch: Revisiting Universal Adversarial Patch Attacks against Object Detection

Pavlitskaya, S.; Hendl, J.; Kleim, S.; Muller, L. J.; Wylczoch, F.; Zollner, J. M.
2022. 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), 1–6, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Dec 21, 2022
Economic Security Quantification

Weighted attack graphs and behavioral cyber game theory for cyber risk quantification

Kaiser, F. K.; Wiens, M.; Schultmann, F.
2022. Advances in Cyber Security and Intelligent Analytics. Ed.: A. Verma, 27–42, CRC Press-Taylor & Francis Group

Publication
Dec 17, 2022
Machine Learning System Security

How to Protect the Public Opinion Against New Types of Bots?

Reubold, J. L.; Escher, S. C.; Wressnegger, C.; Strufe, T.
2022. IEEE International Conference on Big Data

Publication
Dec 16, 2022
Production Security

Secure Provisioning of OPC UA Applications Using the Asset Administration Shell

Meier, D.; Vogl, J.; Kohnhäuser, F.; Beyerer, J.
2023. 2022 IEEE 17th Conference on Industrial Electronics and Applications (ICIEA), 144–149, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Dec 15, 2022
Legal Informatics Mobility Systems Security

Intelligente Verkehrssysteme – IT-Sicherheit in offenen Infrastrukturen Teil 1

Sterz, L.; Werner, C.; Raabe, O.
2022. Recht der Datenverarbeitung, 2022 (6), 291–299

Publication
Dec 05, 2022
Network Security System Security

LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems

Kühnapfel, N.; Preußler, S.; Noppel, M.; Schneider, T.; Rieck, K.; Wressnegger, C.
2021. Proceedings of 37th Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 6-10, 2021, 796–811, Association for Computing Machinery (ACM).

Publication
Dec 02, 2022
Software Engineering

Immutability and Encapsulation for Sound OO Information Flow Control

Runge, T.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. ACM Transactions on Programming Languages and Systems, 45 (1), Art.Nr. 3.

Publication
Dec 01, 2022
Legal Informatics

Grundlagen für ein gesetzliches IT-Sicherheitsrisikomanagement : Ansätze zur Vereinheitlichung von Rollenmodell, Risikomanagement und Definitionen für das IT-Sicherheitsrecht

Werner, C.; Brinker, N.; Raabe, O.
2022. Computer und Recht, 38 (12), 817–824.

Publication
Dec 01, 2022
Human-Centered IT Security Privacy

Privacy and Utility of Private Synthetic Data for Medical Data Analyses

Appenzeller, A.; Leitner, M.; Philipp, P.; Krempel, E.; Beyerer, J.
2022. Applied Sciences, 12 (23), Article no: 12320.

Publication
Nov 30, 2022
Dependability Societal Security

Why is Online Voting Still Largely a Black Box

Kirsten, M.; Volkamer, M.; Beckert, B.
2022

Publication
Nov 24, 2022
Machine Learning Production Security

Optimal human labelling for anomaly detection in industrial inspection

Zander, T.; Ziyan, P.; Birnstill, P.; Beyerer, J.
2022. Forum Bildverarbeitung 2022. Ed.: T. Längle, 49–59, KIT Scientific Publishing

Publication
Nov 23, 2022
Production Security

POET: A Self-learning Framework for PROFINET Industrial Operations Behaviour

Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. Tools for Design, Implementation and Verification of Emerging Information Technologies – 17th EAI International Conference, TridentCom 2022, Melbourne, Australia, November 23-25, 2022, Proceedings. Ed.: S. Yu, 3 – 19, Springer Nature Switzerland.

Publication
Nov 09, 2022
Software Engineering

Token-based plagiarism detection for metamodels

Sağlam, T.; Hahner, S.; Wittler, J. W.; Kühn, T.
2022. MODELS ’22: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion ProceedingsOctober 2022, 138–141, Association for Computing Machinery (ACM).

Publication
Nov 07, 2022
Cryptography

Anonymous Whistleblowing over Authenticated Channels

Agrikola, T.; Couteau, G.; Maier, S.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Ed.: E. Kiltz, 685–714, Springer Nature Switzerland AG.

Publication
02 / 05