Publications

Our interdisciplinary research is reflected in the outstanding publications of KASTEL Security Research Labs.

Dec 21, 2022
Economic Security Quantification

Weighted attack graphs and behavioral cyber game theory for cyber risk quantification

Kaiser, F. K.; Wiens, M.; Schultmann, F.
2022. Advances in Cyber Security and Intelligent Analytics. Ed.: A. Verma, 27–42, CRC Press-Taylor & Francis Group

Publication
Dec 19, 2022
Cyber Physical Systems Modeling Software Engineering

Uncertainty in coupled models of cyber-physical systems

Acosta, M.; Hahner, S.; Koziolek, A.; Kühn, T.; Mirandola, R.; Reussner, R.
2022. Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 569–578, Association for Computing Machinery (ACM).

Publication
Dec 19, 2022
Software Engineering

Token-based plagiarism detection for metamodels

Sağlam, T.; Hahner, S.; Wittler, J. W.; Kühn, T.
2022. MODELS ’22: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion ProceedingsOctober 2022, 138–141, Association for Computing Machinery (ACM).

Publication
Dec 17, 2022
Machine Learning System Security

How to Protect the Public Opinion Against New Types of Bots?

Reubold, J. L.; Escher, S. C.; Wressnegger, C.; Strufe, T.
2022. IEEE International Conference on Big Data

Publication
Dec 16, 2022
Production Security

Secure Provisioning of OPC UA Applications Using the Asset Administration Shell

Meier, D.; Vogl, J.; Kohnhäuser, F.; Beyerer, J.
2023. 2022 IEEE 17th Conference on Industrial Electronics and Applications (ICIEA), 144–149, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Dec 15, 2022
Legal Informatics Mobility Systems Security

Intelligente Verkehrssysteme – IT-Sicherheit in offenen Infrastrukturen Teil 1

Sterz, L.; Werner, C.; Raabe, O.
2022. Recht der Datenverarbeitung, 2022 (6), 291–299

Publication
Dec 05, 2022
Human-Centered IT Security Privacy

Privacy and Utility of Private Synthetic Data for Medical Data Analyses

Appenzeller, A.; Leitner, M.; Philipp, P.; Krempel, E.; Beyerer, J.
2022. Applied Sciences, 12 (23), Article no: 12320.

Publication
Dec 05, 2022
Legal Informatics

Ein Netzwerk für Europas Cybersicherheit

Wintzingerode, C. von; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (10), 690–695

Publication
Dec 02, 2022
Legal Informatics Societal Security

Meldepflicht von Mitarbeitenden bei IT Sicherheits- und Datenschutzvorfällen Betrachtung möglicher arbeitsrechtlicher Konsequenzen

Müllmann, D.; Volkamer, M.
2021. Zeitschrift für Datenschutz, 11 (1), 8–13

Publication
Dec 01, 2022
Legal Informatics

Grundlagen für ein gesetzliches IT-Sicherheitsrisikomanagement : Ansätze zur Vereinheitlichung von Rollenmodell, Risikomanagement und Definitionen für das IT-Sicherheitsrecht

Werner, C.; Brinker, N.; Raabe, O.
2022. Computer und Recht, 38 (12), 817–824.

Publication
Nov 30, 2022
Dependability Societal Security

Why is Online Voting Still Largely a Black Box

Kirsten, M.; Volkamer, M.; Beckert, B.
2022

Publication
Nov 30, 2022
IT Security Privacy

On the Privacy–Utility Trade-Off in Differentially Private Hierarchical Text Classification

Wunderlich, D.; Bernau, D.; Aldà, F.; Parra-Arnau, J.; Strufe, T.
2022. Applied Sciences, 12 (21), Art.-Nr.: 11177.

Publication
Nov 23, 2022
Communication Security Quantification

Sharp: Short Relaxed Range Proofs

Couteau, G.; Goudarzi, D.; Klooß, M.; Reichle, M.
2022. CCS ’22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Ed.: H. Yin Conference: CCS ’22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA November 7 – 11, 2022, 609–622, Association for Computing Machinery (ACM).

Publication
Nov 18, 2022
Legal Informatics Privacy

Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Security Gründen

Müllmann, D.; Veit, M.; Volkamer, M.
2022. Informatik 2022. Hrsg.: D. Demmler, 601–615, Gesellschaft für Informatik (GI).

Publication
Nov 08, 2022
Legal Informatics Usable Security

Insights on Data Sensitivity from the Technical, Legal and the Users’ Perspectives — Practical suggestions on how to raise more awareness for the assumed exercise of informational self-determination

Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Computer law review international, 22 (1), 8–15.

Publication
Nov 07, 2022
Cryptography

Anonymous Whistleblowing over Authenticated Channels

Agrikola, T.; Couteau, G.; Maier, S.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Ed.: E. Kiltz, 685–714, Springer Nature Switzerland AG.

Publication
Oct 31, 2022
Legal Informatics Privacy

A Model-Based Framework for Simplified Collaboration of Legal and Software Experts in Data Protection Assessments

Boltz, N.; Sterz, L.; Gerking, C.; Raabe, O.
2022. INFORMATIK 2022, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik. Ed.: D. Demmler, 521–532, Gesellschaft für Informatik (GI).

Publication
Oct 31, 2022
Decentralized Systems Network Services

Grasping the Concept of Decentralized Systems for Instant Messaging

Gebhardt, L.; Leinweber, M.; Jacob, F.; Hartenstein, H.
2022. Proceedings of the 17th Workshop in Primary and Secondary Computing Education, Art.-Nr. 10, Association for Computing Machinery (ACM).

Publication
Oct 27, 2022
Decentralized Systems Network Services

Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network

Grundmann, M.; Amberg, H.; Baumstark, M.; Hartenstein, H.
2022. Financial Cryptography and Data Security – 26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers. Ed.: I. Eyal, 694–704, Springer International Publishing.

Publication
Oct 25, 2022
Cyber Physical Systems System Security

Early Detection of GOOSE Denial of Service (DoS) Attacks in IEC 61850 Substations

Elbez, G.; Nahrstedt, K.; Hagenmeyer, V.
2022. IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids 2022.

Publication
Oct 22, 2022
Dependability Software Engineering

Attuning Adaptation Rules via a Rule-Specific Neural Network

Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Proceedings. Vol. 3. Ed.: T. Margaria, 215–230, Springer Nature Switzerland AG.

Publication
Oct 22, 2022
Dependability Verification

A Refactoring for Data Minimisation Using Formal Verification

Lanzinger, F.; Ulbrich, M.; Weigl, A.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 345–364, Springer Nature Switzerland AG.

Publication
Oct 20, 2022
Decentralized Systems Mobility Systems Security Network Services

On the Applicability of Payment Channel Networks for Allocation of Transport Ticket Revenues

Grundmann, M.; von Zastrow-Marcks, O.; Hartenstein, H.
2022. Proceedings – International Conference on Computer Communications and Networks, ICCCN : 31st International Conference on Computer Communications and Networks, ICCCN 2022, Virtual, Online, 25 – 28 July 2022, 7 S., Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 19, 2022
Cryptography IT Security Privacy

La Publicación de Trayectorias: un Estudio sobre la Protección de la Privacidad

Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2022. Proceedings of the XVII Spanish Meeting on Cryptology and Information Security (RECSI), Santader, 19th – 21st October, 2022.

Publication
Oct 19, 2022
Applied Informatics Legal Informatics

Die EU als Trendsetter weltweiter KI-Regulierung: Der Kommissionsentwurf für eine KI-Verordnung der EU

Ebert, A.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (16), 1188–1193

Publication
Oct 17, 2022
Verification

Towards a Usable and Sustainable Deductive Verification Tool

Beckert, B.; Bubel, R.; Hähnle, R.; Ulbrich, M.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 281–300, Springer Nature Switzerland AG.

Publication
Oct 12, 2022
Societal Security Usable Security

Individual Verifiability with Return Codes: Manipulation Detection Efficacy

Thürwächter, P. T.; Volkamer, M.; Kulyk, O.
2022. Electronic Voting – 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4–7, 2022, Proceedings. Ed.: R. Krimmer, 139–156, Springer International Publishing.

Publication
Oct 10, 2022
IT Security Network Security

Efficient Public Verification of Confidential Supply-Chain Transactions

Becher, K.; Schäfer, M.; Schröpfer, A.; Strufe, T.
2022. 2022 IEEE Conference on Communications and Network Security (CNS), 308–316, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 10, 2022
Privacy Usable Security

Shoulder-Surfing Resistant Authentication for Augmented Reality

Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Nordic Human Computer Interaction Conference (NordiCHI ’22), Art.Nr. 29, ACM Digital Library.

Publication
Oct 07, 2022
Cryptography

Fiat-Shamir Transformation of Multi-round Interactive Proofs

Attema, T.; Fehr, S.; Klooß, M.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Ed.: E. Kiltz, 113–142, Springer Nature Switzerland AG.

Publication
Oct 06, 2022
Process Security

Cyber threat intelligence enabled automated attack incident response

Kaiser, F. K.; Andris, L.; Tenning, T.; Iser, J.; Wiens, M.; Schultmann, F.
2022. 2022 3rd International Conference on Next Generation Computing Applications (NextComp), IEEE, 1–6, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 06, 2022
Cryptography Privacy

Private Stream Aggregation with Labels in the Standard Model

Ernst, J.; Koch, A.
2021. Proceedings on Privacy Enhancing Technologies, 2021 (4), 117–138.

Publication
Oct 04, 2022
Network Protocols Privacy Societal Security

Electronic Voting: 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings

Krimmer, R.; Volkamer, M.; Duenas-Cid, D.; Rønne, P.; Germann, M. (Hrsg.)
2022

Publication
Oct 01, 2022
Decentralized Systems Software Engineering

Challenges and Common Solutions in Smart Contract Development

Kannengießer, N.; Lins, S.; Sander, C.; Winter, K.; Frey, H.; Sunyaev, A.
2022. IEEE transactions on software engineering, 48 (11), 4291–4318.

Publication
Oct 01, 2022
Modeling Software Engineering

Knowledge-based Sense Disambiguation of Multiword Expressions in Requirements Documents

Hey, T.; Keim, J.; Tichy, W. F.
2021. 2021 IEEE 29th International Requirements Engineering Conference Workshops (REW), Notre Dame, IN, USA, 20-24 Sept. 2021, 70–76, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 01, 2022
Cryptography System Security

On Forging SPHINCS + -Haraka Signatures on a Fault-Tolerant Quantum Computer

Berger, R. M.; Tiepelt, M.
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing.

Publication
Sep 29, 2022
Privacy Usable Security

Design and Evaluation of an Anti-Phishing Artifact Based on Useful Transparency

Beckmann, C.; Berens, B.; Kühl, N.; Mayer, P.; Mossano, M.; Volkamer, M.
2022. International Workshop on Socio-Technical Aspects in Security

Publication
Sep 27, 2022
Dependability Production Security

Generalized Test Tables: A Domain-Specific Specification Language for Automated Production Systems

Beckert, B.; Ulbrich, M.; Vogel-Heuser, B.; Weigl, A.
2022. Theoretical Aspects of Computing – ICTAC 2022 – 19th International Colloquium, Tbilisi, Georgia, September 27–29, 2022, Proceedings. Ed.: H. Seidl, 7–13, Springer International Publishing.

Publication
Sep 26, 2022
Software Engineering

Information Flow Control-by-Construction for an Object-Oriented Language

Runge, T.; Kittelmann, A.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. Software Engineering and Formal Methods – 20th International Conference, SEFM 2022, Berlin, Germany, September 26–30, 2022, Proceedings. Ed.: B.-H. Schlingloff, 209–226, Springer International Publishing.

Publication
Sep 26, 2022
Legal Informatics Privacy Production Security

Datenschutzkonforme Weitergabe von Versichertendaten aus dem Forschungsdatenzentrum

Orak, B.; Krempel, E.; Appenzeller, A.
2022. D. Demmler, D. Krupka & H. Federrath (Hrsg.), INFORMATIK 2022 Hrsg.: Demmler, Daniel AND Federrath, Hannes, Daniel AND Krupka, 533–549, Gesellschaft für Informatik (GI).

Publication
Sep 26, 2022
Communication Security Network Security

ReCEIF: Reinforcement Learning-Controlled Effective Ingress Filtering

Heseding, H.; Zitterbart, M.
2022. 2022 IEEE 47th Conference on Local Computer Networks (LCN), 106–113, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 26, 2022
Communication Security Network Security

HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic

Kopmann, S.; Heseding, H.; Zitterbart, M.
2022. 2022 IEEE 47th Conference on Local Computer Networks (LCN), 90–97, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 19, 2022
Modeling Software Engineering

Accurate Performance Predictions with Component-Based Models of Data Streaming Applications

Werle, D.; Seifermann, S.; Koziolek, A.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 83–98, Springer International Publishing.

Publication
Sep 19, 2022
Modeling Software Engineering

A Taxonomy for Design Decisions in Software Architecture Documentation

Keim, J.; Hey, T.; Sauer, B.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 439–454, Springer International Publishing. 

Publication
Sep 19, 2022
Modeling Software Engineering

ARCHI4MOM: Using Tracing Information to Extract the Architecture of Microservice-Based Systems from Message-Oriented Middleware

Singh, S.; Werle, D.; Koziolek, A.
2022. Software Architecture : 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 189–204, Springer International Publishing.

Publication
Sep 14, 2022
IT Security Privacy

Membership Inference Attack Against Principal Component Analysis

Zari, O.; Parra-Arnau, J.; Ünsal, A.; Strufe, T.; Önen, M.
2022. Privacy in Statistical Databases – International Conference, PSD 2022, Paris, France, September 21–23, 2022, Proceedings. Ed.: J. Domingo-Ferrer, 269–282, Springer International Publishing.

Publication
Sep 12, 2022
Dependability Software Engineering

Towards an integrated approach for managing the variability and evolution of both software and hardware components

Wittler, J. W.; Kühn, T.; Reussner, R.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference – Volume B Ed.: A. Felfernig, 94–98, Association for Computing Machinery (ACM).

Publication
Sep 12, 2022
Software Engineering

Synchronizing software variants: A two-dimensional approach

König, C.; Rosiak, K.; Linsbauer, L.; Schaefer, I.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference (SPLC ’22), Graz, A, 12.-16. September 2022. Ed.: A. Felfernig. Vol. B, 82–89, Association for Computing Machinery (ACM).

Publication
Sep 06, 2022
Production Security Robotics

CrossTest: a cross-domain physical testbed environment for cybersecurity performance evaluations

Karch, M.; Rösch, D.; André, K.; Meshram, A.; Haas, C.; Nicolai, S.
2022. 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA), 1–8, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 01, 2022
Privacy Usable Security

PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren für Virtual Reality Head-Mounted Displays

Länge, T.; Matheis, P.; Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Mensch und Computer 2022 – Workshopband. Ed.: K. Marky, Gesellschaft für Informatik (GI).

Publication
Sep 01, 2022
IT Security Privacy

Dissecting chirping patterns of invasive Tweeter flocks in the German Twitter forest

Reubold, J. L.; Escher, S.; Pflugmacher, J.; Strufe, T.
2022. Online Social Networks and Media, 31, Art.-Nr.: 100228.

Publication
Aug 31, 2022
Dependability Software Engineering

Handling Environmental Uncertainty in Design Time Access Control Analysis

Boltz, N.; Hahner, S.; Walter, M.; Seifermann, S.; Heinrich, R.; Bures, T.; Hnetynka, P.
2022. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Gran Canaria, Spain, 31 August 2022 – 02 September 2022, 382–389, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Aug 27, 2022
Modeling

Trace Link Recovery for Software Architecture Documentation

Keim, J.; Schulz, S.; Fuchß, D.; Kocher, C.; Speit, J.; Koziolek, A.
2021. Software Architecture: 15th European Conference, ECSA 2021, Virtual Event, Sweden, September 13-17, 2021, Proceedings. Ed.: S. Biffl, 101–116, Springer Verlag.

Publication
Aug 23, 2022
Privacy Usable Security

Cookie Disclaimers: Impact of Design and Users’ Attitude

Berens, B. M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2022. Proceedings of the 17th International Conference on Availability, Reliability and Security, 1–20, Association for Computing Machinery (ACM).

Publication
Aug 23, 2022
Privacy Usable Security

SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays

Duezguen, R.; Noah, N.; Mayer, P.; Das, S.; Volkamer, M.
2022. International Conference on Availability, Reliability and Security, ARES 2022, August 23 – August 26, 2022, Vienna, Austria, Art.-No.: 36, Association for Computing Machinery (ACM).

Publication
Aug 20, 2022
Modeling Quantification

Quantifying Software Reliability via Model-Counting

Teuber, S.; Weigl, A.
2021. Quantitative Evaluation of Systems: 18th International Conference, QEST 2021, Paris, France, August 23–27, 2021, Proceedings. Ed.: A. Abate, 59–79, Springer Verlag.

Publication
Aug 15, 2022
Dependability Software Engineering

Modeling and Enforcing Access Control Policies for Smart Contracts

Töberg, J.-P.; Schiffl, J.; Reiche, F.; Beckert, B.; Heinrich, R.; Reussner, R.
2022. Conference Proceedings: 2022 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 38–47, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Aug 11, 2022
Decentralized Systems Trustworthy Internet Technologies

Finding the Right Balance: Technical and Political Decentralization in the Token Economy

Pfister, M.; Kannengießer, N.; Sunyaev, A.
2022. Blockchains and the Token Economy. Ed.: M. C. Lacity, 53–86, Springer Nature Switzerland AG.

Publication
Aug 10, 2022
Privacy Usable Security

Why Users (Don’t) Use Password Managers at a Large Educational Institution

Mayer, P.; Munyendo, C. W.; Mazurek, M. L.; Aviv, A. J.
2022. 31st USENIX Security Symposium (USENIX Security 22), 1849–1866, USENIX Association

Publication
Aug 10, 2022
Machine Learning System Security

Dos and Don’ts of Machine Learning in Computer Security

Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2022. Proc. of the USENIX Security Symposium 2022

Publication
Aug 09, 2022
Dependability Software Engineering

Feature-based Investigation of Simulation Structure and Behaviour

Koch, S.; Hamann, E.; Heinrich, R.; Reussner, R.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 178–185, Springer.

Publication
Aug 07, 2022
Societal Security Usable Security

Increasing security without decreasing usability: A comparison of various verifiable voting systems

Volkamer, M.; Kulyk, O.; Ludwig, J.; Fuhrberg, N.
2022. Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS 2022), Boston, MA, August 8-9, 2022, 233–252, USENIX Association

Publication
Aug 07, 2022
Privacy Societal Security Usable Security

“I don’t know why I check this…” – Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks

Mayer, P.; Poddebniak, D.; Fischer, K.; Brinkmann, M.; Somorovsky, J.; Sasse, M. A.; Schinzel, S.; Volkamer, M.
2022. Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 77–96, USENIX Association

Publication
Aug 05, 2022
Communication Security Production Security

Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks

Borcherding, A.; Takacs, P.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy, 334–344, SciTePress.

Publication
Jul 28, 2022
Legal Informatics Privacy System Security

Artificial Intelligence and Data Protection

Spiecker genannt Döhmann, I.
2022. The Cambridge Handbook of Artificial Intelligence – Global Perspectives on Law and Ethics. Hrsg.: L. DiMatteo/Chr. Poncibo/M. Cannarsa, 132–145, Cambridge Univ. Press.

Publication
Jul 25, 2022
Machine Learning System Security

Non-Uniform Adversarially Robust Pruning

Zhao, Q.; Königl, T.; Wressnegger, C.
2022. Proc. of the 1st International Conference on Automated Machine Learning (AutoML)

Publication
Jul 23, 2022
Dependability Software Engineering

Scalability testing automation using multivariate characterization and detection of software performance antipatterns

Avritzer, A.; Britto, R.; Trubiani, C.; Camilli, M.; Janes, A.; Russo, B.; Hoorn, A. van; Heinrich, R.; Rapp, M.; Henß, J.; Chalawadi, R. K.
2022. Journal of Systems and Software, 193, Art.-Nr.: 111446.

Publication
Jul 14, 2022
Dependability Software Engineering

Design-time Performability Optimization of Runtime Adaptation Strategies

Rapp, M.; Scheerer, M.; Reussner, R.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 113–120, Association for Computing Machinery (ACM).

Publication
Jul 13, 2022
Cryptography Production Security

Towards Heterogeneous Remote Attestation Protocols

Wagner, P. G.; Beyerer, J.
2022. Proceedings of the 19th International Conference on Security and Cryptography – SECRYPT. Vol. 1. Ed.: S. De Capitani di Vimercati, 586–591, SciTePress.

Publication
Jul 13, 2022
Privacy Production Security

Towards Private Medical Data Donations by Using Privacy Preserving Technologies

Appenzeller, A.; Terzer, N.; Krempel, E.; Beyerer, J.
2022. The15th International Conference on PErvasive Technologies Related to Assistive Environments, 446–454, Association for Computing Machinery (ACM).

Publication
Jul 11, 2022
Production Security Robotics

Trustworthy Artificial Intelligence

Becker, M.
2022. Proceedings of the 2021 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory, 21–32, Karlsruher Institut für Technologie (KIT)

Publication
Jul 06, 2022
Privacy Societal Security Usable Security

Your Cookie Disclaimer is not in line with the ideas of the GDPR. Why?

Hennig, A.; Dietmann, H.; Lehr, F.; Mutter, M.; Volkamer, M.; Mayer, P.
2022. Human Aspects of Information Security and Assurance. Ed.: N. Clarke, 218–227, Springer Verlag.

Publication
Jul 04, 2022
Software Engineering

Re-CorC-ing KeY: Correct-by-Construction Software Development Based on KeY

Bordis, T.; Cleophas, L.; Kittelmann, A.; Runge, T.; Schaefer, I.; Watson, B. W.
2022. The Logic of Software. A Tasting Menu of Formal Methods – Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday. Ed.: W. Ahrendt, 80–104, Springer International Publishing.

Publication
Jul 04, 2022
Dependability Verification

The Karlsruhe Java Verification Suite

Klamroth, J.; Lanzinger, F.; Pfeifer, W.; Ulbrich, M.
2022. The Logic of Software. A Tasting Menu of Formal Methods – Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday. Ed.: W. Ahrendt, 290–312, Springer International Publishing. 

Publication
Jun 27, 2022
Legal Informatics

The Law of Global Digitality

Kettemann, M. C.; Peukert, A.; Spiecker genannt Döhmann, I.
2022. Routledge.

Publication
Jun 27, 2022
Dependability Production Security Software Engineering

A Cross-Disciplinary Process Modelling Language for Validating Reconfigured Production Processes

Koch, S.; Wunderlich, T.; Hansert, J.; Schlegel, T.; Ihlenfeldt, S.; Heinrich, R.
2022. Modellierung 2022 : 27.06.-01.07.2022 Hamburg, Germany. Ed.: Matthias Riebisch, 181–190, Köllen Druck+Verlag.

Publication
Jun 27, 2022
Decentralized Systems Software Engineering

Decentralized Review and Attestation of Software Attribute Claims

Stengele, O.; Westermeyer, C.; Hartenstein, H.
2022. IEEE Access, 10, 66694–66710.

Publication
Jun 24, 2022
Legal Informatics Privacy

Data Protection: The more the merrier – a dynamic approach learning from prior mis-governance

Spiecker genannt Döhmann, I.
2022. The Law of Global Digitality. Hrsg.: M. Kettemann, 77–95, Taylor and Francis

Publication
Jun 23, 2022
Decentralized Systems Mobility Systems Security Trustworthy Internet Technologies

Leveraging Distributed Ledger Technology for Decentralized Mobility-as-a-Service Ticket Systems

Leinweber, M.; Kannengießer, N.; Hartenstein, H.; Sunyaev, A.
2022. Towards the New Normal in Mobility : Technische und betriebswirtschaftliche Aspekte. Hrsg.: H. Proff, 547–567, Springer Fachmedien Wiesbaden.

Publication
Jun 22, 2022
Legal Informatics Privacy

Panorama-Abbildungen im Internet unter der DSGVO: Google Street View und Co revisited

Spiecker genannt Döhmann, I.
2022. Gestaltung der Informationsrechtsordnung: Festschrift für Thomas Dreier. Hrsg.: V. Fischer/G. Nolte/M. Senftleben/L. Specht-Riemenschneider, 427–444, Verlag C.H.Beck

Publication
Jun 22, 2022
Legal Informatics Privacy

Challenges in Data Protection in Business Transactions: An Overview Over Civil Law Approaches to Data Protection and Data Ownership

Spiecker genannt Döhmann, I.; Benecke, A.
2022. Handbook Industry 4.0 – Law, Technology, Society, 159–178, Springer Verlag.

Publication
Jun 14, 2022
Decentralized Systems Robotics

BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots

Bayreuther, S.; Jacob, F.; Grotz, M.; Kartmann, R.; Peller-Konrad, F.; Paus, F.; Hartenstein, H.; Asfour, T.
2022. SACMAT ’22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesJune 2022, New York NY USA, June 8 – 10, 2022. Ed.: S. Dietrich, 185–194, Association for Computing Machinery (ACM).

Publication
Jun 12, 2022
Decentralized Systems Verification

Towards Correct Smart Contracts: A Case Study on Formal Verification of Access Control

Schiffl, J.; Grundmann, M.; Leinweber, M.; Stengele, O.; Friebe, S.; Beckert, B.
2021. SACMAT ’21: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 125–130, Association for Computing Machinery (ACM).

Publication
May 31, 2022
Modeling Software Engineering

A conceptual model for unifying variability in space and time: Rationale, validation, and illustrative applications

Ananieva, S.; Greiner, S.; Kehrer, T.; Krüger, J.; Kühn, T.; Linsbauer, L.; Grüner, S.; Koziolek, A.; Lönn, H.; Ramesh, S.; Reussner, R.
2022. Empirical Software Engineering, 27 (5), Article no: 101.

Publication
May 31, 2022
Dependability Software Engineering

Architectural Attack Propagation Analysis for Identifying Confidentiality Issues

Walter, M.; Heinrich, R.; Reussner, R.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), 12 S., Institute of Electrical and Electronics Engineers (IEEE).

Publication
May 31, 2022
Decentralized Systems Network Services

On the Peer Degree Distribution of the Bitcoin P2P Network

Grundmann, M.; Baumstark, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–5, Institute of Electrical and Electronics Engineers (IEEE).

Publication
May 30, 2022
IT Security Privacy

Differentially private publication of database streams via hybrid video coding

Parra-Arnau, J.; Strufe, T.; Domingo-Ferrer, J.
2022. Knowledge-Based Systems, 247, Art.-Nr.: 108778.

Publication
May 23, 2022
Modeling Software Engineering

Performance-Detective: Automatic Deduction of Cheap and Accurate Performance Models

Schmid, L.; Copik, M.; Calotoiu, A.; Werle, D.; Reiter, A.; Selzer, M.; Koziolek, A.; Hoefler, T.
2022. ACM International Conference on Supercomputing (ICS ’22), Virtual Event, June 28-30, 2022, Association for Computing Machinery (ACM).

Publication
May 23, 2022
Privacy Usable Security

Standing out among the daily spam: How to catch website owners’ attention by means of vulnerability notifications

Hennig, A.; Neusser, F.; Pawelek, A. A.; Herrmann, D.; Mayer, P.
2022. Conference on Human Factors in Computing Systems (CHI ’22) : Extended Abstracts, Art.-Nr.: 317, Association for Computing Machinery (ACM).

Publication
May 05, 2022
Network Protocols Network Services

Verifying Payment Channels with TLA+

Grundmann, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–3, Institute of Electrical and Electronics Engineers (IEEE).

Publication
May 04, 2022
System Security

Reinforcement Learning-Controlled Mitigation of Volumetric DDoS Attacks

Heseding, H.
2022. C. Wressnegger, D. Reinhardt, T. Barber, B. C. Witt, D. Arp & Z. Mann (Hrsg.), SICHERHEIT 2022 Hrsg.: Wressnegger, Christian; Reinhardt, Delphine; Barber, Thomas; Witt, Bernhard C.; Arp, Daniel; Mann, Zoltan, 237–242, Gesellschaft für Informatik (GI).

Publication
Apr 27, 2022
Legal Informatics Privacy

§ 71: Grundrechte der Digitalisierung

Spiecker genannt Döhmann, I.
2022. Handbuch des Verwaltungsrechts, Band 3. Hrsg.: W. Kahl/M. Ludwigs, 535–564, C.F. Müller

Publication
Apr 27, 2022
Decentralized Systems Quantification

Quantifying Trustworthiness in Decentralized Trusted Applications

Wagner, P. G.; Beyerer, J.
2022. Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (Sat-CPS’22), 67–76, Association for Computing Machinery (ACM).

Publication
Apr 25, 2022
IT Security System Security

Reproducibility and Replicability of Web Measurement Studies

Demir, N.; Große-Kampmann, M.; Urban, T.; Wressnegger, C.; Holz, T.; Pohlmann, N.
2022. WWW ’22: Proceedings of the ACM Web Conference 2022. Ed.: F. Laforest, 533–544, Association for Computing Machinery (ACM).

Publication
Apr 23, 2022
Privacy Usable Security

Phishing awareness and education – When to best remind?

Berens, B. M.; Dimitrova, K.; Mossano, M.; Volkamer, M.
2022. Symposium on Usable Security and Privacy (USEC), co-located with the Network and Distributed System Security Symposium (NDSS 2022), San Diego, CA, April 23, 2022.

Publication
Apr 09, 2022
Decentralized Systems Software Engineering

Beauty and the Beast – A Case Study on Performance Prototyping of Data-Intensive Containerized Cloud Applications

Klinaku, F.; Rapp, M.; Henss, J.; Rhode, S.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 53–60, Association for Computing Machinery (ACM).

Publication
Apr 07, 2022
Communication Security Network Security

The Smart Grid: A Use-Case for Large-Scale SDN Deployment

Neumeister, F.; Zitterbart, M.
2022. 3. KuVS Fachgespräch “Network Softwarization” (7.4. – 8.4.2022). 3. KuVS Fachgespräch “Network Softwarization” (online) 7./8.4.2022, Universitätsbibliothek Tübingen.

Publication
Apr 05, 2022
Cryptography Cyber Physical Systems

Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules

Doerner, D.; Mechler, J.; Müller-Quade, J.
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 83–99, Gesellschaft für Informatik (GI).

Publication
Apr 05, 2022
Privacy Societal Security

Recent Developments in the Context of Online Elections and Digital Polls in Germany

Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI).

Publication
Apr 05, 2022
Legal Informatics Privacy

Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende – Betrachtung möglicher arbeitsrechtlicher Konsequenzen

Müllmann, D.; Volkamer, M.
2021. Informatik 2020 – Back to the future. Hrsg.: R. H. Reussner, 829–840, Gesellschaft für Informatik (GI).

Publication
02 / 04