Publications

Our interdisciplinary research is reflected in the outstanding publications of KASTEL Security Research Labs.

Apr 25, 2025
Privacy Societal Security

It’s a Match – Enhancing the Fit between Users and Phishing Training through Personalisation

Schöni, L.; Roch, N.; Sievers, H.; Strohmeier, M.; Mayer, P.; Zimmermann, V.
2025. CHI ’25: Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems, Art.-Nr.: 592, Association for Computing Machinery (ACM).

Publication
Apr 25, 2025
Societal Security

“It’s like an explosion”: Cyberwarfare harms for civilian population in Ukraine during the Russian invasion

Kulyk, O.; Kickbusch, J.; Mayer, P.
2025. Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA ’25). Ed.: N. Yamashita, Art.-Nr.: 22, Association for Computing Machinery (ACM).

Publication
Apr 25, 2025
Usable Security

It’s a Match – Enhancing the Fit between Users and Phishing Training through Personalisation

Schöni, Lorin; Roch, Neele; Sievers, Hannah; Strohmeier, Martin; Mayer, Peter; Zimmermann, Verena

Publication
Apr 20, 2025
Cryptography Energy Systems Security

Analytical Evaluation of Time-based Cryptography

Ramadan, M.; Gadekar, P.; Hagenmeyer, V.; Elbez, G.
2025. Title: Proceedings of the 11th International Conference on Information Systems Security and Privacy 2025. Editor: Gabriele Lenzini, Paolo Mori, Steven Furnell (Eds.)

Publication
Apr 13, 2025
Cryptography Privacy

Scalable and Fine-Tuned Privacy Pass from Group Verifiable Random Functions

Faut, D.; Hesse, J.; Kohl, L.; Rupp, A.
2025. 2025 IEEE 10th European Symposium on Security and Privacy (EuroS&P), 38–59, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Apr 09, 2025
Software Engineering

QbC: Quantum Correctness by Construction

Peduri, A.; Schaefer, I.; Walter, M.
2025. Proceedings of the ACM on Programming Languages, 9 (OOPSLA1), 534–562.

Publication
Apr 08, 2025
Cryptography

Fully Collusion Resistant Traceable Identity-Based Inner Product Functional Encryption

Dutta, S.; Pal, T.; Singh, A.; Mukhopadhyay, S.
2025. IACR Communications in Cryptology, 2 (1).

Publication
Apr 07, 2025
Modeling Software Engineering

Requirements Traceability Link Recovery via Retrieval-Augmented Generation

Fuchß, D.; Keim, J.; Koziolek, A.; Hey, T.
2025. International Working Conference on Requirements Engineering (REFSQ 2025)

Publication
Apr 05, 2025
Modeling Software Engineering

Towards LLM-powered consistency in model-based low-code platforms

Hagel, N.; Hili, N.; Bartel, A.; Koziolek, A.
2025. 22nd IEEE International Conference on Software Architecture (ICSA 2025), Institute of Electrical and Electronics Engineers (IEEE)

Publication
Apr 02, 2025
Decentralized Systems

Proof-Carrying CRDTs allow Succinct Non-Interactive Byzantine Update Validation

Marx, N.; Jacob, F.; Hartenstein, H.
2025. PaPoC ’25: 12th Workshop on Principles and Practice of Consistency for Distributed Data, World Trade Center Rotterdam Netherlands, 30 March 2025- 3 April 2025, 15–21, Association for Computing Machinery (ACM).

Publication
Mar 31, 2025
Modeling Software Engineering

Do Large Language Models Contain Software Architectural Knowledge? An Exploratory Case Study with GPT

Soliman, M.; Keim, J.
2025. 22nd IEEE International Conference on Software Architecture (ICSA 2025), Institute of Electrical and Electronics Engineers (IEEE)

Publication
Mar 31, 2025
Modeling Software Engineering

Enabling Architecture Traceability by LLM-based Architecture Component Name Extraction

Fuchß, D.; Liu, H.; Hey, T.; Keim, J.; Koziolek, A.
2025. 22nd IEEE International Conference on Software Architecture (ICSA 2025)

Publication
Mar 31, 2025
Software Engineering

Detecting Encryption Vulnerabilities By Coupling Architectural Analyses and Source Code Analyses

Reiche, F.; Heinrich, R.
2025. 22nd IEEE International Conference on Software Architecture Companion (ICSA 2025), Institute of Electrical and Electronics Engineers (IEEE)

Publication
Mar 31, 2025
IoT Security

Data Distribution and Redistribution – A formal and practical Analysis of the DDS Security Standard

Lauser, Timm; Müller, Maximilian; Baumgart, Ingmar; Krauß, Christoph

Publication
Mar 30, 2025
Software Engineering

SeBS-Flow: Benchmarking Serverless Cloud Function Workflows

Schmid, L.; Copik, M.; Calotoiu, A.; Brandner, L.; Koziolek, A.; Hoefler, T.
2025. EuroSys ’25: Proceedings of the Twentieth European Conference on Computer Systems, 902 – 920, Association for Computing Machinery (ACM).

Publication
Mar 29, 2025
IT Security Privacy

A Full-Body IMU-Based Motion Dataset of Daily Tasks by Older and Younger Adults

Pogrzeba, L.; Muschter, E.; Hanisch, S.; Wardhani, V. Y. P.; Strufe, T.; Fitzek, F. H. P.; Li, S.-C.
2025. Scientific Data, 12 (1), Art.-Nr.: 531.

Publication
Mar 06, 2025
Legal Informatics

Die Resilienz als neue Anforderung des Rechts der Daten- und IT-Sicherheit : Eine Untersuchung anhand der exemplarischen Betrachtung kritischer, personalisierter Dienste

Werner, C.
2025. Nomos.

Publication
Mar 01, 2025
Societal Security Usable Security

SoK: The past decade of user deception in emails and today’s email clients’ susceptibility to phishing techniques

Veit, M. F.; Wiese, O.; Ballreich, F. L.; Volkamer, M.; Engels, D.; Mayer, P.
2025. Computers & Security, 150, 104197.

Publication
Feb 26, 2025
Dependability Software Engineering

Many-Objective Self-adaptation under Model Uncertainty

Camilli, M.; Mirandola, R.; Scandurra, P.
2025. ACM Transactions on Autonomous and Adaptive Systems.

Publication
Feb 25, 2025
Artificial Intelligence Machine Learning

Two Sides of the Same Coin: Learning the Backdoor to Remove the Backdoor

Zhao, Q.; Wressnegger, C.
2025. Proceedings of the 39th Annual AAAI Conference on Artificial Intelligence (AAAI)

Publication
Feb 24, 2025
System Security

DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing

Wachter, L.; Gremminger, J.; Wressnegger, C.; Payer, M.; Toffalini, F.
2025. Proceedings of the Network and Distributed System Security Symposium (NDSS)

Publication
Feb 24, 2025
Software Engineering

A Classification Framework for Scientific Documents to Support Knowledge Graph Population

Kaplan, A.; Keim, J.; Greiner, L.; Koziolek, A.; Reussner, R.
2025. Software Engineering 2025 – Companion Proceedings. Ed.: K. Feichtinger, 277–286, Gesellschaft für Informatik (GI).

Publication
Feb 14, 2025
Privacy Societal Security

Manuelles Löschen von Phishing-Nachrichten aus Mitarbeiterpostfächern : Rechtliche und technische Grenzen

Hunter, J. C.; Ballreich, F. L.; Kemmler, K. J.; Volkamer, M.
2025. Zeitschrift für Digitalisierung und Recht (ZfDR), 5 (1), 23–43

Publication
Feb 01, 2025
Healthcare

Assessing the impact of technology partners on the level of cyberattack damage in hospitals

Angler, Y.; Flessa, S.; Grass, E.; Goetz, O.
2025. Health Policy and Technology, 14 (1), 100955.

Publication
Feb 01, 2025
Dependability Software Engineering

Integration of performability-model extraction and performability prediction in continuous integration/continuous delivery

Weber, S.; Weber, T.; Henß, J.
2024. Softwaretechnik-Trends, 45 (1)

Publication
Jan 31, 2025
Economic Security

How to enhance company engagement in public-private emergency collaborations in the supply of essential goods

Lüttenberg, M.; Zienau, A.; Wiens, M.; Hansen, O.; Diehlmann, F.; Schultmann, F.
2025. Journal of Humanitarian Logistics and Supply Chain Management, 15 (1), 48–60.

Publication
Jan 31, 2025
Software Engineering

UVL: Feature modelling with the universal variability language

Benavides, D.; Sundermann, C.; Feichtinger, K.; Galindo, J. A.; Rabiser, R.; Thüm, T.
2025. Journal of Systems and Software, 112326.

Publication
Jan 01, 2025
Usable Security

“I believe it’s incredibly difficult to fight against this flood of spam”: Towards Enhancing Strategies for Creating Effective Vulnerability Notifications

Hennig, A.; Veit, M.; Schmidt-Enke, L.; Neusser, F.; Herrmann, D.; Mayer, P.
2025. Computers & security

Publication
Dec 30, 2024
Legal Informatics

Datenschutzrecht – DS-GVO / BDSG

Spiecker genannt Döhmann, I.; Hornung, G.; Simitis, S. (Hrsg.)
2024. Nomos Verlagsgesellschaft

Publication
Dec 27, 2024
Machine Learning Software Engineering

An Architectural Viewpoint for Benefit-Cost-Risk-Aware Decision-Making in Self-Adaptive Systems

Weyns, D.; Hezavehi, S. M.; Avgeriou, P.; Calinescu, R.; Mirandola, R.; Perez-Palacin, D.
2024. ACM Transactions on Autonomous and Adaptive Systems.

Publication
Dec 18, 2024
Machine Learning

Evaluating Adversarial Attacks on Traffic Sign Classifiers Beyond Standard Baselines

Pavlitska, S.; Müller, L.; Zöllner, J. M.
2024. 23rd International Conference on Machine Learning and Applications (ICMLA 2024), 1390–1395, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Dec 18, 2024
Machine Learning

Towards Adversarial Robustness of Model-Level Mixture-of-Experts Architectures for Semantic Segmentation

Pavlitska, S.; Eisen, E.; Zöllner, J. M.
2024. 23rd International Conference on Machine Learning and Applications (ICMLA 2024), 1460–1465, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Dec 17, 2024
Healthcare

A stochastic optimisation model to support cybersecurity within the UK national health service

Grass, E.; Pagel, C.; Crowe, S.; Ghafur, S.
2024. Journal of the Operational Research Society, 1–12.

Publication
Dec 15, 2024
Energy Systems Security

Aviator: A MITRE Emulation Plan-Derived Living Dataset for Advanced Persistent Threat Detection and Investigation

Liu, Q.; Bao, K.; Hagenmeyer, V.
2024. 2024 IEEE International Conference on Big Data (BigData), 5610–5619, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Dec 10, 2024
Cryptography

Registered FE Beyond Predicates: (Attribute-Based) Linear Functions and More

Datta, P.; Pal, T.; Yamada, S.
2025. Advances in Cryptology – ASIACRYPT 2024 – 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings, Part I. Ed.: K.-M. Chung, 65–104, Springer Nature Singapore.

Publication
Dec 09, 2024
IT Security Privacy

R+R: Understanding Hyperparameter Effects in DP-SGD

Morsbach, F.; Reubold, J. L.; Strufe, T.
2024. Proceedings of the 40th Annual Computer Security Applications Conference

Publication
Dec 09, 2024
Machine Learning

Model-Manipulation Attacks Against Black-Box Explanations

Hegde, A.; Noppel, M.; Wressnegger, C.
2024. Proceedings of the Annual Computer Security Applications Conference (ACSAC), Honolulu, HI, 9th – 13th December 2024

Publication
Dec 09, 2024
Communication Security Decentralized Systems

ReP2P Matrix: Decentralized Relays to Improve Reliability and Performance of Peer-to-Peer Matrix

Schichtholz, B. D.; Bless, R.; Jacob, F.; Hartenstein, H.; Zitterbart, M.
2024. Proceedings of the ACM Conext-2024 Workshop on the Decentralization of the Internet (DIN ’24), Los Angeles, CA, USA, December 9–12, 2024, 8–14, Association for Computing Machinery (ACM).

Publication
Dec 07, 2024
Software Engineering

Integrated QoS- and Vulnerability-Driven Self-adaptation for Microservices Applications

Camilli, M.; Luccioletti, F.; Mirandola, R.; Scandurra, P.
2025. Service-Oriented Computing – 22nd International Conference, ICSOC 2024, Tunis, Tunisia, December 3–6, 2024, Proceedings, Part II. Ed.: W. Gaaloul, 55–71, Springer Nature Singapore.

Publication
Nov 28, 2024
Societal Security Usable Security

Literature Review: Misconceptions About Phishing

Mossano, M.; Volkamer, M.
2025. Human Aspects of Information Security and Assurance : 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024, Proceedings, Part I, 215–228, Springer Nature Switzerland.

Publication
Nov 26, 2024
Legal Informatics

Kostenfreie ISO-Normen für alle? Zulässigkeit und Bedeutung von Verweisen auf private Normung im IT-Recht

Sterz, L.; Werner, C.; Raabe, O.
2024. InTeR, 146 (4), 146–153

Publication
Nov 22, 2024
Artificial Intelligence Machine Learning

Adversarially Robust Anti-Backdoor Learning

Zhao, Q.; Wressnegger, C.
2024. Proceedings of the 2024 Workshop on Artificial Intelligence and Security (AISEC), Association for Computing Machinery (ACM).

Publication
Nov 21, 2024
Machine Learning Production Security

Explainable fatigue detection in assembly tasks through graph neural networks

Vishwesh, V.; Becker, M.; Birnstill, P.; Beyerer, J.
2024. Forum Bildverarbeitung 2024: Hrsg.: T. Längle, 171–182, Karlsruher Institut für Technologie (KIT)

Publication
Nov 21, 2024
Human-Centered IT Security Privacy

Analysis and Measurement of Attack Resilience of Differential Privacy

Guerra-Balboa, P.; Sauer, A.; Strufe, T.
2024. WPES ’24: Proceedings of the 23rd Workshop on Privacy in the Electronic Society. Ed.: E. Ayday, 155–171, Association for Computing Machinery (ACM).

Publication
Nov 20, 2024
Machine Learning Trustworthy Internet Technologies

Collaborative Distributed Machine Learning

Jin, D.; Kannengießer, N.; Rank, S.; Sunyaev, A.
2024. ACM Computing Surveys.

Publication
Nov 20, 2024
Energy Systems Security

Improving Anomaly Detection with Adaptive Dynamic Threshold: A Review and Enhanced Method

Attar, A. A.; Fabarisov, T.; Bao, K.; Hagenmeyer, V.
2024. 2024 8th International Conference on System Reliability and Safety (ICSRS), 5 S

Publication
Nov 09, 2024
Human-Centered IT Security Privacy

A kinematic dataset of locomotion with gait and sit-to-stand movements of young adults

Hanisch, S.; Pogrzeba, L.; Muschter, E.; Li, S.-C.; Strufe, T.
2024. Scientific Data, 11 (1), Art.-Nr.: 1209.

Publication
Nov 09, 2024
Software Engineering

Retriever: A View-Based Approach to Reverse Engineering Software Architecture Models

Kirschner, Y. R.; Gstür, M.; Sağlam, T.; Weber, S.; Koziolek, A.
2025. Journal of Systems and Software, 220, 112277.

Publication
Nov 06, 2024
Software Engineering

Towards Bringing Vitruvius into the Cloud

Armbruster, M.; Weber, T.; König, L.
2024. Softwaretechnik-Trends, 18–20, Gesellschaft für Informatik (GI)

Publication
Nov 06, 2024
Modeling

Performance Factors of Proxy Objects in the Eclipse Modeling Framework

Armbruster, M.
2024. Softwaretechnik-Trends, 42–44, Gesellschaft für Informatik (GI)

Publication
Nov 06, 2024
Software Engineering

Scalability of Consistency Preservation with Vitruvius

Jutz, B.; Weber, T.
2024. Softwaretechnik-Trends, Gesellschaft für Informatik (GI)

Publication
Nov 06, 2024
Cyber Physical Systems Software Engineering

The Influence of Granularity of Transactions on Performance in Vitruvius

Weber, T.; Jutz, B.; Zacouris, Z.
2024. Softwaretechnik-Trends, Gesellschaft für Informatik (GI)

Publication
Nov 01, 2024
Legal Informatics

Informationspflichten und Einwilligung bei der Nutzung von PIMS: Probleme und Potenziale der Einwilligungsverwaltung de lege lata

Hunter, J. C.; Ebert, A.; Spiecker genannt Döhmann, I.
2024. Zeitschrift für Datenschutz, 14 (11), 603–610

Publication
Nov 01, 2024
Software Engineering

Integrating Security-Enriched Data Flow Diagrams Into Architecture-Based Confidentiality Analysis

Niehues, N.; Arp, B.; Hüller, T.; Schwickerath, F.; Boltz, N.; Hahner, S.
2024. Softwaretechnik-Trends, 44 (4)

Publication
Nov 01, 2024
Software Engineering

Analyzing Cyclic Data Flow Diagrams Regarding Information Security

Arp, B.; Niehues, N.; Hüller, T.; Schwickerath, F.; Boltz, N.; Hahner, S.
2024. Softwaretechnik-Trends, 44 (4)

Publication
Oct 31, 2024
Modeling Software Engineering

Towards Deep Reactions in Multi-Level, Multi-View Modeling

Weber, T.; Ojha, M.; Sadeghi, M.; König, L.; Armbruster, M.; Lange, A.; Burger, E.; Atkinson, C.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, Linz Austria, 22nd – 27th September 2024, 760–769, Association for Computing Machinery (ACM).

Publication
Oct 31, 2024
Cyber Physical Systems Software Engineering

Managing Variability of Cyber-Physical Production Systems: Towards Consistency Management

Fadhlillah, H. S.; Greiner, S.; Feichtinger, K.; Rabiser, R.; Zoitl, A.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, September 22-27, 2024, at the JKU Linz., 945–949, Association for Computing Machinery (ACM).

Publication
Oct 31, 2024
Privacy Usable Security

Encouraging Users to Change Breached Passwords Using the Protection Motivation Theory

Zou, Y.; Le, K.; Mayer, P.; Acquisti, A.; Aviv, A. J.; Schaub, F.
2024. ACM Transactions on Computer-Human Interaction, 31 (5), 1–45.

Publication
Oct 31, 2024
Cyber Physical Systems Software Engineering

Towards Formalizing and Relating Different Notions of Consistency in Cyber-Physical Systems Engineering

Feichtinger, K.; Kegel, K.; Pascual, R.; Aßmann, U.; Beckert, B.; Reussner, R.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, Linz/Wien, 22nd – 27th September 2024, 915–919, Association for Computing Machinery (ACM).

Publication
Oct 31, 2024
Software Engineering

Towards Integrating Low-Code in View-based Development

Hermann, A.-K.; König, L.; Burger, E.; Reussner, R.
2024. MODELS Companion ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering. Ed.: M. Wimmer, 866–875, Association for Computing Machinery (ACM).

Publication
Oct 30, 2024
Cyber Physical Systems Verification

Formal Foundations of Consistency in Model-Driven Development

Pascual, R.; Beckert, B.; Ulbrich, M.; Kirsten, M.; Pfeifer, W.
2025. Leveraging Applications of Formal Methods, Verification and Validation. Specification and Verification : 12th International Symposium, ISoLA 2024, Crete, Greece, October 27–31, 2024, Proceedings, Part III. Ed.: T. Margaria, 178–200, Springer Nature Switzerland.

Publication
Oct 26, 2024
Software Engineering

X-by-Construction Meets AI

ter Beek, M. H.; Cleophas, L.; Dubslaff, C.; Schaefer, I.
2025. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies – 12th International Symposium, ISoLA 2024, Crete, Greece, October 27–31, 2024, Proceedings, Part IV. Ed.: T. Margaria, 155–161, Springer Nature Switzerland.

Publication
Oct 26, 2024
Artificial Intelligence Machine Learning Software Engineering

Towards AI-Assisted Correctness-by-Construction Software Development

Kodetzki, M.; Bordis, T.; Kirsten, M.; Schaefer, I.
2025. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies – 12th International Symposium, ISoLA 2024, Crete, Greece, October 27–31, 2024, Proceedings, Part IV. Ed.: T. Margaria, 222–241, Springer Nature Switzerland.

Publication
Oct 25, 2024
Machine Learning

Pitfalls in Machine Learning for Computer Security

Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2024. Communications of the ACM, 67 (11), 104–112.

Publication
Oct 24, 2024
Energy Systems Security Machine Learning

Web Application Penetration Testing with Artificial Intelligence: A Systematic Review

Sánchez, G.; Olayinka, O.; Pasikhani, A.
2024. 2024 22nd International Symposium on Network Computing and Applications (NCA), 24-26 October 2024 Bertinoro, Italy, 236–245, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 23, 2024
IT Security Privacy

Unlocking the Potential of Composition for General Neighborhood Definitions

Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Strufe, T.
2024. Proceedings of the XVIII Spanish Meeting on Cryptology and Information Security (RECSI), León, 22th – 25st October, 2024

Publication
Oct 16, 2024
Healthcare Legal Informatics

Sharing for Caring? A Patients’ and Clinicians’ View on Handling Personal Medical Data in the Context of Digitization: An Exploratory Study

Frank, K.; Mengesdorf, T.; Radić, M.; Herrmann, P.; Appenzeller, A.; Mucha, H.; Orak, B.; Spiecker gen. Döhmann, I.; Rüping, S.; Burkhardt, H.; Köhm, M.; Dauth, S.
2024. Healthcare, 12 (20), Art.-Nr.: 2053.

Publication
Oct 14, 2024
Communication Security Privacy

Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling Concepts

Khaloopour, L.; Su, Y.; Raskob, F.; Meuser, T.; Bless, R.; Janzen, L.; Abedi, K.; Andjelkovic, M.; Chaari, H.; Chakraborty, P.; Kreutzer, M.; Hollick, M.; Strufe, T.; Franchi, N.; Jamali, V.
2023. IEEE Access, 11.

Publication
Oct 14, 2024
Machine Learning System Security

On Practical Realization of Evasion Attacks for Industrial Control Systems

Erba, A.; Murillo, A. F.; Taormina, R.; Galelli, S.; Tippenhauer, N. O.
2024. Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security (RICSS), Association for Computing Machinery (ACM).

Publication
Oct 08, 2024
Communication Security Network Security

Evaluating Drill-Down DDoS Destination Detection

Krack, T.; Kopmann, S.; Zitterbart, M.
2024. 2024 IEEE 49th Conference on Local Computer Networks (LCN), Normandy, France, 08-10 October 2024, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 02, 2024
Societal Security

Recommendations for Implementing Independent Individual Verifiability in Internet Voting

Moser, F.; Grimm, R.; Hilt, T.; Kirsten, M.; Niederbudde, C.; Volkamer, M.
2024. 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024), Gesellschaft für Informatik (GI)

Publication
Oct 02, 2024
Societal Security Verification

SoK: Mechanisms Used in Practice for Verifiable Internet Voting

Moser, F.; Kirsten, M.; Dörre, F.
2024. 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024), Gesellschaft für Informatik (GI)

Publication
Oct 02, 2024
Societal Security

Design and Evaluation of Verifiable Voting Systems Based on Tracking Code Verification

Nissen, C.; Kulyk, O.; Volkamer, M.; Friedrich, L. E.; Hermansen, H.
2024. 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024)

Publication
Sep 24, 2024
Machine Learning Mobility Systems Security

TLD-READY: Traffic Light Detection ‐ Relevance Estimation and Deployment Analysis

Polley, N.; Pavlitska, S.; Boualili, Y.; Rohrbeck, P.; Stiller, P.; Bangaru, A. K.; Zollnerl, J. M.
2024. 2024 IEEE 27th International Conference on Intelligent Transportation Systems (ITSC), Edmonton, 24th-27th September 2024, 3800–3806, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 24, 2024
Software Engineering

Exploring Existing Tools for Managing Different Types of Research Data

Freund, A.; Hajiabadi, H.; Koziolek, A.
2024. INFORMATIK 2024 – Jahrestagung der Gesellschaft für Informatik e.V., 2181–2193, Gesellschaft für Informatik (GI).

Publication
Sep 24, 2024
Legal Informatics

KI-generierte Abbildungen von Kindesmissbrauch: Technische Grundlagen und rechtliche Einordnung

Steinebach, M.; Hunter, J. C.; Schröder, L.
2024. Informatik 2024 : Tagung vom 24.-26. September 2024, Wiesbaden : Lock-in or log out? – Wie digitale Souveränität gelingt. Hrsg.: M. Klein, 247–261, Köllen Druck+Verlag.

Publication
Sep 22, 2024
Software Engineering

A Collaborative Uncertainty Collection to Address the Awareness Problem of Model-Based Confidentiality Analysis

Hahner, S.; Niehues, N.; Boltz, N.; Fuksa, M.; Heinrich, R.
2024. ACM / IEEE 27th International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C)

Publication
Sep 22, 2024
Software Engineering

ARC³N: A Collaborative Uncertainty Catalog to Address the Awareness Problem of Model-Based Confidentiality Analysis

Hahner, S.; Niehues, N.; Boltz, N.; Fuksa, M.; Heinrich, R.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 640–644, Association for Computing Machinery (ACM).

Publication
Sep 22, 2024
Software Engineering

Model Everything but with Intellectual Property Protection – The Deltachain Approach

Weber, T.; Weber, S.
2024. MODELS ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 49–56, Association for Computing Machinery (ACM).

Publication
Sep 22, 2024
Software Engineering

Consistency Management for Security Annotations for Continuous Verification

Reiche, F.; Weber, T.; Becker, S.; Weber, S.; Heinrich, R.; Burger, E.
2024. ACM / IEEE 27th International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), 1096–1105, Association for Computing Machinery (ACM).

Publication
Sep 22, 2024
Mobility Systems Security Modeling

Modeling Languages for Automotive Digital Twins: A Survey Among the German Automotive Industry

Pfeiffer, Jérôme; Fuchß, Dominik; Kühn, Thomas; Liebhart, Robin; Neumann, Dirk; Neimöck, Christer; Seiler, Christian; Koziolek, Anne; Wortmann, Andreas

Publication
Sep 22, 2024
Software Engineering

A Delta-Oracle for Fast Model Merge Conflict Estimation using Sketch-Based Critical Pair Analysis

Kegel, K.; Domanowski, A.; Feichtinger, K.; Pascual, R.; Aßmann, U.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 22.-27.09.2024, Linz, 1046–1055, Association for Computing Machinery (ACM).

Publication
Sep 22, 2024
Mobility Systems Security Modeling Software Engineering

Modeling Languages for Automotive Digital Twins : A Survey Among the German Automotive Industry

Pfeiffer, J.; Fuchß, D.; Kühn, T.; Liebhart, R.; Neumann, D.; Neimöck, C.; Seiler, C.; Koziolek, A.; Wortmann, A.
2024. MODELS ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems. Ed.: A. Egyed, 92–103, Association for Computing Machinery (ACM).

Publication
Sep 17, 2024
Energy Systems Security Machine Learning

Machine Learning-Based Feature Selection for Intrusion Detection Systems in IEC 61850-Based Digital Substations

Eynawi, A.; Mumrez, A.; Elbez, G.; Hagenmeyer, V.
2024. 2024 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 7 S., Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 13, 2024
Network Security

Importance Analysis of Micro-Flow Independent Features for Detecting Distributed Network Attacks

Kopmann, S.; Zitterbart, M.
2024. IEEE Transactions on Network and Service Management, 1.

Publication
Sep 11, 2024
Trustworthy Internet Technologies

HybCBDC: A Design for Central Bank Digital Currency Systems Enabling Digital Cash

Lamberty, R.; Kirste, D.; Kannengießer, N.; Sunyaev, A.
2023. IEEE Access.

Publication
Sep 10, 2024
Modeling Software Engineering

LLM-based Control Code Generation using Image Recognition

Koziolek, H.; Koziolek, A.
2024. LLM4Code ’24: Proceedings of the 1st International Workshop on Large Language Models for Code (LLM4 Code), Lissabon, 20th April 2024, 38–45, Association for Computing Machinery (ACM).

Publication
Sep 07, 2024
Communication Security Software Engineering

How Do Asynchronous Communication Models Impact the Composability of Information Flow Security?

Gerlach, L.; Gerking, C.
2024. Formal Aspects of Component Software – 20th International Conference, FACS 2024, Milan, Italy, September 9–10, 2024, Proceedings. Ed.: D. Marmsoler, 127 – 145, Springer Nature Switzerland.

Publication
Sep 04, 2024
Privacy

An overview of proposals towards the privacy-preserving publication of trajectory data

Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2024. International Journal of Information Security, 23, 3711–3747.

Publication
Sep 04, 2024
Legal Informatics Privacy

Structuring different manifestations of misinformation for better policy development using a decision tree‐based approach

Hägle, O.; Escher, S.; Heil, R.; Jahnel, J.
2025. Policy & Internet, 17 (2).

Publication
Sep 03, 2024
Modeling Software Engineering

Cost-Efficient Construction of Performance Models

Schmid, L.; Saglam, T.; Selzer, M.; Koziolek, A.
2024. 4th Workshop on Performance EngineeRing, Modelling, Analysis, and VisualizatiOn STrategy (PERMAVOST ’24), Pisa, 3rd-4th June 2024, Association for Computing Machinery (ACM).

Publication
Sep 02, 2024
Software Engineering

Variability modeling of products, processes, and resources in cyber-physical production systems engineering

Meixner, K.; Feichtinger, K.; Fadhlillah, H. S.; Greiner, S.; Marcher, H.; Rabiser, R.; Biffl, S.
2024. SPLC ’24 : 28th ACM International Systems and Software Product Line Conference. Volume B. Ed.: M. Cordy, 219, Association for Computing Machinery (ACM).

Publication
Sep 02, 2024
Software Engineering

Seventh International Workshop on Languages for Modelling Variability (MODEVAR@SPLC 2024)

Feichtinger, K.; Galasso-Carbonnel, J.
2024. SPLC ’24 : Proceedings of the 28th ACM International Systems and Software Product Line Conference – Volume B. Ed.: M. Cordy, 224, Association for Computing Machinery (ACM).

Publication
Sep 02, 2024
Software Engineering

MulTi-Wise Sampling: Trading Uniform T-Wise Feature Interaction Coverage for Smaller Samples

Pett, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2024. SPLC ’24: Proceedings of the 28th ACM International Systems and Software Product Line Conference – Volume B. Ed.: M. Cordy, 47–53, Association for Computing Machinery (ACM).

Publication
Sep 01, 2024
Societal Security

Usability and Understanding of Individual Verifiability in the 2023 GI-Election

Hilt, T.; Matheis, P.; Volkamer, M.
2024. Mensch und Computer 2024 – Workshopband, September 2024, Karlsruhe, Germany, Gesellschaft für Informatik e.V.

Publication
Sep 01, 2024
Privacy Usable Security

“Data Protection Can Sometimes Be a Nuisance” A Notification Study on Data Sharing Practices in City Apps

Drescher, J. N.; Moser, J.; Strangmann, N.; Spinner, J.; Herrmann, D.; Volkamer, M.
2024. Proceedings of Mensch und Computer 2024 (MuC’24). Ed. A. Maedche, 8 S., Association for Computing Machinery (ACM).

Publication
Sep 01, 2024
Usable Security

Erstellung eines Erklärvideos zur Verwendung von S/MIME (WIP)

Ballreich, F. L.; Volkamer, M.
2024. Mensch und Computer 2024 (MuC), Gesellschaft für Informatik (GI).

Publication
Sep 01, 2024
Software Engineering

Modeling and Analyzing Zero Trust Architectures Regarding Performance and Security

Boltz, N.; Schmid, L.; Taghavi, B.; Gerking, C.; Heinrich, R.
2024. Software Architecture : 18th European Conference, ECSA 2024, Luxembourg City, Luxembourg, September 3–6, 2024 ; Proceedings. Ed.: M. Galster, 253–269, Springer.

Publication
Sep 01, 2024
Software Engineering

Semantics Enhancing Model Transformation for Automated Constraint Validation of Palladio Software Architecture to MontiArc Models

Weber, S.; Henß, J.; Taghavi, B.; Weber, T.; Stüber, S.; Marin, A.; Rumpe, B.; Heinrich, R.
2024. Software Architecture. ECSA 2024 Tracks and Workshops – Luxembourg City, Luxembourg, September 3–6, 2024, Proceedings. Ed.: A. Ampatzoglou, J. Pérez, B. Buhnova, V. Lenarduzzi, C. C. Venters, U. Zdun, K. Drira, L. Rebelo, D. Di Pompeo, M. Tucci, E. Y. Nakagawa, E. Navarro, 30 – 38, Springer Nature Switzerland.

Publication
Sep 01, 2024
Software Engineering

Architecture-based Issue Propagation Analysis

Speth, S.; Krieger, N.; Heinrich, R.; Becker, S.
2024. Software Architecture : 18th European Conference, ECSA 2024, Luxembourg City, Luxembourg, September 3–6, 2024 ; Proceedings. Ed.: M. Galster, 121–137, Springer.

Publication
02 / 08