Publications

Our interdisciplinary research is reflected in the outstanding publications of KASTEL Security Research Labs.

Apr 14, 2024
Software Engineering

Detecting Automatic Software Plagiarism via Token Sequence Normalization

Sağlam, T.; Brödel, M.; Schmid, L.; Hahner, S.
2024. Proceedings of the 46th International Conference on Software Engineering, ICSE ’24, Lissabon, April 14-20, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Apr 14, 2024
Software Engineering

Multi-requirement Parametric Falsification

Camilli, M.; Mirandola, R.
2024. 46th International Conference on Software Engineering (ICSE 2024), Lissabon, Portugal, 14.–20. April 2024

Publication
Apr 14, 2024
Software Engineering

Automated Detection of AI-Obfuscated Plagiarism in Modeling Assignments

Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. Proceedings of the 46th International Conference on Software Engineering: Software Engineering Education and Training, ICSE SEET ’24, Lissabon, 14th-20th April 2024, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Apr 14, 2024
Cryptography

Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions

Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Gröll, R.; Müller, M.; Müller-Quade, J.
2024. Public-Key Cryptography – PKC 2024 : 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings. Part IV. Ed.: Q. Tang, 257–288, Springer Nature Switzerland. 

Publication
Apr 09, 2024
Cryptography

Post-Quantum Ready Key Agreement for Aviation

Tiepelt, M.; Martin, C.; Maeurer, N.
2024. IACR Communications in Cryptology, 1 (1), 17.

Publication
Apr 08, 2024
Software Engineering Verification

Quantifying Software Correctness by Combining Architecture Modeling and Formal Program Analysis

Lanzinger, F.; Martin, C.; Reiche, F.; Teuber, S.; Heinrich, R.; Weigl, A.
2024. SAC ’24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing. Ed.: J. Hong, 1702–1711, Association for Computing Machinery (ACM).

Publication
Apr 07, 2024
Verification

A Practical Notion of Liveness in Smart Contract Applications

Schiffl, J.; Beckert, B.
2024. 5th International Workshop on Formal Methods for Blockchains (FMBC 2024). Ed.: B. Bernardo, 8:1–8:13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (LZI).

Publication
Apr 04, 2024
Applied Informatics Cyber Physical Systems

CESAR: Control Envelope Synthesis via Angelic Refinements

Kabra, A.; Laurent, J.; Mitsch, S.; Platzer, A.
2024. Tools and Algorithms for the Construction and Analysis of Systems – 30th International Conference (TACAS 2024). Held as Part of the European Joint Conferences on Theory and Practice of Software (ETAPS 2024) Luxembourg City, LU, April 6–11, 2024, Proceedings., Part 1. Ed.: B. Finkbeiner, 144–164, Springer Nature Switzerland.

Publication
Apr 01, 2024
Legal Informatics

Die Reform des australischen Privacy Act

Ebert, A.
2024. Zeitschrift für Datenschutz (ZD), 14 (4), 181–240

Publication
Mar 26, 2024
Economic Security Process Security

Resilient and sustainable energy supply chains: insights on sourcing and pricing strategies in a non-collaborative and collaborative environment

Rajabzadeh, H.; Wiens, M.
2024. International Journal of Production Research, 62 (24), 9011–9042.

Publication
Mar 25, 2024
Communication Security Network Security

TRUST Issues: Multicast and Integrity Protection for the TRUST Redundancy Mechanism

Neumeister, F.; Zitterbart, M.
2024. 2024 IEEE International Conference on Industrial Technology (ICIT), 1–6, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 12, 2024
Economic Security

Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT

Daniel, N.; Kaiser, F. K.; Dzega, A.; Elyashar, A.; Puzis, R.
2024. Computer Security. ESORICS 2023 International Workshops – CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II. Ed.: S. Katsikas, 76 – 91, Springer Nature Switzerland.

Publication
Mar 08, 2024
Privacy Societal Security Usable Security

Systematic User Evaluation of a Second Device based cast-as-intended verifiability Approach

Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.; Volkamer, M.
2024. Voting’24, Springer

Publication
Mar 01, 2024
Cryptography

Two-Party Decision Tree Training from Updatable Order-Revealing Encryption

Berger, R.; Dörre, F.; Koch, A.
2024. Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings. Part I. Ed.: C. Pöpper, 288–317, Springer International Publishing.

Publication
Feb 26, 2024
Software Engineering

Architecture-based Propagation Analyses Regarding Security

Hahner, S.; Walter, M.; Heinrich, R.; Reussner, R.
2024. Software Engineering 2024 (SE 2024), Gesellschaft für Informatik e.V.

Publication
Feb 26, 2024
Privacy Societal Security Usable Security

Exploring Phishing Threats through QR Codes in Naturalistic Settings

Sharevski, F.; Mossano, M.; Veit, M. F.; Schiefer, G.; Volkamer, M.
2024. Symposium on Usable Security and Privacy (USEC) 2024.

Publication
Feb 26, 2024
Privacy Usable Security

Vision: Towards Fully Shoulder-Surfing Resistant and Usable Authentication for Virtual Reality

Länge, T.; Matheis, P.; Düzgün, R.; Volkamer, M.; Mayer, P.
2024. Symposium on Usable Security and Privacy (USEC) 2024 : Co-located with NDSS Symposium 2024, San Diego, CA, 26th February – 1st March 2024.

Publication
Feb 20, 2024
Software Engineering

Variabilitätsartefakte vergleichen leicht gemacht

Feichtinger, K.
2024. OCG Journal, 49 (1), 28–30

Publication
Feb 07, 2024
Software Engineering

Kfeature: Rendering the Kconfig System into Feature Models

Yaman, K. B.; Wittler, J. W.; Gerking, C.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 134 – 138, Association for Computing Machinery (ACM).

Publication
Feb 06, 2024
Human-Centered IT Security Production Security

RIXA – Explaining Artificial Intelligence in Natural Language

Becker, M.; Vishwesh, V.; Birnstill, P.; Schwall, F.; Wu, S.; Beyerer, J.
2024. 2023 IEEE International Conference on Data Mining Workshops (ICDMW), Shanghai, 1st-4th December 2023, 875–884, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jan 29, 2024
Software Engineering

Obfuscation-Resilient Software Plagiarism Detection with JPlag

Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. 46th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jan 12, 2024
Cryptography Quantification

Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements

Tiepelt, M.; Eaton, E.; Stebila, D.
2024. Computer Security – ESORICS 2023. Ed.: G. Tsudik. Pt. 1, 168–188, Springer Nature Switzerland.

Publication
Jan 11, 2024
Privacy

Panini — Anonymous Anycast and an Instantiation

Coijanovic, C.; Weis, C.; Strufe, T.
2024. Computer Security – ESORICS 2023 – 28th European Symposium on Research in Computer Security : The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II. Ed.: G. Tsudik, 193 – 211, Springer, Cham.

Publication
Jan 08, 2024
Energy Systems Security

Verifiable Certificateless Signcryption Scheme for Smart Grids

Ramadan, M.; Elbez, G.; Hagenmeyer, V.
2024. 2023 7th International Conference on System Reliability and Safety (ICSRS), 181–189, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jan 08, 2024
Trustworthy Internet Technologies

Exploring Contrasting Effects of Trust in Organizational Security Practices and Protective Structures on Employees’ Security-Related Precaution Taking

Greulich, M.; Lins, S.; Pienta, D.; Thatcher, J. B.; Sunyaev, A.
2024. Information systems research.

Publication
Jan 01, 2024
Legal Informatics

DGRI-Jahrestagung 2023: KI, Cybersicherheit/Cyberresilienz, Datenökonomie

Dieler, P.
2024. Computer und Recht, 40 (1), R9-R11

Publication
Jan 01, 2024
Software Engineering

Towards a Data Flow Diagram-Centric Confidentiality Analysis in Palladio

Hüller, T.; Schwickerath, F.; Arp, B.; Niehues, N.; Boltz, N.; Hahner, S.
2024. Softwaretechnik-Trends, 44 (4)

Publication
Dec 31, 2023
Societal Security Usable Security

Online-Wahlen und digitale Abstimmungen – eine Einordnung aktueller Entwicklungen

Volkamer, M.; Mayer, A.; Neumann, S.; Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Müller-Quade, J.
2023. DGRI Jahrbuch 2021/2022, 141–160, Verlag Dr. Otto Schmidt.

Publication
Dec 15, 2023
Legal Informatics

“Complete” Independence of the ICO and Strategic Priorities of the UK Government?

Winau, M.
2023. Computer law & security review, (6), 180–187

Publication
Dec 11, 2023
Decentralized Systems

ABCperf: Performance Evaluation of Fault Tolerant State Machine Replication Made Simple: Demo Abstract

Spannagel, T.; Leinweber, M.; Castro, A.; Hartenstein, H.
2023. Proceedings of the 24th International Middleware Conference Demos, Posters and Doctoral Symposium, 35–36, Association for Computing Machinery (ACM).

Publication
Dec 04, 2023
Cryptography

Practically Efficient Private Set Intersection From Trusted Hardware with Side-Channels

Dörre, F.; Mechler, J.; Müller-Quade, J.
2023. Advances in Cryptology – ASIACRYPT 2023 – 29th International Conference on the Theory and Application of Cryptology and Information Security, Springer Verlag

Publication
Dec 04, 2023
Cryptography Privacy

Universally Composable Auditable Surveillance

Fetzer, V.; Klooß, M.; Müller-Quade, J.; Raiber, M.; Rupp, A.
2023. ASIACRYPT 2023, 4th – 8th December 2023, 145, Springer Verlag

Publication
Dec 01, 2023
Legal Informatics Privacy

Technische und datenschutzrechtliche Einordnung von Weiterleitungs-URLs in E-Mails—Was bei Weiterleitungs-URLs in E-Mails aus Marketinggründen zu beachten ist

Veit, M.; Müllmann, D.; Volkamer, M.
2023. Computer und Recht, 39 (12), 810–816.

Publication
Nov 30, 2023
Software Engineering

A Survey of Analysis Composition Operators in the Context of Palladio

Taghavi, B.; Weber, S.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 8–10, Gesellschaft für Informatik (GI).

Publication
Nov 30, 2023
Software Engineering

Multi-level Hardware Simulation in Palladio

Weber, S.; Taghavi, B.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 32–34, Gesellschaft für Informatik (GI).

Publication
Nov 29, 2023
Usable Security

Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video

Berens, B. M.; Mossano, M.; Volkamer, M.
2024. Computers & Security, 137, Art.-Nr.: 103620.

Publication
Nov 27, 2023
Cryptography

Composable Long-Term Security with Rewinding

Berger, R. M.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
2023. Theory of Cryptography. 21th International Conference, TCC 2023. Proceedings, Part 1. Ed.: G. Rothblum, Springer Verlag

Publication
Nov 26, 2023
IT Security Privacy

BAZAAR: Anonymous Resource Sharing

Coijanovic, C.; Schadt, D.; Weis, C.; Strufe, T.
2023. WPES ’23: Proceedings of the 22nd Workshop on Privacy in the Electronic Society, Kopenhagen, 26th November 2023, 135–139, Association for Computing Machinery (ACM).

Publication
Nov 21, 2023
IT Security Privacy

Poster: Towards Practical Brainwave-based User Authentication

Fallahi, M.; Arias-Cabarcos, P.; Strufe, T.
2023. CCS’ 23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Kopenhagen, 26th-30th November 2023, 3627–3629, Association for Computing Machinery (ACM).

Publication
Nov 20, 2023
Software Engineering

Engineering Self-adaptive Microservice Applications: An Experience Report

Riccio, V.; Sorrentino, G.; Camilli, M.; Mirandola, R.; Scandurra, P.
2023. Service-Oriented Computing – 21st International Conference, ICSOC 2023, Rome, Italy, November 28 – December 1, 2023, Proceedings, Part I. Ed.: F. Monti, 227–242, Springer Nature Switzerland.

Publication
Nov 15, 2023
Legal Informatics Societal Security

Online-Bundestagswahlen – Verfassungsrechtliche Grenzen und technische Herausforderungen

Gutjahr, A.; Spiecker gen. Döhmann, I.; Volkamer, M.
2023. Computer und Recht, 767–776

Publication
Nov 15, 2023
Human-Centered IT Security Privacy Usable Security

“I just stopped using one and started using the other”: Motivations, Techniques, and Challenges When Switching Password Managers

Munyendo, C. W.; Mayer, P.; Aviv, A. J. 2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3123–3137, Association for Computing Machinery (ACM).

Publication
Nov 15, 2023
Machine Learning

Poster: Fooling XAI with Explanation-Aware Backdoors

Noppel, M.; Wressnegger, C.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3612–3614, Association for Computing Machinery (ACM).

Publication
Nov 15, 2023
IT Security System Security

Load-and-Act: Increasing Page Coverage of Web Applications

Weidmann, N.; Barber, T.; Wressnegger, C.
2023. Information Security – 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15–17, 2023, Proceedings. Ed.: E. Athanasopoulos, 163–182, Springer Nature Switzerland.

Publication
Nov 15, 2023
Privacy

Privacy in the Age of Neurotechnology: Investigating Public Attitudes towards Brain Data Collection and Use

Kablo, E.; Arias-Cabarcos, P.
2023. CCS ’23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Ed.: W. Meng, 225–238, Association for Computing Machinery (ACM).

Publication
Nov 07, 2023
Dependability Software Engineering

Generating adaptation rule-specific neural networks

Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2023. International Journal on Software Tools for Technology Transfer, 25, 733–746.

Publication
Nov 06, 2023
Cyber Physical Systems Dependability Software Engineering

Identifying Performance Challenges in Consistency Preserving View-Based Environments

König, L.; Weber, T.
2023. Softwaretechnik-Trends, 14th Symposium on Software Performance 2023, Karlsruhe, 6th – 8th November 2023, 26–28, Gesellschaft für Informatik (GI).

Publication
Nov 06, 2023
Verification

Scalable and Precise Refinement Types for Imperative Languages

Lanzinger, F.; Bachmeier, J.; Ulbrich, M.; Dietl, W.
2024. iFM 2023 – 18th International Conference, iFM 2023, Leiden, The Netherlands, November 13–15, 2023, Proceedings. Ed.: P. Herber, 377–383, Springer Nature Switzerland.

Publication
Nov 06, 2023
Mobility Systems Security Software Engineering

Designing Automotive Case Studies for Architectural Security Analyses

Boltz, N.; Walter, M.; Gerking, C.
2023. 14th Symposium on Software Performance 2023 (SSP 2023), Karlsruhe, 6th-8th November 2023, 23–25

Publication
Nov 02, 2023
Network Security

SAFFIRRE: Selective Aggregate Filtering Through Filter Rule Refinement

Heseding, H.; Bachmann, F.; Bien, P. S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), Izmir, 4th-06th October 2023, 42–46, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 31, 2023
Privacy Usable Security

Awareness, Intention, (In)Action: Individuals’ Reactions to Data Breaches

Mayer, P.; Zou, Y.; Lowens, B. M.; Dyer, H. A.; Le, K.; Schaub, F.; Aviv, A. J.
2023. ACM Transactions on Computer-Human Interaction, 30 (5), 1–53.

Publication
Oct 31, 2023
Energy Systems Security Machine Learning

Comparative Study on Smart Grid Security Testbeds Using MITRE ATT&CK Matrix

Mumrez, A.; Muhammad M. Roomi; Heng Chuan Tan; Daisuke Mashima; Elbez, G.; Hagenmeyer, V.
2023. 14th IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, Institute of Electrical and Electronics Engineers (IEEE)

Publication
Oct 31, 2023
Energy Systems Security Machine Learning

On Evasion of Machine Learning-based Intrusion Detection in Smart Grids

Mumrez, A.; Sánchez, G.; Elbez, G.; Hagenmeyer, V.
2023. IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids

Publication
Oct 30, 2023
Economic Security Trustworthy Internet Technologies

The Future of Enterprise Information Systems

Sunyaev, A.; Dehling, T.; Strahringer, S.; Da Xu, L.; Heinig, M.; Perscheid, M.; Alt, R.; Rossi, M.
2023. Business & Information Systems Engineering.

Publication
Oct 16, 2023
Usable Security

Influence of URL Formatting on Users’ Phishing URL Detection

Mossano, M.; Kulyk, O.; Berens, B. M.; Häußler, E. M.; Volkamer, M.
2023. Proceedings of the 2023 European Symposium on Usable Security, 318–333, Association for Computing Machinery (ACM).

Publication
Oct 16, 2023
Usable Security

Encouraging Organisational Information Security Incident Reporting

Ballreich, F. L.; Volkamer, M.; Müllmann, D.; Berens, B. M.; Häußler, E. M.; Renaud, K. V.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 224–236, Association for Computing Machinery (ACM).

Publication
Oct 16, 2023
Usable Security

Vision: What the hack is going on? A first look at how website owners became aware that their website was hacked

Hennig, A.; Thi Thanh Vuong, N.; Mayer, P.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 312–317, Association for Computing Machinery (ACM).

Publication
Oct 16, 2023
Usable Security

Influence of URL Formatting on Users’ Phishing URL Detection

Mossano, M.; Kulyk, O.; Berens, B. M.; Häußler, E. M.; Volkamer, M.
2023. Proceedings of the 2023 European Symposium on Usable Security, 318–333, Association for Computing Machinery (ACM).

Publication
Oct 16, 2023
Verification

Are Formal Contracts a useful Digital Twin of Software Systems?

Schiffl, J.; Weigl, A.
2023. Proceedings of the Workshop on Applications of Formal Methods and Digital Twins co-located with 25th International Symposium on Formal Methods (FM 2023), Ed.: S. Hallerstede, CEUR-WS

Publication
Oct 14, 2023
Privacy Usable Security

A Proposal to Study Shoulder-Surfing Resistant Authentication for Augmented and Virtual Reality: Replication Study in the US

Noah, N.; Mayer, P.; Das, S.
2023. CSCW ’23 Companion: Companion Publication of the 2023 Conference on Computer-Supported Cooperative Work and Social Computing, (CSCW ’23 Companion), Minneapolis, 14th-18th October 2023, 317 – 322, Association for Computing Machinery (ACM).

Publication
Oct 13, 2023
Dependability Software Engineering

Towards a Research Agenda for Understanding and Managing Uncertainty in Self-Adaptive Systems

Weyns, D.; Calinescu, R.; Mirandola, R.; Tei, K.; Acosta, M.; Bencomo, N.; Bennaceur, A.; Boltz, N.; Bures, T.; Camara, J.; Diaconescu, A.; Engels, G.; Gerasimou, S.; Gerostathopoulos, I.; Getir Yaman, S.; Grassi, V.; Hahner, S.; Letier, E.; Litoiu, M.; Marsso, L.; Musil, A.; Musil, J.; Nunes Rodrigues, G.; Perez-Palacin, D.; Quin, F.; Scandurra, P.; Vallecillo, A.; Zisman, A.
2023. ACM SIGSOFT Software Engineering Notes, 48 (4), 20–36.

Publication
Oct 09, 2023
Network Services Privacy

Brief Announcement: Let It TEE: Asynchronous Byzantine Atomic Broadcast with n ≥ 2f+1

Leinweber, M.; Hartenstein, H.
2023. 37th International Symposium on Distributed Computing (DISC 2023). Ed.: R. Oshman, 43:1–43:7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (LZI).

Publication
Oct 04, 2023
Network Security

eMinD: Efficient and Micro-Flow Independent Detection of Distributed Network Attacks

Kopmann, S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), 159–167, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 03, 2023
Societal Security Usable Security

Voter Perception of Cast-as-Intended Verifiability in the Estonian I-Vote Protocol

Hilt, T.; Sein, K.; Mällo, T.; Willemson, J.; Volkamer, M.
2023. E-Vote-ID 2023

Publication
Oct 03, 2023
Societal Security

German Social Elections 2023: An Overview and first Analysis

Hilt, T.; Kulyk, O.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI)

Publication
Oct 01, 2023
Cyber Physical Systems Dependability Software Engineering

Co-Evolving Meta-Models and View Types in View-Based Development

Muctadir, H. M.; König, L.; Weber, T.; Amrani, M.; Cleophas, L.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), 954–963, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 01, 2023
Software Engineering

How Students Plagiarize Modeling Assignments

Sağlam, T.; Schmid, L.; Hahner, S.; Burger, E.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, 1st – 6th October 2023, 98 – 101, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 01, 2023
Cyber Physical Systems Software Engineering

Consistency in the View-Based Development of Cyber-Physical Systems (Convide)

Reussner, R.; Schaefer, I.; Beckert, B.; Koziolek, A.; Burger, E.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, Sweden, 01-06 October 2023, 83–84, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 27, 2023
Dependability Network Services

Investigating the Role of Computing Education for Informed Usage Decision-Making

Gebhardt, L.; Leinweber, M.; Michaeli, T.
2023. WiPSCE ’23: The 18th WiPSCE Conference on Primary and Secondary Computing Education Research Cambridge United Kingdom September 27 – 29, 2023. Ed.: S. Sentance, 1–2, Association for Computing Machinery (ACM).

Publication
Sep 27, 2023
Societal Security

Cookie disclaimers: Dark patterns and lack of transparency

Berens, B. M.; Bohlender, M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2024. Computers & Security, 136, Art.-Nr.: 103507.

Publication
Sep 26, 2023
Legal Informatics

§ 20: Digitalisierung, Informationsgesellschaft, Massendaten

Spiecker genannt Döhmann, I.
2023. Handbuch des Staatsrechts, Band I: Grundlagen, Wandel und Herausforderungen. Hrsg.: Uwe Kischel, Hanno Kube, 899–934, C.F. Müller

Publication
Sep 26, 2023
Machine Learning

Explanation-Aware Backdoors in a Nutshell

Noppel, M.; Wressnegger, C.
2023. Proc. of 46th German Conference on Artificial Intelligence (KI)

Publication
Sep 26, 2023
Production Security

Cybersecurity for industrial automation and control systems

Haas, C.; Bretthauer, G.; Beyerer, J.
2023. at – Automatisierungstechnik, 71 (9), 723–725.

Publication
Sep 26, 2023
Legal Informatics

Verantwortlichkeit im Unternehmen und Verschuldensmaßstab im Rahmen des Art.83 DSGVO

Kemmler, K. J.
2023. INFORMATIK 2023. Hrsg.: M. Klein, 689–702, Gesellschaft für Informatik (GI).

Publication
Sep 25, 2023
Cyber Physical Systems Process Security

Labeling NIDS Rules with MITRE ATT&CK Techniques using ChatGPT

Daniel, N.; Kaiser, F. K.; Dzega, A.; Elyashar, A.; Puzis, R.
2023. 4th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection

Publication
Sep 25, 2023
IT Security Privacy

Panini – Anonymous Anycast and an Instantiation

Coijanovic, C.; Weis, C.; Strufe, T.
2024. 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Springer Verlag

Publication
Sep 24, 2023
Mobility Systems Security

Is Scenario Generation Ready for SOTIF? A Systematic Literature Review

Birkemeyer, L.; King, C.; Schaefer, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), 472–479, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 24, 2023
Mobility Systems Security

SOTIF-Compliant Scenario Generation Using Semi-Concrete Scenarios and Parameter Sampling

Birkemeyer, L.; Fuchs, J.; Gambi, A.; Schaefer, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), 2139–2144, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 24, 2023
Mobility Systems Security

The Fast Rise of Cautious Vehicle-to-X: Towards Evaluating Misbehavior Detection in the Field

Wehmer, M.; Baumgart, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), Bilbao, Spain, 24-28 September 2023, 3930–3936, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 19, 2023
Legal Informatics

Article-by-Article Commentary on the European General Data Protection Regulation

Papakonstantinou, V.; Hornung, G.
2023. (P. De Hert & I. Spiecker genannt Döhmann, Hrsg.), Nomos

Publication
Sep 19, 2023
Legal Informatics

General Data Protection Regulation. Article-by-Article Commentary

Papakonstantinou, V.; Hornung, G.
2023. (P. De Hert & I. Spiecker genannt Döhmann, Hrsg.), Nomos

Publication
Sep 18, 2023
Dependability Software Engineering

An Extensible Framework for Architecture-Based Data Flow Analysis for Information Security

Boltz, N.; Hahner, S.; Gerking, C.; Heinrich, R.
2024. Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral Symposium : Istanbul, Turkey, September 18–22, 2023, Revised Selected Papers. Ed.: B. Tekinerdoğan, 342–358, Springer.

Publication
Sep 15, 2023
Cryptography Energy Systems Security

Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems

Ramadan, M.; Raza, S.
2023. IEEE Internet of Things Journal, 10 (18), 16594–16604.

Publication
Sep 13, 2023
Machine Learning Production Security

Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models

Borcherding, A.; Morawetz, M.; Pfrang, S.
2023. Sensors, 23 (18), Art.-Nr.: 7864.

Publication
Sep 12, 2023
Network Security Production Security

Towards Self-learning Industrial Process Behaviour from Payload Bytes for Anomaly Detection

Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA), Sinaia, Romania, 12-15 September 2023, Institute of Electrical and Electronics Engineers (IEEE). 

Publication
Sep 10, 2023
Machine Learning System Security

On the Similarity of Web Measurements Under Different Experimental Setups

Demir, N.; Hörnemann, J.; Große-Kampmann, M.; Urban, T.; Holz, T.; Pohlmann, N.; Wressnegger, C.
2023. Proceedings of the 23nd ACM Internet Measurement Conference, 23nd ACM Internet Measurement Conference (2023) Montreal, Kanada, 24.10.2023–26.10.2023, 356 – 369, Association for Computing Machinery (ACM).

Publication
Sep 08, 2023
Dependability Software Engineering

Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents

Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Architecture. Ed.: B. Tekinerdogan, 37–53, Springer Nature Switzerland AG.

Publication
Sep 08, 2023
Energy Systems Security

A new hybrid risk assessment process for cyber security design of smart grids using fuzzy analytic hierarchy processes

Canbolat, S.; Elbez, G.; Hagenmeyer, V.
2023. Automatisierungstechnik.

Publication
Sep 08, 2023
Software Engineering

Automated Reverse Engineering of the Technology-Induced Software System Structure

Kirschner, Y. R.; Keim, J.; Peter, N.; Koziolek, A.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 283–291, Springer Nature Switzerland.

Publication
Sep 08, 2023
Software Engineering

Automated Integration of Heteregeneous Architecture Information into a Unified Model

Jordan, S.; König, C.; Linsbauer, L.; Schaefer, I.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 83 – 99, Springer Nature Switzerland.

Publication
Sep 06, 2023
Machine Learning

Lessons Learned on Machine Learning for Computer Security

Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2023. 
IEEE Security & Privacy, 21 (5), 72–77.

Publication
Sep 04, 2023
Privacy Usable Security

Zu Risiken und Anonymisierungen von Verhaltensbiometrie

Hanisch, S.; Todt, J.; Volkamer, M.; Strufe, T.
2023. Daten-Fairness in einer globalisierten Welt. Ed.: M. Friedewald, 423–444, Nomos Verlagsgesellschaft.

Publication
Sep 04, 2023
Machine Learning Network Security

Impact of Adaptive Packet Sampling on ML-based DDoS Detection

Kopmann, S.; Zitterbart, M.
2023. 2nd Workshop “Machine Learning & Networking” (MaLeNe) Proceedings Co-Located with the 5th International Conference on Networked Systems (NETSYS 2023) Potsdam, Germany, September 4, 2023 (MaLeNe). Ed.: M. Seufert

Publication
Sep 04, 2023
Machine Learning Network Security

Reducing memory footprints in purity estimations of volumetric DDoS traffic aggregates

Heseding, H.; Krack, T.; Zitterbart, M.
2023. M. Seufert, A. Blenk & O. Landsiedel (Hrsg.), 2nd Workshop on Machine Learning & Netwoking (MaLeNe) with the 5th International Conference on Networked Systems (NetSys 2023), Potsdam, 4th – 8th September 2023

Publication
Sep 03, 2023
Societal Security Trustworthy Internet Technologies

Nutzerzentrierter Ansatz zur Vereinfachung des Auffindens von Security Policies

Aldag, L.; Ballreich, F.; Berens, B.; Volkamer, M.
2023. Mensch und Computer 2023, Gesellschaft für Informatik (GI)

Publication
Sep 03, 2023
Societal Security Usable Security

A user-centred approach to facilitate locating company security policies : Nutzerzentrierter Ansatz zur Vereinfachung des Auffindens von Security Policies

Aldag, L.; Ballreich, F.; Berens, B.; Volkamer, M.
2023. MuC ’23: Proceedings of Mensch und Computer. Ed.: M. Stolze, 173–185, Association for Computing Machinery (ACM).

Publication
Aug 28, 2023
Software Engineering

True Variability Shining Through Taxonomy Mining

König, C.; Rosiak, K.; Cleophas, L.; Schaefer, I.
2023. Proceedings of the 27th ACM International Systems and Software Product Line Conference – Volume A, 182–193, Association for Computing Machinery (ACM).

Publication
Aug 28, 2023
Mobility Systems Security Software Engineering

Continuous T-Wise Coverage

Pett, T.; Heß, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2023. SPLC ’23: Proceedings of the 27th ACM International Systems and Software Product Line Conference. Vol. A. Ed.: P. Arcaini, 87–98, Association for Computing Machinery (ACM).

Publication
Aug 18, 2023
Machine Learning

Personalized Explanations

Becker, M.
2023. Proceedings of the 2022 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer, 1–10, KIT Scientific Publishing

Publication
Aug 17, 2023
Software Engineering

A Toolchain for Simulation Component Specification and Identification

Koch, S.; Reiche, F.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 75–89, Springer International Publishing.

Publication
02 / 06