Publications

Our interdisciplinary research is reflected in the outstanding publications of KASTEL Security Research Labs.

Oct 06, 2022
Process Security

Cyber threat intelligence enabled automated attack incident response

Kaiser, F. K.; Andris, L.; Tenning, T.; Iser, J.; Wiens, M.; Schultmann, F.
2022. 2022 3rd International Conference on Next Generation Computing Applications (NextComp), IEEE, 1–6, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 06, 2022
Cryptography Privacy

Private Stream Aggregation with Labels in the Standard Model

Ernst, J.; Koch, A.
2021. Proceedings on Privacy Enhancing Technologies, 2021 (4), 117–138.

Publication
Oct 04, 2022
Network Protocols Privacy Societal Security

Electronic Voting: 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings

Krimmer, R.; Volkamer, M.; Duenas-Cid, D.; Rønne, P.; Germann, M. (Hrsg.)
2022

Publication
Oct 01, 2022
Decentralized Systems Software Engineering

Challenges and Common Solutions in Smart Contract Development

Kannengießer, N.; Lins, S.; Sander, C.; Winter, K.; Frey, H.; Sunyaev, A.
2022. IEEE transactions on software engineering, 48 (11), 4291–4318.

Publication
Oct 01, 2022
Modeling Software Engineering

Knowledge-based Sense Disambiguation of Multiword Expressions in Requirements Documents

Hey, T.; Keim, J.; Tichy, W. F.
2021. 2021 IEEE 29th International Requirements Engineering Conference Workshops (REW), Notre Dame, IN, USA, 20-24 Sept. 2021, 70–76, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Oct 01, 2022
Cryptography System Security

On Forging SPHINCS + -Haraka Signatures on a Fault-Tolerant Quantum Computer

Berger, R. M.; Tiepelt, M.
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing.

Publication
Sep 29, 2022
Privacy Usable Security

Design and Evaluation of an Anti-Phishing Artifact Based on Useful Transparency

Beckmann, C.; Berens, B.; Kühl, N.; Mayer, P.; Mossano, M.; Volkamer, M.
2022. International Workshop on Socio-Technical Aspects in Security

Publication
Sep 27, 2022
Dependability Production Security

Generalized Test Tables: A Domain-Specific Specification Language for Automated Production Systems

Beckert, B.; Ulbrich, M.; Vogel-Heuser, B.; Weigl, A.
2022. Theoretical Aspects of Computing – ICTAC 2022 – 19th International Colloquium, Tbilisi, Georgia, September 27–29, 2022, Proceedings. Ed.: H. Seidl, 7–13, Springer International Publishing.

Publication
Sep 26, 2022
Software Engineering

Information Flow Control-by-Construction for an Object-Oriented Language

Runge, T.; Kittelmann, A.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. Software Engineering and Formal Methods – 20th International Conference, SEFM 2022, Berlin, Germany, September 26–30, 2022, Proceedings. Ed.: B.-H. Schlingloff, 209–226, Springer International Publishing.

Publication
Sep 26, 2022
Legal Informatics Privacy Production Security

Datenschutzkonforme Weitergabe von Versichertendaten aus dem Forschungsdatenzentrum

Orak, B.; Krempel, E.; Appenzeller, A.
2022. D. Demmler, D. Krupka & H. Federrath (Hrsg.), INFORMATIK 2022 Hrsg.: Demmler, Daniel AND Federrath, Hannes, Daniel AND Krupka, 533–549, Gesellschaft für Informatik (GI).

Publication
Sep 26, 2022
Communication Security Network Security

ReCEIF: Reinforcement Learning-Controlled Effective Ingress Filtering

Heseding, H.; Zitterbart, M.
2022. 2022 IEEE 47th Conference on Local Computer Networks (LCN), 106–113, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 26, 2022
Communication Security Network Security

HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic

Kopmann, S.; Heseding, H.; Zitterbart, M.
2022. 2022 IEEE 47th Conference on Local Computer Networks (LCN), 90–97, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 19, 2022
Modeling Software Engineering

Accurate Performance Predictions with Component-Based Models of Data Streaming Applications

Werle, D.; Seifermann, S.; Koziolek, A.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 83–98, Springer International Publishing.

Publication
Sep 19, 2022
Modeling Software Engineering

A Taxonomy for Design Decisions in Software Architecture Documentation

Keim, J.; Hey, T.; Sauer, B.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 439–454, Springer International Publishing. 

Publication
Sep 19, 2022
Modeling Software Engineering

ARCHI4MOM: Using Tracing Information to Extract the Architecture of Microservice-Based Systems from Message-Oriented Middleware

Singh, S.; Werle, D.; Koziolek, A.
2022. Software Architecture : 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 189–204, Springer International Publishing.

Publication
Sep 14, 2022
IT Security Privacy

Membership Inference Attack Against Principal Component Analysis

Zari, O.; Parra-Arnau, J.; Ünsal, A.; Strufe, T.; Önen, M.
2022. Privacy in Statistical Databases – International Conference, PSD 2022, Paris, France, September 21–23, 2022, Proceedings. Ed.: J. Domingo-Ferrer, 269–282, Springer International Publishing.

Publication
Sep 12, 2022
Dependability Software Engineering

Towards an integrated approach for managing the variability and evolution of both software and hardware components

Wittler, J. W.; Kühn, T.; Reussner, R.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference – Volume B Ed.: A. Felfernig, 94–98, Association for Computing Machinery (ACM).

Publication
Sep 12, 2022
Software Engineering

Synchronizing software variants: A two-dimensional approach

König, C.; Rosiak, K.; Linsbauer, L.; Schaefer, I.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference (SPLC ’22), Graz, A, 12.-16. September 2022. Ed.: A. Felfernig. Vol. B, 82–89, Association for Computing Machinery (ACM).

Publication
Sep 06, 2022
Production Security Robotics

CrossTest: a cross-domain physical testbed environment for cybersecurity performance evaluations

Karch, M.; Rösch, D.; André, K.; Meshram, A.; Haas, C.; Nicolai, S.
2022. 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA), 1–8, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 01, 2022
Privacy Usable Security

PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren für Virtual Reality Head-Mounted Displays

Länge, T.; Matheis, P.; Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Mensch und Computer 2022 – Workshopband. Ed.: K. Marky, Gesellschaft für Informatik (GI).

Publication
Sep 01, 2022
IT Security Privacy

Dissecting chirping patterns of invasive Tweeter flocks in the German Twitter forest

Reubold, J. L.; Escher, S.; Pflugmacher, J.; Strufe, T.
2022. Online Social Networks and Media, 31, Art.-Nr.: 100228.

Publication
Aug 31, 2022
Dependability Software Engineering

Handling Environmental Uncertainty in Design Time Access Control Analysis

Boltz, N.; Hahner, S.; Walter, M.; Seifermann, S.; Heinrich, R.; Bures, T.; Hnetynka, P.
2022. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Gran Canaria, Spain, 31 August 2022 – 02 September 2022, 382–389, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Aug 27, 2022
Modeling

Trace Link Recovery for Software Architecture Documentation

Keim, J.; Schulz, S.; Fuchß, D.; Kocher, C.; Speit, J.; Koziolek, A.
2021. Software Architecture: 15th European Conference, ECSA 2021, Virtual Event, Sweden, September 13-17, 2021, Proceedings. Ed.: S. Biffl, 101–116, Springer Verlag.

Publication
Aug 23, 2022
Privacy Usable Security

Cookie Disclaimers: Impact of Design and Users’ Attitude

Berens, B. M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2022. Proceedings of the 17th International Conference on Availability, Reliability and Security, 1–20, Association for Computing Machinery (ACM).

Publication
Aug 23, 2022
Privacy Usable Security

SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays

Duezguen, R.; Noah, N.; Mayer, P.; Das, S.; Volkamer, M.
2022. International Conference on Availability, Reliability and Security, ARES 2022, August 23 – August 26, 2022, Vienna, Austria, Art.-No.: 36, Association for Computing Machinery (ACM).

Publication
Aug 20, 2022
Modeling Quantification

Quantifying Software Reliability via Model-Counting

Teuber, S.; Weigl, A.
2021. Quantitative Evaluation of Systems: 18th International Conference, QEST 2021, Paris, France, August 23–27, 2021, Proceedings. Ed.: A. Abate, 59–79, Springer Verlag.

Publication
Aug 15, 2022
Dependability Software Engineering

Modeling and Enforcing Access Control Policies for Smart Contracts

Töberg, J.-P.; Schiffl, J.; Reiche, F.; Beckert, B.; Heinrich, R.; Reussner, R.
2022. Conference Proceedings: 2022 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 38–47, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Aug 11, 2022
Decentralized Systems Trustworthy Internet Technologies

Finding the Right Balance: Technical and Political Decentralization in the Token Economy

Pfister, M.; Kannengießer, N.; Sunyaev, A.
2022. Blockchains and the Token Economy. Ed.: M. C. Lacity, 53–86, Springer Nature Switzerland AG.

Publication
Aug 10, 2022
Privacy Usable Security

Why Users (Don’t) Use Password Managers at a Large Educational Institution

Mayer, P.; Munyendo, C. W.; Mazurek, M. L.; Aviv, A. J.
2022. 31st USENIX Security Symposium (USENIX Security 22), 1849–1866, USENIX Association

Publication
Aug 10, 2022
Machine Learning System Security

Dos and Don’ts of Machine Learning in Computer Security

Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2022. Proc. of the USENIX Security Symposium 2022

Publication
Aug 09, 2022
Dependability Software Engineering

Feature-based Investigation of Simulation Structure and Behaviour

Koch, S.; Hamann, E.; Heinrich, R.; Reussner, R.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 178–185, Springer.

Publication
Aug 07, 2022
Societal Security Usable Security

Increasing security without decreasing usability: A comparison of various verifiable voting systems

Volkamer, M.; Kulyk, O.; Ludwig, J.; Fuhrberg, N.
2022. Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS 2022), Boston, MA, August 8-9, 2022, 233–252, USENIX Association

Publication
Aug 07, 2022
Privacy Societal Security Usable Security

“I don’t know why I check this…” – Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks

Mayer, P.; Poddebniak, D.; Fischer, K.; Brinkmann, M.; Somorovsky, J.; Sasse, M. A.; Schinzel, S.; Volkamer, M.
2022. Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 77–96, USENIX Association

Publication
Aug 05, 2022
Communication Security Production Security

Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks

Borcherding, A.; Takacs, P.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy, 334–344, SciTePress.

Publication
Jul 28, 2022
Legal Informatics Privacy System Security

Artificial Intelligence and Data Protection

Spiecker genannt Döhmann, I.
2022. The Cambridge Handbook of Artificial Intelligence – Global Perspectives on Law and Ethics. Hrsg.: L. DiMatteo/Chr. Poncibo/M. Cannarsa, 132–145, Cambridge Univ. Press.

Publication
Jul 25, 2022
Machine Learning System Security

Non-Uniform Adversarially Robust Pruning

Zhao, Q.; Königl, T.; Wressnegger, C.
2022. Proc. of the 1st International Conference on Automated Machine Learning (AutoML)

Publication
Jul 23, 2022
Dependability Software Engineering

Scalability testing automation using multivariate characterization and detection of software performance antipatterns

Avritzer, A.; Britto, R.; Trubiani, C.; Camilli, M.; Janes, A.; Russo, B.; Hoorn, A. van; Heinrich, R.; Rapp, M.; Henß, J.; Chalawadi, R. K.
2022. Journal of Systems and Software, 193, Art.-Nr.: 111446.

Publication
Jul 14, 2022
Dependability Software Engineering

Design-time Performability Optimization of Runtime Adaptation Strategies

Rapp, M.; Scheerer, M.; Reussner, R.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 113–120, Association for Computing Machinery (ACM).

Publication
Jul 13, 2022
Cryptography Production Security

Towards Heterogeneous Remote Attestation Protocols

Wagner, P. G.; Beyerer, J.
2022. Proceedings of the 19th International Conference on Security and Cryptography – SECRYPT. Vol. 1. Ed.: S. De Capitani di Vimercati, 586–591, SciTePress.

Publication
Jul 13, 2022
Privacy Production Security

Towards Private Medical Data Donations by Using Privacy Preserving Technologies

Appenzeller, A.; Terzer, N.; Krempel, E.; Beyerer, J.
2022. The15th International Conference on PErvasive Technologies Related to Assistive Environments, 446–454, Association for Computing Machinery (ACM).

Publication
Jul 11, 2022
Production Security Robotics

Trustworthy Artificial Intelligence

Becker, M.
2022. Proceedings of the 2021 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory, 21–32, Karlsruher Institut für Technologie (KIT)

Publication
Jul 06, 2022
Privacy Societal Security Usable Security

Your Cookie Disclaimer is not in line with the ideas of the GDPR. Why?

Hennig, A.; Dietmann, H.; Lehr, F.; Mutter, M.; Volkamer, M.; Mayer, P.
2022. Human Aspects of Information Security and Assurance. Ed.: N. Clarke, 218–227, Springer Verlag.

Publication
Jul 04, 2022
Software Engineering

Re-CorC-ing KeY: Correct-by-Construction Software Development Based on KeY

Bordis, T.; Cleophas, L.; Kittelmann, A.; Runge, T.; Schaefer, I.; Watson, B. W.
2022. The Logic of Software. A Tasting Menu of Formal Methods – Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday. Ed.: W. Ahrendt, 80–104, Springer International Publishing.

Publication
Jul 04, 2022
Dependability Verification

The Karlsruhe Java Verification Suite

Klamroth, J.; Lanzinger, F.; Pfeifer, W.; Ulbrich, M.
2022. The Logic of Software. A Tasting Menu of Formal Methods – Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday. Ed.: W. Ahrendt, 290–312, Springer International Publishing. 

Publication
Jun 27, 2022
Legal Informatics

The Law of Global Digitality

Kettemann, M. C.; Peukert, A.; Spiecker genannt Döhmann, I.
2022. Routledge.

Publication
Jun 27, 2022
Dependability Production Security Software Engineering

A Cross-Disciplinary Process Modelling Language for Validating Reconfigured Production Processes

Koch, S.; Wunderlich, T.; Hansert, J.; Schlegel, T.; Ihlenfeldt, S.; Heinrich, R.
2022. Modellierung 2022 : 27.06.-01.07.2022 Hamburg, Germany. Ed.: Matthias Riebisch, 181–190, Köllen Druck+Verlag.

Publication
Jun 27, 2022
Decentralized Systems Software Engineering

Decentralized Review and Attestation of Software Attribute Claims

Stengele, O.; Westermeyer, C.; Hartenstein, H.
2022. IEEE Access, 10, 66694–66710.

Publication
Jun 24, 2022
Legal Informatics Privacy

Data Protection: The more the merrier – a dynamic approach learning from prior mis-governance

Spiecker genannt Döhmann, I.
2022. The Law of Global Digitality. Hrsg.: M. Kettemann, 77–95, Taylor and Francis

Publication
Jun 23, 2022
Decentralized Systems Mobility Systems Security Trustworthy Internet Technologies

Leveraging Distributed Ledger Technology for Decentralized Mobility-as-a-Service Ticket Systems

Leinweber, M.; Kannengießer, N.; Hartenstein, H.; Sunyaev, A.
2022. Towards the New Normal in Mobility : Technische und betriebswirtschaftliche Aspekte. Hrsg.: H. Proff, 547–567, Springer Fachmedien Wiesbaden.

Publication
Jun 22, 2022
Legal Informatics Privacy

Panorama-Abbildungen im Internet unter der DSGVO: Google Street View und Co revisited

Spiecker genannt Döhmann, I.
2022. Gestaltung der Informationsrechtsordnung: Festschrift für Thomas Dreier. Hrsg.: V. Fischer/G. Nolte/M. Senftleben/L. Specht-Riemenschneider, 427–444, Verlag C.H.Beck

Publication
Jun 22, 2022
Legal Informatics Privacy

Challenges in Data Protection in Business Transactions: An Overview Over Civil Law Approaches to Data Protection and Data Ownership

Spiecker genannt Döhmann, I.; Benecke, A.
2022. Handbook Industry 4.0 – Law, Technology, Society, 159–178, Springer Verlag.

Publication
Jun 14, 2022
Decentralized Systems Robotics

BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots

Bayreuther, S.; Jacob, F.; Grotz, M.; Kartmann, R.; Peller-Konrad, F.; Paus, F.; Hartenstein, H.; Asfour, T.
2022. SACMAT ’22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesJune 2022, New York NY USA, June 8 – 10, 2022. Ed.: S. Dietrich, 185–194, Association for Computing Machinery (ACM).

Publication
Jun 12, 2022
Decentralized Systems Verification

Towards Correct Smart Contracts: A Case Study on Formal Verification of Access Control

Schiffl, J.; Grundmann, M.; Leinweber, M.; Stengele, O.; Friebe, S.; Beckert, B.
2021. SACMAT ’21: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 125–130, Association for Computing Machinery (ACM).

Publication
May 31, 2022
Modeling Software Engineering

A conceptual model for unifying variability in space and time: Rationale, validation, and illustrative applications

Ananieva, S.; Greiner, S.; Kehrer, T.; Krüger, J.; Kühn, T.; Linsbauer, L.; Grüner, S.; Koziolek, A.; Lönn, H.; Ramesh, S.; Reussner, R.
2022. Empirical Software Engineering, 27 (5), Article no: 101.

Publication
May 31, 2022
Dependability Software Engineering

Architectural Attack Propagation Analysis for Identifying Confidentiality Issues

Walter, M.; Heinrich, R.; Reussner, R.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), 12 S., Institute of Electrical and Electronics Engineers (IEEE).

Publication
May 31, 2022
Decentralized Systems Network Services

On the Peer Degree Distribution of the Bitcoin P2P Network

Grundmann, M.; Baumstark, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–5, Institute of Electrical and Electronics Engineers (IEEE).

Publication
May 30, 2022
IT Security Privacy

Differentially private publication of database streams via hybrid video coding

Parra-Arnau, J.; Strufe, T.; Domingo-Ferrer, J.
2022. Knowledge-Based Systems, 247, Art.-Nr.: 108778.

Publication
May 23, 2022
Modeling Software Engineering

Performance-Detective: Automatic Deduction of Cheap and Accurate Performance Models

Schmid, L.; Copik, M.; Calotoiu, A.; Werle, D.; Reiter, A.; Selzer, M.; Koziolek, A.; Hoefler, T.
2022. ACM International Conference on Supercomputing (ICS ’22), Virtual Event, June 28-30, 2022, Association for Computing Machinery (ACM).

Publication
May 23, 2022
Privacy Usable Security

Standing out among the daily spam: How to catch website owners’ attention by means of vulnerability notifications

Hennig, A.; Neusser, F.; Pawelek, A. A.; Herrmann, D.; Mayer, P.
2022. Conference on Human Factors in Computing Systems (CHI ’22) : Extended Abstracts, Art.-Nr.: 317, Association for Computing Machinery (ACM).

Publication
May 05, 2022
Network Protocols Network Services

Verifying Payment Channels with TLA+

Grundmann, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–3, Institute of Electrical and Electronics Engineers (IEEE).

Publication
May 04, 2022
System Security

Reinforcement Learning-Controlled Mitigation of Volumetric DDoS Attacks

Heseding, H.
2022. C. Wressnegger, D. Reinhardt, T. Barber, B. C. Witt, D. Arp & Z. Mann (Hrsg.), SICHERHEIT 2022 Hrsg.: Wressnegger, Christian; Reinhardt, Delphine; Barber, Thomas; Witt, Bernhard C.; Arp, Daniel; Mann, Zoltan, 237–242, Gesellschaft für Informatik (GI).

Publication
Apr 27, 2022
Legal Informatics Privacy

§ 71: Grundrechte der Digitalisierung

Spiecker genannt Döhmann, I.
2022. Handbuch des Verwaltungsrechts, Band 3. Hrsg.: W. Kahl/M. Ludwigs, 535–564, C.F. Müller

Publication
Apr 27, 2022
Decentralized Systems Quantification

Quantifying Trustworthiness in Decentralized Trusted Applications

Wagner, P. G.; Beyerer, J.
2022. Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (Sat-CPS’22), 67–76, Association for Computing Machinery (ACM).

Publication
Apr 25, 2022
IT Security System Security

Reproducibility and Replicability of Web Measurement Studies

Demir, N.; Große-Kampmann, M.; Urban, T.; Wressnegger, C.; Holz, T.; Pohlmann, N.
2022. WWW ’22: Proceedings of the ACM Web Conference 2022. Ed.: F. Laforest, 533–544, Association for Computing Machinery (ACM).

Publication
Apr 23, 2022
Privacy Usable Security

Phishing awareness and education – When to best remind?

Berens, B. M.; Dimitrova, K.; Mossano, M.; Volkamer, M.
2022. Symposium on Usable Security and Privacy (USEC), co-located with the Network and Distributed System Security Symposium (NDSS 2022), San Diego, CA, April 23, 2022.

Publication
Apr 09, 2022
Decentralized Systems Software Engineering

Beauty and the Beast – A Case Study on Performance Prototyping of Data-Intensive Containerized Cloud Applications

Klinaku, F.; Rapp, M.; Henss, J.; Rhode, S.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 53–60, Association for Computing Machinery (ACM).

Publication
Apr 07, 2022
Communication Security Network Security

The Smart Grid: A Use-Case for Large-Scale SDN Deployment

Neumeister, F.; Zitterbart, M.
2022. 3. KuVS Fachgespräch “Network Softwarization” (7.4. – 8.4.2022). 3. KuVS Fachgespräch “Network Softwarization” (online) 7./8.4.2022, Universitätsbibliothek Tübingen.

Publication
Apr 05, 2022
Cryptography Cyber Physical Systems

Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules

Doerner, D.; Mechler, J.; Müller-Quade, J.
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 83–99, Gesellschaft für Informatik (GI).

Publication
Apr 05, 2022
Privacy Societal Security

Recent Developments in the Context of Online Elections and Digital Polls in Germany

Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI).

Publication
Apr 05, 2022
Legal Informatics Privacy

Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende – Betrachtung möglicher arbeitsrechtlicher Konsequenzen

Müllmann, D.; Volkamer, M.
2021. Informatik 2020 – Back to the future. Hrsg.: R. H. Reussner, 829–840, Gesellschaft für Informatik (GI).

Publication
Mar 29, 2022
Legal Informatics System Security

Die Regulierungsperspektive von KI/BigData in der Wissenschaft

Spiecker genannt Döhmann, I.
2022. Künstliche Intelligenz in der Forschung. Hrsg.: C.F. Gethmann, 147–172, Springer Verlag.

Publication
Mar 22, 2022
Communication Security Network Security

MIDA: Micro-flow Independent Detection of DDoS Attacks with CNNs

Kopmann, S.; Heseding, H.; Zitterbart, M.
2023. Advances in Service-Oriented and Cloud Computing : International Workshops of ESOCC 2022, Wittenberg, Germany, March 22-24, 2022, Revised Selected Papers. Ed.: C. Zirpins, 32–43, Springer International Publishing.

Publication
Mar 21, 2022
Human-Centered IT Security IT Security Privacy

MPER – a Motion Profiling Experiment and Research system for human body movement

Rettlinger, S.; Knaus, B.; Wieczorek, F.; Ivakko, N.; Hanisch, S.; Nguyen, G. T.; Strufe, T.; Fitzek, F. H. P.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy, 21-25 March 2022, 88–90, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 21, 2022
IoT Security Privacy

Transparency for Bystanders in IoT regarding audiovisual Recordings

Escher, S.; Etzrodt, K.; Weller, B.; Kopsell, S.; Strufe, T.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops): 21–25 March 2022, Pisa, Italy, 649–654, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 17, 2022
Cryptography Privacy

PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics

Fetzer, V.; Keller, M.; Maier, S.; Raiber, M.; Rupp, A.; Schwerdt, R.
2022. Proceedings on Privacy Enhancing Technologies, 2022 (2), 447–516.

Publication
Mar 12, 2022
Software Engineering

Replication Package of “Evaluation Methods and Replicability of Software Architecture Research Objects”

Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; Al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 58, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 12, 2022
Cyber Physical Systems Software Engineering

Architectural Pen-Test Generation and Vulnerability Prediction for Cyber-Physical Systems

Walter, T.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 45–46, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 12, 2022
Modeling Software Engineering

Evaluation Methods and Replicability of Software Architecture Research Objects

Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), Honolulu, HI, USA, 12-15 March 2022, 157–168, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 12, 2022
Dependability Software Engineering

Dataset – Architectural Attack Propagation Analysis for Identifying Confidentiality Issues

Walter, M.; Heinrich, R.; Reussner, R.
2022. IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 12 -15 March 2022, Honolulu, HI, USA, 59, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 08, 2022
Cryptography Modeling

A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels

Beskorovajnov, W.; Gröll, R.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing.

Publication
Mar 08, 2022
Cryptography Privacy

Private Function Evaluation with Cards

Koch, A.; Walzer, S.
2022. New Generation Computing, 40, 115–147.

Publication
Feb 25, 2022
Dependability Software Engineering

Continuous Secure Software Development and Analysis

Schulz, S.; Reiche, F.; Hahner, S.; Schiffl, J.
2022. Symposium on Software Performance 2021 : Short Paper Proceedings of Symposium on Software Performance, Leipzig, Germany, November 9.-10., 2021. Ed.: D. G. Reichelt, R. Müller, S. Becker, W. Hasselbring, A. v. Hoorn, S. Kounev, A. Koziolek, R. Reussner, RWTH Aachen

Publication
Feb 23, 2022
Dependability Modeling Software Engineering

Unified Operations for Variability in Space and Time

Ananieva, S.; Greiner, S.; Krueger, J.; Linsbauer, L.; Gruener, S.; Kehrer, T.; Kuehn, T.; Seidl, C.; Reussner, R.
2022. Proceedings of the 16th International Working Conference on Variability Modelling of Software-Intensive Systems, 1–10, Association for Computing Machinery (ACM).

Publication
Feb 22, 2022
Privacy Quantification

Sovereign Digital Consent through Privacy Impact Quantification and Dynamic Consent

Appenzeller, A.; Hornung, M.; Kadow, T.; Krempel, E.; Beyerer, J.
2022. Technologies, 10 (1), Article no: 35.

Publication
Feb 21, 2022
Legal Informatics Privacy

Extra DSGVO nulla salus? – Zur weiteren Zulässigkeit nicht akkreditierter Datenschutzsiegel neben akkreditierten Gütesiegeln im Sinne der Art. 42 f. DSGVO

Müllmann, D.; Spiecker genannt Döhmann, I.
2022. Deutsches Verwaltungsblatt, 137 (4), 208–214

Publication
Feb 18, 2022
Privacy Societal Security Verification

German voters’ attitudes towards voting online with a verifiable system

Kulyk, O.; Volkamer, M.; Fuhrberg, N.; Berens, B.; Krimmer, R.
2022. Workshop on Advances in Secure Electronic Voting (VOTING), Grenada, February 18, 2022

Publication
Feb 09, 2022
Machine Learning Network Security Robotics

Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks

Borcherding, A.; Feldmann, L.; Karch, M.; Meshram, A.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy – ICISSP, 314–325, SciTePress.

Publication
Jan 31, 2022
Legal Informatics Robotics

Responsible Human-Robot Interaction with Anthropomorphic Service Robots: State of the Art of an Interdisciplinary Research Challenge

Stock-Homburg, R. M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; Rawal, N.; David, K.; Wendt, J.; Spiecker genannt Döhmann, I.; Stryk, O. von; Hannig, M.; Knof, M.
2022. Proceedings of the 55th Annual Hawaii International Conference on System Sciences : January 3-7, 2022. Ed.: T. X. Bui, 2065–2074, University of Hawaii.

Publication
Jan 27, 2022
Machine Learning Modeling

A Step Towards Global Counterfactual Explanations: Approximating the Feature Space Through Hierarchical Division and Graph Search

Becker, M.; Burkart, N.; Birnstill, P.; Beyerer, J.
2021. Advances in Artificial Intelligence and Machine Learning, 1 (2), 90–110.

Publication
Jan 27, 2022
Process Security

Attack Forecast and Prediction

Kaiser, F.; Budig, T.; Goebel, E.; Fischer, T.; Muff, J.; Wiens, M.; Schultmann, F.
2021. C&ESAR 2021: Automation in Cybersecurity ; Proceedings of the 28th Computer & Electronics Security Application Rendezvous co-located with the 6th European Cyber Week (ECW 2021) ; Rennes, France, November 16-17, 2021. Ed.: G. Le Guernic, 77–97, CEUR-WS.org

Publication
Jan 10, 2022
Human-Centered IT Security Legal Informatics

Demokratie und Öffentlichkeit im 21. Jahrhundert – zur Macht des Digitalen

Spiecker genannt Döhmann, I.; Westland, M.; Campos, R. (Hrsg.)
2022. Nomos Verlagsgesellschaft.

Publication
Jan 10, 2022
Human-Centered IT Security Legal Informatics

Künstliche Intelligenz in der Forschung – Neue Möglichkeiten und Herausforderungen für die Wissenschaft

Gethmann, C. F.; Buxmann, P.; Distelrath, J.; Humm, B. G.; Lingner, S.; Nitsch, V.; Schmidt, J. C.; Spiecker genannt Döhmann, I.
2022. Springer Verlag.

Publication
Jan 04, 2022
IT Security Network Security

Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings

Byrenheid, M.; Roos, S.; Strufe, T.
2022. ICDCN ’22: Proceedings of the 2022 International Conference on Distributed Computing and Networking ; Jan 4th-7th, 2022, Virtual Conference, 107–116, Association for Computing Machinery (ACM).

Publication
Jan 03, 2022
Legal Informatics Privacy

§ 24: Europäisches Datenschutzverwaltungsrecht

Spiecker genannt Döhmann, I.; Benecke, A.
2022. Verwaltungsrecht der Europäischen Union. Hrsg.: J.P. Terhechte, 997–1040, Nomos

Publication
Jan 03, 2022
Legal Informatics Privacy

§ 24 Europäisches Datenschutzrecht

Spiecker gen. Döhmann, I.; Benecke, A.
2021. Verwaltungsrecht der Europäischen Union. Hrsg.: J. Tierhechte, Nomos Verlagsgesellschaft

Publication
Dec 30, 2021
Human-Centered IT Security Privacy Usable Security

Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass

Renaud, K.; Volkamer, M.; Mayer, P.; Grimm, R.
2021. AIS transactions on human-computer interaction, 13 (4), 407–430.

Publication
Dec 30, 2021
Cryptography Network Services

ETHTID: Deployable Threshold Information Disclosure on Ethereum

Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Dec 14, 2021
Cryptography Privacy

Black-Box Accumulation Based on Lattices

Faller, S. H.; Baumer, P.; Klooß, M.; Koch, A.; Ottenhues, A.; Raiber, M.
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer.

Publication
Dec 14, 2021
Privacy Trustworthy Internet Technologies

Architecture Matters: Investigating the Influence of Differential Privacy on Neural Network Design

Morsbach, F.; Dehling, T.; Sunyaev, A.
2021. Presented at NeurIPS 2021 Workshop on Privacy in Machine Learning (PriML 2021), 14.12.2021.

Publication
Dec 12, 2021
Decentralized Systems Trustworthy Internet Technologies

Need for Change: Business Functions Affected by the Use of Decentralized Information Systems

Heines, R.; Kannengießer, N.; Sturm, B.; Jung, R.; Sunyaev, A.
2021. 42nd International Conference on Information Systems (ICIS), Association for Information Systems (AIS)

Publication
02 / 03