Publications

Our interdisciplinary research is reflected in the outstanding publications of KASTEL Security Research Labs.

Jul 30, 2025
IT Security Machine Learning

Adversarial Subspace Generation for Outlier Detection in High-Dimensional Data

Cribeiro-Ramallo, J.; Matteucci, F.; Enciu, P.; Jenke, A.; Arzamasov, V.; Strufe, T.; Böhm, K.
2025. Transactions on Machine Learning Research, 7

Publication
Jul 30, 2025
Cyber Physical Systems

A Real-Analytic Approach to Differential-Algebraic Dynamic Logic

Hellwig, J.; Platzer, A.
2025. Automated Deduction – CADE 30 – 30th International Conference on Automated Deduction, Stuttgart, Germany, July 28-31, 2025, Proceedings. Ed.: C. Barrett, 696–714, Springer Nature Switzerland.

Publication
Jul 27, 2025
Privacy

Can a Large Language Model Keep My Secrets? A Study on LLM-Controlled Agents

Hemken, N.; Koneru, S.; Jacob, F.; Hartenstein, H.; Niehues, J.
2025. Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics. Vol 4: Student Research Workshop, 746–759, Association for Computational Linguistics (ACL)

Publication
Jul 23, 2025
Economic Security Process Security

Energy Supply Chain Resilience and Sustainability Practices: Insights on Sourcing and Pricing Strategies

Rajabzadeh, H.; Wiens, M.
2025. Operations Research Proceedings 2023 : Selected Papers of the Annual International Conference of the German Operations Research Society (GOR), Germany, August 29 – September 1, 2023. Ed.: G. Voigt, 403–413, Springer Nature Switzerland.

Publication
Jul 19, 2025
Verification

Next Steps in LLM-Supported Java Verification

Teuber, S.; Beckert, B.
2025. 2025 IEEE/ACM 1st International Workshop on Neuro-Symbolic Software Engineering (NSE), 1 – 4, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jul 16, 2025
Software Engineering

Detecting Information Flow Security Vulnerabilities by Analysis Coupling

Reiche, F.; Reussner, R.; Heinrich, R.
2025. IEEE Transactions on Software Engineering, 1–33.

Publication
Jul 14, 2025
Cryptography Machine Learning

AlphaFL: Secure Aggregation with Malicious2 Security for Federated Learning against Dishonest Majority

Jiang, Y.; Zarezadeh, M.; Dai, T.; Köpsell, S.
2025. Proceedings on Privacy Enhancing Technologies, 2025 (4), 348–368.

Publication
Jul 14, 2025
Privacy

Aimless Onions: Mixing without Topology Information

Schadt, D.; Coijanovic, C.; Strufe, T.
2025. Proceedings on Privacy Enhancing Technologies, 2025 (4), 293–307.

Publication
Jul 09, 2025
Artificial Intelligence Machine Learning

POMELO : Black-Box Feature Attribution with Full-Input, In-Distribution Perturbations

Ademi, L.; Noppel, M.; Wressnegger, C.
2025. Explainable Artificial Intelligence. Ed.: R. Guidotti. Pt. 2, 219–243, Springer Nature Switzerland

Publication
Jul 07, 2025
Cryptography Privacy

POBA: Privacy-Preserving Operator-Side Bookkeeping and Analytics

Faut, D.; Fetzer, V.; Müller-Quade, J.; Raiber, M.; Rupp, A.
2025. IACR Communications in Cryptology, 2 (2).

Publication
Jul 07, 2025
Decentralized Systems Network Services

A Policy-Based Mitigation of Transaction Exclusion in Ethereum

Spiesberger, P.; Droll, J.; Hartenstein, H.
2025. Proceedings of the 30th ACM Symposium on Access Control Models and Technologies (SACMAT 2025), 127–132, Association for Computing Machinery (ACM).

Publication
Jul 04, 2025
Economic Security Process Security

Competitive dynamics in blockchain-based supply chains under cryptocurrency volatility: a game theory approach

Shirafkan, N.; Rajabzadeh, H.; Wiens, M.
2025. International Journal of Production Research, 63 (19), 7339–7362.

Publication
Jul 03, 2025
Machine Learning

Composite Explanation-Aware Attacks

Noppel, M.; Wressnegger, C.
2025. IEEE Security and Privacy Workshops (SPW 2025). Ed.: M. Blanton, 167 – 176, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jul 01, 2025
Artificial Intelligence Software Engineering

Bridging Explanations and Logics: Opportunities for Multimodal Language Models

Schuler, Nicolas Sebastian, Scotti, Vincenzo, Camilli, Matteo  Mirandola  Raffaela Bridging Explanations and Logics: Opportunities for Multimodal Language Models, Preprint, Accepted for Formal Methods for Intersymbolic AI (AISoLA 2025 · FMIAI)

Publication
Jun 24, 2025
Software Engineering

Traceability Support for Engineering Reviews of Horizontal Model Evolution

Cederbladh, J.; Kamburjan, E.; Manrique-Negrin, D. A.; Mittal, R.; Weber, T.
2025. Systems Engineering, e70001.

Publication
Jun 23, 2025
Cryptography

Security Analysis of Forward Secure Log Sealing in Journald

Dörre, F.; Ottenhues, A.
2025. International Conference on Applied Cryptography and Network Security, 27 S

Publication
Jun 23, 2025
Cryptography

Protection Against Subversion Corruptions via Reverse Firewalls in the Plain Universal Composability Framework

Ottenhues, A.; Müller-Quade, J.; Arnold, P.; Berndt, S.
2025. International Conference on Applied Cryptography and Network Security, München, 23rd-26th June 2025

Publication
Jun 23, 2025
Privacy Software Engineering

Quantifying Privacy Risk with Gaussian Mixtures

Rønneberg, R. C.; Randone, F.; Pardo, R.; Wąsowski, A.
2025. Software and Systems Modeling.

Publication
Jun 23, 2025
Privacy System Security

Privacy from 5 PM to 6 AM: Tracking and Transparency Mechanisms in the HbbTV Ecosystem

Böttger, C.; Hosseini, H.; Utz, C.; Demir, N.; Hörnemann, J.; Wressnegger, C.; Hupperich, T.; Pohlmann, N.; Große-Kampmann, M.; Urban, T.
2025. 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2025), Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jun 22, 2025
Machine Learning Mobility Systems Security

Fool the Stoplight: Realistic Adversarial Patch Attacks on Traffic Light Detectors

Pavlitska, S.; Robb, J.; Polley, N.; Yazgan, M.; Zöllner, J. M.
2025. 2025 IEEE Intelligent Vehicles Symposium (IV), 734–741, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jun 22, 2025
Machine Learning Mobility Systems Security

The ATLAS of Traffic Lights: A Reliable Perception Framework for Autonomous Driving

Polley, R.; Polley, N.; Heid, D.; Heinrich, M.; Ochs, S.; Zöllner, J. M.
2025. 2025 IEEE Intelligent Vehicles Symposium (IV), Cluj-Napoca, 22nd-25th June 2025, 2215–2222, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jun 18, 2025
Software Engineering

Efficient Self-Adaptation through Explanation-Driven White-Box Optimization

Negri, F.; Nicolosi, N.; Camilli, M.; Mirandola, R.
2025. ACM Transactions on Autonomous and Adaptive Systems.

Publication
Jun 17, 2025
Energy Systems Security

Enhancing Situational Awareness in Smart Grids through Event Correlation for ATT&CK Mapping

Canbolat Kaya, S.; Elbez, G.; Hagenmeyer, V.
2025. ACM International Conference on Future and Sustainable Energy Systems (ACM e-Energy 2025), Association for Computing Machinery (ACM).

Publication
Jun 17, 2025
Energy Systems Security

Advanced Persistent Threats on Consumer Energy Resources in Decentralized Energy Systems

Bao, K.; Chau, S. C.-K.; Elbez, G.; Liu, Q.; Hagenmeyer, V.
2025. Proceedings of the 16th ACM International Conference on Future and Sustainable Energy Systems (E-ENERGY ’25), 838–845, Association for Computing Machinery (ACM).

Publication
Jun 17, 2025
Energy Systems Security

Insights and Lessons Learned from a Realistic Smart Grid Testbed for Cybersecurity Research

Elbez, Ghada; Sanchez, Gustavo; Canbolat, Sine; Corallo, Sophie; Fruböse, Clemens; Lanzinger, Florian; Kellerer, Nicolai; Keppler, Gustav; Neumeister, Felix; Beckert, Bernhard; Koziolek, Anne; Zitterbart, Martina; Hagenmeyer, Veit

Publication
Jun 17, 2025
Energy Systems Security

Insights and Lessons Learned from a Realistic Smart Grid Testbed for Cybersecurity Research

Elbez, Ghada; Sanchez, Gustavo; Canbolat, Sine; Corallo, Sophie; Fruböse, Clemens; Lanzinger, Florian; Kellerer, Nicolai; Keppler, Gustav; Neumeister, Felix; Beckert, Bernhard; Koziolek, Anne; Zitterbart, Martina; Hagenmeyer, Veit

Publication
Jun 17, 2025
Cyber Physical Systems Energy Systems Security

Masquerading IEC 61850 GOOSE Protocol: Cyber-Physical Experiments and Detection

Alberto, H. da C.; Sánchez Collado, G.; DEMBELE, J. M.; DIOP, I.; Elbez, G.; Hagenmeyer, V.
2025. E-ENERGY ’25, Rotterdam, Netherlands, Association for Computing Machinery (ACM).

Publication
Jun 17, 2025
Energy Systems Security

Physical Impact Analysis of Cyberattacks on Inverter-based Consumer Energy Resources

Engel, S. M.; Bao, K.; Attar, A. A.; Rudolph, R.; Hagenmeyer, V.
2025. E-Energy ’25: Proceedings of the 16th ACM International Conference on Future and Sustainable Energy Systems, 820–829, Association for Computing Machinery (ACM).

Publication
Jun 16, 2025
Energy Systems Security

Attacks on the Siemens S7 Protocol Using an Industrial Control System Testbed

Kellerer, N.; Sanchez, G.; Alberto, H.; Hagenmeyer, V.; Elbez, G.
2025. E-Energy ’25: Proceedings of the 16th ACM International Conference on Future and Sustainable Energy Systems, 770–779, Association for Computing Machinery (ACM).

Publication
Jun 12, 2025
Human-Centered IT Security Privacy

Anonymization Techniques for Behavioral Biometric Data: A Survey

Hanisch, S.; Arias-Cabarcos, P.; Parra-Arnau, J.; Strufe, T.
2025. ACM Computing Surveys, 57.

Publication
Jun 11, 2025
Software Engineering

Scaling Information Flow Control By-Construction to Component-Based Software Architectures

Rønneberg, R. C.; Bordis, T.; Gerking, C.; Tabar, A. H.; Schaefer, I.
2025. Formal Techniques for Distributed Objects, Components, and Systems Techniques. Ed.: C. Ferreira, 55–74, Springer Nature Switzerland.

Publication
Jun 11, 2025
Cryptography

Honorific Security: Efficient Two-Party Computation with Offloaded Arbitration and Public Verifiability

Dai, T.; Jiang, Y.; Li, Y.; Müller-Quade, J.; Rupp, A.
2025. Proceedings of the 22nd International Conference on Security and Cryptography – Volume 1, Bilbao, June 11-13, 2025, 49–60, SciTePress.

Publication
Jun 05, 2025
Societal Security

The relationship between cybersecurity awareness, cybersecurity supply chain risk management and firm performance

Stentoft, J.; Peressotti, M.; Mayer, P.; Wickstrøm, K. A.; Schmitt, O.; Keating, V. C.; Theussen, A.; Tumchewics, L. A.; Kankam-Boateng, J.
2025. Supply Chain Management: An International Journal, 30 (5), 497–517.

Publication
Jun 04, 2025
Decentralized Systems

To the Best of Knowledge and Belief: On Eventually Consistent Access Control

Jacob, F.; Hartenstein, H.
2025. Proceedings of the 15th ACM Conference on Data and Application Security and Privacy, 107–118, Association for Computing Machinery (ACM).

Publication
Jun 02, 2025
Trustworthy Internet Technologies

SM-SIM: A Simulator for Analyzing Selfish Mining Attacks in Blockchain Systems

Sproll, Y.; Heinrich, R.; Quang Le, L. B.; Kannengießer, N.
2025. 2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Pisa, Italy, 02-06 June 2025, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jun 02, 2025
Cyber Physical Systems Verification

Verification of Autonomous Neural Car Control with KeYmaera X

Prebet, E.; Teuber, S.; Platzer, A.
2025. Rigorous State-Based Methods. Hrsg.: M. Leuschel, 288–307, Springer Nature Switzerland.

Publication
Jun 02, 2025
Artificial Intelligence Software Engineering

Towards Robust Plagiarism Detection in Programming Education: Introducing Tolerant Token Matching Techniques to Counter Novel Obfuscation Methods

Maisch, R.; Hagel, N.; Bartel, A.
2025. ECSEE ’25: Proceedings of the 6th European Conference on Software Engineering Education, 2nd – 4th June 2025, Seeon, Germany, 11–19, Association for Computing Machinery (ACM).

Publication
May 31, 2025
Healthcare Legal Informatics

Data Analytics im Gesundheitswesen – Anforderungen der Datensouveränität aus klinischer, technischer, rechtlicher und sozioökonomischer Sicht

Radic, M.; Busch-Casler, J.; Vosen, A.; Herrmann, P.; Appenzeller, A.; Mucha, H.; Philipp, P.; Frank, K.; Dauth, S.; Köhm, M.; Orak, B.; Spiecker genannt Döhmann, I.; Böhm, P.; Radic, D.
2025. Digital Analytics im Dienstleistungsmanagement : Customer Insights, Prozesse der Künstlichen Intelligenz, Digitale Geschäftsmodelle. Ed: M. Bruhn, 777–800, Springer Fachmedien Wiesbaden.

Publication
May 29, 2025
Modeling Software Engineering

Continuous integration of architectural performance models with parametric dependencies – the CIPM approach

Mazkatli, M.; Monschein, D.; Armbruster, M.; Heinrich, R.; Koziolek, A.
2025. Automated Software Engineering, 32 (2), 54.

Publication
May 28, 2025
Verification

The Many Uses of Dynamic Logic

Ahrendt, W.; Beckert, B.; Bubel, R.; Hähnle, R.; Ulbrich, M.
2025. Go Where the Bugs Are – Essays Dedicated to Wolfgang Reif on the Occasion of His 65th Birthday. Ed.: G. Ernst, 56–82, Springer Nature Switzerland.

Publication
May 26, 2025
Network Security

Hocarest: Host Cardinality Estimation On-Switch using Randomized Algorithm and TCAM

Krack, T.; Zitterbart, M.
2025. IFIP Networking Conference (IFIP Networking 2025), Limassol, CY, May 26-29, 2025

Publication
May 16, 2025
Verification

Scar: Verification-Based Development of Smart Contracts (Tool Paper)

Schiffl, J.; Beckert, B.
2025. D. Marmsoler & M. Xu (Hrsg.), 6th International Workshop on Formal Methods for Blockchains (FMBC 2025), 14:1–14:13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (LZI).

Publication
May 14, 2025
Trustworthy Internet Technologies

Automated Market Makers: Toward More Profitable Liquidity Provisioning Strategies

Drossos, T.; Kirste, D.; Kannengießer, N.; Sunyaev, A.
2025. SAC ’25: Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing. Ed.: J. Hong, 358–365, Association for Computing Machinery (ACM).

Publication
May 12, 2025
Privacy Societal Security

Restricting the Link: Effects of Focused Attention and Time Delay on Phishing Warning Effectiveness

Petelka, J.; Berens, B.; Sugatan, C.; Volkamer, M.; Schaub, F.
2025. Proceedings of the Symposium on Security and Privacy, 55–73, Advanced Computing Systems Association (USENIX)

Publication
May 09, 2025
IT Security Privacy

Inferring Personal Attributes with a Mmwave Radar

Tamayo Gonzalez, C. C.; Soderi, S.; Todt, J.; Strufe, T.; Conti, M.
2025. 2025 IEEE Wireless Communications and Networking Conference (WCNC), 6 S., Institute of Electrical and Electronics Engineers (IEEE).

Publication
May 05, 2025
Cryptography

Multi-Client Attribute-Based Unbounded Inner Product Functional Encryption, and More

Dutta, S.; Mitrokotsa, A.; Pal, T.; Tomy, J.
2025. Public-Key Cryptography – PKC 2025. Ed.: T. Jager. Pt. 5, 3–37, Springer Nature Switzerland.

Publication
May 05, 2025
Software Engineering

Modeling And Optimizing Runtime Adaptation Strategies At Design-Time Using Evolutionary Algorithms (Idea Paper)

Rapp, M.; Scheerer, M.; Sieger, R.; Reussner, R.; Mirandola, R.
2025. ICPE ’25: Companion of the 16th ACM/SPEC International Conference on Performance Engineering. Ed.: M. Litoiu, 38 – 46, Association for Computing Machinery (ACM).

Publication
May 05, 2025
Legal Informatics

Agentes de Tratamento de Dados Pessoais nas Concessões de Serviço Público

Gasiola, G. G.
2025. Direito da Infraestrutura:. Eds.: Conti, José Mauricio; Marrara, Thiago; Iocken, Sabrina Nunes; Dal Pozzo, Augusto Neves, 469–496, Editora Foco

Publication
May 01, 2025
Modeling

Enhancing Production Workflows by Leveraging BPMN to Model Inconsistencies — An Experience Report

Weber, T.; Kuder, N. D.; Völk, T. A.; Schneider, J.; Weber, S.; Koziolek, A.
2025. The Journal of Object Technology, 24 (2), 1–14.

Publication
May 01, 2025
Verification

Revisiting Differential Verification: Equivalence Verification with Confidence

Teuber, S.; Kern, P.; Janzen, M.; Beckert, B.
2025. Tools and Algorithms for the Construction and Analysis of Systems – 31st International Conference, TACAS 2025, Held as Part of the International Joint Conferences on Theory and Practice of Software, ETAPS 2025, Hamilton, ON, Canada, May 3–8, 2025, Proceedings, Part II. Ed.: A. Gurfinkel, 257 – 278, Springer Nature Switzerland.

Publication
Apr 30, 2025
Machine Learning Software Engineering

An Architecture-Based Approach to Mitigate Confidentiality Violations Using Machine Learning

Niehues, N.; Hahner, S.; Heinrich, R.
2025. 2025 IEEE 22nd International Conference on Software Architecture (ICSA), Odense, Denmark, 31 March 2025 – 04 April 2025, 107–118, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Apr 30, 2025
Software Engineering

Semantic Validation for Slingshot Simulator Using MontiArc

Taghavi, B.; Heinrich, R.; Marin, A.; Rumpe, B.; Stüber, S.; Weber, S.
2025. 15th Symposium on Software Performance 2024, Linz, November 6-7th 2024, Ed.: Andrea Herrmann, 26–28, Gesellschaft für Informatik (GI)

Publication
Apr 28, 2025
Cyber Physical Systems Software Engineering

Approaching Proactive Self-Adaptation in Nonlinear Cyber-Physical Systems

Edrisi, F.; Perez-Palacin, D.; Caporuscio, M.; Mirandola, R.
2025. 2025 IEEE/ACM 20th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), Ottawa, 28th-29th April 2025, 25–31, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Apr 27, 2025
Artificial Intelligence Software Engineering

Responsible and Sustainable AI: Considering Energy Consumption in Automated Text Classification Evaluation Tasks

Kaplan, A.; Keim, J.; Greiner, L.; Sieger, R.; Mirandola, R.; Reussner, R.
2025. Proceedings of the 2025 {IEEE/ACM} 47th International Conference on Software Engineering: Companion Proceedings, {ICSE} Companion 2025, Ottawa, 27th April – 3rd May 2025

Publication
Apr 27, 2025
Modeling Software Engineering

LiSSA: Toward Generic Traceability Link Recovery through Retrieval-Augmented Generation

Fuchß, D.; Hey, T.; Keim, J.; Liu, H.; Ewald, N.; Thirolf, T.; Koziolek, A.
2025. 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE), 723–723, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Apr 27, 2025
Software Engineering

Parametric Falsification of Many Probabilistic Requirements under Flakiness

Camilli, M.; Mirandola, R.
2025. 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE), 773–773.

Publication
Apr 27, 2025
Software Engineering

Embracing Uncertainty: A Fuzzy Theoretical Model for Goal Fulfillment Assessment

Grassi, V.; Mirandola, R.; Perez-Palacin, D.
2025. FormaliSE 2025, 113–123, IEEEXplore.

Publication
Apr 27, 2025
Software Engineering

Mitigating Obfuscation Attacks on Software Plagiarism Detectors via Subsequence Merging

Sağlam, T.; Niehues, N.; Hahner, S.; Schmid, L.
2025. 2025 IEEE/ACM 37th International Conference on Software Engineering Education and Training : CSEE & T 2025 : Ottawa, Ontario, Canada, 28-29 April 2025, 217–228, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Apr 25, 2025
Human-Centered IT Security Privacy

On the Usability of Next-Generation Authentication: A Study on Eye Movement and Brainwave-based Mechanisms

Fallahi, M.; Arias-Cabarcos, P.; Strufe, T.
2025. CHI EA ’25: Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems.Ed.: N. Yamashita, 1–14, Association for Computing Machinery (ACM).

Publication
Apr 25, 2025
Privacy Societal Security

It’s a Match – Enhancing the Fit between Users and Phishing Training through Personalisation

Schöni, L.; Roch, N.; Sievers, H.; Strohmeier, M.; Mayer, P.; Zimmermann, V.
2025. CHI ’25: Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems, Art.-Nr.: 592, Association for Computing Machinery (ACM).

Publication
Apr 25, 2025
Societal Security

“It’s like an explosion”: Cyberwarfare harms for civilian population in Ukraine during the Russian invasion

Kulyk, O.; Kickbusch, J.; Mayer, P.
2025. Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA ’25). Ed.: N. Yamashita, Art.-Nr.: 22, Association for Computing Machinery (ACM).

Publication
Apr 25, 2025
Usable Security

It’s a Match – Enhancing the Fit between Users and Phishing Training through Personalisation

Schöni, Lorin; Roch, Neele; Sievers, Hannah; Strohmeier, Martin; Mayer, Peter; Zimmermann, Verena

Publication
Apr 20, 2025
Cryptography Energy Systems Security

Analytical Evaluation of Time-based Cryptography

Ramadan, M.; Gadekar, P.; Hagenmeyer, V.; Elbez, G.
2025. Title: Proceedings of the 11th International Conference on Information Systems Security and Privacy 2025. Editor: Gabriele Lenzini, Paolo Mori, Steven Furnell (Eds.)

Publication
Apr 13, 2025
Cryptography Privacy

Scalable and Fine-Tuned Privacy Pass from Group Verifiable Random Functions

Faut, D.; Hesse, J.; Kohl, L.; Rupp, A.
2025. 2025 IEEE 10th European Symposium on Security and Privacy (EuroS&P), 38–59, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Apr 09, 2025
Software Engineering

QbC: Quantum Correctness by Construction

Peduri, A.; Schaefer, I.; Walter, M.
2025. Proceedings of the ACM on Programming Languages, 9 (OOPSLA1), 534–562.

Publication
Apr 09, 2025
Cyber Physical Systems

Adaptive Shielding via Parametric Safety Proofs

Feng, Y.; Zhu, J.; Platzer, A.; Laurent, J.
2025. Proceedings of the ACM on Programming Languages, 9 (OOPSLA1), 816–843.

Publication
Apr 08, 2025
Cryptography

Fully Collusion Resistant Traceable Identity-Based Inner Product Functional Encryption

Dutta, S.; Pal, T.; Singh, A.; Mukhopadhyay, S.
2025. IACR Communications in Cryptology, 2 (1).

Publication
Apr 07, 2025
Modeling Software Engineering

Requirements Traceability Link Recovery via Retrieval-Augmented Generation

Fuchß, D.; Keim, J.; Koziolek, A.; Hey, T.
2025. International Working Conference on Requirements Engineering (REFSQ 2025)

Publication
Apr 05, 2025
Modeling Software Engineering

Towards LLM-powered consistency in model-based low-code platforms

Hagel, N.; Hili, N.; Bartel, A.; Koziolek, A.
2025. 22nd IEEE International Conference on Software Architecture (ICSA 2025), Institute of Electrical and Electronics Engineers (IEEE)

Publication
Apr 02, 2025
Decentralized Systems

Proof-Carrying CRDTs allow Succinct Non-Interactive Byzantine Update Validation

Marx, N.; Jacob, F.; Hartenstein, H.
2025. PaPoC ’25: 12th Workshop on Principles and Practice of Consistency for Distributed Data, World Trade Center Rotterdam Netherlands, 30 March 2025- 3 April 2025, 15–21, Association for Computing Machinery (ACM).

Publication
Mar 31, 2025
Modeling Software Engineering

Do Large Language Models Contain Software Architectural Knowledge? An Exploratory Case Study with GPT

Soliman, M.; Keim, J.
2025. 22nd IEEE International Conference on Software Architecture (ICSA 2025), Institute of Electrical and Electronics Engineers (IEEE)

Publication
Mar 31, 2025
Modeling Software Engineering

Enabling Architecture Traceability by LLM-based Architecture Component Name Extraction

Fuchß, D.; Liu, H.; Hey, T.; Keim, J.; Koziolek, A.
2025. 22nd IEEE International Conference on Software Architecture (ICSA 2025)

Publication
Mar 31, 2025
Software Engineering

Detecting Encryption Vulnerabilities By Coupling Architectural Analyses and Source Code Analyses

Reiche, F.; Heinrich, R.
2025. 22nd IEEE International Conference on Software Architecture Companion (ICSA 2025), Institute of Electrical and Electronics Engineers (IEEE)

Publication
Mar 31, 2025
IoT Security

Data Distribution and Redistribution – A formal and practical Analysis of the DDS Security Standard

Lauser, Timm; Müller, Maximilian; Baumgart, Ingmar; Krauß, Christoph

Publication
Mar 30, 2025
Software Engineering

SeBS-Flow: Benchmarking Serverless Cloud Function Workflows

Schmid, L.; Copik, M.; Calotoiu, A.; Brandner, L.; Koziolek, A.; Hoefler, T.
2025. EuroSys ’25: Proceedings of the Twentieth European Conference on Computer Systems, 902 – 920, Association for Computing Machinery (ACM).

Publication
Mar 29, 2025
IT Security Privacy

A Full-Body IMU-Based Motion Dataset of Daily Tasks by Older and Younger Adults

Pogrzeba, L.; Muschter, E.; Hanisch, S.; Wardhani, V. Y. P.; Strufe, T.; Fitzek, F. H. P.; Li, S.-C.
2025. Scientific Data, 12 (1), Art.-Nr.: 531.

Publication
Mar 07, 2025
Software Engineering

From Zero to Hero: When a Simple Line Can Make All the Difference The Case of Progress Bars in Educational Online Courses

Marquardt, K.; Kia, E.; Koziolek, A.; Happe, L.
2025. Computer-Human Interaction Research and Applications – 8th International Conference, CHIRA 2024, Porto, Portugal, November 21–22, 2024, Proceedings, Part II. Ed.: H. Plácido da Silva, 212 – 222, Springer Nature Switzerland.

Publication
Mar 06, 2025
Legal Informatics

Die Resilienz als neue Anforderung des Rechts der Daten- und IT-Sicherheit : Eine Untersuchung anhand der exemplarischen Betrachtung kritischer, personalisierter Dienste

Werner, C.
2025. Nomos.

Publication
Mar 01, 2025
Societal Security Usable Security

SoK: The past decade of user deception in emails and today’s email clients’ susceptibility to phishing techniques

Veit, M. F.; Wiese, O.; Ballreich, F. L.; Volkamer, M.; Engels, D.; Mayer, P.
2025. Computers & Security, 150, 104197.

Publication
Feb 26, 2025
Dependability Software Engineering

Many-Objective Self-adaptation under Model Uncertainty

Camilli, M.; Mirandola, R.; Scandurra, P.
2025. ACM Transactions on Autonomous and Adaptive Systems.

Publication
Feb 25, 2025
Artificial Intelligence Machine Learning

Two Sides of the Same Coin: Learning the Backdoor to Remove the Backdoor

Zhao, Q.; Wressnegger, C.
2025. Proceedings of the 39th Annual AAAI Conference on Artificial Intelligence (AAAI)

Publication
Feb 24, 2025
System Security

DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing

Wachter, L.; Gremminger, J.; Wressnegger, C.; Payer, M.; Toffalini, F.
2025. Proceedings of the Network and Distributed System Security Symposium (NDSS)

Publication
Feb 24, 2025
Software Engineering

A Classification Framework for Scientific Documents to Support Knowledge Graph Population

Kaplan, A.; Keim, J.; Greiner, L.; Koziolek, A.; Reussner, R.
2025. Software Engineering 2025 – Companion Proceedings. Ed.: K. Feichtinger, 277–286, Gesellschaft für Informatik (GI).

Publication
Feb 24, 2025
Software Engineering Verification

Improved Bounds for Rounding Errors in Quantum Circuit Simulators

Klamroth, J.; Lemke, N.; Götz, R.; Beckert, B.
2025. Software Engineering 2025 – Companion Proceedings. Gesellschaft für Informatik, Bonn., 197–211, Gesellschaft für Informatik (GI).

Publication
Feb 24, 2025
Software Engineering

Structuring Scientific Knowledge in Software Engineering Using the Open Research Knowledge Graph: A Use Case and Experience Report

Kaplan, A.; Chebbi, F.; Fuchß, D.; Karras, O.; Hey, T.; Koziolek, A.; Reussner, R.
2025. Software Engineering 2025 – Companion Proceedings. Ed.: K. Feichtinger, 287–296, Gesellschaft für Informatik (GI).

Publication
Feb 14, 2025
Privacy Societal Security

Manuelles Löschen von Phishing-Nachrichten aus Mitarbeiterpostfächern : Rechtliche und technische Grenzen

Hunter, J. C.; Ballreich, F. L.; Kemmler, K. J.; Volkamer, M.
2025. Zeitschrift für Digitalisierung und Recht (ZfDR), 5 (1), 23–43

Publication
Feb 01, 2025
Healthcare

Assessing the impact of technology partners on the level of cyberattack damage in hospitals

Angler, Y.; Flessa, S.; Grass, E.; Goetz, O.
2025. Health Policy and Technology, 14 (1), 100955.

Publication
Feb 01, 2025
Dependability Software Engineering

Integration of performability-model extraction and performability prediction in continuous integration/continuous delivery

Weber, S.; Weber, T.; Henß, J.
2024. Softwaretechnik-Trends, 45 (1)

Publication
Jan 31, 2025
Economic Security

How to enhance company engagement in public-private emergency collaborations in the supply of essential goods

Lüttenberg, M.; Zienau, A.; Wiens, M.; Hansen, O.; Diehlmann, F.; Schultmann, F.
2025. Journal of Humanitarian Logistics and Supply Chain Management, 15 (1), 48–60.

Publication
Jan 31, 2025
Software Engineering

UVL: Feature modelling with the universal variability language

Benavides, D.; Sundermann, C.; Feichtinger, K.; Galindo, J. A.; Rabiser, R.; Thüm, T.
2025. Journal of Systems and Software, 112326.

Publication
Jan 29, 2025
Artificial Intelligence Software Engineering

How to Train Your Llama – Efficient Grammar-Based Application Fuzzing Using Large Language Models

Mhiri, I.; Börsig, M.; Stark, A.; Baumgart, I.
2025. Secure IT Systems. Proceedings. Ed.: L.H. Iwaya, 239–257, Springer Nature Switzerland.

Publication
Jan 29, 2025
Artificial Intelligence

Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates

Keppler, G.; Kunz, J.; Hagenmeyer, V.; Elbez, G.
2025. Secure IT Systems. Ed.: L.H. Iwaya, 219–238, Springer Nature Switzerland.

Publication
Jan 01, 2025
Usable Security

“I believe it’s incredibly difficult to fight against this flood of spam”: Towards Enhancing Strategies for Creating Effective Vulnerability Notifications

Hennig, A.; Veit, M.; Schmidt-Enke, L.; Neusser, F.; Herrmann, D.; Mayer, P.
2025. Computers & security

Publication
Dec 30, 2024
Legal Informatics

Datenschutzrecht – DS-GVO / BDSG

Spiecker genannt Döhmann, I.; Hornung, G.; Simitis, S. (Hrsg.)
2024. Nomos Verlagsgesellschaft

Publication
Dec 27, 2024
Machine Learning Software Engineering

An Architectural Viewpoint for Benefit-Cost-Risk-Aware Decision-Making in Self-Adaptive Systems

Weyns, D.; Hezavehi, S. M.; Avgeriou, P.; Calinescu, R.; Mirandola, R.; Perez-Palacin, D.
2024. ACM Transactions on Autonomous and Adaptive Systems.

Publication
Dec 26, 2024
Cyber Physical Systems Software Engineering

Does Every Computer Scientist Need to Know Formal Methods?

Broy, M.; Brucker, A. D.; Fantechi, A.; Gleirscher, M.; Havelund, K.; Kuppe, M. A.; Mendes, A.; Platzer, A.; Ringert, J. O.; Sullivan, A.
2025. Formal Aspects of Computing, 37 (1), Art.-Nr.: 6.

Publication
Dec 18, 2024
Machine Learning

Evaluating Adversarial Attacks on Traffic Sign Classifiers Beyond Standard Baselines

Pavlitska, S.; Müller, L.; Zöllner, J. M.
2024. 23rd International Conference on Machine Learning and Applications (ICMLA 2024), 1390–1395, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Dec 18, 2024
Machine Learning

Towards Adversarial Robustness of Model-Level Mixture-of-Experts Architectures for Semantic Segmentation

Pavlitska, S.; Eisen, E.; Zöllner, J. M.
2024. 23rd International Conference on Machine Learning and Applications (ICMLA 2024), 1460–1465, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Dec 17, 2024
Healthcare

A stochastic optimisation model to support cybersecurity within the UK national health service

Grass, E.; Pagel, C.; Crowe, S.; Ghafur, S.
2024. Journal of the Operational Research Society, 1–12.

Publication
Dec 16, 2024
Cryptography Decentralized Systems

Physical One‐Way Functions for Decentralized Consensus Via Proof of Physical Work

Winkler, M.; Peither, C.; Petrick, S.; Seidemann, L.; Jelich, H.; Kleine Jäger, F.; Müller-Quade, J.; Colsmann, A.; Nirschl, H.; Rhein, F.
2025. Advanced Science, 12 (5).

Publication
02 / 08