Publications

Our interdisciplinary research is reflected in the outstanding publications of KASTEL Security Research Labs.

Mar 17, 2022
Cryptography Privacy

PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics

Fetzer, V.; Keller, M.; Maier, S.; Raiber, M.; Rupp, A.; Schwerdt, R.
2022. Proceedings on Privacy Enhancing Technologies, 2022 (2), 447–516.

Publication
Mar 12, 2022
Software Engineering

Replication Package of “Evaluation Methods and Replicability of Software Architecture Research Objects”

Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; Al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 58, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 12, 2022
Cyber Physical Systems Software Engineering

Architectural Pen-Test Generation and Vulnerability Prediction for Cyber-Physical Systems

Walter, T.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 45–46, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 12, 2022
Modeling Software Engineering

Evaluation Methods and Replicability of Software Architecture Research Objects

Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), Honolulu, HI, USA, 12-15 March 2022, 157–168, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 12, 2022
Dependability Software Engineering

Dataset – Architectural Attack Propagation Analysis for Identifying Confidentiality Issues

Walter, M.; Heinrich, R.; Reussner, R.
2022. IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 12 -15 March 2022, Honolulu, HI, USA, 59, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 08, 2022
Cryptography Modeling

A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels

Beskorovajnov, W.; Gröll, R.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing.

Publication
Mar 08, 2022
Cryptography Privacy

Private Function Evaluation with Cards

Koch, A.; Walzer, S.
2022. New Generation Computing, 40, 115–147.

Publication
Feb 25, 2022
Dependability Software Engineering

Continuous Secure Software Development and Analysis

Schulz, S.; Reiche, F.; Hahner, S.; Schiffl, J.
2022. Symposium on Software Performance 2021 : Short Paper Proceedings of Symposium on Software Performance, Leipzig, Germany, November 9.-10., 2021. Ed.: D. G. Reichelt, R. Müller, S. Becker, W. Hasselbring, A. v. Hoorn, S. Kounev, A. Koziolek, R. Reussner, RWTH Aachen

Publication
Feb 23, 2022
Dependability Modeling Software Engineering

Unified Operations for Variability in Space and Time

Ananieva, S.; Greiner, S.; Krueger, J.; Linsbauer, L.; Gruener, S.; Kehrer, T.; Kuehn, T.; Seidl, C.; Reussner, R.
2022. Proceedings of the 16th International Working Conference on Variability Modelling of Software-Intensive Systems, 1–10, Association for Computing Machinery (ACM).

Publication
Feb 22, 2022
Privacy Quantification

Sovereign Digital Consent through Privacy Impact Quantification and Dynamic Consent

Appenzeller, A.; Hornung, M.; Kadow, T.; Krempel, E.; Beyerer, J.
2022. Technologies, 10 (1), Article no: 35.

Publication
Feb 21, 2022
Legal Informatics Privacy

Extra DSGVO nulla salus? – Zur weiteren Zulässigkeit nicht akkreditierter Datenschutzsiegel neben akkreditierten Gütesiegeln im Sinne der Art. 42 f. DSGVO

Müllmann, D.; Spiecker genannt Döhmann, I.
2022. Deutsches Verwaltungsblatt, 137 (4), 208–214

Publication
Feb 18, 2022
Privacy Societal Security Verification

German voters’ attitudes towards voting online with a verifiable system

Kulyk, O.; Volkamer, M.; Fuhrberg, N.; Berens, B.; Krimmer, R.
2022. Workshop on Advances in Secure Electronic Voting (VOTING), Grenada, February 18, 2022

Publication
Feb 09, 2022
Machine Learning Network Security Robotics

Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks

Borcherding, A.; Feldmann, L.; Karch, M.; Meshram, A.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy – ICISSP, 314–325, SciTePress.

Publication
Jan 31, 2022
Legal Informatics Robotics

Responsible Human-Robot Interaction with Anthropomorphic Service Robots: State of the Art of an Interdisciplinary Research Challenge

Stock-Homburg, R. M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; Rawal, N.; David, K.; Wendt, J.; Spiecker genannt Döhmann, I.; Stryk, O. von; Hannig, M.; Knof, M.
2022. Proceedings of the 55th Annual Hawaii International Conference on System Sciences : January 3-7, 2022. Ed.: T. X. Bui, 2065–2074, University of Hawaii.

Publication
Jan 27, 2022
Machine Learning Modeling

A Step Towards Global Counterfactual Explanations: Approximating the Feature Space Through Hierarchical Division and Graph Search

Becker, M.; Burkart, N.; Birnstill, P.; Beyerer, J.
2021. Advances in Artificial Intelligence and Machine Learning, 1 (2), 90–110.

Publication
Jan 27, 2022
Process Security

Attack Forecast and Prediction

Kaiser, F.; Budig, T.; Goebel, E.; Fischer, T.; Muff, J.; Wiens, M.; Schultmann, F.
2021. C&ESAR 2021: Automation in Cybersecurity ; Proceedings of the 28th Computer & Electronics Security Application Rendezvous co-located with the 6th European Cyber Week (ECW 2021) ; Rennes, France, November 16-17, 2021. Ed.: G. Le Guernic, 77–97, CEUR-WS.org

Publication
Jan 10, 2022
Human-Centered IT Security Legal Informatics

Demokratie und Öffentlichkeit im 21. Jahrhundert – zur Macht des Digitalen

Spiecker genannt Döhmann, I.; Westland, M.; Campos, R. (Hrsg.)
2022. Nomos Verlagsgesellschaft.

Publication
Jan 10, 2022
Human-Centered IT Security Legal Informatics

Künstliche Intelligenz in der Forschung – Neue Möglichkeiten und Herausforderungen für die Wissenschaft

Gethmann, C. F.; Buxmann, P.; Distelrath, J.; Humm, B. G.; Lingner, S.; Nitsch, V.; Schmidt, J. C.; Spiecker genannt Döhmann, I.
2022. Springer Verlag.

Publication
Jan 04, 2022
IT Security Network Security

Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings

Byrenheid, M.; Roos, S.; Strufe, T.
2022. ICDCN ’22: Proceedings of the 2022 International Conference on Distributed Computing and Networking ; Jan 4th-7th, 2022, Virtual Conference, 107–116, Association for Computing Machinery (ACM).

Publication
Jan 03, 2022
Legal Informatics Privacy

§ 24: Europäisches Datenschutzverwaltungsrecht

Spiecker genannt Döhmann, I.; Benecke, A.
2022. Verwaltungsrecht der Europäischen Union. Hrsg.: J.P. Terhechte, 997–1040, Nomos

Publication
Jan 03, 2022
Legal Informatics Privacy

§ 24 Europäisches Datenschutzrecht

Spiecker gen. Döhmann, I.; Benecke, A.
2021. Verwaltungsrecht der Europäischen Union. Hrsg.: J. Tierhechte, Nomos Verlagsgesellschaft

Publication
Dec 30, 2021
Human-Centered IT Security Privacy Usable Security

Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass

Renaud, K.; Volkamer, M.; Mayer, P.; Grimm, R.
2021. AIS transactions on human-computer interaction, 13 (4), 407–430.

Publication
Dec 30, 2021
Cryptography Network Services

ETHTID: Deployable Threshold Information Disclosure on Ethereum

Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Dec 14, 2021
Cryptography Privacy

Black-Box Accumulation Based on Lattices

Faller, S. H.; Baumer, P.; Klooß, M.; Koch, A.; Ottenhues, A.; Raiber, M.
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer.

Publication
Dec 14, 2021
Privacy Trustworthy Internet Technologies

Architecture Matters: Investigating the Influence of Differential Privacy on Neural Network Design

Morsbach, F.; Dehling, T.; Sunyaev, A.
2021. Presented at NeurIPS 2021 Workshop on Privacy in Machine Learning (PriML 2021), 14.12.2021.

Publication
Dec 12, 2021
Decentralized Systems Trustworthy Internet Technologies

Need for Change: Business Functions Affected by the Use of Decentralized Information Systems

Heines, R.; Kannengießer, N.; Sturm, B.; Jung, R.; Sunyaev, A.
2021. 42nd International Conference on Information Systems (ICIS), Association for Information Systems (AIS)

Publication
Dec 11, 2021
Privacy Usable Security

Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites

Krisam, C.; Dietmann, H.; Volkamer Melanie; Kulyk, O.
2021. EuroUSEC ’21: European Symposium on Usable Security 2021, Karlsruhe Germany, October 11 – 12, 2021, 8 S., Association for Computing Machinery (ACM).

Publication
Dec 06, 2021
Cryptography Privacy

Onion Routing with Replies

Kuhn, C.; Hofheinz, D.; Rupp, A.; Strufe, T.
2021. Advances in Cryptology – ASIACRYPT 2021 – 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 573–604, Springer International Publishing.

Publication
Dec 06, 2021
Network Security System Security

LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems

Kühnapfel, N.; Preußler, S.; Noppel, M.; Schneider, T.; Rieck, K.; Wressnegger, C.
2021. Proceedings of 37th Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 6-10, 2021, 796–811, Association for Computing Machinery (ACM).

Publication
Dec 01, 2021
Cryptography Privacy

ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy

Beskorovajnov, W.; Dörre, F.; Hartung, G.; Koch, A.; Müller-Quade, J.; Strufe, T.
2021. Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 665–695, Springer Verlag.

Publication
Nov 24, 2021
Modeling Software Engineering

Finding a Universal Execution Strategy for Model Transformation Networks

Gleitze, J.; Klare, H.; Burger, E.
2021. Fundamental Approaches to Software Engineering. Ed.: E. Guerra, 87–107, Springer International Publishing.

Publication
Nov 23, 2021
Dependability Software Engineering

Detecting Violations of Access Control and Information Flow Policies in Data Flow Diagrams

Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2022. The journal of systems and software, 184, Art.-Nr. 111138.

Publication
Nov 15, 2021
Privacy Trustworthy Internet Technologies

Security Engineering of Patient-Centered Health Care Information Systems in Peer-to-Peer Environments: Systematic Review

Yari, I. A.; Dehling, T.; Kluge, F.; Geck, J.; Sunyaev, A.; Eskofier, B.
2021. Journal of Medical Internet Research, 23 (11), e24460.

Publication
Nov 15, 2021
Communication Security System Security

Plausible Deniability for Anonymous Communication

Kuhn, C.; Noppel, M.; Wressnegger, C.; Strufe, T.
2021. Proceedings of 20th Workshop on Privacy in the Electronic Society (WPES), Seoul, South Korea, November 15, 2021, 17–32, Association for Computing Machinery (ACM).

Publication
Nov 12, 2021
IT Security Privacy

Side-Channel Attacks on Query-Based Data Anonymization

Boenisch, F.; Munz, R.; Tiepelt, M.; Hanisch, S.; Kuhn, C.; Francis, P.
2021. CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 1254–1265, Association for Computing Machinery (ACM).

Publication
Nov 11, 2021
Dependability Software Engineering

Modeling Data Flow Constraints for Design-Time Confidentiality Analyses

Hahner, S.; Seifermann, S.; Heinrich, R.; Walter, M.; Bures, T.; Hnetynka, P.
2021. Proceedings IEEE 18th International Conference on Software Architecture – Companion: ICSA-C 2021 ; 22 – 26 March 2021 ; virtual conference, 15–21, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Nov 09, 2021
Decentralized Systems Network Security

Coupling Smart Contracts: A Comparative Case Study

Friebe, S.; Stengele, O.; Hartenstein, H.; Zitterbart, M.
2021. 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 27-30 Sept. 2021, 137–144, Institute of Electrical and Electronics Engineers (IEEE). 

Publication
Nov 09, 2021
IT Security Network Services

Mitigating Internal, Stealthy DoS Attacks in Microservice Networks

Osman, A.; Born, J.; Strufe, T.
2021. Stabilization, Safety, and Security of Distributed Systems : 23rd International Symposium, SSS 2021, Virtual Event, November 17–20, 2021, Proceedings. Ed.: C. Johnen, 500–504, Springer.

Publication
Nov 08, 2021
Cryptography

On Expected Polynomial Runtime in Cryptography

Klooß, M.
2021. Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 558–590, Springer International Publishing.

Publication
Nov 08, 2021
Cryptography Quantification

Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions

Broadnax, B.; Mechler, J.; Müller-Quade, J.
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing.

Publication
Oct 29, 2021
Legal Informatics

The legal framework for access to data from a data protection viewpoint – especially under GDPR

Spiecker gen. Döhmann, I.
2021. Data Access, Consumer Interests and Public Welfare, 175–208, Nomos Verlagsgesellschaft. 

Publication
Oct 25, 2021
Cryptography System Security

A unified model to detect information flow and access control violations in software architectures

Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2021. Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, Virtual, Online, 6 July 2021 – 8 July 2021, 26–37, SciTePress.

Publication
Oct 22, 2021
Verification

Scalability and Precision by Combining Expressive Type Systems and Deductive Verification

Lanzinger, F.; Weigl, A.; Ulbrich, M.; Dietl, W.
2021. Proceedings of the ACM on programming languages, 5 (OOPSLA), Article no: 143.

Publication
Oct 15, 2021
Trustworthy Internet Technologies

Tackling Challenges of Robustness Measures for Autonomous Agent Collaboration in Open Multi-Agent Systems

Jin, D.; Kannengießer, N.; Sturm, B.; Sunyaev, A.
2022. Proceedings of the 55th Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, 03.01.2022-07.01.2022, 7585–7594.

Publication
Oct 11, 2021
Privacy Societal Security

Electronic Voting: 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5–8, 2021: proceedings

Krimmer, R.; Volkamer, M.; Duenas-Cid, D.; Kulyk, O.; Rønne, P.; Solvak, M.; Germann, M. (Hrsg.)
2021. Springer Nature.

Publication
Oct 11, 2021
Privacy Societal Security Usable Security

Vision: What Johnny learns about Password Security from Videos posted on YouTube

Christmann, M.; Mayer, P.; Volkamer, M.
2021. European Symposium on Usable Security (EuroUSEC), 11 – 12 Oktober 2021, 124–128, Association for Computing Machinery (ACM).

Publication
Oct 11, 2021
Privacy Societal Security

Electronic Voting: 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5–8, 2021: proceedings

Krimmer, R.; Volkamer, M.; Duenas-Cid, D.; Kulyk, O.; Rønne, P.; Solvak, M.; Germann, M. (Hrsg.)
2021. Springer Nature.

Publication
Oct 08, 2021
Privacy

Towards a Formal Approach for Data Minimization in Programs (Short Paper)

Lanzinger, F.; Weigl, A.
2022. Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers. Ed.: J. Garcia-Alfaro, 161–169, Springer International Publishing.

Publication
Oct 06, 2021
Cryptography Quantification

On Forging SPHINCS + -Haraka Signatures on a Fault-Tolerant Quantum Computer

Berger, R. M.; Tiepelt, M.
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing.

Publication
Oct 06, 2021
Cryptography

On Forging SPHINCS+ -Haraka Signatures on a Fault-Tolerant Quantum Computer

Berger, R. M.; Tiepelt, M.

Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, Springer International Publishing

Oct 05, 2021
Privacy Societal Security

Usable Verifiable Secrecy-Preserving E-Voting

Kulyk, O.; Ludwig, J.; Volkamer, M.; Koenig, R. E.; Locher, P.
2021. 6th Joint International Conference on Electronic Voting, E-Vote-ID 2021, 5-8 October 2021. Ed.: R. Krimmer ; M. Volkamer, 337–353, University of Tartu Press

Publication
Sep 24, 2021
Legal Informatics

§ 23: Informationsverwaltung

Spiecker gen. Döhmann, I.
2021. Handbuch des Verwaltungsrechts. Hrsg.: W. Kahl. Bd. 1, 891–938, C.F. Müller

Publication
Sep 21, 2021
Legal Informatics Mobility Systems Security

Datenschutzrechtliche Aspekte neuer Mobilitätskonzepte im Öffentlichen Nahverkehr

Bretthauer, S.; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Nomos Verlagsgesellschaft

Publication
Sep 20, 2021
IT Security Privacy

2PPS – Publish/Subscribe with Provable Privacy

Abdelwahab Gaballah, S.; Coijanovic, C.; Strufe, T.; Mühlhäuser, M.
2021. 40th International Symposium on Reliable Distributed Systems (SRDS), Chicago, IL, USA, 20-23 Sept. 2021. Vol.: 1, 198–209, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Sep 15, 2021
Privacy Societal Security Usable Security

Evaluation der interaktiven NoPhish Präsenzschulung

Berens, B.; Aldag, L.; Volkamer, M.
2021. Mensch und Computer 2021 – Workshopband. Hrsg.: C. Wienrich, Gesellschaft für Informatik (GI).

Publication
Sep 13, 2021
Societal Security

Toward Awareness Creation of Common Challenges Women are Facing in Academia: A Study from a German Perspective

Corallo, S.; Mazkatli, M.; Rapp, M.; Hajiabadi, H.; Kaplan, A.; Kuehn, R.; Schmid, L.; Singh, S.
2022. Software Architecture – 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021, Revised Selected Papers. Ed.: P. Scandurra, 47–62, Springer International Publishing. 

Publication
Sep 13, 2021
Dependability Software Engineering

Architectural Optimization for Confidentiality Under Structural Uncertainty

Walter, M.; Hahner, S.; Seifermann, S.; Bures, T.; Hnetynka, P.; Pacovský, J.; Heinrich, R.
2022. Software Architecture : 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021 : Revised Selected Papers. Ed.: P. Scandurra, 309–332, Springer Nature Switzerland AG.

Publication
Sep 13, 2021
Dependability Modeling

Identifying confidentiality violations in architectural design using palladio

Seifermann, S.; Walter, M.; Hahner, S.; Heinrich, R.; Reussner, R.
2021. W. D. W. D. Heinrich R. Mirandola R. (Hrsg.), 15th European Conference on Software Architecture – Companion, ECSA-C 2021, Virtual, Online, 13 September 2021 through 17 September 2021. Ed.: R. Heinrich, Code 172547, CEUR-WS.org

Publication
Sep 13, 2021
Production Security Verification

Architectural Access Control Policy Refinement and Verification under Uncertainty

Hahner, S.
2021. Companion Proceedings of the 15th European Conference on Software Architecture, RWTH Aachen

Publication
Sep 12, 2021
Privacy System Security

Secure and privacy-respecting documentation for interactive manufacturing and quality assurance

Wagner, P. G.; Lengenfelder, C.; Holzbach, G.; Becker, M.; Birnstill, P.; Voit, M.; Bejhad, A.; Samorei, T.; Beyerer, J.
2021. Applied Sciences (Switzerland), 11 (16), Art.-Nr.: 7339.

Publication
Sep 06, 2021
Cryptography Privacy

A Secure Cell-Attachment Procedure of LDACS

Maurer, N.; Graupl, T.; Gentsch, C.; Guggemos, T.; Tiepelt, K. M.; Schmitt, C.; Rodosek, G. D.

Proceedings 2021 IEEE European Symposium on Security and Privacy Workshops, EuroS&PW 2021: Virtual Conference, 6-10 September 2021

Aug 11, 2021
Human-Centered IT Security IT Security

Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance

Arias-Cabarcos, P.; Habrich, T.; Becker, K.; Becker, C.; Strufe, T.
2021. Proceedings of the 30th USENIX Security Symposium : August 11-13, 2021, 55–72, USENIX Association

Publication
Aug 11, 2021
Communication Security Legal Informatics

Effective Notification Campaigns on the Web : A matter of Trust, Framing, and Support

Maass, M.; Stöver, A.; Pridöhl, H.; Bretthauer, S.; Herrmann, D.; Hollick, M.; Spiecker gen. Döhmann, I.
2021. Proceedings of the 30th USENIV Security Symposium, 2489–2506, USENIX Association

Publication
Aug 11, 2021
Privacy Usable Security

“Now I’m a bit angry:” Individuals’ Awareness, Perception, and Responses to Data Breaches that Affected Them

Mayer, P.; Zou, Y.; Schaub, F.; Aviv, A. J.
2021. 30th USENIX Security Symposium, Vancouver, CDN, August 11-13, 2021, 393–410, Advanced Computing Systems Association (USENIX)

Publication
Jul 26, 2021
Cryptography Privacy

Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules

Broadnax, B.; Koch, A.; Mechler, J.; Müller, T.; Müller-Quade, J.; Nagel, M.
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338.

Publication
Jul 21, 2021
Cryptography System Security

Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions

Roy, A.; Andreeva, E.; Sauer, J. F.
2021. Selected Areas in Cryptography : 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Ed.: O. Dunkelman, 273–300, Springer International Publishing.

Publication
Jul 19, 2021
IoT Security Privacy

How to Increase Smart Home Security and Privacy Risk Perception

Duezguen, R.; Mayer, P.; Berens, B.; Beckmann, C.; Aldag, L.; Mossano, M.; Volkamer, M.; Strufe, T.
2021. 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 18 – 20 Augus 2021, Shenyang, China, 997–1004, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jul 12, 2021
Process Security Production Security

Classifying Usage Control and Data Provenance Architectures

Wagner, P. G.
2021. Proceedings of the 2020 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer; T. Zander, 135–154, KIT Scientific Publishing

Publication
Jul 09, 2021
IoT Security Network Security Production Security

On the Security of IIoT Deployments: An Investigation of Secure Provisioning Solutions for OPC UA

Kohnhäuser, F.; Meier, D.; Patzer, F.; Finster, S.
2021. IEEE access, 9, 99299–99311.

Publication
Jul 08, 2021
Privacy Societal Security Usable Security

A Literature Review on Virtual Reality Authentication

Jones, J. M.; Duezguen, R.; Mayer, P.; Volkamer, M.; Das, S.
2021. Human Aspects of Information Security and Assurance – 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Ed.: S. Furnell, 189–198, Springer.

Publication
Jul 08, 2021
Cryptography

Card-Based Cryptography Meets Formal Verification

Koch, A.; Schrempp, M.; Kirsten, M.
2021. New generation computing, 39, 115–158.

Publication
Jul 06, 2021
Dependability Software Engineering

A Classification of Software-Architectural Uncertainty Regarding Confidentiality

Hahner, S.; Seifermann, S.; Heinrich, R.; Reussner, R.
2023. E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, 139–160, Springer International Publishing.

Publication
Jun 28, 2021
Cryptography

Lower Bounds and Hardness Magnification for Sublinear-Time Shrinking Cellular Automata

Modanese, A.
2021. Computer Science – Theory and Applications : 16th International Computer Science Symposium in Russia, CSR 2021, Sochi, Russia, June 28–July 2, 2021, Proceedings. Ed.: R. Santhanam, 296–320, Springer Verlag.

Publication
Jun 21, 2021
Dependability Software Engineering

Classifying and Avoiding Compatibility Issues in Networks of Bidirectional Transformations

Sağlam, T.; Klare, H.
2021. STAF 2021 Workshop Proceedings: 9th International Workshop on Bidirectional Transformations. Hrsg.: Ludovico Lovino, Lars Michael Kristensen, 34–53, CEUR-WS.org

Publication
Jun 19, 2021
Machine Learning Mobility Systems Security

Adversarial Robust Model Compression using In-Train Pruning

Vemparala, M. R.; Fasfous, N.; Frickenstein, A.; Sarkar, S.; Zhao, Q.; Kuhn, S.; Frickenstein, L.; Singh, A.; Unger, C.; Nagaraja, N. S.; Wressnegger, C.; Stechele, W.
2021. CVPR 3rd Workshop on Safe Artificial Intelligence for Automated Driving (SAIAD), June 19, 2021, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jun 15, 2021
Decentralized Systems Trustworthy Internet Technologies

Security in Distributed Ledger Technology: An Analysis of Vulnerabilities and Attack Vectors

Gojka, E.-E.; Kannengießer, N.; Sturm, B.; Bartsch, J.; Sunyaev, A.
2021. Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 3. Ed.: K. Arai, 722–742, Springer. 

Publication
Jun 14, 2021
IoT Security Machine Learning Production Security

Generative Machine Learning for Resource-Aware 5G and IoT Systems

Piatkowski, N.; Mueller-Roemer, J. S.; Hasse, P.; Bachorek, A.; Werner, T.; Birnstill, P.; Morgenstern, A.; Stobbe, L.
2021. 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada, 14-23 June 2021, 1–6, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Jun 14, 2021
Cyber Physical Systems Software Engineering Verification

Table-based formal specification approaches for control engineers—empirical studies of usability

Cha, S.; Vogel-Heuser, B.; Weigl, A.; Ulbrich, M.; Beckert, B.
2021. IET Cyber-Physical Systems: Theory and Applications, 64, 193–207.

Publication
May 31, 2021
Cyber Physical Systems Energy Systems Security

Dynamic Model Based Detection of Cyberattacks in Industrial Facilities

Reibelt, K.; Keller, H. B.; Hagenmeyer, V.; Matthes, J.
2021. 31st European Symposium on Computer Aided Process Engineering: ESCAPE-31. Ed.: M. Türkay, 1339–1344, Elsevier.

Publication
May 28, 2021
Legal Informatics Privacy

§ 4 HDSIG – Videoüberwachung öffentlich zugänglicher Räume

Spiecker gen. Döhmann, I.
2021. Hessisches Datenschutz- und Informationsfreiheitsgesetz. Hrsg.: A. Roßnagel, 107–117, Nomos Verlagsgesellschaft

Publication
May 20, 2021
Human-Centered IT Security Societal Security

Human Factors in Security

Berens, B.; Ghiglieri, M.; Kulyk, O.; Mayer, P.; Volkamer, M.
2021. Sicherheitskritische Mensch-Computer-Interaktion. Hrsg.: C. Reuter, 89–110, Springer Fachmedien Wiesbaden.

Publication
May 19, 2021
Dependability Verification

Runtime Verification of Generalized Test Tables

Weigl, A.; Ulbrich, M.; Tyszberowicz, S.; Klamroth, J.
2021. NASA Formal Methods: 13th International Symposium, NFM 2021, Virtual Event, May 24–28, 2021, Proceedings. Ed.: A. Dutle, 358–374, Springer Verlag.

Publication
Apr 28, 2021
Network Security

A Practical Evaluation Method for Misbehavior Detection in the Presence of Selfish Attackers

Wehmer, M.; Baumgart, I.
2021. Proceedings of the 7th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2021), 529–537, SciTePress.

Publication
Apr 28, 2021
Process Security Societal Security

Use of digital healthcare solutions for care delivery during a pandemic-chances and (cyber) risks referring to the example of the COVID-19 pandemic

Kaiser, F. K.; Wiens, M.; Schultmann, F.
2021. Health and Technology, 11, 1125–1137.

Publication
Apr 26, 2021
Machine Learning System Security

TagVet: Vetting Malware Tags using Explainable Machine Learning

Pirch, L.; Warnecke, A.; Wressnegger, C.; Rieck, K.
2021. EuroSec ’21: Proceedings of the 14th European Workshop on Systems Security, 34–40, Association for Computing Machinery (ACM).

Publication
Apr 26, 2021
Machine Learning System Security

TagVet: Vetting Malware Tags using Explainable Machine Learning

Pirch, L.; Warnecke, A.; Wressnegger, C.; Rieck, K.
2021. EuroSec ’21: Proceedings of the 14th European Workshop on Systems Security, 34–40, Association for Computing Machinery (ACM).

Publication
Apr 20, 2021
Legal Informatics Societal Security

Governance im lernenden Gesundheitssystem : Anforderungen an eine gesamtheitliche Steuerung von Plattformen

Spiecker gen. Döhmann, I.
2021. Perspektive Gesundheit 2030. Hrsg.: J. Baas, 45–53, Medizinisch Wissenschaftliche Verlagsgesellschaft mbH & Co. KG (MWV)

Publication
Apr 19, 2021
Modeling Software Engineering

Towards extraction of message-based communication in mixed-technology architectures for performance model

Singh, S.; Kirschner, Y. R.; Koziolek, A.
2021. ICPE ’21: Companion of the ACM/SPEC International Conference on Performance Engineering, 133–138, Association for Computing Machinery (ACM).

Publication
Apr 01, 2021
Dependability Software Engineering

A Layered Reference Architecture for Metamodels to Tailor Quality Modeling and Analysis

Heinrich, R.; Strittmatter, M.; Reussner, R. H.
2021. IEEE transactions on software engineering, 47 (4), 775–800.

Publication
Mar 27, 2021
Software Engineering Verification

Deductive Verification of Floating-Point Java Programs in KeY

Abbasi, R.; Schiffl, J.; Darulova, E.; Ulbrich, M.; Ahrendt, W.
2021. Tools and Algorithms for the Construction and Analysis of Systems : 27th International Conference, TACAS 2021, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021, Luxembourg City, Luxembourg, March 27 – April 1, 2021, Proceedings, Part II. Ed.: J. F. Groote, 242–261, Springer International Publishing.

Publication
Mar 22, 2021
Software Engineering

Enabling Consistency between Software Artefacts for Software Adaption and Evolution

Monschein, D.; Mazkatli, M.; Heinrich, R.; Koziolek, A.
2021. Proceedings IEEE 18th International Conference on Software Architecture: 22-26 March 2021 ; virtual conference, Institute of Electrical and Electronics Engineers (IEEE).

Publication
Mar 22, 2021
Machine Learning Network Services Privacy

Intelligent networks

Cabrera G., J. A.; Fitzek, F. H. P.; Hanisch, S.; Itting, S. A. W.; Zhang, J.; Zimmermann, S.; Strufe, T.; Simsek, M.; Fetzer, C. W.
2021. Tactile Internet. Ed.: F. H.P. Fitzek, 131–149, Academic Press.

Publication
Mar 22, 2021
IT Security Societal Security

Tactile Internet : with Human-in-the-Loop

Fitzek, F. H. P.; Speidel, S.; Simsek, M.; Li, S.-C.; Strufe, T.; Reisslein, M. (Hrsg.)
2021. Academic Press.

Publication
Mar 19, 2021
Machine Learning Network Security Privacy

Tactile computing: Essential building blocks for the Tactile Internet

Aßmann, U.; Baier, C.; Dubslaff, C.; Grzelak, D.; Hanisch, S.; Hartono, A. P. P.; Köpsell, S.; Lin, T.; Strufe, T.
2021. Tactile Internet. Ed.: F. H.P. Fitzek, 293–317, Academic Press.

Publication
Mar 11, 2021
Mobility Systems Security Trustworthy Internet Technologies

When Data Fly: An Open Data Trading System in Vehicular Ad Hoc Networks

Lücking, M.; Kretzer, F.; Kannengießer, N.; Beigl, M.; Sunyaev, A.; Stork, W.
2021. Electronics, 10 (6), 654.

Publication
Feb 23, 2021
Mobility Systems Security Software Engineering

Dealing with Uncertainty in Architectural Confidentiality Analysis

Hahner, S.
2021. Proceedings of the Software Engineering 2021 Satellite Events, 1–6, Gesellschaft für Informatik (GI)

Publication
Feb 23, 2021
Communication Security Decentralized Systems

Analysis of the Matrix Event Graph Replicated Data Type

Jacob, F.; Beer, C.; Henze, N.; Hartenstein, H.
2021. IEEE access, 9, 28317–28333.

Publication
Feb 17, 2021
Legal Informatics Privacy

Datensouveränität für Patienten im Gesundheitswesen

Bretthauer, S.; Appenzeller, A.; Birnstill, P.
2021. Datenschutz und Datensicherheit, 45 (3), 173–179.

Publication
Feb 17, 2021
Legal Informatics

Information Management

Spiecker gen. Döhmann, I.
2021. Oxford Handbook on Comparative Law. Ed.: P. Cane, Oxford Univ. Pr

Publication
Feb 15, 2021
Decentralized Systems Economic Security

Token Economy

Sunyaev, A.; Kannengießer, N.; Beck, R.; Treiblmaier, H.; Lacity, M.; Kranz, J.; Fridgen, G.; Spankowski, U.; Luckow, A.
2021. Business & information systems engineering, 63 (4), 457–478.

Publication
03 / 04