Research at KASTEL SRL

Research at KASTEL Security Research Labs is distinguished by its broad scope. Privacy and reliability aspects are naturally part of IT security; basic and applied research complement each other, and a comprehensive approach to IT security needs to look not just at the technical system, but also at its social environment as well as its human aspects.

  • Fact 1

    414 Publications from 2021 to 2024

  • Fact 2

    85 Papers at 33 Top Conferences 2021 to 2024

  • Fact 3

    36 Awards from 2021 to 2024

Our research covers a broad spectrum of cybersecurity. It combines the view of different disciplines in order to adress not only technical aspects, but also human factors and the legal framework.

KASTEL Security Research Labs conduct interdisciplinary and application-oriented research. Therefore, we permanently maintain and expand numerous partnerships with industrial enterprises and research institutions. The resulting synergy effects flow into our research.

  • Fact 1

    119 Academic Cooperations in 19 Countries

  • Fact 2

    20 New Projects in 2023 and 2024

  • Fact 3

    88 Cooperations with Companies

Publications

Jun 23, 2025
Cryptography

Security Analysis of Forward Secure Log Sealing in Journald

Dörre, F.; Ottenhues, A.
2025. International Conference on Applied Cryptography and Network Security, 27 S

Publication
Apr 20, 2025
Cryptography

Analytical Evaluation of Time-based Cryptography

Ramadan, M.; Gadekar, P.; Hagenmeyer, V.; Elbez, G.
2025. Title: Proceedings of the 11th International Conference on Information Systems Security and Privacy 2025. Editor: Gabriele Lenzini, Paolo Mori, Steven Furnell (Eds.)

Publication
Mar 31, 2025
Software Engineering

Do Large Language Models Contain Software Architectural Knowledge? An Exploratory Case Study with GPT

Soliman, M.; Keim, J.
2025. 22nd IEEE International Conference on Software Architecture (ICSA 2025), Institute of Electrical and Electronics Engineers (IEEE)

Publication
Mar 01, 2025
Societal Security Usable Security

SoK: The past decade of user deception in emails and today’s email clients’ susceptibility to phishing techniques

Veit, M. F.; Wiese, O.; Ballreich, F. L.; Volkamer, M.; Engels, D.; Mayer, P.
2025. Computers & Security, 150, 104197.

Publication
Feb 25, 2025
Machine Learning

Two Sides of the Same Coin: Learning the Backdoor to Remove the Backdoor

Zhao, Q.; Wressnegger, C.
2025. Proceedings of the 39th Annual AAAI Conference on Artificial Intelligence (AAAI)

Publication
Feb 24, 2025
System Security

DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing

Wachter, L.; Gremminger, J.; Wressnegger, C.; Payer, M.; Toffalini, F.
2025. Proceedings of the Network and Distributed System Security Symposium (NDSS)

Publication
01 / 88