Research at KASTEL SRL

Research at KASTEL Security Research Labs is distinguished by its broad scope. Privacy and reliability aspects are naturally part of IT security; basic and applied research complement each other, and a comprehensive approach to IT security needs to look not just at the technical system, but also at its social environment as well as its human aspects.

  • Fact 1

    666 Publications from 2021 to 2025

  • Fact 2

    148 Papers at 42 Top Conferences 2021 to 2025

  • Fact 3

    65 Awards from 2021 to 2025

Our research covers a broad spectrum of cybersecurity. It combines the view of different disciplines in order to adress not only technical aspects, but also human factors and the legal framework.

KASTEL Security Research Labs conduct interdisciplinary and application-oriented research. Therefore, we permanently maintain and expand numerous partnerships with industrial enterprises and research institutions. The resulting synergy effects flow into our research.

  • Fact 1

    156 Academic Cooperations in 25 Countries

  • Fact 2

    24 Ongoing Thirt-Party Funded Projects

  • Fact 3

    92 Cooperations with Companies

Publications

Jul 06, 2026
Societal Security

Implementing and Evaluating the Usability of Reliable Voter Complaints in E2E Verifiable Remote Electronic Voting

Hilt, T.; Mack, C.; Matheis, P.; Berens, B.; Länge, T.; Haenni, R.; Koenig, R. E.; Locher, P.; Volkamer, M.
2026. 11th IEEE European Symposium on Security and Privacy (EuroS&P)

Publication
Jun 22, 2026
Software Engineering

Architecture in the Cradle: Early Warning of Architectural Decay with ArchGuard

Liu, H.; Fuchß, D.; Corallo, S.; Hummel, M.; Keim, J.; Hey, T.
2026. 23rd IEEE International Conference on Software Architecture (ICSA 2026), Institute of Electrical and Electronics Engineers (IEEE)

Publication
Apr 30, 2026
Decentralized Systems

Automated Market Makers in Cryptoeconomic Systems: A Taxonomy and Archetypes

Kirste, D.; Kannengießer, N.; Lamberty, R.; Sunyaev, A.
2026. ACM Computing Surveys, 58 (5), 1–37.

Publication
Apr 26, 2026
Cryptography Network Services

Performance and Security of TEE-Based Threshold Cryptography

Haller, M.; Leinweber, M.; Spannagel, T.; Raiber, M.; Hartenstein, H.
2026. SysTEX’26: Proceedings of the 9th Workshop on System Software for Trusted Execution, 42–49, Association for Computing Machinery (ACM).

Publication
Apr 13, 2026
Societal Security

Why Johnny Checks but Doesn’t Alert: Reporting as the Missing Step in Verifiable Internet Voting

Hilt, T.; Mack, C.; Berens, B.; Volkamer, M.
2026. Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems (CHI ’26).

Publication
Apr 13, 2026
Privacy Usable Security

Development, Evaluation, and Implementation of SEQR — a Usable Secure QR Code Scanner

Mossano, M.; Fabian Veit, M.; Länge, T.; Maximilian Berens, B.; Sharevski, F.; Volkamer, M.
2026. Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems, 1–33, Association for Computing Machinery (ACM).

Publication
01 / 133