Towards Legal Knowledge Transfer Based on Software Architecture
Boltz, N.; Wagner, J.; Sterz, L.; Raabe, O.; Gerking, C.
2025. Software Architecture : 19th European Conference (ECSA 2025), Limassol, CY, September 15–19, 2025
Research at KASTEL Security Research Labs is distinguished by its broad scope. Privacy and reliability aspects are naturally part of IT security; basic and applied research complement each other, and a comprehensive approach to IT security needs to look not just at the technical system, but also at its social environment as well as its human aspects.
Our research covers a broad spectrum of cybersecurity. It combines the view of different disciplines in order to adress not only technical aspects, but also human factors and the legal framework.
KASTEL Security Research Labs conduct interdisciplinary and application-oriented research. Therefore, we permanently maintain and expand numerous partnerships with industrial enterprises and research institutions. The resulting synergy effects flow into our research.
Boltz, N.; Wagner, J.; Sterz, L.; Raabe, O.; Gerking, C.
2025. Software Architecture : 19th European Conference (ECSA 2025), Limassol, CY, September 15–19, 2025
Dörre, F.; Ottenhues, A.
2025. International Conference on Applied Cryptography and Network Security, 27 S
Ottenhues, A.; Müller-Quade, J.; Arnold, P.; Berndt, S.
2025. International Conference on Applied Cryptography and Network Security, München, 23rd-26th June 2025
Canbolat Kaya, S.; Elbez, G.; Hagenmeyer, V.
2025. ACM International Conference on Future and Sustainable Energy Systems (ACM e-Energy 2025), Association for Computing Machinery (ACM).
Jacob, F.; Hartenstein, H.
2025. Proceedings of the 15th ACM Conference on Data and Application Security and Privacy, 107–118, Association for Computing Machinery (ACM).
Drossos, T.; Kirste, D.; Kannengießer, N.; Sunyaev, A.
2025. SAC ’25: Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing. Ed.: J. Hong, 358–365, Association for Computing Machinery (ACM).