Research at KASTEL SRL

Research at KASTEL Security Research Labs is distinguished by its broad scope. Privacy and reliability aspects are naturally part of IT security; basic and applied research complement each other, and a comprehensive approach to IT security needs to look not just at the technical system, but also at its social environment as well as its human aspects.

  • Fact 1

    666 Publications from 2021 to 2025

  • Fact 2

    148 Papers at 42 Top Conferences 2021 to 2025

  • Fact 3

    65 Awards from 2021 to 2025

Our research covers a broad spectrum of cybersecurity. It combines the view of different disciplines in order to adress not only technical aspects, but also human factors and the legal framework.

KASTEL Security Research Labs conduct interdisciplinary and application-oriented research. Therefore, we permanently maintain and expand numerous partnerships with industrial enterprises and research institutions. The resulting synergy effects flow into our research.

  • Fact 1

    156 Academic Cooperations in 25 Countries

  • Fact 2

    24 Ongoing Thirt-Party Funded Projects

  • Fact 3

    92 Cooperations with Companies

Publications

Oct 17, 2025
Software Engineering

How Toxic Can You Get? Search-based Toxicity Testing for Large Language Models

Corbo, S.; Bancale, L.; Gennaro, V. D.; Lestingi, L.; Scotti, V.; Camilli, M.
2025. IEEE Transactions on Software Engineering.

Publication
Oct 15, 2025
Legal Informatics

Offene und subkutane Zielkonflikte zwischen KI-VO und DSGVO – Das Zusammenspiel zwischen Vertrauenswürdigkeit von KI und Vertrauen in Datenverarbeitung als grundlegende Herausforderung

Winau, M.; Spiecker genannt Döhmann, I.
2025. Computer und Recht : CR ; Zeitschrift für die Praxis des Rechts der Informationstechnologien, (10), 647–654

Publication
Oct 15, 2025
Software Engineering

Proactive self-adaptation and assurance of explainable Human–Machine Teaming

Lestingi, L.; Bersani, M. M.; Camilli, M.; Mirandola, R.; Rossi, M.; Scandurra, P.
2026. Journal of Systems and Software, 232, Art.-Nr.: 112657.

Publication
Oct 13, 2025
Privacy

BFId: Identity Inference Attacks Utilizing Beamforming Feedback Information

Todt, J.; Morsbach, F.; Strufe, T.
2025. Proceedings of 32nd ACM SIGSAC Conference on Computer and Communications Security (CCS ’25), Taipei, October 13–17, 2025, Association for Computing Machinery (ACM).

Publication
Oct 12, 2025
Mobility Systems Security Network Security

NOTHORG; A digital twin for ECU security testing

Wehmer, M.; Diestl, J.; Waibel, D.; Baumgart, I.
2025. Proceedings of the 2025 Cyber Security in CarS Workshop (CSCS ’25), 9 S., Association for Computing Machinery (ACM).

Publication
Oct 10, 2025
Modeling Software Engineering

Towards the Derivation of Encryption Rules for Encryption-Based Access Control for Delta-Based Model Representations — The DEBAC Approach

Weber, T.; Quellmalz, K.; Benz, L.; Weber, S.; Burger, E.; Reussner, R.
2025. Second International Workshop on Model Management (MoM), co-located with the 28th International Conference on Model Driven Engineering Languages and Systems (MODELS 2025), Grand Rapids, MI, 5th-10th October 2025, Institute of Electrical and Electronics Engineers (IEEE)

Publication