Research at KASTEL SRL

Research at KASTEL Security Research Labs is distinguished by its broad scope. Privacy and reliability aspects are naturally part of IT security; basic and applied research complement each other, and a comprehensive approach to IT security needs to look not just at the technical system, but also at its social environment as well as its human aspects.

  • Fact 1

    414 Publications from 2021 to 2024

  • Fact 2

    85 Papers at 33 Top Conferences 2021 to 2024

  • Fact 3

    36 Awards from 2021 to 2024

Our research covers a broad spectrum of cybersecurity. It combines the view of different disciplines in order to adress not only technical aspects, but also human factors and the legal framework.

KASTEL Security Research Labs conduct interdisciplinary and application-oriented research. Therefore, we permanently maintain and expand numerous partnerships with industrial enterprises and research institutions. The resulting synergy effects flow into our research.

  • Fact 1

    119 Academic Cooperations in 19 Countries

  • Fact 2

    20 New Projects in 2023 and 2024

  • Fact 3

    88 Cooperations with Companies

Publications

Aug 09, 2024
Trustworthy Internet Technologies

On the influence of conventional and automated market makers on market quality in cryptoeconomic systems

Kirste, D.; Poddey, A.; Kannengießer, N.; Sunyaev, A.
2024. Electronic Markets, 34 (1), Art.-Nr.: 42.

Publication
Jul 31, 2024
Dependability

A conceptual and architectural characterization of antifragile systems

Grassi, V.; Mirandola, R.; Perez-Palacin, D.
2024. Journal of Systems and Software, 213, Art.-Nr.: 112051.

Publication
Jul 30, 2024
Human-Centered IT Security Production Security

DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote Attestation

Wagner, P. G.; Birnstill, P.; Beyerer, J.
2024. Proceedings of the 19th International Conference on Availability, Reliability and Security, Art.-Nr.: 159, Association for Computing Machinery (ACM).

Publication
Jul 30, 2024
Privacy Usable Security

Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent Banners

Kriecherbauer, T.; Schwank, R.; Krauss, A.; Neureither, K.; Remme, L.; Volkamer, M.; Herrmann, D.
2024. ARES ’24: Proceedings of the 19th International Conference on Availability, Reliability and Security, 1–7, Association for Computing Machinery (ACM).

Publication
Jul 27, 2024
Cryptography

Compact FE for unbounded attribute-weighted sums for logspace from SXDH

Datta, P.; Pal, T.; Takashima, K.
2024. Designs, Codes, and Cryptography.

Publication
Jul 18, 2024
Human-Centered IT Security IT Security

NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research

Chaurasia, A. K.; Fallahi, M.; Strufe, T.; Terhörst, P.; Cabarcos, P. A.
2024. Journal of Information Security and Applications, 85, Article no: 103832.

Publication