Publikationsliste
-
Evaluating Drill-Down DDoS Destination Detection
Krack, T.; Kopmann, S.; Zitterbart, M.
2024. 2024 IEEE 49th Conference on Local Computer Networks (LCN), Normandy, France, 08-10 October 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN60385.2024.10639629 -
ARC³N: A Collaborative Uncertainty Catalog to Address the Awareness Problem of Model-Based Confidentiality Analysis
Hahner, S.; Niehues, N.; Boltz, N.; Fuksa, M.; Heinrich, R.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 640–644, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688556 -
Model Everything but with Intellectual Property Protection - The Deltachain Approach
Weber, T.; Weber, S.
2024. MODELS ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 49–56, Association for Computing Machinery (ACM). doi:10.1145/3640310.3674086 -
Composition in Differential Privacy for General Granularity Notions
Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Strufe, T.
2024. 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 8th-12th July 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSF61375.2024.00004 -
7D: Demonstrating Drill-Down DDoS Destination Detection
Kopmann, S.; Krack, T.; Zitterbart, M.
2024. 2024 IEEE International Conference on Machine Learning for Communication and Networking (ICMLCN), Stockholm, 5th-8th May 2024, 1–2, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICMLCN59089.2024.10624795 -
Inconsistencies in Production Workflows and How to Model Them
Kuder, N. D.; Weber, T.; Schneider, J.; Weber, S.; Völk, T. A.; Albers, A.; Koziolek, A.
2024. 2024 IEEE 21st International Conference on Software Architecture Companion (ICSA-C), Hyderabad, 4th - 8th June 2024, 84 – 86, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C63560.2024.00021 -
SMILE4VIP: Intervention to Support Visually Impaired Users Against Phishing
Bohlender, M.; Morisco, R.; Mossano, M.; Schwarz, T.; Volkamer, M.
2024. 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Vienna, 8th-12th July 2024, 650 – 657, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW61312.2024.00079 -
Of Mothers and Managers – The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field
Gerber, N.; Stöver, A.; Mayer, P.
2024. Proceedings of the Twentieth Symposium on Usable Privacy and Security, Advanced Computing Systems Association (USENIX) -
Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent Banners
Kriecherbauer, T.; Schwank, R.; Krauss, A.; Neureither, K.; Remme, L.; Volkamer, M.; Herrmann, D.
2024. ARES ’24: Proceedings of the 19th International Conference on Availability, Reliability and Security, 1–7, Association for Computing Machinery (ACM). doi:10.1145/3664476.3664499 -
DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote Attestation
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2024. Proceedings of the 19th International Conference on Availability, Reliability and Security, Art.-Nr.: 159, Association for Computing Machinery (ACM). doi:10.1145/3664476.3670442 -
Complete Game Logic with Sabotage
Abou El Wafa, N.; Platzer, A.
2024. Proceedings of the 39th Annual ACM/IEEE Symposium on Logic in Computer Science, 1–15, Association for Computing Machinery (ACM). doi:10.1145/3661814.3662121 -
Interoperability Assessment of IEC 61850 Devices in a Multivendor Digital Substation
Keppler, G.; Bonetti, A.; Canbolat, S.; Mumrez, A.; Hagenmeyer, V.; Elbez, G.
2024. 6th Global Power, Energy and Communication Conference (GPECOM2024), Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/GPECOM61896.2024.10582663 -
Uncertainty Flow Diagrams: Towards a Systematic Representation of Uncertainty Propagation and Interaction in Adaptive Systems
Camara, J.; Hahner, S.; Perez-Palacin, D.; Vallecillo, A.; Acosta, M.; Bencomo, N.; Calinescu, R.; Gerasimou, S.
2024. SEAMS ’24: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems; New York, 37 – 43, Association for Computing Machinery (ACM). doi:10.1145/3643915.3644084 -
RAMSES: An Artifact Exemplar for Engineering Self-Adaptive Microservice Applications
Riccio, V.; Sorrentino, G.; Zamponi, E.; Camilli, M.; Mirandola, R.; Scandurra, P.
2024. Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Lissabon, 15th-16th April, 2024, 161 – 167, Association for Computing Machinery (ACM). doi:10.1145/3643915.3644110 -
Attacking Learning-based Models in Smart Grids: Current Challenges and New Frontiers
Sanchez, G.; Elbez, G.; Hagenmeyer, V.
2024. e-Energy ’24: Proceedings of the 15th ACM International Conference on Future and Sustainable Energy Systems, 589–595, Association for Computing Machinery (ACM). doi:10.1145/3632775.3661984 -
Better Together: The Interplay Between a Phishing Awareness Video and a Link-centric Phishing Support Tool
Berens, B. M.; Schaub, F.; Mossano, M.; Volkamer, M.
2024. Proceedings of the CHI Conference on Human Factors in Computing Systems, 1–60, Association for Computing Machinery (ACM). doi:10.1145/3613904.3642843 -
Improving Resilience of Future Mobile Network Generations Implementing Zero Trust Paradigm
Abedi, K.; Nguyen, G. T.; Strufe, T.
2024. NOMS 2024-2024 IEEE Network Operations and Management Symposium, 06th-10th May 2024, Seoul, Korea, 1–5, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NOMS59830.2024.10574898 -
Logical Clocks and Monotonicity for Byzantine-Tolerant Replicated Data Types
Jacob, F.; Hartenstein, H.
2024. PaPoC ’24: Proceedings of the 11th Workshop on Principles and Practice of Consistency for Distributed Data, 37–43, Association for Computing Machinery (ACM). doi:10.1145/3642976.3653034 -
Explanation-driven Self-adaptation using Model-agnostic Interpretable Machine Learning
Negri, F. R.; Nicolosi, N.; Camilli, M.; Mirandola, R.
2024. IEEE/ACM proceedings of the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS2024) -
Quantifying Software Correctness by Combining Architecture Modeling and Formal Program Analysis
Lanzinger, F.; Martin, C.; Reiche, F.; Teuber, S.; Heinrich, R.; Weigl, A.
2024. SAC ’24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing. Ed.: J. Hong, 1702–1711, Association for Computing Machinery (ACM). doi:10.1145/3605098.3636008 -
TRUST Issues: Multicast and Integrity Protection for the TRUST Redundancy Mechanism
Neumeister, F.; Zitterbart, M.
2024. 2024 IEEE International Conference on Industrial Technology (ICIT), 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICIT58233.2024.10540910 -
Vision: Towards Fully Shoulder-Surfing Resistant and Usable Authentication for Virtual Reality
Länge, T.; Matheis, P.; Düzgün, R.; Volkamer, M.; Mayer, P.
2024. Symposium on Usable Security and Privacy (USEC) 2024 : Co-located with NDSS Symposium 2024, San Diego, CA, 26th February - 1st March 2024. doi:10.14722/usec.2024.23092 -
Co-Simulation of Hardware and Software in Palladio
Weber, S.; Henss, J.; Reussner, R.
2024. 13th Symposium on Software Performance 2023, Stuttgart, 7th-9th November 2022, Ed.: Andrea Herrmann, 32–34, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43641 -
Kfeature: Rendering the Kconfig System into Feature Models
Yaman, K. B.; Wittler, J. W.; Gerking, C.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 134 – 138, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634731 -
RIXA - Explaining Artificial Intelligence in Natural Language
Becker, M.; Vishwesh, V.; Birnstill, P.; Schwall, F.; Wu, S.; Beyerer, J.
2024. 2023 IEEE International Conference on Data Mining Workshops (ICDMW), Shanghai, 1st-4th December 2023, 875–884, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICDMW60847.2023.00118 -
Verifiable Certificateless Signcryption Scheme for Smart Grids
Ramadan, M.; Elbez, G.; Hagenmeyer, V.
2024. 2023 7th International Conference on System Reliability and Safety (ICSRS), 181–189, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSRS59833.2023.10381069 -
Towards Deep Reactions in Multi-Level, Multi-View Modeling
Weber, T.; Ojha, M.; Sadeghi, M.; König, L.; Armbruster, M.; Lange, A.; Burger, E.; Atkinson, C.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, Linz Austria, 22nd - 27th September 2024, 760–769, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688208 -
SoK: Mechanisms Used in Practice for Verifiable Internet Voting
Moser, F.; Kirsten, M.; Dörre, F.
2024. 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024), Gesellschaft für Informatik (GI) -
Usability and Understanding of Individual Verifiability in the 2023 GI-Election
Hilt, T.; Matheis, P.; Volkamer, M.
2024. Mensch und Computer 2024 – Workshopband, September 2024, Karlsruhe, Germany, Gesellschaft für Informatik e.V. doi:10.18420/muc2024-mci-ws17-151 -
Recommendations for Implementing Independent Individual Verifiability in Internet Voting
Moser, F.; Grimm, R.; Hilt, T.; Kirsten, M.; Niederbudde, C.; Volkamer, M.
2024. 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024), Gesellschaft für Informatik (GI) -
Automated Reverse Engineering for MoM-Based Microservices (ARE4MOM) Using Static Analysis
Singh, S.; Koziolek, A.
2024. 2024 IEEE 21st International Conference on Software Architecture (ICSA), Hyderabad, 4th-8th June 2024, 12–22, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA59870.2024.00010 -
CESAR: Control Envelope Synthesis via Angelic Refinements
Kabra, A.; Laurent, J.; Mitsch, S.; Platzer, A.
2024. Tools and Algorithms for the Construction and Analysis of Systems. Proceedings., Part 1. Ed.: B. Finkbeiner, 144–164, Springer Nature Switzerland. doi:10.1007/978-3-031-57246-3_9 -
HiddenΔ-Fairness: A Novel Notion for Fair Secure Two-Party Computation
Bayreuther, S.; Berger, R.; Dörre, F.; Mechler, J.; Müller-Quade, J.
2024. Information Security and Privacy. Ed.: T. Zhu. Pt. 2, 330–349, Springer Nature Singapore. doi:10.1007/978-981-97-5028-3_17 -
A Collaborative Uncertainty Collection to Address the Awareness Problem of Model-Based Confidentiality Analysis
Hahner, S.; Niehues, N.; Boltz, N.; Fuksa, M.; Heinrich, R.
2024. ACM / IEEE 27th International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C) -
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions
Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Gröll, R.; Müller, M.; Müller-Quade, J.
2024. Public-Key Cryptography – PKC 2024 : 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings. Part IV. Ed.: Q. Tang, 257–288, Springer Nature Switzerland. doi:10.1007/978-3-031-57728-4_9 -
An Extensible Framework for Architecture-Based Data Flow Analysis for Information Security
Boltz, N.; Hahner, S.; Gerking, C.; Heinrich, R.
2024. Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral Symposium : Istanbul, Turkey, September 18–22, 2023, Revised Selected Papers. Ed.: B. Tekinerdoğan, 342–358, Springer. doi:10.1007/978-3-031-66326-0_21 -
Uniform Substitution for Differential Refinement Logic
Prebet, E.; Platzer, A.
2024. Automated Reasoning. IJCAR 2024. Part 2. Ed.: C. Benzmüller, 196–215, Springer Nature Switzerland. doi:10.1007/978-3-031-63501-4_11 -
A Practical Notion of Liveness in Smart Contract Applications
Schiffl, J.; Beckert, B.
2024. 5th International Workshop on Formal Methods for Blockchains (FMBC 2024). Ed.: B. Bernardo, 8:1–8:13, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/oasics.fmbc.2024.8 -
Detecting Inconsistencies in Software Architecture Documentation Using Traceability Link Recovery
Keim, J.; Corallo, S.; Fuchß, D.; Koziolek, A.
2024. Software Engineering 2024 (SE 2024). Ed.: R. Rabiser, 119–120, Gesellschaft für Informatik e.V. doi:10.18420/sw2024_37 -
Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids
Canbolat, S.; Fruböse, C.; Elbez, G.; Hagenmeyer, V.
2024. 21st Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA ’24) -
Explainability Engineering Challenges: Connecting Explainability Levels to Run-time Explainability
Schwammberger, M.; Mirandola, R.; Wenninghoff, N.
2024. Proceedings of 2nd World Conference on Explainable Artificial Intelligence Conference (XAI2024), Springer -
RAMSES: An Exemplar for Engineering Self-Adaptive Microservice Applications
Riccio, V.; Sorrentino, G.; Zamponi, E.; Camilli, M.; Mirandola, R.; Scandurra, P.
2024. IEEE/ACM proceedings of the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS2024), Institute of Electrical and Electronics Engineers (IEEE) -
Requirements Classification for Traceability Link Recovery
Hey, T.; Keim, J.; Corallo, S.
2024. 2024 IEEE 32nd International Requirements Engineering Conference (RE’24), Institute of Electrical and Electronics Engineers (IEEE) -
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption
Berger, R.; Dörre, F.; Koch, A.
2024. Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings. Part I. Ed.: C. Pöpper, 288–317, Springer International Publishing. doi:10.1007/978-3-031-54770-6_12 -
Exploring Phishing Threats through QR Codes in Naturalistic Settings
Sharevski, F.; Mossano, M.; Veit, M. F.; Schiefer, G.; Volkamer, M.
2024. Symposium on Usable Security and Privacy (USEC) 2024. doi:10.14722/usec.2024.23050 -
Systematic User Evaluation of a Second Device based cast-as-intended verifiability Approach
Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.; Volkamer, M.
2024. Voting’24, Springer -
Architecture-based Propagation Analyses Regarding Security
Hahner, S.; Walter, M.; Heinrich, R.; Reussner, R.
2024. Software Engineering 2024 (SE 2024), 121–122, Gesellschaft für Informatik e.V. doi:10.18420/sw2024_38 -
Obfuscation-Resilient Software Plagiarism Detection with JPlag
Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. 46th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3639478.3643074 -
Automated Detection of AI-Obfuscated Plagiarism in Modeling Assignments
Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. Proceedings of the 46th International Conference on Software Engineering: Software Engineering Education and Training, ICSE SEET ’24, Lissabon, 14th-20th April 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3639474.3640084 -
Detecting Automatic Software Plagiarism via Token Sequence Normalization
Sağlam, T.; Brödel, M.; Schmid, L.; Hahner, S.
2024. Proceedings of the 46th International Conference on Software Engineering, ICSE ’24, Lissabon, April 14-20, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3597503.3639192 -
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
Tiepelt, M.; Eaton, E.; Stebila, D.
2024. Computer Security – ESORICS 2023. Ed.: G. Tsudik. Pt. 1, 168–188, Springer Nature Switzerland. doi:10.1007/978-3-031-50594-2_9 -
Panini - Anonymous Anycast and an Instantiation
Coijanovic, C.; Weis, C.; Strufe, T.
2024. 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Springer-Verlag -
Recovering Trace Links Between Software Documentation And Code
Keim, J.; Corallo, S.; Fuchß, D.; Hey, T.; Telge, T.; Koziolek, A.
2024. ICSE ’24: Proceedings of the IEEE/ACM 46th International Conference on Software Engineering. Ed.: A. Paiva, Art.-Nr.: 215, Association for Computing Machinery (ACM). doi:10.1145/3597503.3639130 -
PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support
Schadt, D.; Coijanovic, C.; Weis, C.; Strufe, T.
2024. 2024 IEEE Symposium on Security and Privacy (SP), 44–44, IEEE Computer Society. doi:10.1109/SP54263.2024.00044 -
SoK: Explainable Machine Learning in Adversarial Environments
Noppel, M.; Wressnegger, C.
2024. Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P), San Francisco, 20th-22nd May 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SP54263.2024.00021 -
ABCperf: Performance Evaluation of Fault Tolerant State Machine Replication Made Simple: Demo Abstract
Spannagel, T.; Leinweber, M.; Castro, A.; Hartenstein, H.
2023. Proceedings of the 24th International Middleware Conference Demos, Posters and Doctoral Symposium, 35–36, Association for Computing Machinery (ACM). doi:10.1145/3626564.3629101 -
Multi-level Hardware Simulation in Palladio
Weber, S.; Taghavi, B.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 32–34, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43229 -
A Survey of Analysis Composition Operators in the Context of Palladio
Taghavi, B.; Weber, S.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 8–10, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43245 -
BAZAAR: Anonymous Resource Sharing
Coijanovic, C.; Schadt, D.; Weis, C.; Strufe, T.
2023. WPES ’23: Proceedings of the 22nd Workshop on Privacy in the Electronic Society, Kopenhagen, 26th November 2023, 135–139, Association for Computing Machinery (ACM). doi:10.1145/3603216.3624957 -
Poster: Towards Practical Brainwave-based User Authentication
Fallahi, M.; Arias-Cabarcos, P.; Strufe, T.
2023. CCS’ 23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Kopenhagen, 26th-30th November 2023, 3627–3629, Association for Computing Machinery (ACM). doi:10.1145/3576915.3624399 -
Poster: Fooling XAI with Explanation-Aware Backdoors
Noppel, M.; Wressnegger, C.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3612–3614, Association for Computing Machinery (ACM). doi:10.1145/3576915.3624379 -
"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers
Munyendo, C. W.; Mayer, P.; Aviv, A. J.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3123–3137, Association for Computing Machinery (ACM). doi:10.1145/3576915.3623150 -
SAFFIRRE: Selective Aggregate Filtering Through Filter Rule Refinement
Heseding, H.; Bachmann, F.; Bien, P. S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), Izmir, 4th-06th October 2023, 42–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NoF58724.2023.10302813 -
Encouraging Organisational Information Security Incident Reporting
Ballreich, F. L.; Volkamer, M.; Müllmann, D.; Berens, B. M.; Häußler, E. M.; Renaud, K. V.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 224–236, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617098 -
Influence of URL Formatting on Users’ Phishing URL Detection
Mossano, M.; Kulyk, O.; Berens, B. M.; Häußler, E. M.; Volkamer, M.
2023. Proceedings of the 2023 European Symposium on Usable Security, 318–333, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617111 -
A Proposal to Study Shoulder-Surfing Resistant Authentication for Augmented and Virtual Reality: Replication Study in the US
Noah, N.; Mayer, P.; Das, S.
2023. CSCW ’23 Companion: Companion Publication of the 2023 Conference on Computer-Supported Cooperative Work and Social Computing, (CSCW ’23 Companion), Minneapolis, 14th-18th October 2023, 317 – 322, Association for Computing Machinery (ACM). doi:10.1145/3584931.3607007 -
eMinD: Efficient and Micro-Flow Independent Detection of Distributed Network Attacks
Kopmann, S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), 159–167, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NoF58724.2023.10302763 -
How Students Plagiarize Modeling Assignments
Sağlam, T.; Schmid, L.; Hahner, S.; Burger, E.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, 1st - 6th October 2023, 98 – 101, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00032 -
Co-Evolving Meta-Models and View Types in View-Based Development
Muctadir, H. M.; König, L.; Weber, T.; Amrani, M.; Cleophas, L.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), 954–963, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00150 -
Consistency in the View-Based Development of Cyber-Physical Systems (Convide)
Reussner, R.; Schaefer, I.; Beckert, B.; Koziolek, A.; Burger, E.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, Sweden, 01-06 October 2023, 83–84, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00026 -
Vision: What the hack is going on? A first look at how website owners became aware that their website was hacked
Hennig, A.; Thi Thanh Vuong, N.; Mayer, P.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 312–317, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617101 -
Investigating the Role of Computing Education for Informed Usage Decision-Making
Gebhardt, L.; Leinweber, M.; Michaeli, T.
2023. WiPSCE ’23: The 18th WiPSCE Conference on Primary and Secondary Computing Education Research Cambridge United Kingdom September 27 - 29, 2023. Ed.: S. Sentance, 1–2, Association for Computing Machinery (ACM). doi:10.1145/3605468.3609776 -
The Fast Rise of Cautious Vehicle-to-X: Towards Evaluating Misbehavior Detection in the Field
Wehmer, M.; Baumgart, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), Bilbao, Spain, 24-28 September 2023, 3930–3936, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/itsc57777.2023.10422080 -
SOTIF-Compliant Scenario Generation Using Semi-Concrete Scenarios and Parameter Sampling
Birkemeyer, L.; Fuchs, J.; Gambi, A.; Schaefer, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), 2139–2144, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10422637 -
Is Scenario Generation Ready for SOTIF? A Systematic Literature Review
Birkemeyer, L.; King, C.; Schaefer, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), 472–479, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10422664 -
Towards Self-learning Industrial Process Behaviour from Payload Bytes for Anomaly Detection
Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA), Sinaia, Romania, 12-15 September 2023, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA54631.2023.10275358 -
Reducing memory footprints in purity estimations of volumetric DDoS traffic aggregates
Heseding, H.; Krack, T.; Zitterbart, M.
2023. M. Seufert, A. Blenk & O. Landsiedel (Hrsg.), 2nd Workshop on Machine Learning & Netwoking (MaLeNe) Proceedings. Co-located with the 5th International Conference on Networked Systems (NetSys 2023), Potsdam, Germany. Ed.: . Seufert, Universität Augsburg -
Impact of Adaptive Packet Sampling on ML-based DDoS Detection
Kopmann, S.; Zitterbart, M.
2023. 2nd Workshop “Machine Learning & Networking” (MaLeNe) Proceedings Co-Located with the 5th International Conference on Networked Systems (NETSYS 2023) Potsdam, Germany, September 4, 2023 (MaLeNe). Ed.: M. Seufert -
A user-centred approach to facilitate locating company security policies : Nutzerzentrierter Ansatz zur Vereinfachung des Auffindens von Security Policies
Aldag, L.; Ballreich, F.; Berens, B.; Volkamer, M.
2023. MuC ’23: Proceedings of Mensch und Computer. Ed.: M. Stolze, 173–185, Association for Computing Machinery (ACM). doi:10.1145/3603555.3603573 -
Continuous T-Wise Coverage
Pett, T.; Heß, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2023. SPLC ’23: Proceedings of the 27th ACM International Systems and Software Product Line Conference. Vol. A. Ed.: P. Arcaini, 87–98, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608980 -
True Variability Shining Through Taxonomy Mining
König, C.; Rosiak, K.; Cleophas, L.; Schaefer, I.
2023. Proceedings of the 27th ACM International Systems and Software Product Line Conference - Volume A, 182–193, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608989 -
A Toolchain for Simulation Component Specification and Identification
Koch, S.; Reiche, F.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 75–89, Springer International Publishing. doi:10.1007/978-3-031-36889-9_7 -
Usability for Data Sovereignty - Evaluation of Privacy Risk Quantification Interfaces
Appenzeller, A.; Balduf, F.; Beyerer, J.
2023. Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments, 206–214, Association for Computing Machinery (ACM). doi:10.1145/3594806.3594816 -
Adversarial Attacks on Traffic Sign Recognition: A Survey
Pavlitska, S.; Lambing, N.; Zöllner, J. M.
2023. 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Tenerife, Spain, 19-21 July 2023, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICECCME57830.2023.10252727 -
Protocol-Agnostic Detection of Stealth Attacks on Networked Control Systems
Heseding, H.; Dieing, M.; Meshram, A.; Zitterbart, M.
2023. 2023 IEEE 21st International Conference on Industrial Informatics (INDIN), Lemgo, Germany, 17-20 2023, 1–7, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INDIN51400.2023.10218314 -
TRUST: Transparent Redundancy for UDP STreams
Neumeister, F.; Göckel, M.; Zitterbart, M.
2023. IEEE 21st International Conference on Industrial Informatics (INDIN 2023), 7 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INDIN51400.2023.10218145 -
The Bandit’s States: Modeling State Selection for Stateful Network Fuzzing as Multi-armed Bandit Problem
Borcherding, A.; Giraud, M.; Fitzgerald, I.; Beyerer, J.
2023. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 345–350, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW59978.2023.00043 -
Investigating Software Engineering Artifacts in DevOps Through the Lens of Boundary Objects
Matthies, C.; Heinrich, R.; Wohlrab, R.
2023. EASE ’23: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 12–21, Association for Computing Machinery (ACM). doi:10.1145/3593434.3593441 -
On Extend-Only Directed Posets and Derived Byzantine-Tolerant Replicated Data Types
Jacob, F.; Hartenstein, H.
2023. PaPoC ’23: 10th Workshop on Principles and Practice of Consistency for Distributed Data Rome Italy 8 May 2023.Ed.: E. Gonzalez Boix, 63–69, Association for Computing Machinery (ACM). doi:10.1145/3578358.3591333 -
Holistic Adversarially Robust Pruning
Zhao, Q.; Wressnegger, C.
2023. 11th International Conference on Learning Representations (ICLR), Kigali, 1st-5th May 2023 -
Architecture-Based Uncertainty Impact Analysis to Ensure Confidentiality
Hahner, S.; Heinrich, R.; Reussner, R.
2023. 2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 126–132, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAMS59076.2023.00026 -
BrainNet: Improving Brainwave-based Biometric Recognition with Siamese Networks
Fallahi, M.; Strufe, T.; Arias-Cabarcos, P.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications (PerCom), 53–60, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PERCOM56429.2023.10099367 -
Design-time Performability Evaluation of Runtime Adaptation Strategies (Work In Progress Paper)
Rapp, M.; Scheerer, M.; Reussner, R.
2023. Companion of the 2023 ACM/SPEC International Conference on Performance Engineering, 9–15, Association for Computing Machinery (ACM). doi:10.1145/3578245.3585028 -
Applying Differential Privacy to Medical Questionnaires
Appenzeller, A.; Terzer, N.; Philipp, P.; Beyerer, J.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 608–613, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops56833.2023.10150373 -
Model-based Confidentiality Analysis under Uncertainty
Hahner, S.; Bitschi, T.; Walter, M.; Bureš, T.; Hnětynka, P.; Heinrich, R.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), 256–263, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00062 -
Automatic Derivation of Vulnerability Models for Software Architectures
Kirschner, Y. R.; Walter, M.; Bossert, F.; Heinrich, R.; Koziolek, A.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), L’Aquila, Italy, 13-17 March 2023, 276–283, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00065 -
Detecting Inconsistencies in Software Architecture Documentation Using Traceability Link Recovery
Keim, J.; Corallo, S.; Fuchß, D.; Koziolek, A.
2023. 20th IEEE International Conference on Software Architecture (ICSA), 141–152, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA56044.2023.00021 -
A First Complete Algorithm for Real Quantifier Elimination in Isabelle/HOL
Kosaian, K.; Tan, Y. K.; Platzer, A.
2023. Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs, 211–224, Association for Computing Machinery (ACM). doi:10.1145/3573105.3575672 -
Designing Automotive Case Studies for Architectural Security Analyses
Boltz, N.; Walter, M.; Gerking, C.
2023. 14th Symposium on Software Performance 2023 (SSP 2023), Karlsruhe, 6th-8th November 2023, 23–25 -
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from VOLE-in-the-Head
Baum, C.; Braun, L.; Saint Guilhem, C. D. De; Klooß, M.; Orsini, E.; Roy, L.; Scholl, P.
2023. Advances in Cryptology – CRYPTO 2023 – 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V. Ed.: H. Handschuh, 581–615, Springer Nature Switzerland. doi:10.1007/978-3-031-38554-4_19 -
Identifying Performance Challenges in Consistency Preserving View-Based Environments
König, L.; Weber, T.
2023. Softwaretechnik-Trends, 14th Symposium on Software Performance 2023, Karlsruhe, 6th - 8th November 2023, 26–28, Gesellschaft für Informatik (GI) -
Composable Long-Term Security with Rewinding
Berger, R.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
2023. Theory of Cryptography – 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part IV. Ed.: G. Rothblum, 510 – 541, Springer Nature Switzerland. doi:10.1007/978-3-031-48624-1_19 -
Explanation-Aware Backdoors in a Nutshell
Noppel, M.; Wressnegger, C.
2023. Proc. of 46th German Conference on Artificial Intelligence (KI) -
On Evasion of Machine Learning-based Intrusion Detection in Smart Grids
Mumrez, A.; Sánchez, G.; Elbez, G.; Hagenmeyer, V.
2023. IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids. doi:10.1109/SmartGridComm57358.2023.10333966 -
Comparative Study on Smart Grid Security Testbeds Using MITRE ATT&CK Matrix
Mumrez, A.; Muhammad M. Roomi; Heng Chuan Tan; Daisuke Mashima; Elbez, G.; Hagenmeyer, V.
2023. 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SmartGridComm57358.2023.10333902 -
Engineering Self-adaptive Microservice Applications: An Experience Report
Riccio, V.; Sorrentino, G.; Camilli, M.; Mirandola, R.; Scandurra, P.
2023. Service-Oriented Computing – 21st International Conference, ICSOC 2023, Rome, Italy, November 28 – December 1, 2023, Proceedings, Part I. Ed.: F. Monti, 227–242, Springer Nature Switzerland. doi:10.1007/978-3-031-48421-6_16 -
Are Formal Contracts a useful Digital Twin of Software Systems?
Schiffl, J.; Weigl, A.
2023. Proceedings of the Workshop on Applications of Formal Methods and Digital Twins co-located with 25th International Symposium on Formal Methods (FM 2023), Ed.: S. Hallerstede, CEUR-WS -
Universally Composable Auditable Surveillance
Fetzer, V.; Klooß, M.; Müller-Quade, J.; Raiber, M.; Rupp, A.
2023. Advances in Cryptology – ASIACRYPT 2023 – 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part II. Ed.: J. Guo, 453 – 487, Springer Nature Singapore. doi:10.1007/978-981-99-8724-5_14 -
Identifying Factors Studied for Voter Trust in E-Voting – Review of Literature
Erb, Y.; Duenas-Cid, D.; Volkamer, M.
2023. E-Vote-ID 2023 -
Voter Perception of Cast-as-Intended Verifiability in the Estonian I-Vote Protocol
Hilt, T.; Sein, K.; Mällo, T.; Willemson, J.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI) -
German Social Elections 2023: An Overview and first Analysis
Hilt, T.; Kulyk, O.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI) -
Practically Efficient Private Set Intersection From Trusted Hardware with Side-Channels
Dörre, F.; Mechler, J.; Müller-Quade, J.
2023. Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Springer-Verlag. doi:10.1007/978-981-99-8730-6_9 -
Static Capability-Based Security for Smart Contracts
Schiffl, J.; Weigl, A.; Beckert, B.
2023. 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 110 – 117, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/DAPPS57946.2023.00024 -
QIn: Enabling Formal Methods to Deal with Quantum Circuits
Klamroth, J.; Beckert, B.; Scheerer, M.; Denninger, O.
2023. 2023 IEEE International Conference on Quantum Software (QSW), Chicago, IL, 2nd - 8th July 2023, 175 – 185, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/QSW59989.2023.00029 -
Uniform Substitution for Dynamic Logic with Communicating Hybrid Programs
Brieger, M.; Mitsch, S.; Platzer, A.
2023. Automated Deduction – CADE 29 – 29th International Conference on Automated Deduction, Rome, Italy, July 1–4, 2023, Proceedings. Ed.: B. Pientka, 96 – 115, Springer Nature Switzerland. doi:10.1007/978-3-031-38499-8_6 -
Automated Integration of Heteregeneous Architecture Information into a Unified Model
Jordan, S.; König, C.; Linsbauer, L.; Schaefer, I.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 83 – 99, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_6 -
Brief Announcement: Let It TEE: Asynchronous Byzantine Atomic Broadcast with n ≥ 2f+1
Leinweber, M.; Hartenstein, H.
2023. 37th International Symposium on Distributed Computing (DISC 2023). Ed.: R. Oshman, 43:1–43:7, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.DISC.2023.43 -
Sparsely-gated Mixture-of-Expert Layers for CNN Interpretability
Pavlitska, S.; Hubschneider, C.; Struppek, L.; Zöllner, J. M.
2023. 2023 International Joint Conference on Neural Networks (IJCNN), 1–10, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IJCNN54540.2023.10191904 -
Automated Reverse Engineering of the Technology-Induced Software System Structure
Kirschner, Y. R.; Keim, J.; Peter, N.; Koziolek, A.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 283–291, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_19 -
Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents
Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Architecture. Ed.: B. Tekinerdogan, 37–53, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_3 -
Disguising Attacks with Explanation-Aware Backdoors
Noppel, M.; Peter, L.; Wressnegger, C.
2023. 2023 IEEE Symposium on Security and Privacy (SP), 664 – 681, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SP46215.2023.10179308 -
Personalized Explanations
Becker, M.
2023. Proceedings of the 2022 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer, 1–10, KIT Scientific Publishing -
A Classification of Software-Architectural Uncertainty Regarding Confidentiality
Hahner, S.; Seifermann, S.; Heinrich, R.; Reussner, R.
2023. E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, 139–160, Springer International Publishing. doi:10.1007/978-3-031-36840-0_8 -
POET: A Self-learning Framework for PROFINET Industrial Operations Behaviour
Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. Tools for Design, Implementation and Verification of Emerging Information Technologies – 17th EAI International Conference, TridentCom 2022, Melbourne, Australia, November 23-25, 2022, Proceedings. Ed.: S. Yu, 3 – 19, Springer Nature Switzerland. doi:10.1007/978-3-031-33458-0_1 -
A Taxonomy for Design Decisions in Software Architecture Documentation
Keim, J.; Hey, T.; Sauer, B.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 439–454, Springer International Publishing. doi:10.1007/978-3-031-36889-9_29 -
Analysis and Prevention of Averaging Attacks Against Obfuscation Protocols
Becher, K.; Lagodzinski, J. A. G.; Parra-Arnau, J.; Strufe, T.
2023. Applied Cryptography and Network Security – 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part I. Ed.: M. Tibouchi, 451 – 475, Springer Nature Switzerland. doi:10.1007/978-3-031-33488-7_17 -
Establishing a Benchmark Dataset for Traceability Link Recovery Between Software Architecture Documentation and Models
Fuchß, D.; Corallo, S.; Keim, J.; Speit, J.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops, Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 455–464, Springer International Publishing. doi:10.1007/978-3-031-36889-9_30 -
Tool-Based Attack Graph Estimation and Scenario Analysis for Software Architectures
Walter, M.; Reussner, R.
2023. Software Architecture : ECSA 2022 Tracks and Workshops. Ed.: T. Batista, 45–61, Springer International Publishing. doi:10.1007/978-3-031-36889-9_5 -
Automating GUI-based Software Testing with GPT-3
Zimmermann, D.; Koziolek, A.
2023. 2023 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 62 – 65, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSTW58534.2023.00022 -
Sender-binding Key Encapsulation
Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2023. Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I. Ed.: A. Boldyreva, 744 – 773, Springer Nature Switzerland. doi:10.1007/978-3-031-31368-4_26 -
Refinements of Hybrid Dynamical Systems Logic
Platzer, A.
2023. Rigorous State-Based Methods – 9th International Conference, ABZ 2023, Nancy, France, May 30–June 2, 2023, Proceedings. Ed.: U. Glässer, 3 – 14, Springer Nature Switzerland. doi:10.1007/978-3-031-33163-3_1 -
Adversarial Vulnerability of Temporal Feature Networks for Object Detection
Pavlitskaya, S.; Polley, N.; Weber, M.; Zöllner, J. M.
2023. Computer Vision – ECCV 2022 Workshops. Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part V, Ed.: L. Karlinsky, 510–525, Springer Nature Switzerland. doi:10.1007/978-3-031-25072-9_35 -
Council of Europe Guidelines on the Use of ICT in Electoral Processes
Driza Maurer, A.; Volkamer, M.; Krimmer, R.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 585–599, Springer International Publishing. doi:10.1007/978-3-031-25460-4_34 -
Why Is Online Voting Still Largely a Black Box?
Kirsten, M.; Volkamer, M.; Beckert, B.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 555–567, Springer International Publishing. doi:10.1007/978-3-031-25460-4_32 -
Evaluation Methods and Replicability of Software Architecture Research Objects
Konersmann, M.; Kaplan, A.; Kühn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2023. Software Engineering 2023 : Fachtagung des GI-Fachbereichs Softwaretechnik : 20.-24. Februar 2023 Paderborn. Ed.: G. Engels; M. Tichy, 75–76, Gesellschaft für Informatik (GI) -
SoK: Differentially Private Publication of Trajectory Data
Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies, 496–516, De Gruyter. doi:10.56553/popets-2023-0065 -
Randomness is the Root of All Evil: More Reliable Evaluation of Deep Active Learning
Ji, Y.; Kaestner, D.; Wirth, O.; Wressnegger, C.
2023. 2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 3932–3941, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WACV56688.2023.00393 -
SWaTEval: An Evaluation Framework for Stateful Web Application Testing
Borcherding, A.; Penkov, N.; Giraud, M.; Beyerer, J.
2023. Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP, 430–441, SciTePress. doi:10.5220/0011652200003405 -
Identifizierung von Vertraulichkeitsproblemen mithilfe von Angriffsausbreitung auf Architektur
Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Engineering 2023. Hrsg.: R. Engels, 123–124, Gesellschaft für Informatik (GI) -
Secure Provisioning of OPC UA Applications Using the Asset Administration Shell
Meier, D.; Vogl, J.; Kohnhäuser, F.; Beyerer, J.
2023. 2022 IEEE 17th Conference on Industrial Electronics and Applications (ICIEA), 144–149, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICIEA54703.2022.10005899 -
MIDA: Micro-flow Independent Detection of DDoS Attacks with CNNs
Kopmann, S.; Heseding, H.; Zitterbart, M.
2023. Advances in Service-Oriented and Cloud Computing : International Workshops of ESOCC 2022, Wittenberg, Germany, March 22-24, 2022, Revised Selected Papers. Ed.: C. Zirpins, 32–43, Springer International Publishing. doi:10.1007/978-3-031-23298-5_3 -
Understanding Person Identification through Gait
Hanisch, S.; Muschter, E.; Hatzipanayioti, A.; Li, S.-C.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), 177–189. doi:10.56553/popets-2023-0011 -
"Surprised, Shocked, Worried": User Reactions to Facebook Data Collection from Third Parties
Arias-Cabarcos, P.; Kjalili, S.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open. doi:10.56553/popets-2023-0023 -
German Voters’ Attitudes Towards Voting Online with a Verifiable System
Kulyk, O.; Volkamer, M.; Fuhrberg, N.; Berens, B.; Krimmer, R.
2023. Financial Cryptography and Data Security. FC 2022 International Workshops – CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers, Ed.: S. Matsuo, 33 –350, Springer International Publishing. doi:10.1007/978-3-031-32415-4_23 -
How to Protect the Public Opinion Against New Types of Bots?
Reubold, J. L.; Escher, S. C.; Wressnegger, C.; Strufe, T.
2022. IEEE International Conference on Big Data, 1671–1680, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BigData55660.2022.10020758 -
Token-based plagiarism detection for metamodels
Sağlam, T.; Hahner, S.; Wittler, J. W.; Kühn, T.
2022. MODELS ’22: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion ProceedingsOctober 2022, 138–141, Association for Computing Machinery (ACM). doi:10.1145/3550356.3556508 -
Sharp: Short Relaxed Range Proofs
Couteau, G.; Goudarzi, D.; Klooß, M.; Reichle, M.
2022. CCS ’22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Ed.: H. Yin Conference: CCS ’22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA November 7 - 11, 2022, 609–622, Association for Computing Machinery (ACM). doi:10.1145/3548606.3560628 -
La Publicación de Trayectorias: un Estudio sobre la Protección de la Privacidad
Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2022. Proceedings of the XVII Spanish Meeting on Cryptology and Information Security (RECSI), Santader, 19th - 21st October, 2022. doi:10.22429/Euc2022.028 -
Design and Evaluation of an Anti-Phishing Artifact Based on Useful Transparency
Beckmann, C.; Berens, B.; Kühl, N.; Mayer, P.; Mossano, M.; Volkamer, M.
2022. International Workshop on Socio-Technical Aspects in Security -
Datenschutzkonforme Weitergabe von Versichertendaten aus dem Forschungsdatenzentrum
Orak, B.; Krempel, E.; Appenzeller, A.
2022. D. Demmler, D. Krupka & H. Federrath (Hrsg.), INFORMATIK 2022 Hrsg.: Demmler, Daniel AND Federrath, Hannes, Daniel AND Krupka, 533–549, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_45 -
ReCEIF: Reinforcement Learning-Controlled Effective Ingress Filtering
Heseding, H.; Zitterbart, M.
2022. 2022 IEEE 47th Conference on Local Computer Networks (LCN), 106–113, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN53696.2022.9843478 -
HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic
Kopmann, S.; Heseding, H.; Zitterbart, M.
2022. 2022 IEEE 47th Conference on Local Computer Networks (LCN), 90–97, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN53696.2022.9843465 -
PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren für Virtual Reality Head-Mounted Displays
Länge, T.; Matheis, P.; Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Mensch und Computer 2022 - Workshopband. Ed.: K. Marky, Gesellschaft für Informatik (GI). doi:10.18420/muc2022-mci-ws01-462 -
Cookie Disclaimers: Impact of Design and Users’ Attitude
Berens, B. M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2022. Proceedings of the 17th International Conference on Availability, Reliability and Security, 1–20, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539008 -
Handling Environmental Uncertainty in Design Time Access Control Analysis
Boltz, N.; Hahner, S.; Walter, M.; Seifermann, S.; Heinrich, R.; Bures, T.; Hnetynka, P.
2022. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Gran Canaria, Spain, 31 August 2022 - 02 September 2022, 382–389, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA56994.2022.00067 -
Why Users (Don’t) Use Password Managers at a Large Educational Institution
Mayer, P.; Munyendo, C. W.; Mazurek, M. L.; Aviv, A. J.
2022. 31st USENIX Security Symposium (USENIX Security 22), 1849–1866, USENIX Association -
"I don’t know why I check this...’’ - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks
Mayer, P.; Poddebniak, D.; Fischer, K.; Brinkmann, M.; Somorovsky, J.; Sasse, M. A.; Schinzel, S.; Volkamer, M.
2022. Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 77–96, USENIX Association -
On the Applicability of Payment Channel Networks for Allocation of Transport Ticket Revenues
Grundmann, M.; von Zastrow-Marcks, O.; Hartenstein, H.
2022. Proceedings - International Conference on Computer Communications and Networks, ICCCN : 31st International Conference on Computer Communications and Networks, ICCCN 2022, Virtual, Online, 25 - 28 July 2022, 7 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCCN54977.2022.9868881 -
Non-Uniform Adversarially Robust Pruning
Zhao, Q.; Königl, T.; Wressnegger, C.
2022. Proc. of the 1st International Conference on Automated Machine Learning (AutoML) -
Design-time Performability Optimization of Runtime Adaptation Strategies
Rapp, M.; Scheerer, M.; Reussner, R.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 113–120, Association for Computing Machinery (ACM). doi:10.1145/3491204.3527471 -
Towards Private Medical Data Donations by Using Privacy Preserving Technologies
Appenzeller, A.; Terzer, N.; Krempel, E.; Beyerer, J.
2022. The15th International Conference on PErvasive Technologies Related to Assistive Environments, 446–454, Association for Computing Machinery (ACM). doi:10.1145/3529190.3534768 -
Classification of Software Engineering Contributions to Support Validation Techniques and Research Applications
Kaplan, A.
2022. The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 323–328, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535345 -
Verifying Payment Channels with TLA+
Grundmann, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–3, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805487 -
On the Peer Degree Distribution of the Bitcoin P2P Network
Grundmann, M.; Baumstark, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–5, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805511 -
Reproducibility and Replicability of Web Measurement Studies
Demir, N.; Große-Kampmann, M.; Urban, T.; Wressnegger, C.; Holz, T.; Pohlmann, N.
2022. WWW ’22: Proceedings of the ACM Web Conference 2022. Ed.: F. Laforest, 533–544, Association for Computing Machinery (ACM). doi:10.1145/3485447.3512214 -
Phishing awareness and education – When to best remind?
Berens, B. M.; Dimitrova, K.; Mossano, M.; Volkamer, M.
2022. Symposium on Usable Security and Privacy (USEC), co-located with the Network and Distributed System Security Symposium (NDSS 2022), San Diego, CA, April 23, 2022. doi:10.14722/usec.2022.23075 -
The Smart Grid: A Use-Case for Large-Scale SDN Deployment
Neumeister, F.; Zitterbart, M.
2022. 3. KuVS Fachgespräch "Network Softwarization" (7.4. - 8.4.2022). 3. KuVS Fachgespräch "Network Softwarization" (online) 7./8.4.2022, Universitätsbibliothek Tübingen. doi:10.15496/publikation-67443 -
Reinforcement Learning-Controlled Mitigation of Volumetric DDoS Attacks
Heseding, H.
2022. C. Wressnegger, D. Reinhardt, T. Barber, B. C. Witt, D. Arp & Z. Mann (Hrsg.), SICHERHEIT 2022 Hrsg.: Wressnegger, Christian; Reinhardt, Delphine; Barber, Thomas; Witt, Bernhard C.; Arp, Daniel; Mann, Zoltan, 237–242, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_20 -
Transparency for Bystanders in IoT regarding audiovisual Recordings
Escher, S.; Etzrodt, K.; Weller, B.; Kopsell, S.; Strufe, T.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops): 21–25 March 2022, Pisa, Italy, 649–654, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767212 -
Replication Package of "Evaluation Methods and Replicability of Software Architecture Research Objects"
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; Al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 58, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00021 -
Architectural Pen-Test Generation and Vulnerability Prediction for Cyber-Physical Systems
Walter, T.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 45–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00016 -
Evaluation Methods and Replicability of Software Architecture Research Objects
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), Honolulu, HI, USA, 12-15 March 2022, 157–168, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00023 -
Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022. IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 12 -15 March 2022, Honolulu, HI, USA, 59, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00022 -
Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), 12 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00009 -
Unified Operations for Variability in Space and Time
Ananieva, S.; Greiner, S.; Krueger, J.; Linsbauer, L.; Gruener, S.; Kehrer, T.; Kuehn, T.; Seidl, C.; Reussner, R.
2022. Proceedings of the 16th International Working Conference on Variability Modelling of Software-Intensive Systems, 1–10, Association for Computing Machinery (ACM). doi:10.1145/3510466.3510483 -
Continuous Secure Software Development and Analysis
Schulz, S.; Reiche, F.; Hahner, S.; Schiffl, J.
2022. Symposium on Software Performance 2021 : Short Paper Proceedings of Symposium on Software Performance, Leipzig, Germany, November 9.-10., 2021. Ed.: D. G. Reichelt, R. Müller, S. Becker, W. Hasselbring, A. v. Hoorn, S. Kounev, A. Koziolek, R. Reussner, RWTH Aachen -
Beauty and the Beast – A Case Study on Performance Prototyping of Data-Intensive Containerized Cloud Applications
Klinaku, F.; Rapp, M.; Henss, J.; Rhode, S.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 53–60, Association for Computing Machinery (ACM). doi:10.1145/3491204.3527482 -
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules
Doerner, D.; Mechler, J.; Müller-Quade, J.
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 83–99, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_05 -
Model-Based Fault Classification for Automotive Software
Becker, M.; Meyer, R.; Runge, T.; Schaefer, I.; van der Wall, S.; Wolff, S.
2022. Programming Languages and Systems: 20th Asian Symposium, APLAS 2022, Auckland, New Zealand, December 5, 2022, Proceedings. Ed.: I. Sergey, 110–131, Springer Nature Switzerland. doi:10.1007/978-3-031-21037-2_6 -
Responsible Human-Robot Interaction with Anthropomorphic Service Robots: State of the Art of an Interdisciplinary Research Challenge
Stock-Homburg, R. M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; Rawal, N.; David, K.; Wendt, J.; Spiecker genannt Döhmann, I.; Stryk, O. von; Hannig, M.; Knof, M.
2022. Proceedings of the 55th Annual Hawaii International Conference on System Sciences : January 3-7, 2022. Ed.: T. X. Bui, 2065–2074, University of Hawaii. doi:10.24251/HICSS.2022.260 -
Optimal human labelling for anomaly detection in industrial inspection
Zander, T.; Ziyan, P.; Birnstill, P.; Beyerer, J.
2022. Forum Bildverarbeitung 2022. Ed.: T. Längle, 49–59, KIT Scientific Publishing -
Fiat-Shamir Transformation of Multi-round Interactive Proofs
Attema, T.; Fehr, S.; Klooß, M.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Ed.: E. Kiltz, 113–142, Springer Nature Switzerland. doi:10.1007/978-3-031-22318-1_5 -
Anonymous Whistleblowing over Authenticated Channels
Agrikola, T.; Couteau, G.; Maier, S.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Ed.: E. Kiltz, 685–714, Springer Nature Switzerland. doi:10.1007/978-3-031-22365-5_24 -
Efficient Public Verification of Confidential Supply-Chain Transactions
Becher, K.; Schäfer, M.; Schröpfer, A.; Strufe, T.
2022. 2022 IEEE Conference on Communications and Network Security (CNS), 308–316, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CNS56114.2022.9947231 -
Uncertainty in coupled models of cyber-physical systems
Acosta, M.; Hahner, S.; Koziolek, A.; Kühn, T.; Mirandola, R.; Reussner, R.
2022. Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 569–578, Association for Computing Machinery (ACM). doi:10.1145/3550356.3561539 -
Towards a Usable and Sustainable Deductive Verification Tool
Beckert, B.; Bubel, R.; Hähnle, R.; Ulbrich, M.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 281–300, Springer Nature Switzerland. doi:10.1007/978-3-031-19756-7_16 -
Runtime Verification of Correct-by-Construction Driving Maneuvers
Kittelmann, A.; Runge, T.; Bordis, T.; Schaefer, I.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part I. Ed.: T. Margaria, 242–263, Springer International Publishing. doi:10.1007/978-3-031-19849-6_15 -
Decentralizing Watchtowers for Payment Channels using IPFS
Bonisch, H.; Grundmann, M.
2022. 2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW), 27–32, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICDCSW56584.2022.00015 -
CrossTest: a cross-domain physical testbed environment for cybersecurity performance evaluations
Karch, M.; Rösch, D.; André, K.; Meshram, A.; Haas, C.; Nicolai, S.
2022. 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA), 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA52439.2022.9921672 -
Early Detection of GOOSE Denial of Service (DoS) Attacks in IEC 61850 Substations
Elbez, G.; Nahrstedt, K.; Hagenmeyer, V.
2022. IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids 2022. doi:10.1109/SmartGridComm52983.2022.9961042 -
Modeling and Enforcing Access Control Policies for Smart Contracts
Töberg, J.-P.; Schiffl, J.; Reiche, F.; Beckert, B.; Heinrich, R.; Reussner, R.
2022. Conference Proceedings: 2022 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 38–47, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/DAPPS55202.2022.00013 -
Cyber threat intelligence enabled automated attack incident response
Kaiser, F. K.; Andris, L.; Tenning, T.; Iser, J.; Wiens, M.; Schultmann, F.
2022. 2022 3rd International Conference on Next Generation Computing Applications (NextComp), IEEE, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NextComp55567.2022.9932254 -
Attuning Adaptation Rules via a Rule-Specific Neural Network
Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Proceedings. Vol. 3. Ed.: T. Margaria, 215–230, Springer Nature Switzerland. doi:10.1007/978-3-031-19759-8_14 -
Generalized Test Tables: A Domain-Specific Specification Language for Automated Production Systems
Beckert, B.; Ulbrich, M.; Vogel-Heuser, B.; Weigl, A.
2022. Theoretical Aspects of Computing – ICTAC 2022 – 19th International Colloquium, Tbilisi, Georgia, September 27–29, 2022, Proceedings. Ed.: H. Seidl, 7–13, Springer International Publishing. doi:10.1007/978-3-031-17715-6_2 -
Information Flow Control-by-Construction for an Object-Oriented Language
Runge, T.; Kittelmann, A.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. Software Engineering and Formal Methods – 20th International Conference, SEFM 2022, Berlin, Germany, September 26–30, 2022, Proceedings. Ed.: B.-H. Schlingloff, 209–226, Springer International Publishing. doi:10.1007/978-3-031-17108-6_13 -
A Model-Based Framework for Simplified Collaboration of Legal and Software Experts in Data Protection Assessments
Boltz, N.; Sterz, L.; Gerking, C.; Raabe, O.
2022. INFORMATIK 2022, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik. Ed.: D. Demmler, 521–532, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_44 -
Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
Grundmann, M.; Amberg, H.; Baumstark, M.; Hartenstein, H.
2022. Financial Cryptography and Data Security – 26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers. Ed.: I. Eyal, 694–704, Springer International Publishing. doi:10.1007/978-3-031-18283-9_35 -
A Refactoring for Data Minimisation Using Formal Verification
Lanzinger, F.; Ulbrich, M.; Weigl, A.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 345–364, Springer Nature Switzerland. doi:10.1007/978-3-031-19756-7_19 -
Accurate Performance Predictions with Component-Based Models of Data Streaming Applications
Werle, D.; Seifermann, S.; Koziolek, A.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 83–98, Springer International Publishing. doi:10.1007/978-3-031-16697-6_6 -
Towards an integrated approach for managing the variability and evolution of both software and hardware components
Wittler, J. W.; Kühn, T.; Reussner, R.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference - Volume B Ed.: A. Felfernig, 94–98, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547059 -
Membership Inference Attack Against Principal Component Analysis
Zari, O.; Parra-Arnau, J.; Ünsal, A.; Strufe, T.; Önen, M.
2022. Privacy in Statistical Databases – International Conference, PSD 2022, Paris, France, September 21–23, 2022, Proceedings. Ed.: J. Domingo-Ferrer, 269–282, Springer International Publishing. doi:10.1007/978-3-031-13945-1_19 -
ARCHI4MOM: Using Tracing Information to Extract the Architecture of Microservice-Based Systems from Message-Oriented Middleware
Singh, S.; Werle, D.; Koziolek, A.
2022. Software Architecture : 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos., 189–204, Springer International Publishing. doi:10.1007/978-3-031-16697-6_14 -
Individual Verifiability with Return Codes: Manipulation Detection Efficacy
Thürwächter, P. T.; Volkamer, M.; Kulyk, O.
2022. Electronic Voting – 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4–7, 2022, Proceedings. Ed.: R. Krimmer, 139–156, Springer International Publishing. doi:10.1007/978-3-031-15911-4_9 -
A Cross-Disciplinary Process Modelling Language for Validating Reconfigured Production Processes
Koch, S.; Wunderlich, T.; Hansert, J.; Schlegel, T.; Ihlenfeldt, S.; Heinrich, R.
2022. Modellierung 2022 : 27.06.-01.07.2022 Hamburg, Germany. Ed.: Matthias Riebisch, 181–190, Köllen Druck+Verlag. doi:10.18420/modellierung2022-004 -
Toward Awareness Creation of Common Challenges Women are Facing in Academia: A Study from a German Perspective
Corallo, S.; Mazkatli, M.; Rapp, M.; Hajiabadi, H.; Kaplan, A.; Kuehn, R.; Schmid, L.; Singh, S.
2022. Software Architecture – 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021, Revised Selected Papers. Ed.: P. Scandurra, 47–62, Springer International Publishing. doi:10.1007/978-3-031-15116-3_3 -
Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Security Gründen
Müllmann, D.; Veit, M. F.; Volkamer, M.
2022. Informatik 2022. Hrsg.: D. Demmler, 601–615, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_49 -
Synchronizing software variants: A two-dimensional approach
König, C.; Rosiak, K.; Linsbauer, L.; Schaefer, I.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference (SPLC ’22), Graz, A, 12.-16. September 2022. Ed.: A. Felfernig. Vol. B, 82–89, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547053 -
Architectural Optimization for Confidentiality Under Structural Uncertainty
Walter, M.; Hahner, S.; Seifermann, S.; Bures, T.; Hnetynka, P.; Pacovský, J.; Heinrich, R.
2022. Software Architecture : 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021 : Revised Selected Papers. Ed.: P. Scandurra, 309–332, Springer Nature Switzerland. doi:10.1007/978-3-031-15116-3_14 -
Grasping the Concept of Decentralized Systems for Instant Messaging
Gebhardt, L.; Leinweber, M.; Jacob, F.; Hartenstein, H.
2022. Proceedings of the 17th Workshop in Primary and Secondary Computing Education, Art.-Nr. 10, Association for Computing Machinery (ACM). doi:10.1145/3556787.3556864 -
Shoulder-Surfing Resistant Authentication for Augmented Reality
Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Nordic Human Computer Interaction Conference (NordiCHI ’22), Art.Nr. 29, ACM Digital Library. doi:10.1145/3546155.3546663 -
Increasing security without decreasing usability: A comparison of various verifiable voting systems
Volkamer, M.; Kulyk, O.; Ludwig, J.; Fuhrberg, N.
2022. Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS 2022), Boston, MA, August 8-9, 2022, 233–252, USENIX Association -
Towards Heterogeneous Remote Attestation Protocols
Wagner, P. G.; Beyerer, J.
2022. Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT. Vol. 1. Ed.: S. De Capitani di Vimercati, 586–591, SciTePress. doi:10.5220/0011289000003283 -
Feature-based Investigation of Simulation Structure and Behaviour
Koch, S.; Hamann, E.; Heinrich, R.; Reussner, R.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 178–185, Springer. doi:10.1007/978-3-031-16697-6_13 -
Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks
Borcherding, A.; Takacs, P.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy, 334–344, SciTePress. doi:10.5220/0010806300003120 -
Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks
Borcherding, A.; Feldmann, L.; Karch, M.; Meshram, A.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, 314–325, SciTePress. doi:10.5220/0010795900003120 -
Anonymizing Trajectory Data: Limitations and Opportunities
Guerra-Balboa, P.; Miranda-Pascual, À.; Strufe, T.; Parra-Arnau, J.; Forné, J.
2022. AAAI Workshop on Privacy-Preserving Artificial Intelligence -
MPER - a Motion Profiling Experiment and Research system for human body movement
Rettlinger, S.; Knaus, B.; Wieczorek, F.; Ivakko, N.; Hanisch, S.; Nguyen, G. T.; Strufe, T.; Fitzek, F. H. P.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy, 21-25 March 2022, 88–90, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767484 -
Conceptualization of a Trust Dashboard for Distributed Usage Control Systems
Wagner, P. G.
2022. Proceedings of the 2021 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory, 169–188, Karlsruher Institut für Technologie (KIT) -
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays
Duezguen, R.; Noah, N.; Mayer, P.; Das, S.; Volkamer, M.
2022. International Conference on Availability, Reliability and Security, ARES 2022, August 23 - August 26, 2022, Vienna, Austria, Art.-No.: 36, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539011 -
Trustworthy Artificial Intelligence
Becker, M.
2022. Proceedings of the 2021 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory, 21–32, Karlsruher Institut für Technologie (KIT) -
Leveraging Distributed Ledger Technology for Decentralized Mobility-as-a-Service Ticket Systems
Leinweber, M.; Kannengießer, N.; Hartenstein, H.; Sunyaev, A.
2022. Towards the New Normal in Mobility : Technische und betriebswirtschaftliche Aspekte. Hrsg.: H. Proff, 547–567, Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-39438-7_32 -
Your Cookie Disclaimer is not in line with the ideas of the GDPR. Why?
Hennig, A.; Dietmann, H.; Lehr, F.; Mutter, M.; Volkamer, M.; Mayer, P.
2022. Human Aspects of Information Security and Assurance. Ed.: N. Clarke, 218–227, Springer-Verlag. doi:10.1007/978-3-031-12172-2_17 -
BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots
Bayreuther, S.; Jacob, F.; Grotz, M.; Kartmann, R.; Peller-Konrad, F.; Paus, F.; Hartenstein, H.; Asfour, T.
2022. SACMAT ’22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesJune 2022, New York NY USA, June 8 - 10, 2022. Ed.: S. Dietrich, 185–194, Association for Computing Machinery (ACM). doi:10.1145/3532105.3535018 -
Introducing an Evaluation Method for Taxonomies
Kaplan, A.; Kühn, T.; Hahner, S.; Benkler, N.; Keim, J.; Fuchß, D.; Corallo, S.; Heinrich, R.; Corallo, S.; Heinrich, R.
2022. EASE 2022: The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 311–316, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535305 -
Quantifying Trustworthiness in Decentralized Trusted Applications
Wagner, P. G.; Beyerer, J.
2022. Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (Sat-CPS’22), 67–76, Association for Computing Machinery (ACM). doi:10.1145/3510547.3517930 -
PREUNN: Protocol Reverse Engineering using Neural Networks
Kiechle, V.; Börsig, M.; Nitzsche, S.; Baumgart, I.; Becker, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy. Ed.: P. Mori. Vol. 1, 345–356, SciTePress. doi:10.5220/0010813500003120 -
Standing out among the daily spam: How to catch website owners’ attention by means of vulnerability notifications
Hennig, A.; Neusser, F.; Pawelek, A. A.; Herrmann, D.; Mayer, P.
2022. Conference on Human Factors in Computing Systems (CHI ’22) : Extended Abstracts, Art.-Nr.: 317, Association for Computing Machinery (ACM). doi:10.1145/3491101.3519847 -
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
Beskorovajnov, W.; Gröll, R.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing. doi:10.1007/978-3-030-97131-1_11 -
SMILE - Smart eMaIl Link Domain Extractor
Mossano, M.; Berens, B.; Heller, P.; Beckmann, C.; Aldag, L.; Mayer, P.; Volkamer, M.
2022. Computer Security. ESORICS 2021 International Workshops – CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers. Ed.: S. Katsikas, 403–412, Springer International Publishing. doi:10.1007/978-3-030-95484-0_23 -
Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings
Byrenheid, M.; Roos, S.; Strufe, T.
2022. ICDCN ’22: Proceedings of the 2022 International Conference on Distributed Computing and Networking ; Jan 4th-7th, 2022, Virtual Conference, 107–116, Association for Computing Machinery (ACM). doi:10.1145/3491003.3491020 -
Recent Developments in the Context of Online Elections and Digital Polls in Germany
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_16 -
Dos and Don’ts of Machine Learning in Computer Security
Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2022. Proc. of the USENIX Security Symposium 2022 -
Towards a Formal Approach for Data Minimization in Programs (Short Paper)
Lanzinger, F.; Weigl, A.
2022. Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers. Ed.: J. Garcia-Alfaro, 161–169, Springer International Publishing. doi:10.1007/978-3-030-93944-1_11 -
Tackling Challenges of Robustness Measures for Autonomous Agent Collaboration in Open Multi-Agent Systems
Jin, D.; Kannengießer, N.; Sturm, B.; Sunyaev, A.
2022. Proceedings of the 55th Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, 03.01.2022-07.01.2022, 7585–7594. doi:10.24251/HICSS.2022.911 -
ETHTID: Deployable Threshold Information Disclosure on Ethereum
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BCCA53669.2021.9657019 -
Architecture Matters: Investigating the Influence of Differential Privacy on Neural Network Design
Morsbach, F.; Dehling, T.; Sunyaev, A.
2021. Presented at NeurIPS 2021 Workshop on Privacy in Machine Learning (PriML 2021), 14.12.2021. doi:10.48550/arXiv.2111.14924 -
Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites
Krisam, C.; Dietmann, H.; Volkamer Melanie; Kulyk, O.
2021. EuroUSEC ’21: European Symposium on Usable Security 2021, Karlsruhe Germany, October 11 - 12, 2021, 8 S., Association for Computing Machinery (ACM). doi:10.1145/3481357.3481516 -
LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems
Kühnapfel, N.; Preußler, S.; Noppel, M.; Schneider, T.; Rieck, K.; Wressnegger, C.
2021. Proceedings of 37th Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 6-10, 2021, 796–811, Association for Computing Machinery (ACM). doi:10.1145/3485832.3485911 -
Need for Change: Business Functions Affected by the Use of Decentralized Information Systems
Heines, R.; Kannengießer, N.; Sturm, B.; Jung, R.; Sunyaev, A.
2021. 42nd International Conference on Information Systems (ICIS), Association for Information Systems (AIS) -
Side-Channel Attacks on Query-Based Data Anonymization
Boenisch, F.; Munz, R.; Tiepelt, M.; Hanisch, S.; Kuhn, C.; Francis, P.
2021. CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 1254–1265, Association for Computing Machinery (ACM). doi:10.1145/3460120.3484751 -
Towards Distributed Healthcare Systems – Virtual Data Pooling Between Cancer Registries as Backbone of Care and Research
Appenzeller, A.; Bartholomaus, S.; Breitschwerdt, R.; Claussen, C.; Geisler, S.; Hartz, T.; Kachel, P.; Krempel, E.; Robert, S.; Zeissig, S. R.
2021. 2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA), Tangier, Morocco, 30 Nov.-3 Dec. 2021, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/AICCSA53542.2021.9686918 -
Coupling Smart Contracts: A Comparative Case Study
Friebe, S.; Stengele, O.; Hartenstein, H.; Zitterbart, M.
2021. 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 27-30 Sept. 2021, 137–144, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BRAINS52497.2021.9569830 -
Usable Verifiable Secrecy-Preserving E-Voting
Kulyk, O.; Ludwig, J.; Volkamer, M.; Koenig, R. E.; Locher, P.
2021. 6th Joint International Conference on Electronic Voting, E-Vote-ID 2021, 5-8 October 2021. Ed.: R. Krimmer ; M. Volkamer, 337–353, University of Tartu Press -
Aspect-Oriented Adaptation of Access Control Rules
Bures, T.; Gerostathopoulos, I.; Hnetynka, P.; Seifermann, S.; Walter, M.; Heinrich, R.
2021. 2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 363–370, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA53835.2021.00054 -
How to Increase Smart Home Security and Privacy Risk Perception
Duezguen, R.; Mayer, P.; Berens, B.; Beckmann, C.; Aldag, L.; Mossano, M.; Volkamer, M.; Strufe, T.
2021. 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 18 - 20 Augus 2021, Shenyang, China, 997–1004, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom53373.2021.00138 -
"Now I’m a bit angry:" Individuals’ Awareness, Perception, and Responses to Data Breaches that Affected Them
Mayer, P.; Zou, Y.; Schaub, F.; Aviv, A. J.
2021. 30th USENIX Security Symposium, Vancouver, CDN, August 11-13, 2021, 393–410, Advanced Computing Systems Association (USENIX) -
A Literature Review on Virtual Reality Authentication
Jones, J. M.; Duezguen, R.; Mayer, P.; Volkamer, M.; Das, S.
2021. Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Ed.: S. Furnell, 189–198, Springer. doi:10.1007/978-3-030-81111-2_16 -
Security in Distributed Ledger Technology: An Analysis of Vulnerabilities and Attack Vectors
Gojka, E.-E.; Kannengießer, N.; Sturm, B.; Bartsch, J.; Sunyaev, A.
2021. Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 3. Ed.: K. Arai, 722–742, Springer. doi:10.1007/978-3-030-80129-8_50 -
Generative Machine Learning for Resource-Aware 5G and IoT Systems
Piatkowski, N.; Mueller-Roemer, J. S.; Hasse, P.; Bachorek, A.; Werner, T.; Birnstill, P.; Morgenstern, A.; Stobbe, L.
2021. 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada, 14-23 June 2021, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCWorkshops50388.2021.9473625 -
CPIQ - A Privacy Impact Quantification for Digital Medical Consent
Appenzeller, A.; Kadow, T.; Krempel, E.; Beyer, J.
2021. PETRA ’21: The 14th PErvasive Technologies Related to Assistive Environments Conference Corfu Greece 29 June, 2021- 2 July, 2021, 534–543, Association for Computing Machinery (ACM). doi:10.1145/3453892.3461653 -
Towards Correct Smart Contracts: A Case Study on Formal Verification of Access Control
Schiffl, J.; Grundmann, M.; Leinweber, M.; Stengele, O.; Friebe, S.; Beckert, B.
2021. SACMAT ’21: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 125–130, Association for Computing Machinery (ACM). doi:10.1145/3450569.3463574 -
Towards extraction of message-based communication in mixed-technology architectures for performance model
Singh, S.; Kirschner, Y. R.; Koziolek, A.
2021. ICPE ’21: Companion of the ACM/SPEC International Conference on Performance Engineering, 133–138, Association for Computing Machinery (ACM). doi:10.1145/3447545.3451201 -
Adversarial Robust Model Compression using In-Train Pruning
Vemparala, M. R.; Fasfous, N.; Frickenstein, A.; Sarkar, S.; Zhao, Q.; Kuhn, S.; Frickenstein, L.; Singh, A.; Unger, C.; Nagaraja, N. S.; Wressnegger, C.; Stechele, W.
2021. CVPR 3rd Workshop on Safe Artificial Intelligence for Automated Driving (SAIAD), June 19, 2021, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CVPRW53098.2021.00016 -
Dealing with Uncertainty in Architectural Confidentiality Analysis
Hahner, S.
2021. Proceedings of the Software Engineering 2021 Satellite Events, 1–6, Gesellschaft für Informatik (GI) -
Preface to the 3rd Multi-Paradigm Modeling for Cyber-Physical Systems (MPM4CPS 2021)
Amrani, M.; Blouin, D.; Challenger, M.; Deantoni, J.; Heinrich, R.; Wimmer, M.
2021. 24th International Conference on Model-Driven Engineering Languages and Systems: MODELS 2021 ; 10-15 October 2021, Virtual Event, 284–285, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C53483.2021.00049 -
Towards the Co-Evolution of Models and Artefacts of Industrial Tools Through External Views
Sağlam, T.; Kühn, T.
2021. 2021 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Fukuoka, J, October 10-15, 2021, 410–416, IEEEXplore. doi:10.1109/MODELS-C53483.2021.00064 -
Upper Bound Computation of Information Leakages for Unbounded Recursion
Bechberger, J.; Weigl, A.
2021. Software Engineering and Formal Methods: 19th International Conference, SEFM 2021, Virtual Event, December 6–10, 2021, Proceedings. Ed.: R. Calinescu, 160–177, Springer-Verlag. doi:10.1007/978-3-030-92124-8_10 -
Onion Routing with Replies
Kuhn, C.; Hofheinz, D.; Rupp, A.; Strufe, T.
2021. Advances in Cryptology – ASIACRYPT 2021 – 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 573–604, Springer International Publishing. doi:10.1007/978-3-030-92075-3_20 -
Black-Box Accumulation Based on Lattices
Faller, S. H.; Baumer, P.; Klooß, M.; Koch, A.; Ottenhues, A.; Raiber, M.
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer. doi:10.1007/978-3-030-92641-0_11 -
Angriffserkennungssysteme in ICS Netzwerken
Kippe, J.; Karch, M.
2021. Deutschland, Digital, Sicher : 30 Jahre BSI : Tagungsband zum 17. Deutschen IT-Sicherheitskongress, 1–11, SecuMedia Verlag -
A Secure Cell-Attachment Procedure of LDACS
Maurer, N.; Graupl, T.; Gentsch, C.; Guggemos, T.; Tiepelt, K. M.; Schmitt, C.; Rodosek, G. D.
2021. Proceedings 2021 IEEE European Symposium on Security and Privacy Workshops, EuroS&PW 2021: Virtual Conference, 6-10 September 2021, 113–122, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW54576.2021.00019 -
Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance
Arias-Cabarcos, P.; Habrich, T.; Becker, K.; Becker, C.; Strufe, T.
2021. Proceedings of the 30th USENIX Security Symposium : August 11-13, 2021, 55–72, USENIX Association -
2PPS – Publish/Subscribe with Provable Privacy
Abdelwahab Gaballah, S.; Coijanovic, C.; Strufe, T.; Mühlhäuser, M.
2021. 40th International Symposium on Reliable Distributed Systems (SRDS), Chicago, IL, USA, 20-23 Sept. 2021. Vol.: 1, 198–209, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SRDS53918.2021.00028 -
On Expected Polynomial Runtime in Cryptography
Klooß, M.
2021. Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 558–590, Springer International Publishing. doi:10.1007/978-3-030-90459-3_19 -
Classifying and Avoiding Compatibility Issues in Networks of Bidirectional Transformations
Sağlam, T.; Klare, H.
2021. STAF 2021 Workshop Proceedings: 9th International Workshop on Bidirectional Transformations. Hrsg.: Ludovico Lovino, Lars Michael Kristensen, 34–53, CEUR-WS.org -
Tackling Problems of Maintenance and Evolution in Industry 4.0 Scenarios Using a Distributed Architecture
Koch, S.; Wunderlich, T.; Hansert, J.; Heinrich, R.; Schlegel, T.
2021. SE-SE 2021 - Software Engineering 2021 Satellite Events - Workshops and Tools & Demos - Proceedings of the Software Engineering 2021 Satellite Events, Braunschweig/Virtual, Germany, February 22 - 26, 2021. Ed.: S. Götz, CEUR-WS -
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions
Broadnax, B.; Mechler, J.; Müller-Quade, J.
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25 -
Identifying confidentiality violations in architectural design using palladio
Seifermann, S.; Walter, M.; Hahner, S.; Heinrich, R.; Reussner, R.
2021. W. D. W. D. Heinrich R. Mirandola R. (Hrsg.), 15th European Conference on Software Architecture - Companion (ECSA-C 2021), Virtual online (originally: Växjö, Sweden), September, 13-17, 2021. Ed.: R. Heinrich, Code 172547, CEUR-WS.org -
Deductive Verification of Floating-Point Java Programs in KeY
Abbasi, R.; Schiffl, J.; Darulova, E.; Ulbrich, M.; Ahrendt, W.
2021. Tools and Algorithms for the Construction and Analysis of Systems : 27th International Conference, TACAS 2021, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021, Luxembourg City, Luxembourg, March 27 – April 1, 2021, Proceedings, Part II. Ed.: J. F. Groote, 242–261, Springer International Publishing. doi:10.1007/978-3-030-72013-1_13 -
Effective Notification Campaigns on the Web : A matter of Trust, Framing, and Support
Maass, M.; Stöver, A.; Pridöhl, H.; Bretthauer, S.; Herrmann, D.; Hollick, M.; Spiecker gen. Döhmann, I.
2021. Proceedings of the 30th USENIV Security Symposium, 2489–2506, USENIX Association -
Recht und Technik: Datenschutz im Diskurs
Grimm, R.; Hornung, G.; Sorge, C.; Spiecker gen. Döhmann, I.
2021. Informatik 2020: Fachtagung vom 28. September–2. Oktober 2020 Karlsruhe. Hrsg.: R. H. Reussner, 813–814, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_72 -
Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis
Patzer, F.; Beyerer, J.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Hrsg:. Paolo Mori, Gabriele Lenzini, Steven Furnell, 550–557, SciTePress. doi:10.5220/0010285305500557 -
Architectural Access Control Policy Refinement and Verification under Uncertainty
Hahner, S.
2021. 15th European Conference on Software Architecture - Companion (ECSA-C 2021), Virtual online (originally: Växjö, Sweden), September, 13-17, 2021. Ed.: R. Heinrich, RWTH Aachen -
On Forging SPHINCS
-Haraka Signatures on a Fault-Tolerant Quantum Computer
Berger, R. M.; Tiepelt, M.
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing. doi:10.1007/978-3-030-88238-9_3 -
Quantifying Software Reliability via Model-Counting
Teuber, S.; Weigl, A.
2021. Quantitative Evaluation of Systems: 18th International Conference, QEST 2021, Paris, France, August 23–27, 2021, Proceedings. Ed.: A. Abate, 59–79, Springer-Verlag. doi:10.1007/978-3-030-85172-9_4 -
Trace Link Recovery for Software Architecture Documentation
Keim, J.; Schulz, S.; Fuchß, D.; Kocher, C.; Speit, J.; Koziolek, A.
2021. Software Architecture. Ed.: S. Biffl, 101–116, Springer-Verlag. doi:10.1007/978-3-030-86044-8_7 -
Plausible Deniability for Anonymous Communication
Kuhn, C.; Noppel, M.; Wressnegger, C.; Strufe, T.
2021. Proceedings of 20th Workshop on Privacy in the Electronic Society (WPES), Seoul, South Korea, November 15, 2021, 17–32, Association for Computing Machinery (ACM). doi:10.1145/3463676.3485605 -
Putting Privacy into Perspective – Comparing Technical, Legal, and Users’ View of Information Sensitivity
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Informatik 2020 - Back to the future : 50. Jahrestagung der Gesellschaft für Informatik vom 28. September - 2. Oktober 2020, virtual. Ed.: R.H. Reussner, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_76 -
Reconstructing z3 proofs in KeY: There and back again
Pfeifer, W.; Schiffl, J.; Ulbrich, M.
2021. Proceedings of the 23rd ACM International Workshop on Formal Techniques for Java-like Programs : 23rd ACM International Workshop on Formal Techniques for Java-Like Programs, FTfJP 2021, co-located with ECOOP/ISSTA 2021, Online, 13 July 2021 - null, 24–31, Association for Computing Machinery (ACM). doi:10.1145/3464971.3468421 -
Challenges in aligning enterprise application architectures to business process access control requirements in evolutional changes
Pilipchuk, R.; Seifermann, S.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 18th International Conference on e-Business, ICE-B 2021, Virtual, Online, 7 July 2021 - 9 July 2021, 13–24, SciTePress. doi:10.5220/0010511800130024 -
A unified model to detect information flow and access control violations in software architectures
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2021. Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, Virtual, Online, 6 July 2021 - 8 July 2021, 26–37, SciTePress. doi:10.5220/0010515300260037 -
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
Couteau, G.; Klooß, M.; Lin, H.; Reichle, M.
2021. Advances in Cryptology – EUROCRYPT 2021. Ed.: A. Canteaut, 247–277, Springer International Publishing. doi:10.1007/978-3-030-77883-5_9 -
Vision: What Johnny learns about Password Security from Videos posted on YouTube
Christmann, M.; Mayer, P.; Volkamer, M.
2021. European Symposium on Usable Security (EuroUSEC), 11 - 12 Oktober 2021, 124–128, Association for Computing Machinery (ACM). doi:10.1145/3481357.3481528 -
How to Effectively Communicate Benefits of Introducing a Modern Password Policy to Employees in Companies
Christmann, M.; Mayer, P.; Volkamer, M.
2021. Eighteenth Symposium on Usable Privacy and Security, August 7–9, 2022, Boston, MA, USA -
Evaluation der interaktiven NoPhish Präsenzschulung
Berens, B.; Aldag, L.; Volkamer, M.
2021. Mensch und Computer 2021 - Workshopband. Hrsg.: C. Wienrich, Gesellschaft für Informatik (GI). doi:10.18420/muc2021-mci-wsc-394 -
A classification for managing software engineering knowledge
Kaplan, A.; Walter, M.; Heinrich, R.
2021. EASE 2021: Evaluation and Assessment in Software Engineering. Ed.: R. Chitchyan, 340–346, Association for Computing Machinery (ACM). doi:10.1145/3463274.3463357 -
Classifying Usage Control and Data Provenance Architectures
Wagner, P. G.
2021. Proceedings of the 2020 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer; T. Zander, 135–154, KIT Scientific Publishing -
Modeling Data Flow Constraints for Design-Time Confidentiality Analyses
Hahner, S.; Seifermann, S.; Heinrich, R.; Walter, M.; Bures, T.; Hnetynka, P.
2021. Proceedings IEEE 18th International Conference on Software Architecture - Companion: ICSA-C 2021 ; 22 - 26 March 2021 ; virtual conference, 15–21, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C52384.2021.00009 -
Enabling Consistency between Software Artefacts for Software Adaption and Evolution
Monschein, D.; Mazkatli, M.; Heinrich, R.; Koziolek, A.
2021. Proceedings IEEE 18th International Conference on Software Architecture: 22-26 March 2021 ; virtual conference, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA51549.2021.00009 -
TagVet: Vetting Malware Tags using Explainable Machine Learning
Pirch, L.; Warnecke, A.; Wressnegger, C.; Rieck, K.
2021. EuroSec ’21: Proceedings of the 14th European Workshop on Systems Security, 34–40, Association for Computing Machinery (ACM). doi:10.1145/3447852.3458719 -
A Multivariate Characterization and Detection of Software Performance Antipatterns
Avritzer, A.; Britto, R.; Trubiani, C.; Russo, B.; Janes, A.; Camilli, M.; Van Hoorn, A.; Heinrich, R.; Rapp, M.; Henß, J.
2021. ICPE ’21: Proceedings of the ACM/SPEC International Conference on Performance Engineering, 19-23 April 2021, Rennes, France (virtual), 61–72, Association for Computing Machinery (ACM). doi:10.1145/3427921.3450246 -
Finding a Universal Execution Strategy for Model Transformation Networks
Gleitze, J.; Klare, H.; Burger, E.
2021. Fundamental Approaches to Software Engineering. Ed.: E. Guerra, 87–107, Springer International Publishing. doi:10.1007/978-3-030-71500-7_5 -
A Practical Evaluation Method for Misbehavior Detection in the Presence of Selfish Attackers
Wehmer, M.; Baumgart, I.
2021. Proceedings of the 7th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2021), 529–537, SciTePress. doi:10.5220/0010451005290537 -
Automatically extracting business level access control requirements from BPMN Models to align RBAC policies
Pilipchuk, R.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Ed.: P. Mori, 300–307, SciTePress. doi:10.5220/0010184403000307 -
“Healthy surveillance”: Designing a concept for privacy-preserving mask recognition AI in the age of pandemics
Kühl, N.; Martin, D.; Wolff, C.; Volkamer, M.
2021. Hawaii International Conference on Systems Sciences (HICSS-54), January 5-8, 2021, 1–10 -
Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende - Betrachtung möglicher arbeitsrechtlicher Konsequenzen
Müllmann, D.; Volkamer, M.
2021. Informatik 2020 - Back to the future. Hrsg.: R. H. Reussner, 829–840, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_74