Publications
-
Security Analysis of Forward Secure Log Sealing in Journald
Dörre, F.; Ottenhues, A.
2025. International Conference on Applied Cryptography and Network Security, 27 S -
Analytical Evaluation of Time-based Cryptography
Ramadan, M.; Gadekar, P.; Hagenmeyer, V.; Elbez, G.
2025. Title: Proceedings of the 11th International Conference on Information Systems Security and Privacy 2025. Editor: Gabriele Lenzini, Paolo Mori, Steven Furnell (Eds.) -
An Architectural Viewpoint for Benefit-Cost-Risk-Aware Decision-Making in Self-Adaptive Systems
Weyns, D.; Hezavehi, S. M.; Avgeriou, P.; Calinescu, R.; Mirandola, R.; Perez-Palacin, D.
2025. ACM Transactions on Autonomous and Adaptive Systems, 20 (1), 1–65. doi:10.1145/3705612 -
Project Report HSF Research Area 4 -Graphical Authentication on Augmented Reality
Volkamer, M.
2025. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000179759 -
SoK: The past decade of user deception in emails and today’s email clients’ susceptibility to phishing techniques
Veit, M. F.; Wiese, O.; Ballreich, F. L.; Volkamer, M.; Engels, D.; Mayer, P.
2025. Computers & Security, 150, 104197. doi:10.1016/j.cose.2024.104197 -
Manuelles Löschen von Phishing-Nachrichten aus Mitarbeiterpostfächern : Rechtliche und technische Grenzen
Hunter, J. C.; Ballreich, F. L.; Kemmler, K. J.; Volkamer, M.
2025. Zeitschrift für Digitalisierung und Recht (ZfDR), 5 (1), 23–43 -
Voting and verification process using a cast-as-intended verifiability approach with a second device
Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.; Volkamer, M.
2025. doi:10.5445/IR/1000178558 -
Costing Adversaries on Quantum-secure Cryptography. PhD dissertation
Tiepelt, K. M.
2025, February 5. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000178687 -
Assessing the impact of technology partners on the level of cyberattack damage in hospitals
Angler, Y.; Flessa, S.; Grass, E.; Goetz, O.
2025. Health Policy and Technology, 14 (1), 100955. doi:10.1016/j.hlpt.2024.100955 -
Retriever: A View-Based Approach to Reverse Engineering Software Architecture Models
Kirschner, Y. R.; Gstür, M.; Sağlam, T.; Weber, S.; Koziolek, A.
2025. Journal of Systems and Software, 220, 112277. doi:10.1016/j.jss.2024.112277 -
How to enhance company engagement in public-private emergency collaborations in the supply of essential goods
Lüttenberg, M.; Zienau, A.; Wiens, M.; Hansen, O.; Diehlmann, F.; Schultmann, F.
2025. Journal of Humanitarian Logistics and Supply Chain Management, 15 (1), 48–60. doi:10.1108/JHLSCM-12-2023-0133 -
Replication Package: LiSSA: Toward Generic Traceability Link Recovery through Retrieval-Augmented Generation
Fuchß, D.; Hey, T.; Keim, J.; Liu, H.; Ewald, N.; Thirolf, T.; Koziolek, A.
2025, January 21. doi:10.5281/zenodo.14714706 -
Towards Architectural Pen Test Case Generation and Attack Surface Analysis to Support Secure Design
Jafari Sarvejahani, M.
2025. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000178592 -
Not eXactly Byzantine: Efficient and Resilient TEE-Based State Machine Replication
Leinweber, M.; Hartenstein, H.
2025. arxiv. doi:10.48550/arXiv.2501.11051 -
Modeling, Specification and Verification of Smart Contract Applications. PhD dissertation
Schiffl, J.
2025, January 7. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000177645 -
SM-SIM: A Simulator for Analyzing Selfish Mining Attacks in Blockchain Systems
Sproll, Y.; Heinrich, R.; Le, L. B. Q.; Kannengießer, N.
2025. Institute of Electrical and Electronics Engineers (IEEE). doi:10.5445/IR/1000180433 -
Responsible and Sustainable AI: Considering Energy Consumption in Automated Text Classification Evaluation Tasks
Kaplan, A.; Keim, J.; Greiner, L.; Sieger, R.; Mirandola, R.; Reussner, R.
2025. Proceedings of the 2025 {IEEE/ACM} 47th International Conference on Software Engineering: Companion Proceedings, {ICSE} Companion 2025, Ottawa, 27th April - 3rd May 2025 -
Enabling Architecture Traceability by LLM-based Architecture Component Name Extraction
Fuchß, D.; Liu, H.; Hey, T.; Keim, J.; Koziolek, A.
2025. 22nd IEEE International Conference on Software Architecture (ICSA 2025) -
Requirements Traceability Link Recovery via Retrieval-Augmented Generation
Fuchß, D.; Keim, J.; Koziolek, A.; Hey, T.
2025. International Working Conference on Requirements Engineering (REFSQ 2025) -
LiSSA: Toward Generic Traceability Link Recovery through Retrieval-Augmented Generation
Fuchß, D.; Hey, T.; Keim, J.; Liu, H.; Ewald, N.; Thirolf, T.; Koziolek, A.
2025. 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE), 723–723, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSE55347.2025.00186 -
A Classification Framework for Scientific Documents to Support Knowledge Graph Population
Kaplan, A.; Keim, J.; Greiner, L.; Koziolek, A.; Reussner, R.
2025. Software Engineering 2025 – Companion Proceedings. Ed.: K. Feichtinger, 277–286, Gesellschaft für Informatik (GI). doi:10.18420/se2025-ws-28 -
UVL: Feature modelling with the universal variability language
Benavides, D.; Sundermann, C.; Feichtinger, K.; Galindo, J. A.; Rabiser, R.; Thüm, T.
2025. Journal of Systems and Software, 112326. doi:10.1016/j.jss.2024.112326 -
Mitigating Obfuscation Attacks on Software Plagiarism Detectors via Subsequence Merging
Sağlam, T.; Niehues, N.; Hahner, S.; Schmid, L.
2025. IEEE/ACM. doi:10.5445/IR/1000179016 -
Do Large Language Models Contain Software Architectural Knowledge? An Exploratory Case Study with GPT
Soliman, M.; Keim, J.
2025. 22nd IEEE International Conference on Software Architecture (ICSA 2025), Institute of Electrical and Electronics Engineers (IEEE) -
Requirements Traceability Link Recovery via Retrieval-Augmented Generation
Hey, T.; Fuchß, D.; Keim, J.; Koziolek, A.
2025. doi:10.5445/IR/1000178589 -
Replication Package for "Requirements Traceability Link Recovery via Retrieval-Augmented Generation"
Hey, T.; Fuchß, D.; Keim, J.; Koziolek, A.
2025. doi:10.5281/zenodo.14779457 -
An Architecture-Based Approach to Mitigate Confidentiality Violations Using Machine Learning
Niehues, N.; Hahner, S.; Heinrich, R.
2025. doi:10.5445/IR/1000178568 -
Registered FE Beyond Predicates: (Attribute-Based) Linear Functions and More
Datta, P.; Pal, T.; Yamada, S.
2025. Advances in Cryptology – ASIACRYPT 2024 – 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings, Part I. Ed.: K.-M. Chung, 65–104, Springer Nature Singapore. doi:10.1007/978-981-96-0875-1_3 -
X-by-Construction Meets AI
ter Beek, M. H.; Cleophas, L.; Dubslaff, C.; Schaefer, I.
2025. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies – 12th International Symposium, ISoLA 2024, Crete, Greece, October 27–31, 2024, Proceedings, Part IV. Ed.: T. Margaria, 155–161, Springer Nature Switzerland. doi:10.1007/978-3-031-75387-9_10 -
LiSSA: Toward Generic Traceability Link Recovery through Retrieval-Augmented Generation
Fuchß, D.; Hey, T.; Keim, J.; Liu, H.; Ewald, N.; Thirolf, T.; Koziolek, A.
2025. Institute of Electrical and Electronics Engineers (IEEE). doi:10.5445/IR/1000178348 -
Two Sides of the Same Coin: Learning the Backdoor to Remove the Backdoor
Zhao, Q.; Wressnegger, C.
2025. Proceedings of the 39th Annual AAAI Conference on Artificial Intelligence (AAAI) -
Integrated QoS- and Vulnerability-Driven Self-adaptation for Microservices Applications
Camilli, M.; Luccioletti, F.; Mirandola, R.; Scandurra, P.
2025. Service-Oriented Computing – 22nd International Conference, ICSOC 2024, Tunis, Tunisia, December 3–6, 2024, Proceedings, Part II. Ed.: W. Gaaloul, 55–71, Springer Nature Singapore. doi:10.1007/978-981-96-0808-9_5 -
Enabling Architecture Traceability by LLM-based Architecture Component Name Extraction
Fuchß, D.; Liu, H.; Hey, T.; Keim, J.; Koziolek, A.
2025. doi:10.5445/IR/1000177521 -
DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing
Wachter, L.; Gremminger, J.; Wressnegger, C.; Payer, M.; Toffalini, F.
2025. Proceedings of the Network and Distributed System Security Symposium (NDSS) -
Data Distribution and Redistribution - A formal and practical Analysis of the DDS Security Standard
Müller, M.; Lauser, T.
2025. SAC ’25: Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing -
Literature Review: Misconceptions About Phishing
Mossano, M.; Volkamer, M.
2025. Human Aspects of Information Security and Assurance : 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024, Proceedings, Part I, 215–228, Springer Nature Switzerland. doi:10.1007/978-3-031-72559-3 -
Formal Foundations of Consistency in Model-Driven Development
Pascual, R.; Beckert, B.; Ulbrich, M.; Kirsten, M.; Pfeifer, W.
2025. Leveraging Applications of Formal Methods, Verification and Validation. Specification and Verification : 12th International Symposium, ISoLA 2024, Crete, Greece, October 27–31, 2024, Proceedings, Part III. Ed.: T. Margaria, 178–200, Springer Nature Switzerland. doi:10.1007/978-3-031-75380-0_11 -
Towards AI-Assisted Correctness-by-Construction Software Development
Kodetzki, M.; Bordis, T.; Kirsten, M.; Schaefer, I.
2025. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies – 12th International Symposium, ISoLA 2024, Crete, Greece, October 27–31, 2024, Proceedings, Part IV. Ed.: T. Margaria, 222–241, Springer Nature Switzerland. doi:10.1007/978-3-031-75387-9_14 -
Restricting the Link: Effects of Focused Attention and Time
Petelka, J.; Berens, B.; Sugatan, C.; Volkamer, M.; Schaub, F.
2025. Institute of Electrical and Electronics Engineers (IEEE). doi:10.5445/IR/1000175479 -
Datenschutzrecht - DS-GVO / BDSG
Spiecker genannt Döhmann, I.; Hornung, G.; Simitis, S. (Eds.)
2024. Nomos Verlagsgesellschaft -
Resilient and sustainable energy supply chains: insights on sourcing and pricing strategies in a non-collaborative and collaborative environment
Rajabzadeh, H.; Wiens, M.
2024. International Journal of Production Research, 62 (24), 9011–9042. doi:10.1080/00207543.2024.2331556 -
Towards Adversarial Robustness of Model-Level Mixture-of-Experts Architectures for Semantic Segmentation
Pavlitska, S.; Eisen, E.; Zöllner, J. M.
2024. arxiv. doi:10.48550/arXiv.2412.11608 -
ReP2P Matrix: Decentralized Relays to Improve Reliability and Performance of Peer-to-Peer Matrix
Schichtholz, B. D.; Bless, R.; Jacob, F.; Hartenstein, H.; Zitterbart, M.
2024. Proceedings of the ACM Conext-2024 Workshop on the Decentralization of the Internet (DIN ’24), Los Angeles, CA, USA, December 9–12, 2024, 8–14, Association for Computing Machinery (ACM). doi:10.1145/3694809.3700741 -
Model-Manipulation Attacks Against Black-Box Explanations
Hegde, A.; Noppel, M.; Wressnegger, C.
2024. Proceedings of the Annual Computer Security Applications Conference (ACSAC), Honolulu, HI, 9th - 13th December 2024 -
An overview of proposals towards the privacy-preserving publication of trajectory data
Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2024. International Journal of Information Security, 23 (6), 3711–3747. doi:10.1007/s10207-024-00894-0 -
Importance Analysis of Micro-Flow Independent Features for Detecting Distributed Network Attacks
Kopmann, S.; Zitterbart, M.
2024. IEEE Transactions on Network and Service Management, 21 (6), 5947–5957. doi:10.1109/TNSM.2024.3460082 -
On the influence of conventional and automated market makers on market quality in cryptoeconomic systems
Kirste, D.; Poddey, A.; Kannengießer, N.; Sunyaev, A.
2024. Electronic Markets, 34 (1), Art.-Nr.: 42. doi:10.1007/s12525-024-00723-1 -
Data sovereignty requirements for patient-oriented AI-driven clinical research in Germany; [Anforderungen an die Datensouveränität in der patientenorientierten und KI-gestützten klinischen Forschung in Deutschland]
Radic, M.; Busch-Casler, J.; Vosen, A.; Herrmann, P.; Appenzeller, A.; Mucha, H.; Philipp, P.; Frank, K.; Dauth, S.; Köhm, M.; Orak, B.; Spiecker genannt Döhmann, I.; Böhm, P.
2024. Ethik in der Medizin, 36 (4), 547–562. doi:10.1007/s00481-024-00827-4 -
Exploring Contrasting Effects of Trust in Organizational Security Practices and Protective Structures on Employees’ Security-Related Precaution Taking
Greulich, M.; Lins, S.; Pienta, D.; Thatcher, J. B.; Sunyaev, A.
2024. Information systems research, 35 (4), 1586–1608. doi:10.1287/isre.2021.0528 -
Family-Based Vulnerability Discovery for Software Product Lines. master’s thesis
Bächle, T.
2024, November 28. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000177489 -
Kostenfreie ISO-Normen für alle? Zulässigkeit und Bedeutung von Verweisen auf private Normung im IT-Recht
Sterz, L.; Werner, C.; Raabe, O.
2024. InTeR, 146 (4), 146–153 -
Use of Accessible Information to Improve Industrial Security Testing. PhD dissertation
Borcherding, A.
2024, November 26. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000176555 -
Trust and Costs for Evolving Architectural Performance Models: A Survey : Technical report
Armbruster, M.; Mazkatli, M.; Koziolek, A.
2024. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000176602 -
Analysis and Measurement of Attack Resilience of Differential Privacy
Guerra-Balboa, P.; Sauer, A.; Strufe, T.
2024. WPES ’24: Proceedings of the 23rd Workshop on Privacy in the Electronic Society. Ed.: E. Ayday, 155–171, Association for Computing Machinery (ACM). doi:10.1145/3689943.3695046 -
Improving Secure Channels without Random Oracles based on Ring-LWE. master’s thesis
Brede, R.
2024, November 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000176690 -
A kinematic dataset of locomotion with gait and sit-to-stand movements of young adults
Hanisch, S.; Pogrzeba, L.; Muschter, E.; Li, S.-C.; Strufe, T.
2024. Scientific Data, 11 (1), Art.-Nr.: 1209. doi:10.1038/s41597-024-04020-6 -
Informationspflichten und Einwilligung bei der Nutzung von PIMS: Probleme und Potenziale der Einwilligungsverwaltung de lege lata
Hunter, J. C.; Ebert, A.; Spiecker genannt Döhmann, I.
2024. Zeitschrift für Datenschutz, 14 (11), 603–610 -
The Influence of Granularity of Transactions on Performance in Vitruvius
Weber, T.; Jutz, B.; Zacouris, Z.
2024. Softwaretechnik-Trends, Gesellschaft für Informatik (GI) -
Scalability of Consistency Preservation with Vitruvius
Jutz, B.; Weber, T.
2024. Softwaretechnik-Trends, Gesellschaft für Informatik (GI) -
Evaluation of the potential of infrastructure funds: The case of inland waterways in Germany
Wehrle, R.; Wiens, M.; Schultmann, F.
2024. Technological Forecasting and Social Change, 208, Art.-Nr.: 123711. doi:10.1016/j.techfore.2024.123711 -
Encouraging Users to Change Breached Passwords Using the Protection Motivation Theory
Zou, Y.; Le, K.; Mayer, P.; Acquisti, A.; Aviv, A. J.; Schaub, F.
2024. ACM Transactions on Computer-Human Interaction, 31 (5), 1–45. doi:10.1145/3689432 -
Towards Integrating Low-Code in View-based Development
Hermann, A.-K.; König, L.; Burger, E.; Reussner, R.
2024. MODELS Companion ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering. Ed.: M. Wimmer, 866–875, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688333 -
Managing Variability of Cyber-Physical Production Systems: Towards Consistency Management
Fadhlillah, H. S.; Greiner, S.; Feichtinger, K.; Rabiser, R.; Zoitl, A.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, September 22-27, 2024, at the JKU Linz., 945–949, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688216 -
Towards Formalizing and Relating Different Notions of Consistency in Cyber-Physical Systems Engineering
Feichtinger, K.; Kegel, K.; Pascual, R.; Aßmann, U.; Beckert, B.; Reussner, R.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, Linz/Wien, 22nd - 27th September 2024, 915–919, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688565 -
View-Based-Reverse-Engineering/Retriever: v5.2.0.202410181425
Kirschner, Y. R.; Bossert, F.; Gstür, M.; Peter, N.; Stahl, M.; Koziolek, A.
2024, October 18. doi:10.5281/zenodo.13951797 -
Evaluating Drill-Down DDoS Destination Detection
Krack, T.; Kopmann, S.; Zitterbart, M.
2024. 2024 IEEE 49th Conference on Local Computer Networks (LCN), Normandy, France, 08-10 October 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN60385.2024.10639629 -
Unlocking the Potential of Composition for General Neighborhood Definitions
Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Strufe, T.
2024. Proceedings of the XVIII Spanish Meeting on Cryptology and Information Security (RECSI), León, 22th - 25st October, 2024 -
Generalized Adversarial Code-Suggestions: Exploiting Contexts of LLM-based Code-Completion
Rubel, K.; Noppel, M.; Wressnegger, C.
2024. Karlsruher Institut für Technologie (KIT) -
On Practical Realization of Evasion Attacks for Industrial Control Systems
Erba, A.; Murillo, A. F.; Taormina, R.; Galelli, S.; Tippenhauer, N. O.
2024. Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security (RICSS), Association for Computing Machinery (ACM). doi:10.1145/3689930.3695213 -
Pitfalls in Machine Learning for Computer Security
Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2024. Communications of the ACM, 67 (11), 104–112. doi:10.1145/3643456 -
Adversarially Robust Anti-Backdoor Learning
Zhao, Q.; Wressnegger, C.
2024. Proceedings of the 2024 Workshop on Artificial Intelligence and Security (AISEC), Association for Computing Machinery (ACM). doi:10.1145/3689932.3694763 -
Compact FE for unbounded attribute-weighted sums for logspace from SXDH
Datta, P.; Pal, T.; Takashima, K.
2024. Designs, Codes, and Cryptography, 92 (10), 3155–3235. doi:10.1007/s10623-024-01432-8 -
Frameworks and Protocols for Composable Multi-Party Computation. PhD dissertation
Mechler, J.
2024, September 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000174597 -
Panini — Anonymous Anycast and an Instantiation
Coijanovic, C.; Weis, C.; Strufe, T.
2024. arxiv. doi:10.48550/arXiv.2305.16629 -
A Delta-Oracle for Fast Model Merge Conflict Estimation using Sketch-Based Critical Pair Analysis
Kegel, K.; Domanowski, A.; Feichtinger, K.; Pascual, R.; Aßmann, U.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 22.-27.09.2024, Linz, 1046–1055, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688341 -
ARC³N: A Collaborative Uncertainty Catalog to Address the Awareness Problem of Model-Based Confidentiality Analysis
Hahner, S.; Niehues, N.; Boltz, N.; Fuksa, M.; Heinrich, R.
2024. MODELS Companion ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems. Ed.: M. Wimmer, 640–644, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688556 -
Model Everything but with Intellectual Property Protection - The Deltachain Approach
Weber, T.; Weber, S.
2024. MODELS ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 49–56, Association for Computing Machinery (ACM). doi:10.1145/3640310.3674086 -
Modeling Languages for Automotive Digital Twins : A Survey Among the German Automotive Industry
Pfeiffer, J.; Fuchß, D.; Kühn, T.; Liebhart, R.; Neumann, D.; Neimöck, C.; Seiler, C.; Koziolek, A.; Wortmann, A.
2024. MODELS ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems. Ed.: A. Egyed, 92–103, Association for Computing Machinery (ACM). doi:10.1145/3640310.3674100 -
Machine learning-based feature selection for intrusion detection systems in IEC 61850-based digital substations
Eynawi, A.; Mumrez, A.; Elbez, G.; Hagenmeyer, V.
2024, September 17 -
Machine Learning-Based Feature Selection for Intrusion Detection Systems in IEC 61850-Based Digital Substations
Eynawi, A.; Mumrez, A.; Elbez, G.; Hagenmeyer, V.
2024. 2024 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 7 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SmartGridComm60555.2024.10738031 -
HybCBDC: A Design for Central Bank Digital Currency Systems Enabling Digital Cash
Lamberty, R.; Kirste, D.; Kannengießer, N.; Sunyaev, A.
2024. IEEE Access, 12, 137712–137728. doi:10.1109/ACCESS.2024.3458451 -
LLM-based Control Code Generation using Image Recognition
Koziolek, H.; Koziolek, A.
2024. LLM4Code ’24: Proceedings of the 1st International Workshop on Large Language Models for Code (LLM4 Code), Lissabon, 20th April 2024, 38–45, Association for Computing Machinery (ACM). doi:10.1145/3643795.3648385 -
How Do Asynchronous Communication Models Impact the Composability of Information Flow Security?
Gerlach, L.; Gerking, C.
2024. Formal Aspects of Component Software – 20th International Conference, FACS 2024, Milan, Italy, September 9–10, 2024, Proceedings. Ed.: D. Marmsoler, 127 – 145, Springer Nature Switzerland. doi:10.1007/978-3-031-71261-6_8 -
Variability modeling of products, processes, and resources in cyber-physical production systems engineering
Meixner, K.; Feichtinger, K.; Fadhlillah, H. S.; Greiner, S.; Marcher, H.; Rabiser, R.; Biffl, S.
2024. SPLC ’24 : 28th ACM International Systems and Software Product Line Conference. Volume B. Ed.: M. Cordy, 219, Association for Computing Machinery (ACM). doi:10.1145/3646548.3676547 -
Seventh International Workshop on Languages for Modelling Variability (MODEVAR@SPLC 2024)
Feichtinger, K.; Galasso-Carbonnel, J.
2024. SPLC ’24 : Proceedings of the 28th ACM International Systems and Software Product Line Conference - Volume B. Ed.: M. Cordy, 224, Association for Computing Machinery (ACM). doi:10.1145/3646548.3677006 -
MulTi-Wise Sampling: Trading Uniform T-Wise Feature Interaction Coverage for Smaller Samples
Pett, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2024. SPLC ’24: Proceedings of the 28th ACM International Systems and Software Product Line Conference - Volume B. Ed.: M. Cordy, 47–53, Association for Computing Machinery (ACM). doi:10.1145/3646548.3672589 -
Synergizing Multi-Layer Blockchain Technologies for Enhanced Security and Operational Efficiency
Shirafkan, N.; Wiens, M.; Rajabzadeh, H.; Negar, S.
2024, September. International Conference on Operations Research (OR 2024), Munich, Germany, September 3–6, 2024 -
Semantics Enhancing Model Transformation for Automated Constraint Validation of Palladio Software Architecture to MontiArc Models
Weber, S.; Henß, J.; Taghavi, B.; Weber, T.; Stüber, S.; Marin, A.; Rumpe, B.; Heinrich, R.
2024. Software Architecture. ECSA 2024 Tracks and Workshops – Luxembourg City, Luxembourg, September 3–6, 2024, Proceedings. Ed.: A. Ampatzoglou, J. Pérez, B. Buhnova, V. Lenarduzzi, C. C. Venters, U. Zdun, K. Drira, L. Rebelo, D. Di Pompeo, M. Tucci, E. Y. Nakagawa, E. Navarro, 30 – 38, Springer Nature Switzerland. doi:10.1007/978-3-031-71246-3_4 -
Consistency Management for Security Annotations for Continuous Verification
Reiche, F.; Weber, T.; Becker, S.; Weber, S.; Heinrich, R.; Burger, E.
2024. ACM / IEEE 27th International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), 1096–1105, Association for Computing Machinery (ACM). doi:10.1145/3652620 -
Characteristics of crowd disaster: Database construction and pattern identification
Yang, X.; Liu, Y.; Majumdar, A.; Grass, E.; Ochieng, W.
2024. International Journal of Disaster Risk Reduction, 111, 104653. doi:10.1016/j.ijdrr.2024.104653 -
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research
Chaurasia, A. K.; Fallahi, M.; Strufe, T.; Terhörst, P.; Cabarcos, P. A.
2024. Journal of Information Security and Applications, 85, Article no: 103832. doi:10.1016/j.jisa.2024.103832 -
Composition in Differential Privacy for General Granularity Notions
Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Strufe, T.
2024. 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 8th-12th July 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSF61375.2024.00004 -
7D: Demonstrating Drill-Down DDoS Destination Detection
Kopmann, S.; Krack, T.; Zitterbart, M.
2024. 2024 IEEE International Conference on Machine Learning for Communication and Networking (ICMLCN), Stockholm, 5th-8th May 2024, 1–2, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICMLCN59089.2024.10624795 -
Wirkung von Webshop-Gütesiegeln – Perspektive der Nutzenden
Aldag, L.; Hennig, A.; Volkamer, M.
2024. Datenschutz und Datensicherheit - DuD, 48 (8), 526–531. doi:10.1007/s11623-024-1962-6 -
Inconsistencies in Production Workflows and How to Model Them
Kuder, N. D.; Weber, T.; Schneider, J.; Weber, S.; Völk, T. A.; Albers, A.; Koziolek, A.
2024. 2024 IEEE 21st International Conference on Software Architecture Companion (ICSA-C), Hyderabad, 4th - 8th June 2024, 84 – 86, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C63560.2024.00021 -
MoCoRe - A Generic Model-Driven Composition and Rule-Based Refinement Framework
Gstür, M.; Kirschner, Y. R.; Singh, S.; Koziolek, A.
2024. 2024 IEEE 21st International Conference on Software Architecture Companion (ICSA-C), Hyderabad, 4th - 8th June 2024, 273 – 280, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C63560.2024.00039 -
Towards a Single Source of Truth with a Freely Shareable Deltachain
Weber, T.; Weber, S.
2024. 2024 IEEE 21st International Conference on Software Architecture Companion (ICSA-C), Hyderabad, 4th -8th June 2024, 92 – 94, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C63560.2024.00023 -
SMILE4VIP: Intervention to Support Visually Impaired Users Against Phishing
Bohlender, M.; Morisco, R.; Mossano, M.; Schwarz, T.; Volkamer, M.
2024. 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Vienna, 8th-12th July 2024, 650 – 657, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW61312.2024.00079 -
Of Mothers and Managers – The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field
Gerber, N.; Stöver, A.; Mayer, P.
2024. Proceedings of the Twentieth Symposium on Usable Privacy and Security, August 12–13, 2024 • Philadelphia, PA, USA, 547–566, Advanced Computing Systems Association (USENIX) -
A conceptual and architectural characterization of antifragile systems
Grassi, V.; Mirandola, R.; Perez-Palacin, D.
2024. Journal of Systems and Software, 213, Art.-Nr.: 112051. doi:10.1016/j.jss.2024.112051 -
Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent Banners
Kriecherbauer, T.; Schwank, R.; Krauss, A.; Neureither, K.; Remme, L.; Volkamer, M.; Herrmann, D.
2024. ARES ’24: Proceedings of the 19th International Conference on Availability, Reliability and Security, 1–7, Association for Computing Machinery (ACM). doi:10.1145/3664476.3664499 -
DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote Attestation
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2024. Proceedings of the 19th International Conference on Availability, Reliability and Security, Art.-Nr.: 159, Association for Computing Machinery (ACM). doi:10.1145/3664476.3670442 -
Game Theory and Applications : A Guide for Students and Researchers
Bartholomae, F.; Wiens, M.
2024. Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-44608-6 -
Pirates: Anonymous Group Calls over Fully Untrusted Infrastructure
Coijanovic, C.; Stark, A.; Schadt, D.; Strufe, T.
2024. Information Security and Privacy – 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part III. Ed.: T. Zhu, 193 – 212, Springer Nature Singapore. doi:10.1007/978-981-97-5101-3_11 -
Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments. PhD dissertation
Wagner, P. G.
2024, July 11. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000172286 -
SACfe: Secure Access Control in Functional Encryption with Unbounded Data
Dowerah, U.; Dutta, S.; Hartmann, F.; Mitrokotsa, A.; Mukherjee, S.; Pal, T.
2024. IEEE 9th European Symposium on Security and Privacy (Euro&SP 2024), 860–882, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSP60621.2024.00053 -
Complete Game Logic with Sabotage
Abou El Wafa, N.; Platzer, A.
2024. Proceedings of the 39th Annual ACM/IEEE Symposium on Logic in Computer Science, 1–15, Association for Computing Machinery (ACM). doi:10.1145/3661814.3662121 -
When Awareness Fades and There Is No Support, the Phisher Has an Easy Game. PhD dissertation
Berens, B. M.
2024, July 8. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000172096 -
Interoperability Assessment of IEC 61850 Devices in a Multivendor Digital Substation
Keppler, G.; Bonetti, A.; Canbolat, S.; Mumrez, A.; Hagenmeyer, V.; Elbez, G.
2024. 6th Global Power, Energy and Communication Conference (GPECOM2024), Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/GPECOM61896.2024.10582663 -
Cross-Border and Transboundary Resilience
Adrot, A.; Buscher, M.; Fiedrich, F.; Rigaud, E.; Wiens, M.
2024. Journal of Homeland Security and Emergency Management, 21 (2), 141–146. doi:10.1515/jhsem-2024-0018 -
SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret Sharing
Jiang, Y.; Mei, F.; Dai, T.; Li, Y.
2024. Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 274 – 288, Association for Computing Machinery (ACM). doi:10.1145/3634737.3657024 -
Modeling Spontaneous Volunteers in Cross-Border Crisis Scenarios
Schulte, Y.; Heyde, M. van der; Wiens, M.; Fiedrich, F.; Schultmann, F.
2024. Journal of Homeland Security and Emergency Management, 21 (2), 147 – 166. doi:10.1515/jhsem-2021-0070 -
Effektive Datenschutzaufsicht für effektiven Grundrechtsschutz – aber bitte nicht sofort und nicht gegen den Staat? : Zur Unionsrechtswidrigkeit des Ausschlusses der Anordnung der sofortigen Vollziehbarkeit gem. § 20 VII BDSG
Winau, M.; Kemmler, K. J.
2024. Neue Zeitschrift für Verwaltungsrecht, 42 (13), 945–1040 -
A Framework for Provably Secure Onion Routing against a Global Adversary
Scherer, P.; Weis, C.; Strufe, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (2), 141–159. doi:10.56553/popets-2024-0045 -
Explainability Engineering Challenges: Connecting Explainability Levels to Run-time Explainability
Schwammberger, M.; Mirandola, R.; Wenninghoff, N.
2024. Proceedings of 2nd World Conference on Explainable Artificial Intelligence Conference (XAI2024), Springer. doi:10.1007/978-3-031-63803-9_11 -
Iterative Filter Pruning for Concatenation-based CNN Architectures
Pavlitska, S.; Bagge, O.; Peccia, F.; Mammadov, T.; Zöllner, J. M.
2024. IJCNN 2024 conference proceedings, 10 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IJCNN60899.2024.10650334 -
BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots
Hemken, N.; Jacob, F.; Tërnava, F.; Kartmann, R.; Asfour, T.; Hartenstein, H.
2024. SACMAT 2024: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, San Antonio, 15th-17th May 2024, 117–125, Association for Computing Machinery (ACM). doi:10.1145/3649158.3657034 -
Datensouveränität für Betroffene über persönliche medizinische Daten durch technische Umsetzung einer datenschutzgerechten Forschungsplattform. PhD dissertation
Appenzeller, A.
2024, June 11. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000171248 -
Identification of Inconsistencies in Agile CPS Engineering with Formula Student
Albers, A.; Koziolek, A.; Völk, T. A.; Klippert, M.; Pfaff, F.; Stolpmann, R.; Schwarz, S. E.
2024. Proceedings of The XXXV ISPIM Innovation Conference -
Uncertainty Flow Diagrams: Towards a Systematic Representation of Uncertainty Propagation and Interaction in Adaptive Systems
Camara, J.; Hahner, S.; Perez-Palacin, D.; Vallecillo, A.; Acosta, M.; Bencomo, N.; Calinescu, R.; Gerasimou, S.
2024. SEAMS ’24: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems; New York, 37 – 43, Association for Computing Machinery (ACM). doi:10.1145/3643915.3644084 -
Human empowerment in self-adaptive socio-technical systems
Boltz, N.; Getir Yaman, S.; Inverardi, P.; De Lemos, R.; Van Landuyt, D.; Zisman, A.
2024. SEAMS’ 24: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Lissabon, 15th-16th April 2024, 200 – 206, Association for Computing Machinery (ACM). doi:10.1145/3643915.3644082 -
RAMSES: An Exemplar for Engineering Self-Adaptive Microservice Applications
Riccio, V.; Sorrentino, G.; Zamponi, E.; Camilli, M.; Mirandola, R.; Scandurra, P.
2024. IEEE/ACM proceedings of the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS2024), Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3643915.3644110 -
Attacking Learning-based Models in Smart Grids: Current Challenges and New Frontiers
Sanchez, G.; Elbez, G.; Hagenmeyer, V.
2024. e-Energy ’24: Proceedings of the 15th ACM International Conference on Future and Sustainable Energy Systems, 589–595, Association for Computing Machinery (ACM). doi:10.1145/3632775.3661984 -
Short Paper: Unpredictable Transaction Arrangement for MEV Mitigation in Ethereum
Droll, J.; Stengele, O.; Hartenstein, H.
2024. 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 625–629, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC59979.2024.10634470 -
Dataset and Replication Package for the View-Based Retriever Approach To Reverse Engineering Software Architecture Models
Kirschner, Y.; Moritz, G.; Sağlam, T.; Weber, S.; Koziolek, A.
2024, May 24. doi:10.5281/zenodo.11144303 -
NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree
Dai, T.; Jiang, Y.; Li, Y.; Mei, F.
2024. 2024 IEEE Security and Privacy Workshops (SPW), 95 – 103, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SPW63631.2024.00015 -
Elicitation and Classification of Security Requirements for EVerest. master’s thesis
Marettek, D. M.
2024, May 13. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000171735 -
Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting
Dutta, S.; Pal, T.; Dutta, R.
2024. Theoretical Computer Science, 995, Art.-Nr.: 114502. doi:10.1016/j.tcs.2024.114502 -
Better Together: The Interplay Between a Phishing Awareness Video and a Link-centric Phishing Support Tool
Berens, B. M.; Schaub, F.; Mossano, M.; Volkamer, M.
2024. Proceedings of the CHI Conference on Human Factors in Computing Systems, 1–60, Association for Computing Machinery (ACM). doi:10.1145/3613904.3642843 -
Improving Resilience of Future Mobile Network Generations Implementing Zero Trust Paradigm
Abedi, K.; Nguyen, G. T.; Strufe, T.
2024. NOMS 2024-2024 IEEE Network Operations and Management Symposium, 06th-10th May 2024, Seoul, Korea, 1–5, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NOMS59830.2024.10574898 -
Understanding, describing, and mitigating the flow of personal data in ROS 2 systems to comply with the GDPR and beyond
Zander, T.; Wohnig, J.; Beyerer, J.
2024. 2024 IEEE International Conference on Advanced Robotics and Its Social Impacts (ARSO), 146 – 152, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARSO60199.2024.10557807 -
Das Re-Identifikationsrisiko bei der Weitergabe von Gesundheitsdaten : Eine rechtliche und technische Analyse
Appenzeller, A.; Orak, B.
2024. Datenschutz und Datensicherheit - DuD, 48 (5), 277–283. doi:10.1007/s11623-024-1930-1 -
What do you assume? A Theory of Security-Related Assumptions
Corallo, S.; Weber, T.; König, L.; Schmidt, K. L.; Reiche, F.; Koziolek, A.
2024, May. 46th International Conference on Software Engineering (ICSE 2024), Lisbon, Portugal, April 14–20, 2024 -
A data-driven active learning approach to reusing ML solutions in scientific applications
Hajiabadi, H.; Gerking, C.; Hilbert, L.; Koziolek, A.
2024. Journal of Systems and Software, 211, Article no: 111986. doi:10.1016/j.jss.2024.111986 -
Logical Clocks and Monotonicity for Byzantine-Tolerant Replicated Data Types
Jacob, F.; Hartenstein, H.
2024. PaPoC ’24: Proceedings of the 11th Workshop on Principles and Practice of Consistency for Distributed Data, 37–43, Association for Computing Machinery (ACM). doi:10.1145/3642976.3653034 -
Explanation-driven Self-adaptation using Model-agnostic Interpretable Machine Learning
Negri, F. R.; Nicolosi, N.; Camilli, M.; Mirandola, R.
2024. IEEE/ACM proceedings of the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS2024). doi:10.1145/3643915.364408 -
Post-Quantum Ready Key Agreement for Aviation
Tiepelt, M.; Martin, C.; Maeurer, N.
2024. IACR Communications in Cryptology, 1 (1), 17. doi:10.62056/aebn2isfg -
Quantifying Software Correctness by Combining Architecture Modeling and Formal Program Analysis
Lanzinger, F.; Martin, C.; Reiche, F.; Teuber, S.; Heinrich, R.; Weigl, A.
2024. SAC ’24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing. Ed.: J. Hong, 1702–1711, Association for Computing Machinery (ACM). doi:10.1145/3605098.3636008 -
Die Reform des australischen Privacy Act
Ebert, A.
2024. Zeitschrift für Datenschutz (ZD), 14 (4), 181–240 -
Interview Results, Production Workflows, Inconsistencies in Production Workflows
Kuder, N. D.; Weber, T.
2024, March 28. doi:10.35097/YVtjSZhutJKPvdBi -
Nachvollziehbarkeit und Verifizierbarkeit von Online-Wahlen an Hochschulen. bachelor’s thesis
Keller, A.
2024, March 25. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000180561 -
TRUST Issues: Multicast and Integrity Protection for the TRUST Redundancy Mechanism
Neumeister, F.; Zitterbart, M.
2024. 2024 IEEE International Conference on Industrial Technology (ICIT), 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICIT58233.2024.10540910 -
Systematic User Evaluation of a Second Device based cast-as-intended verifiability Approach
Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.; Volkamer, M.
2024, February 27. doi:10.35097/1934 -
Vision: Towards Fully Shoulder-Surfing Resistant and Usable Authentication for Virtual Reality
Länge, T.; Matheis, P.; Düzgün, R.; Volkamer, M.; Mayer, P.
2024. Symposium on Usable Security and Privacy (USEC) 2024 : Co-located with NDSS Symposium 2024, San Diego, CA, 26th February - 1st March 2024. doi:10.14722/usec.2024.23092 -
Co-Simulation of Hardware and Software in Palladio
Weber, S.; Henss, J.; Reussner, R.
2024. 13th Symposium on Software Performance 2023, Stuttgart, 7th-9th November 2022, Ed.: Andrea Herrmann, 32–34, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43641 -
Kfeature: Rendering the Kconfig System into Feature Models
Yaman, K. B.; Wittler, J. W.; Gerking, C.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 134 – 138, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634731 -
RIXA - Explaining Artificial Intelligence in Natural Language
Becker, M.; Vishwesh, V.; Birnstill, P.; Schwall, F.; Wu, S.; Beyerer, J.
2024. 2023 IEEE International Conference on Data Mining Workshops (ICDMW), Shanghai, 1st-4th December 2023, 875–884, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICDMW60847.2023.00118 -
Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video
Berens, B. M.; Mossano, M.; Volkamer, M.
2024. Computers & Security, 137, Art.-Nr.: 103620. doi:10.1016/j.cose.2023.103620 -
Monitoring tools for DevOps and microservices: A systematic grey literature review
Giamattei, L.; Guerriero, A.; Pietrantuono, R.; Russo, S.; Malavolta, I.; Islam, T.; Dînga, M.; Koziolek, A.; Singh, S.; Armbruster, M.; Gutierrez-Martinez, J. M.; Caro-Alvaro, S.; Rodriguez, D.; Weber, S.; Henss, J.; Vogelin, E. F.; Panojo, F. S.
2024. Journal of Systems and Software, 208, Art.-Nr.: 111906. doi:10.1016/j.jss.2023.111906 -
Panini — Anonymous Anycast and an Instantiation
Coijanovic, C.; Weis, C.; Strufe, T.
2024. Computer Security – ESORICS 2023 – 28th European Symposium on Research in Computer Security : The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II. Ed.: G. Tsudik, 193 – 211, Springer, Cham. doi:10.1007/978-3-031-51476-0_10 -
Verifiable Certificateless Signcryption Scheme for Smart Grids
Ramadan, M.; Elbez, G.; Hagenmeyer, V.
2024. 2023 7th International Conference on System Reliability and Safety (ICSRS), 181–189, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSRS59833.2023.10381069 -
Retriever: A View-Based Approach to Reverse Engineering Software Architecture Models
Kirschner, Y. R.; Gstür, M.; Sağlam, T.; Weber, S.; Koziolek, A.
2024. Elsevier B.V. doi:10.2139/ssrn.4686183 -
E-Vote-ID 2024: Ninth International Joint Conference on Electronic Voting
Volkamer, M.; Duenas-Cid, D.; Rønne, P. B.; Budurushi, J.; Blom, M.; Rodriguez Pérez, A.; Spycher-Krivonosova, I.; Martin-Rozumilowicz, B.; Spycher, O.
2024. Gesellschaft für Informatik (GI) -
Resilience and Antifragility of Autonomous Systems
Burton, S.; Calinescu, R.; Mirandola, R.
2024. Report from Dagstuhl Seminar 24182, 142–163, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/DagRep.14.4.142 -
Performance Factors of Proxy Objects in the Eclipse Modeling Framework
Armbruster, M.
2024. Softwaretechnik-Trends, 42–44, Gesellschaft für Informatik (GI) -
Towards a Data Flow Diagram-Centric Confidentiality Analysis in Palladio
Hüller, T.; Schwickerath, F.; Arp, B.; Niehues, N.; Boltz, N.; Hahner, S.
2024. Softwaretechnik-Trends, 44 (4) -
Integrating Security-Enriched Data Flow Diagrams Into Architecture-Based Confidentiality Analysis
Niehues, N.; Arp, B.; Hüller, T.; Schwickerath, F.; Boltz, N.; Hahner, S.
2024. Softwaretechnik-Trends, 44 (4) -
Analyzing Cyclic Data Flow Diagrams Regarding Information Security
Arp, B.; Niehues, N.; Hüller, T.; Schwickerath, F.; Boltz, N.; Hahner, S.
2024. Softwaretechnik-Trends, 44 (4) -
Towards Bringing Vitruvius into the Cloud
Armbruster, M.; Weber, T.; König, L.
2024. Softwaretechnik-Trends, 18–20, Gesellschaft für Informatik (GI) -
A stochastic optimisation model to support cybersecurity within the UK national health service
Grass, E.; Pagel, C.; Crowe, S.; Ghafur, S.
2024. Journal of the Operational Research Society, 1–12. doi:10.1080/01605682.2024.2436063 -
Replication Package: Enabling Architecture Traceability by LLM-based Architecture Component Name Extraction
Fuchß, D.; Liu, H.; Hey, T.; Keim, J.; Koziolek, A.
2024. doi:10.5281/zenodo.14506935 -
Explainable fatigue detection in assembly tasks through graph neural networks
Vishwesh, V.; Becker, M.; Birnstill, P.; Beyerer, J.
2024. Forum Bildverarbeitung 2024. Hrsg.: T. Längle, M. Heizmann, 171–182, Karlsruher Institut für Technologie (KIT) -
Securing XAI through Trusted Computing
Becker, M.
2024. Proceedings of the 2023 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory, 13–20, KIT Scientific Publishing -
Evaluating Adversarial Attacks on Traffic Sign Classifiers beyond Standard Baselines
Pavlitska, S.; Müller, L.; Zöllner, J. M.
2024. arxiv. doi:10.48550/arXiv.2412.09150 -
“Data Protection Can Sometimes Be a Nuisance” A Notification Study on Data Sharing Practices in City Apps
Drescher, J. N.; Moser, J.; Strangmann, N.; Spinner, J.; Herrmann, D.; Volkamer, M.
2024. Proceedings of Mensch und Computer 2024 (MuC’24). Ed. A. Maedche, 8 S., Association for Computing Machinery (ACM). doi:10.18420/muc2024-mci-ws17-159 -
Exploring Existing Tools for Managing Different Types of Research Data
Freund, A.; Hajiabadi, H.; Koziolek, A.
2024. INFORMATIK 2024 - Jahrestagung der Gesellschaft für Informatik e.V., 2181–2193, Gesellschaft für Informatik (GI). doi:10.18420/inf2024_189 -
Design and Evaluation of Verifiable Voting Systems Based on Tracking Code Verification
Nissen, C.; Kulyk, O.; Volkamer, M.; Friedrich, L. E.; Hermansen, H.
2024. Electronic voting : 9th international joint conference, E-Vote-ID 2024, Tarragona, Spain, October 2-4, 2024 : proceedings -
Erstellung eines Erklärvideos zur Verwendung von S/MIME (WIP)
Ballreich, F. L.; Volkamer, M.
2024. Mensch und Computer 2024 (MuC), Gesellschaft für Informatik (GI). doi:10.18420/muc2024-mci-ws17-152 -
R+R: Understanding Hyperparameter Effects in DP-SGD
Morsbach, F.; Reubold, J. L.; Strufe, T.
2024. Proceedings of the 40th Annual Computer Security Applications Conference -
Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on GPU
Dai, T.; Duan, L.; Jiang, Y.; Li, Y.; Mei, F.; Sun, Y.
2024. Secure IT Systems – 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16–17, 2023, Proceedings. Ed.: L. Fritsch, 330–349, Springer Nature Switzerland. doi:10.1007/978-3-031-47748-5_18 -
A Brief Systematization of Explanation-Aware Attacks
Noppel, M.; Wressnegger, C.
2024. KI 2024: Advances in Artificial Intelligence – 47th German Conference on AI, Würzburg, Germany, September 25–27, 2024, Proceedings. Ed.: A. Hotho, 350–354, Springer Nature Switzerland. doi:10.1007/978-3-031-70893-0_30 -
KI-generierte Abbildungen von Kindesmissbrauch: Technische Grundlagen und rechtliche Einordnung
Steinebach, M.; Hunter, J. C.; Schröder, L.
2024. Informatik 2024 : Tagung vom 24.-26. September 2024, Wiesbaden : Lock-in or log out? - Wie digitale Souveränität gelingt. Hrsg.: M. Klein, 247–261, Köllen Druck+Verlag. doi:10.18420/inf2024_17 -
Examining the EU’s Artificial Intelligence Act
Friedl, P.; Gil Gasiola, G.
2024. Front Matter. doi:10.59704/789d6ad759d0a40b -
Collaborative Distributed Machine Learning
Jin, D.; Kannengießer, N.; Rank, S.; Sunyaev, A.
2024. ACM Computing Surveys. doi:10.1145/3704807 -
Towards Deep Reactions in Multi-Level, Multi-View Modeling
Weber, T.; Ojha, M.; Sadeghi, M.; König, L.; Armbruster, M.; Lange, A.; Burger, E.; Atkinson, C.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, Linz Austria, 22nd - 27th September 2024, 760–769, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688208 -
SoK: Mechanisms Used in Practice for Verifiable Internet Voting
Moser, F.; Kirsten, M.; Dörre, F.
2024. 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024), 141–162, Gesellschaft für Informatik (GI). doi:10.18420/e-vote-id2024_10 -
Sharing for Caring? A Patients’ and Clinicians’ View on Handling Personal Medical Data in the Context of Digitization: An Exploratory Study
Frank, K.; Mengesdorf, T.; Radić, M.; Herrmann, P.; Appenzeller, A.; Mucha, H.; Orak, B.; Spiecker gen. Döhmann, I.; Rüping, S.; Burkhardt, H.; Köhm, M.; Dauth, S.
2024. Healthcare, 12 (20), Art.-Nr.: 2053. doi:10.3390/healthcare12202053 -
Usability and Understanding of Individual Verifiability in the 2023 GI-Election
Hilt, T.; Matheis, P.; Volkamer, M.
2024. Mensch und Computer 2024 – Workshopband, September 2024, Karlsruhe, Germany, Gesellschaft für Informatik (GI). doi:10.18420/muc2024-mci-ws17-151 -
Recommendations for Implementing Independent Individual Verifiability in Internet Voting
Moser, F.; Grimm, R.; Hilt, T.; Kirsten, M.; Niederbudde, C.; Volkamer, M.
2024. 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024), 35–53, Gesellschaft für Informatik (GI). doi:10.18420/e-vote-id2024_02 -
Web Application Penetration Testing with Artificial Intelligence: A Systematic Review
Sanchez Collado, G.; Olayinka, O.; Pasikhani, A.
2024. doi:10.5445/IR/1000175432 -
View-Based-Reverse-Engineering/Retriever-Benchmark: v5.2.0.202410181425
Kirschner, Y. R.; Bossert, F.; Stahl, M.; Koziolek, A.
2024. doi:10.5281/zenodo.13952589 -
Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling Concepts
Khaloopour, L.; Su, Y.; Raskob, F.; Meuser, T.; Bless, R.; Janzen, L.; Abedi, K.; Andjelkovic, M.; Chaari, H.; Chakraborty, P.; Kreutzer, M.; Hollick, M.; Strufe, T.; Franchi, N.; Jamali, V.
2024. IEEE Access, 12, 155666–155695. doi:10.1109/ACCESS.2024.3480275 -
Automated Reverse Engineering for MoM-Based Microservices (ARE4MOM) Using Static Analysis
Singh, S.; Koziolek, A.
2024. 2024 IEEE 21st International Conference on Software Architecture (ICSA), Hyderabad, 4th-8th June 2024, 12–22, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA59870.2024.00010 -
Quantum Lattice Enumeration in Limited Depth
Bindel, N.; Bonnetain, X.; Tiepelt, M.; Virdia, F.
2024. Advances in Cryptology – CRYPTO 2024 – 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2024, Proceedings, Part VI. Ed.: L. Reyzin, 72 – 106, Springer Nature Switzerland. doi:10.1007/978-3-031-68391-6_3 -
The Java Verification Tool KeY: A Tutorial
Beckert, B.; Bubel, R.; Drodt, D.; Hähnle, R.; Lanzinger, F.; Pfeifer, W.; Ulbrich, M.; Weigl, A.
2024. doi:10.5281/zenodo.11669182 -
Quantitative Information Flow Control by Construction for Component-Based Systems
Rønneberg, R. C.
2024. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000173622 -
CESAR: Control Envelope Synthesis via Angelic Refinements
Kabra, A.; Laurent, J.; Mitsch, S.; Platzer, A.
2024. Tools and Algorithms for the Construction and Analysis of Systems. Proceedings., Part 1. Ed.: B. Finkbeiner, 144–164, Springer Nature Switzerland. doi:10.1007/978-3-031-57246-3_9 -
HiddenΔ-Fairness: A Novel Notion for Fair Secure Two-Party Computation
Bayreuther, S.; Berger, R.; Dörre, F.; Mechler, J.; Müller-Quade, J.
2024. Information Security and Privacy. Ed.: T. Zhu. Pt. 2, 330–349, Springer Nature Singapore. doi:10.1007/978-981-97-5028-3_17 -
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions
Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Gröll, R.; Müller, M.; Müller-Quade, J.
2024. Public-Key Cryptography – PKC 2024 : 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings. Part IV. Ed.: Q. Tang, 257–288, Springer Nature Switzerland. doi:10.1007/978-3-031-57728-4_9 -
An Extensible Framework for Architecture-Based Data Flow Analysis for Information Security
Boltz, N.; Hahner, S.; Gerking, C.; Heinrich, R.
2024. Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral Symposium : Istanbul, Turkey, September 18–22, 2023, Revised Selected Papers. Ed.: B. Tekinerdoğan, 342–358, Springer. doi:10.1007/978-3-031-66326-0_21 -
Uniform Substitution for Differential Refinement Logic
Prebet, E.; Platzer, A.
2024. Automated Reasoning. IJCAR 2024. Part 2. Ed.: C. Benzmüller, 196–215, Springer Nature Switzerland. doi:10.1007/978-3-031-63501-4_11 -
Provable Security for the Onion Routing and Mix Network Packet Format Sphinx
Scherer, P.; Weis, C.; Strufe, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (4), 755–783. doi:10.56553/popets-2024-0140 -
Fantômas: Understanding Face Anonymization Reversibility
Todt, J.; Hanisch, S.; Strufe, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (4), 24–43. doi:10.56553/popets-2024-0105 -
Combining a Functional Simulation with Multi-level Timing Simulation for Software Architecture Models to Improve Extensibility
Weber, S.; Weber, T.; Heinrich, R.; Henß, J.
2024. IEEE International Conference on Software Architecture (ICSA 2024). doi:10.1109/ICSA-C63560.2024.00019 -
Modeling and Analyzing Zero Trust Architectures Regarding Performance and Security
Boltz, N.; Schmid, L.; Taghavi, B.; Gerking, C.; Heinrich, R.
2024. Software Architecture : 18th European Conference, ECSA 2024, Luxembourg City, Luxembourg, September 3–6, 2024 ; Proceedings. Ed.: M. Galster, 253–269, Springer. doi:10.1007/978-3-031-70797-1_17 -
Fuzz Wars: The Voltage Awakens – Voltage-Guided Blackbox Fuzzing on FPGAs
Su, K.; Giraud, M.; Borcherding, A.; Krautter, J.; Nenninger, P.; Tahoori, M.
2024. 2024 IEEE 42nd VLSI Test Symposium (VTS), Tempe, 22nd-24th April 2024, 1–7, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/VTS60656.2024.10538727 -
A Practical Notion of Liveness in Smart Contract Applications
Schiffl, J.; Beckert, B.
2024. 5th International Workshop on Formal Methods for Blockchains (FMBC 2024). Ed.: B. Bernardo, 8:1–8:13, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/oasics.fmbc.2024.8 -
Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More
Hiroka, T.; Kitagawa, F.; Morimae, T.; Nishimaki, R.; Pal, T.; Yamakawa, T.
2024. Advances in Cryptology – EUROCRYPT 2024 – 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part III. Ed.: M. Joye, 434 – 456, Springer Nature Switzerland. doi:10.1007/978-3-031-58734-4_15 -
Combining Knowledge Graphs and Large Language Models to Ease Knowledge Access in Software Architecture Research
Kaplan, A.; Keim, J.; Schneider, M.; Koziolek, A.; Reussner, R.
2024. SemTech4STLD 2024 : Semantic Technologies and Deep Learning Models for Scientific, Technical and Legal Data 2024 : Second International Workshop on Semantic Technologies and Deep Learning Models for Scientific, Technical and Legal Data (SemTech4STLD) co-located with the Extended Semantic Web Conference 2024 (ESWC 2024). Ed.: R. Dessi, 76–82, CEUR-WS -
Cost-Efficient Construction of Performance Models
Schmid, L.; Saglam, T.; Selzer, M.; Koziolek, A.
2024. 4th Workshop on Performance EngineeRing, Modelling, Analysis, and VisualizatiOn STrategy (PERMAVOST ’24), Pisa, 3rd-4th June 2024, Association for Computing Machinery (ACM). doi:10.1145/3660317.3660322 -
An Extensible Framework for Architecture-Based Data Flow Analysis for Information Security
Boltz, N.; Hahner, S.; Gerking, C.; Heinrich, R.
2024. arxiv. doi:10.48550/arXiv.2403.09402 -
Detecting Inconsistencies in Software Architecture Documentation Using Traceability Link Recovery
Keim, J.; Corallo, S.; Fuchß, D.; Koziolek, A.
2024. Software Engineering 2024 (SE 2024). Ed.: R. Rabiser, 119–120, Gesellschaft für Informatik (GI). doi:10.18420/sw2024_37 -
Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids
Canbolat, S.; Fruböse, C.; Elbez, G.; Hagenmeyer, V.
2024. 21st Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA ’24), Springer. doi:10.1007/978-3-031-64171-8_28 -
Multi-requirement Parametric Falsification
Camilli, M.; Mirandola, R.
2024. 46th International Conference on Software Engineering (ICSE 2024), Lisbon, Portugal, April 14–20, 2024 -
Requirements Classification for Traceability Link Recovery
Hey, T.; Keim, J.; Corallo, S.
2024. 32nd IEEE International Requirements Engineering Conference : 24-28 June 2024, Reykjavik, Iceland. Ed.: G. Liebel, 155–167, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/RE59067.2024.00024 -
Unraveling the Nuances of AI Accountability: A Synthesis of Dimensions Across Disciplines
Nguyen, L. H.; Lins, S.; Renner, M.; Sunyaev, A.
2024. ECIS 2024 Research Papers, AIS eLibrary (AISeL) -
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption
Berger, R.; Dörre, F.; Koch, A.
2024. Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings. Part I. Ed.: C. Pöpper, 288–317, Springer International Publishing. doi:10.1007/978-3-031-54770-6_12 -
Exploring Phishing Threats through QR Codes in Naturalistic Settings
Sharevski, F.; Mossano, M.; Veit, M. F.; Schiefer, G.; Volkamer, M.
2024. Symposium on Usable Security and Privacy (USEC) 2024. doi:10.14722/usec.2024.23050 -
Traffic Light Recognition using Convolutional Neural Networks: A Survey
Pavlitska, S.; Lambing, N.; Bangaru, A. K.; Zöllner, J. M.
2024. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), BIlbai, 24th-28th September 2023, 2790 – 2796, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10422041 -
Systematic User Evaluation of a Second Device based cast-as-intended verifiability Approach
Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.; Volkamer, M.
2024. Voting’24, Springer. doi:10.1007/978-3-031-69231-4_3 -
Architecture-based Propagation Analyses Regarding Security
Hahner, S.; Walter, M.; Heinrich, R.; Reussner, R.
2024. Software Engineering 2024 (SE 2024), 121–122, Gesellschaft für Informatik (GI). doi:10.18420/sw2024_38 -
Replication Package for ICSE24 paper "Recovering Trace Links Between Software Documentation And Code"
Keim, J.; Corallo, S.; Fuchß, D.; Hey, T.; Telge, T.; Koziolek, A.
2024. doi:10.5281/zenodo.10411853 -
Obfuscation-Resilient Software Plagiarism Detection with JPlag
Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. 46th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3639478.3643074 -
DGRI-Jahrestagung 2023: KI, Cybersicherheit/Cyberresilienz, Datenökonomie
Dieler, P.
2024. Computer und Recht, 40 (1), R9-R11 -
Automated Detection of AI-Obfuscated Plagiarism in Modeling Assignments
Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. Proceedings of the 46th International Conference on Software Engineering: Software Engineering Education and Training, ICSE SEET ’24, Lissabon, 14th-20th April 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3639474.3640084 -
Detecting Automatic Software Plagiarism via Token Sequence Normalization
Sağlam, T.; Brödel, M.; Schmid, L.; Hahner, S.
2024. Proceedings of the 46th International Conference on Software Engineering, ICSE ’24, Lissabon, April 14-20, 1–13, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3597503.3639192 -
Designing Gamification Concepts for Expert Explainable Artificial Intelligence Evaluation Tasks: A Problem Space Exploration
Toussaint, P. A.; Warsinsky, S. L.; Schmidt-Kraepelin, M.; Thiebes, S.; Sunyaev, A.
2024. Proceedings of the 57th Hawaii International Conference on System Sciences, Honolulu, HI, 3rd - 6th January 2024, 1338–1347, ScholarSpace -
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
Tiepelt, M.; Eaton, E.; Stebila, D.
2024. Computer Security – ESORICS 2023. Ed.: G. Tsudik. Pt. 1, 168–188, Springer Nature Switzerland. doi:10.1007/978-3-031-50594-2_9 -
Panini - Anonymous Anycast and an Instantiation
Coijanovic, C.; Weis, C.; Strufe, T.
2024. arxiv. doi:10.5445/IR/1000167109 -
Panini - Anonymous Anycast and an Instantiation
Coijanovic, C.; Weis, C.; Strufe, T.
2024. 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Springer-Verlag -
Explainable artificial intelligence for omics data: a systematic mapping study
Toussaint, P. A.; Leiser, F.; Thiebes, S.; Schlesner, M.; Brors, B.; Sunyaev, A.
2024. Briefings in Bioinformatics, 25 (1), 1–16. doi:10.1093/bib/bbad453 -
Recovering Trace Links Between Software Documentation And Code
Keim, J.; Corallo, S.; Fuchß, D.; Hey, T.; Telge, T.; Koziolek, A.
2024. ICSE ’24: Proceedings of the IEEE/ACM 46th International Conference on Software Engineering. Ed.: A. Paiva, Art.-Nr.: 215, Association for Computing Machinery (ACM). doi:10.1145/3597503.3639130 -
PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support
Schadt, D.; Coijanovic, C.; Weis, C.; Strufe, T.
2024. 2024 IEEE Symposium on Security and Privacy (SP), 44–44, IEEE Computer Society. doi:10.1109/SP54263.2024.00044 -
SoK: Explainable Machine Learning in Adversarial Environments
Noppel, M.; Wressnegger, C.
2024. Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P), San Francisco, 20th-22nd May 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SP54263.2024.00021 -
Scalable and Precise Refinement Types for Imperative Languages
Lanzinger, F.; Bachmeier, J.; Ulbrich, M.; Dietl, W.
2024. iFM 2023 – 18th International Conference, iFM 2023, Leiden, The Netherlands, November 13–15, 2023, Proceedings. Ed.: P. Herber, 377–383, Springer Nature Switzerland. doi:10.1007/978-3-031-47705-8_20 -
Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure
Adavoudi Jolfaei, A.; Rupp, A.; Schiffner, S.; Engel, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (1), 232–257. doi:10.56553/popets-2024-0014 -
Cookie disclaimers: Dark patterns and lack of transparency
Berens, B. M.; Bohlender, M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2024. Computers & Security, 136, Art.-Nr.: 103507. doi:10.1016/j.cose.2023.103507 -
A False Sense of Privacy: Towards a Reliable Evaluation Methodology for the Anonymization of Biometric Data
Hanisch, S.; Todt, J.; Patino, J.; Evans, N.; Strufe, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (1), 116–132. doi:10.56553/popets-2024-0008 -
A Large-Scale Study of Cookie Banner Interaction Tools and their Impact on Users’ Privacy
Demir, N.; Urban, T.; Pohlmann, N.; Wressnegger, C.
2024. Proceedings on Privacy Enhancing Technologies, 2024. doi:10.56553/popets-2024- 0001 -
Early Attack Detection for Securing GOOSE Network Traffic
Elbez, G.; Nahrstedt, K.; Hagenmeyer, V.
2024. IEEE Transactions on Smart Grid, 15 (1), 899–910. doi:10.1109/TSG.2023.3272749 -
Online-Wahlen und digitale Abstimmungen – eine Einordnung aktueller Entwicklungen
Volkamer, M.; Mayer, A.; Neumann, S.; Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Müller-Quade, J.
2023. DGRI Jahrbuch 2021/2022, 141–160, Verlag Dr. Otto Schmidt. doi:10.9785/9783504387914-010 -
Technische und datenschutzrechtliche Einordnung von Weiterleitungs-URLs in E-Mails—Was bei Weiterleitungs-URLs in E-Mails aus Marketinggründen zu beachten ist
Veit, M.; Müllmann, D.; Volkamer, M.
2023. Computer und Recht, 39 (12), 810–816. doi:10.9785/cr-2023-391214 -
“Complete” Independence of the ICO and Strategic Priorities of the UK Government?
Winau, M.
2023. Computer law review international, 24 (6), 180–187. doi:10.9785/cri-2023-240605 -
ABCperf: Performance Evaluation of Fault Tolerant State Machine Replication Made Simple: Demo Abstract
Spannagel, T.; Leinweber, M.; Castro, A.; Hartenstein, H.
2023. Proceedings of the 24th International Middleware Conference Demos, Posters and Doctoral Symposium, 35–36, Association for Computing Machinery (ACM). doi:10.1145/3626564.3629101 -
Multi-level Hardware Simulation in Palladio
Weber, S.; Taghavi, B.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 32–34, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43229 -
A Survey of Analysis Composition Operators in the Context of Palladio
Taghavi, B.; Weber, S.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 8–10, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43245 -
BAZAAR: Anonymous Resource Sharing
Coijanovic, C.; Schadt, D.; Weis, C.; Strufe, T.
2023. WPES ’23: Proceedings of the 22nd Workshop on Privacy in the Electronic Society, Kopenhagen, 26th November 2023, 135–139, Association for Computing Machinery (ACM). doi:10.1145/3603216.3624957 -
Poster: Towards Practical Brainwave-based User Authentication
Fallahi, M.; Arias-Cabarcos, P.; Strufe, T.
2023. CCS’ 23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Kopenhagen, 26th-30th November 2023, 3627–3629, Association for Computing Machinery (ACM). doi:10.1145/3576915.3624399 -
Poster: Fooling XAI with Explanation-Aware Backdoors
Noppel, M.; Wressnegger, C.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3612–3614, Association for Computing Machinery (ACM). doi:10.1145/3576915.3624379 -
"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers
Munyendo, C. W.; Mayer, P.; Aviv, A. J.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3123–3137, Association for Computing Machinery (ACM). doi:10.1145/3576915.3623150 -
Enabling the Collaborative Collection of Uncertainty Sources Regarding Confidentiality. bachelor’s thesis
Gehrig, G.
2023, November 3. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000164576 -
Data Companion Set - Bachelor’s Thesis - Gabriel Gehrig
Gehrig, G.
2023, November 3. doi:10.5281/zenodo.10034691 -
SAFFIRRE: Selective Aggregate Filtering Through Filter Rule Refinement
Heseding, H.; Bachmann, F.; Bien, P. S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), Izmir, 4th-06th October 2023, 42–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NoF58724.2023.10302813 -
Exact and Efficient Bayesian Inference for Privacy Risk Quantification
Rønneberg, R. C.; Pardo, R.; Wąsowski, A.
2023. Software Engineering and Formal Methods – 21st International Conference, SEFM 2023, Eindhoven, The Netherlands, November 6-10, 2023, Proceedings. Ed.: C. Ferreira, 263 – 281, Springer Nature Switzerland. doi:10.1007/978-3-031-47115-5_15 -
On Evasion of Machine Learning-based Intrusion Detection in Smart Grids
Mumrez, A.; Sánchez, G.; Elbez, G.; Hagenmeyer, V.
2023, October 31 -
Awareness, Intention, (In)Action: Individuals’ Reactions to Data Breaches
Mayer, P.; Zou, Y.; Lowens, B. M.; Dyer, H. A.; Le, K.; Schaub, F.; Aviv, A. J.
2023. ACM Transactions on Computer-Human Interaction, 30 (5), 1–53. doi:10.1145/3589958 -
Encouraging Organisational Information Security Incident Reporting
Ballreich, F. L.; Volkamer, M.; Müllmann, D.; Berens, B. M.; Häußler, E. M.; Renaud, K. V.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 224–236, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617098 -
Influence of URL Formatting on Users’ Phishing URL Detection
Mossano, M.; Kulyk, O.; Berens, B. M.; Häußler, E. M.; Volkamer, M.
2023. Proceedings of the 2023 European Symposium on Usable Security, 318–333, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617111 -
A Proposal to Study Shoulder-Surfing Resistant Authentication for Augmented and Virtual Reality: Replication Study in the US
Noah, N.; Mayer, P.; Das, S.
2023. CSCW ’23 Companion: Companion Publication of the 2023 Conference on Computer-Supported Cooperative Work and Social Computing, (CSCW ’23 Companion), Minneapolis, 14th-18th October 2023, 317 – 322, Association for Computing Machinery (ACM). doi:10.1145/3584931.3607007 -
Towards a Research Agenda for Understanding and Managing Uncertainty in Self-Adaptive Systems
Weyns, D.; Calinescu, R.; Mirandola, R.; Tei, K.; Acosta, M.; Bencomo, N.; Bennaceur, A.; Boltz, N.; Bures, T.; Camara, J.; Diaconescu, A.; Engels, G.; Gerasimou, S.; Gerostathopoulos, I.; Getir Yaman, S.; Grassi, V.; Hahner, S.; Letier, E.; Litoiu, M.; Marsso, L.; Musil, A.; Musil, J.; Nunes Rodrigues, G.; Perez-Palacin, D.; Quin, F.; Scandurra, P.; Vallecillo, A.; Zisman, A.
2023. ACM SIGSOFT Software Engineering Notes, 48 (4), 20–36. doi:10.1145/3617946.3617951 -
eMinD: Efficient and Micro-Flow Independent Detection of Distributed Network Attacks
Kopmann, S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), 159–167, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NoF58724.2023.10302763 -
How Students Plagiarize Modeling Assignments
Sağlam, T.; Schmid, L.; Hahner, S.; Burger, E.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, 1st - 6th October 2023, 98 – 101, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00032 -
Co-Evolving Meta-Models and View Types in View-Based Development
Muctadir, H. M.; König, L.; Weber, T.; Amrani, M.; Cleophas, L.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), 954–963, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00150 -
Consistency in the View-Based Development of Cyber-Physical Systems (Convide)
Reussner, R.; Schaefer, I.; Beckert, B.; Koziolek, A.; Burger, E.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, Sweden, 01-06 October 2023, 83–84, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00026 -
Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version)
Attema, T.; Fehr, S.; Klooß, M.
2023. Journal of Cryptology, 36 (4), Art.-Nr.: 36. doi:10.1007/s00145-023-09478-y -
Vision: What the hack is going on? A first look at how website owners became aware that their website was hacked
Hennig, A.; Thi Thanh Vuong, N.; Mayer, P.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 312–317, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617101 -
A Design Toolbox for the Development of Collaborative Distributed Machine Learning Systems
Jin, D.; Kannengießer, N.; Rank, S.; Sunyaev, A.
2023. doi:10.5445/IR/1000162704 -
Investigating the Role of Computing Education for Informed Usage Decision-Making
Gebhardt, L.; Leinweber, M.; Michaeli, T.
2023. WiPSCE ’23: The 18th WiPSCE Conference on Primary and Secondary Computing Education Research Cambridge United Kingdom September 27 - 29, 2023. Ed.: S. Sentance, 1–2, Association for Computing Machinery (ACM). doi:10.1145/3605468.3609776 -
Cybersecurity for industrial automation and control systems
Haas, C.; Bretthauer, G.; Beyerer, J.
2023. at - Automatisierungstechnik, 71 (9), 723–725. doi:10.1515/auto-2023-0141 -
The Fast Rise of Cautious Vehicle-to-X: Towards Evaluating Misbehavior Detection in the Field
Wehmer, M.; Baumgart, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), Bilbao, Spain, 24-28 September 2023, 3930–3936, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/itsc57777.2023.10422080 -
SOTIF-Compliant Scenario Generation Using Semi-Concrete Scenarios and Parameter Sampling
Birkemeyer, L.; Fuchs, J.; Gambi, A.; Schaefer, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), 2139–2144, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10422637 -
Is Scenario Generation Ready for SOTIF? A Systematic Literature Review
Birkemeyer, L.; King, C.; Schaefer, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), 472–479, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10422664 -
How Automated Market Makers Approach the Thin Market Problem in Cryptoeconomic Systems
Kirste, D.; Kannengießer, N.; Lamberty, R.; Sunyaev, A.
2023. arxiv. doi:10.48550/arXiv.2309.12818 -
Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems
Ramadan, M.; Raza, S.
2023. IEEE Internet of Things Journal, 10 (18), 16594–16604. doi:10.1109/JIOT.2023.3269222 -
Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models
Borcherding, A.; Morawetz, M.; Pfrang, S.
2023. Sensors, 23 (18), Art.-Nr.: 7864. doi:10.3390/s23187864 -
Towards Self-learning Industrial Process Behaviour from Payload Bytes for Anomaly Detection
Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA), Sinaia, Romania, 12-15 September 2023, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA54631.2023.10275358 -
A new hybrid risk assessment process for cyber security design of smart grids using fuzzy analytic hierarchy processes
Canbolat, S.; Elbez, G.; Hagenmeyer, V.
2023. Automatisierungstechnik. doi:10.1515/auto-2023-0089 -
Lessons Learned on Machine Learning for Computer Security
Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2023. IEEE Security & Privacy, 21 (5), 72–77. doi:10.1109/MSEC.2023.3287207 -
Reducing memory footprints in purity estimations of volumetric DDoS traffic aggregates
Heseding, H.; Krack, T.; Zitterbart, M.
2023. M. Seufert, A. Blenk & O. Landsiedel (Eds.), 2nd Workshop on Machine Learning & Netwoking (MaLeNe) Proceedings. Co-located with the 5th International Conference on Networked Systems (NetSys 2023), Potsdam, Germany. Ed.: . Seufert, Universität Augsburg -
Impact of Adaptive Packet Sampling on ML-based DDoS Detection
Kopmann, S.; Zitterbart, M.
2023. 2nd Workshop “Machine Learning & Networking” (MaLeNe) Proceedings Co-Located with the 5th International Conference on Networked Systems (NETSYS 2023) Potsdam, Germany, September 4, 2023 (MaLeNe). Ed.: M. Seufert -
A user-centred approach to facilitate locating company security policies : Nutzerzentrierter Ansatz zur Vereinfachung des Auffindens von Security Policies
Aldag, L.; Ballreich, F.; Berens, B.; Volkamer, M.
2023. MuC ’23: Proceedings of Mensch und Computer. Ed.: M. Stolze, 173–185, Association for Computing Machinery (ACM). doi:10.1145/3603555.3603573 -
A Translation Layer for Information Flow Verification Systems: Bridging Type Systems with Theorem Provers. bachelor’s thesis
Mühlenberend, F.
2023, September 1. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165079 -
A Survey on Privacy-Preserving Electronic Toll Collection Schemes for Intelligent Transportation Systems
Adavoudi Jolfaei, A.; Boualouache, A.; Rupp, A.; Schiffner, S.; Engel, T.
2023. IEEE Transactions on Intelligent Transportation Systems, 24 (9), 8945–8962. doi:10.1109/TITS.2023.3266828 -
An Expert Survey on the Use of Informal Models in the Automotive Industry
Fuchß, D.; Kühn, T.; Wortmann, A.; Pfeiffer, J.; Koziolek, A.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000162389 -
Continuous T-Wise Coverage
Pett, T.; Heß, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2023. SPLC ’23: Proceedings of the 27th ACM International Systems and Software Product Line Conference. Vol. A. Ed.: P. Arcaini, 87–98, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608980 -
True Variability Shining Through Taxonomy Mining
König, C.; Rosiak, K.; Cleophas, L.; Schaefer, I.
2023. Proceedings of the 27th ACM International Systems and Software Product Line Conference - Volume A, 182–193, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608989 -
A Toolchain for Simulation Component Specification and Identification
Koch, S.; Reiche, F.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 75–89, Springer International Publishing. doi:10.1007/978-3-031-36889-9_7 -
Usability for Data Sovereignty - Evaluation of Privacy Risk Quantification Interfaces
Appenzeller, A.; Balduf, F.; Beyerer, J.
2023. Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments, 206–214, Association for Computing Machinery (ACM). doi:10.1145/3594806.3594816 -
Tool-Supported Architecture-Based Data Flow Analysis for Confidentiality
Schwickerath, F.; Boltz, N.; Hahner, S.; Walter, M.; Gerking, C.; Heinrich, R.
2023. arxiv. doi:10.48550/arXiv.2308.01645 -
Areas of Tension in the Application of AI and Data Protection Law
Winau, M.
2023. European Data Protection Law Review, 9 (2), 123 – 135. doi:10.21552/edpl/2023/2/7 -
Toward Joining DDoS Mitigation and Image Segmentation – Leveraging Computer Vision for Network Security
Kopmann, S.; Heseding, H.; Zitterbart, M.
2023. Datenschutz und Datensicherheit - DuD, 47 (8), 475–477. doi:10.1007/s11623-023-1801-1 -
Beware of website hackers: Developing an awareness video to warn for website hacking
Hennig, A.; Schmidt-Enke, L.; Mutter, M.; Mayer, P.
2023, August. 19th Symposium on Usable Privacy and Security. Co-located with USENIX Security ’23 (SOUPS 2023), Anaheim, CA, USA, August 6–8, 2023 -
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices
Arias-Cabarcos, P.; Fallahi, M.; Habrich, T.; Schulze, K.; Becker, C.; Strufe, T.
2023. ACM Transactions on Privacy and Security, 26 (3), Art.-Nr.: 26. doi:10.1145/3579356 -
Finding optimal decision boundaries for human intervention in one-class machine-learning models for industrial inspection
Zander, T.; Pan, Z.; Birnstill, P.; Beyerer, J.
2023. tm - Technisches Messen, 90 (7-8), 478–488. doi:10.1515/teme-2023-0010 -
Adversarial Attacks on Traffic Sign Recognition: A Survey
Pavlitska, S.; Lambing, N.; Zöllner, J. M.
2023. 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Tenerife, Spain, 19-21 July 2023, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICECCME57830.2023.10252727 -
Protocol-Agnostic Detection of Stealth Attacks on Networked Control Systems
Heseding, H.; Dieing, M.; Meshram, A.; Zitterbart, M.
2023. 2023 IEEE 21st International Conference on Industrial Informatics (INDIN), Lemgo, Germany, 17-20 2023, 1–7, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INDIN51400.2023.10218314 -
TRUST: Transparent Redundancy for UDP STreams
Neumeister, F.; Göckel, M.; Zitterbart, M.
2023. IEEE 21st International Conference on Industrial Informatics (INDIN 2023), 7 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INDIN51400.2023.10218145 -
Evaluating Model Differencing for the Consistency Preservation of State-based Views
Wittler, J. W.; Saglam, T.; Kühn, T.
2023. The Journal of Object Technology, 22 (2), 2:1–14. doi:10.5381/jot.2023.22.2.a4 -
The Bandit’s States: Modeling State Selection for Stateful Network Fuzzing as Multi-armed Bandit Problem
Borcherding, A.; Giraud, M.; Fitzgerald, I.; Beyerer, J.
2023. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 345–350, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW59978.2023.00043 -
Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0
Walter, M.; Hahner, S.; Bureš, T.; Hnětynka, P.; Heinrich, R.; Reussner, R.
2023. at - Automatisierungstechnik, 71 (6), 443–452. doi:10.1515/auto-2022-0135 -
Investigating Software Engineering Artifacts in DevOps Through the Lens of Boundary Objects
Matthies, C.; Heinrich, R.; Wohlrab, R.
2023. EASE ’23: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 12–21, Association for Computing Machinery (ACM). doi:10.1145/3593434.3593441 -
Decentralizing Software Identity Management. PhD dissertation
Stengele, O.
2023, June 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000159237 -
Hybrid Risk Assessment Process for Smart Grids
Canbolat, S.; Elbez, G.; Hagenmeyer, V.
2023, May 10. 10th KIT-Zentrum Energie Promovierenden-Symposium // KIT Energy Center Doctoral Symposium (2023), Karlsruhe, Germany, May 10, 2023 -
Let It TEE: Asynchronous Byzantine Atomic Broadcast with n ≥ 2f + 1
Leinweber, M.; Hartenstein, H.
2023. doi:10.48550/arXiv.2305.06123 -
On Extend-Only Directed Posets and Derived Byzantine-Tolerant Replicated Data Types
Jacob, F.; Hartenstein, H.
2023. PaPoC ’23: 10th Workshop on Principles and Practice of Consistency for Distributed Data Rome Italy 8 May 2023.Ed.: E. Gonzalez Boix, 63–69, Association for Computing Machinery (ACM). doi:10.1145/3578358.3591333 -
Holistic Adversarially Robust Pruning
Zhao, Q.; Wressnegger, C.
2023. 11th International Conference on Learning Representations (ICLR), Kigali, 1st-5th May 2023 -
Architecture-Based Uncertainty Impact Analysis to Ensure Confidentiality
Hahner, S.; Heinrich, R.; Reussner, R.
2023. 2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 126–132, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAMS59076.2023.00026 -
Weiterleitungs-URLs in E-Mails – Technische und rechtliche Aspekte
Müllmann, D.; Veit, M. F.; Volkamer, M.
2023. Datenschutz und Datensicherheit - DuD, 47 (5), 275–282. doi:10.1007/s11623-023-1761-5 -
Cookie-Nutzung nach Inkrafttreten des TTDSG – Zur Datenschutzkonformität des Cookie-Einsatzes auf den meistgenutzten deutschen Websites
Bohlender, M.; Dietmann, H.; Volkamer, M.
2023. Datenschutz und Datensicherheit - DuD, 47 (5), 283–288. doi:10.1007/s11623-023-1762-4 -
BrainNet: Improving Brainwave-based Biometric Recognition with Siamese Networks
Fallahi, M.; Strufe, T.; Arias-Cabarcos, P.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications (PerCom), 53–60, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PERCOM56429.2023.10099367 -
Design-time Performability Evaluation of Runtime Adaptation Strategies (Work In Progress Paper)
Rapp, M.; Scheerer, M.; Reussner, R.
2023. Companion of the 2023 ACM/SPEC International Conference on Performance Engineering, 9–15, Association for Computing Machinery (ACM). doi:10.1145/3578245.3585028 -
Intelligente Verkehrssysteme – IT-Sicherheit in offenen Infrastrukturen Teil 2
Sterz, L.; Werner, C.; Raabe, O.
2023. Recht der Datenverarbeitung, 39 (2), 97–105 -
Combining rule- and SMT-based reasoning for verifying floating-point Java programs in KeY
Abbasi, R.; Schiffl, J.; Darulova, E.; Ulbrich, M.; Ahrendt, W.
2023. International Journal on Software Tools for Technology Transfer, 25 (2), 185–204. doi:10.1007/s10009-022-00691-x -
Online-basierte gendersensible Informatik-Lerneinheiten
Happe, L.; Marquart, K.; Koziolek, A.; Wagner, I.
2023, March 30. 2. Netzwerktag Lehrkräftebildung (2023), Karlsruhe, Germany, March 30, 2023 -
Applying Differential Privacy to Medical Questionnaires
Appenzeller, A.; Terzer, N.; Philipp, P.; Beyerer, J.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 608–613, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops56833.2023.10150373 -
Model-based Confidentiality Analysis under Uncertainty
Hahner, S.; Bitschi, T.; Walter, M.; Bureš, T.; Hnětynka, P.; Heinrich, R.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), 256–263, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00062 -
Automatic Derivation of Vulnerability Models for Software Architectures
Kirschner, Y. R.; Walter, M.; Bossert, F.; Heinrich, R.; Koziolek, A.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), L’Aquila, Italy, 13-17 March 2023, 276–283, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00065 -
Detecting Inconsistencies in Software Architecture Documentation Using Traceability Link Recovery
Keim, J.; Corallo, S.; Fuchß, D.; Koziolek, A.
2023. 20th IEEE International Conference on Software Architecture (ICSA), 141–152, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA56044.2023.00021 -
On Efficient Zero-Knowledge Arguments. PhD dissertation
Klooß, M.
2023, February 20. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000156118 -
Formally Verified Next-generation Airborne Collision Avoidance Games in ACAS X
Cleaveland, R.; Mitsch, S.; Platzer, A.
2023. ACM Transactions on Embedded Computing Systems, 22, Article no: 10. doi:10.1145/3544970 -
A First Complete Algorithm for Real Quantifier Elimination in Isabelle/HOL
Kosaian, K.; Tan, Y. K.; Platzer, A.
2023. Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs, 211–224, Association for Computing Machinery (ACM). doi:10.1145/3573105.3575672 -
The Democratization of News - Analysis and Behavior Modeling of Users in the Context of Online News Consumption. PhD dissertation
Reubold, J. L.
2023, January 11. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000154353 -
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph
Kaiser, F. K.; Dardik, U.; Elitzur, A.; Zilberman, P.; Daniel, N.; Wiens, M.; Schultmann, F.; Elovici, Y.; Puzis, R.
2023. IEEE transactions on dependable and secure computing, 1–17. doi:10.1109/TDSC.2022.3233703 -
German Social Elections in 2023: An Overview and first Analysis
Hilt, T.; Kulyk, O.; Volkamer, M.
2023. E-Vote-ID 2023 : Eight International Joint Conference on Electronic Voting, 221–237, Gesellschaft für Informatik (GI) -
E-Vote-ID 2023 : Eight International Joint Conference on Electronic Voting
Volkamer, M.; Duenas-Cid, D.; Rønne, P. B.; Ryan, P. Y. A.; Budurushi, J.; Kulyk, O.; Rodriguez Pérez, A.; Spycher-Krivonosova, I.; Kirsten, M.; Debant, A.; Goodman, N. (Eds.)
2023. Gesellschaft für Informatik (GI). doi:10.18420/e-vote-id2023_16 -
Verantwortlichkeit im Unternehmen und Verschuldensmaßstab im Rahmen des Art.83 DSGVO
Kemmler, K. J.
2023. INFORMATIK 2023. Hrsg.: M. Klein, 689–702, Gesellschaft für Informatik (GI). doi:10.18420/inf2023_79 -
Continuing to Catch Up with State of the Art Continuous Integration Pipelines in Palladio – The Experience Report Strikes Back
Alber, L.; Boltz, N.; Schmid, L.
2023. Softwaretechnik-Trends, 43 (4) -
Designing Automotive Case Studies for Architectural Security Analyses
Boltz, N.; Walter, M.; Gerking, C.
2023. 14th Symposium on Software Performance 2023 (SSP 2023), Karlsruhe, 6th-8th November 2023, 23–25 -
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from VOLE-in-the-Head
Baum, C.; Braun, L.; Saint Guilhem, C. D. De; Klooß, M.; Orsini, E.; Roy, L.; Scholl, P.
2023. Advances in Cryptology – CRYPTO 2023 – 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V. Ed.: H. Handschuh, 581–615, Springer Nature Switzerland. doi:10.1007/978-3-031-38554-4_19 -
RIXA - Explaining Artificial Intelligence in Natural Language
Becker, M.; Schwall, F.; Vishwesh, V.; Wu, S.; Birnstill, P.; Beyerer, J.
2023. doi:10.5445/IR/1000167428 -
Explainable Artificial Intelligence for Interpretable Data Minimization
Becker, M.; Toprak, E.; Beyerer, J.
2023. doi:10.5445/IR/1000167427 -
Identifying Performance Challenges in Consistency Preserving View-Based Environments
König, L.; Weber, T.
2023. Softwaretechnik-Trends, 14th Symposium on Software Performance 2023, Karlsruhe, 6th - 8th November 2023, 26–28, Gesellschaft für Informatik (GI) -
Composable Long-Term Security with Rewinding
Berger, R.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
2023. Theory of Cryptography – 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part IV. Ed.: G. Rothblum, 510 – 541, Springer Nature Switzerland. doi:10.1007/978-3-031-48624-1_19 -
Explanation-Aware Backdoors in a Nutshell
Noppel, M.; Wressnegger, C.
2023. Proc. of 46th German Conference on Artificial Intelligence (KI) -
On Evasion of Machine Learning-based Intrusion Detection in Smart Grids
Mumrez, A.; Sánchez, G.; Elbez, G.; Hagenmeyer, V.
2023. IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids. doi:10.1109/SmartGridComm57358.2023.10333966 -
Comparative Study on Smart Grid Security Testbeds Using MITRE ATT&CK Matrix
Mumrez, A.; Muhammad M. Roomi; Heng Chuan Tan; Daisuke Mashima; Elbez, G.; Hagenmeyer, V.
2023. 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SmartGridComm57358.2023.10333902 -
Understanding issues related to personal data and data protection in open source projects on GitHub
Hennig, A.; Schulte, L.; Herbold, S.; Kulyk, O.; Mayer, P.
2023. arxiv. doi:10.48550/arXiv.2304.06367 -
Engineering Self-adaptive Microservice Applications: An Experience Report
Riccio, V.; Sorrentino, G.; Camilli, M.; Mirandola, R.; Scandurra, P.
2023. Service-Oriented Computing – 21st International Conference, ICSOC 2023, Rome, Italy, November 28 – December 1, 2023, Proceedings, Part I. Ed.: F. Monti, 227–242, Springer Nature Switzerland. doi:10.1007/978-3-031-48421-6_16 -
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
Tiepelt, M.; Eaton, E.; Stebila, D.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000164970 -
Are Formal Contracts a useful Digital Twin of Software Systems?
Schiffl, J.; Weigl, A.
2023. Proceedings of the Workshop on Applications of Formal Methods and Digital Twins co-located with 25th International Symposium on Formal Methods (FM 2023), Ed.: S. Hallerstede, CEUR-WS -
Universally Composable Auditable Surveillance
Fetzer, V.; Klooß, M.; Müller-Quade, J.; Raiber, M.; Rupp, A.
2023. Advances in Cryptology – ASIACRYPT 2023 – 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part II. Ed.: J. Guo, 453 – 487, Springer Nature Singapore. doi:10.1007/978-981-99-8724-5_14 -
Data sovereignty and informed consent as enablers for patient-oriented AI-driven clinical research: Requirements from a clinical, technical, legal and economic perspective
Spiecker genannt Döhmann, I.; Radic, M.; Busch-Casler, J.; Vosen, A.; Appenzeller, A.; Mucha, H.; Patrick, P.; Kevin, K.; Dauth, S.; Köhm, M.; Orak, B.
2023 -
§ 20: Digitalisierung, Informationsgesellschaft, Massendaten
Spiecker genannt Döhmann, I.
2023. Handbuch des Staatsrechts, Band I: Grundlagen, Wandel und Herausforderungen. Hrsg.: Uwe Kischel, Hanno Kube, 899–934, C.F. Müller -
Das Allgemeine Gleichbehandlungsgesetz und der Schutz vor Diskriminierung durch algorithmische Entscheidungssysteme
Spiecker genannt Döhmann, I.; Towfigh, E. V.
2023. Antidiskriminierungsstelle des Bundes. doi:10.5445/IR/1000164292 -
General Data Protection Regulation. Article-by-Article Commentary
Papakonstantinou, V.; Hornung, G.
2023. (P. De Hert & I. Spiecker genannt Döhmann, Eds.), Nomos -
Rechtliche Studie zum Cypher Social Contracts Konzept „Fides“
Spiecker genannt Döhmann, I.; Müllmann, D.; Bretthauer, S.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5281/zenodo.7680213 -
Die Zukunft der Gesundheitsberufe in Bildung und Migration
Spiecker gen. Döhmann, I.; Lehner, R.
2023. Lang -
Fracking: eine Option für Deutschland? Chancen, Risiken und Ungewissheiten beim Fracking in nicht konventionellen Lagerstätten
Gierds, J.; Stephanos, C.; Erlach, B.; Fischedick, M.; Henning, H.-M.; Matthies, E.; Pittel, K.; Renn, J.; Sauer, D. U.; Spiecker genannt Döhmann, I. (Eds.)
2023. Deutsche Akademie der Naturforscher Leopoldina e. V. doi:https://doi.org/10.48669/esys_2023-5 -
Online-Bundestagswahlen - Verfassungsrechtliche Grenzen und technische Herausforderungen
Gutjahr, A.; Spiecker gen. Döhmann, I.; Volkamer, M.
2023. Computer und Recht, 39 (11), 767–776. doi:10.9785/cr-2023-391124 -
Geschlechtergerechtigkeit im Spannungsfeld von nachhaltiger und digitaler Transformation – eine interdisziplinäre Annäherung
Spiecker genannt Döhmann, I.; Ohde, F.; Blättel-Mink, B.; Draude, C.
2023. Gender, (2), 132–147. doi:10.3224/gender.v15i2.10 -
Abschreckungseffekte und Überwachungsgefühl im Datenschutzrecht. Auswirkungen auf betroffene Personen
Spiecker genannt Döhmann, I.; Büscher, M.; Gutjahr, A.; Hornung, G.; Schindler, S.; Selzer, A.; Stummer, S.; Wilmer, T.; Zurawski, P.
2023. Datenschutz und Datensicherheit, 503–512. doi:10.1007/s11623-023-1807-8 -
Neue alte Entwicklungen für das Verwaltungsrecht: Von Kooperation und Dreiecksverhältnissen zur Konfliktbefriedung und Vertrauensbildung im Wirtschaftsverwaltungs- und Gesundheitsrecht
Spiecker genannt Döhmann, I.
2023. Schutz des Individuums durch das Recht: Festschrift für Professor Rainer Hofmann zum 70. Geburtstag. Bd.2. Hrsg.: Philipp B. Donath, Alexnader Heger, Moritz Malkmus, Orhan Bayrak, 1135–1150, Springer. doi:10.1007/978-3-662-66978-5_73 -
Governance Foundations for the European Cybersecurity Community
Spiecker genannt Döhmann, I.; Ferreira, A.; Wintzingerode, C. von; Müllmann, D.; Benzekri, A.; Cros, P.-H.; Prochilo, E.
2023. Digital Sovereignty in Cyber Security: New Challenges in Future Vision: First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers, 132–148, Springer Nature Switzerland. doi:10.1007/978-3-031-36096-1_9 -
Dienstleistungsroboter im Handel: Einsatzmöglichkeiten und verantwortungsbewusster Einsatz
Spiecker genannt Döhmann, I.; Stock-Homburg, R.; Knof, M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; David, K.; Wendt, J.; Stryk, O. von; Hannig, M.
2023. L. Binckebanck, R. Elste & A. Haas (Eds.), Digitalisierung im Vertrieb : Strategien zum Einsatz neuer Technologien in Vertriebsorganisationen / Lars Binckebanck, Rainer Elste, Alexander Haas, 533–568, Springer. doi:10.1007/978-3-658-38433-3_21 -
How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Noti-fication Study Reveals Diverse Circumstances and Challenges
Spiecker genannt Döhmann, I.; Stöver, A.; Gerber, N.; Pridöhl, H.; Maass, M.; Bretthauer, S.; Hollick, M.; Herrmann, D.
2023. Proceedings on privacy enhancing technologies, 2023, 251–264. doi:10.56553/popets-2023-0051 -
Neue Strukturen in der Europäischen Cybersicherheit – ein Über- und Ausblick
Spiecker genannt Döhmann, I.; Wintzingerode, C. von; Müllmann, D.
2023. Datenschutz-Berater, 66–70 -
Generating adaptation rule-specific neural networks
Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2023. International Journal on Software Tools for Technology Transfer, 25, 733–746. doi:10.1007/s10009-023-00725-y -
Identifying Factors Studied for Voter Trust in E-Voting – Review of Literature
Erb, Y.; Duenas-Cid, D.; Volkamer, M.
2023. E-Vote-ID 2023 -
Roboter im Supermarkt - Eine Betrachtung haftungs- und datenschutzrechtlicher Probleme beim Einsatz von Robotern im Einzelhandel
Ebert, A.; Busch, P.; Spiecker genannt Döhmann, I.; Wendt, J.
2023. Zeitschrift für Product Compliance, (1), 16–29 -
Human-Centered Design for Data-Sparse Tailored Privacy Information Provision
Goram, M.; Dehling, T.; Morsbach, F.; Sunyaev, A.
2023. Human Factors in Privacy Research. Ed.: N. Gerber, 283–298, Springer International Publishing. doi:10.1007/978-3-031-28643-8_14 -
The Future of Enterprise Information Systems
Sunyaev, A.; Dehling, T.; Strahringer, S.; Da Xu, L.; Heinig, M.; Perscheid, M.; Alt, R.; Rossi, M.
2023. Business & Information Systems Engineering, 65, 731–751. doi:10.1007/s12599-023-00839-2 -
Voter Perception of Cast-as-Intended Verifiability in the Estonian I-Vote Protocol
Hilt, T.; Sein, K.; Mällo, T.; Willemson, J.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI) -
German Social Elections 2023: An Overview and first Analysis
Hilt, T.; Kulyk, O.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI) -
Practically Efficient Private Set Intersection From Trusted Hardware with Side-Channels
Dörre, F.; Mechler, J.; Müller-Quade, J.
2023. Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Springer-Verlag. doi:10.1007/978-981-99-8730-6_9 -
Static Capability-Based Security for Smart Contracts
Schiffl, J.; Weigl, A.; Beckert, B.
2023. 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 110 – 117, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/DAPPS57946.2023.00024 -
QIn: Enabling Formal Methods to Deal with Quantum Circuits
Klamroth, J.; Beckert, B.; Scheerer, M.; Denninger, O.
2023. 2023 IEEE International Conference on Quantum Software (QSW), Chicago, IL, 2nd - 8th July 2023, 175 – 185, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/QSW59989.2023.00029 -
Exact and Efficient Bayesian Inference for Privacy Risk Quantification (Extended Version)
Rønneberg, R. C.; Pardo, R.; Wąsowski, A.
2023. doi:10.48550/arXiv.2308.16700 -
Uniform Substitution for Dynamic Logic with Communicating Hybrid Programs
Brieger, M.; Mitsch, S.; Platzer, A.
2023. Automated Deduction – CADE 29 – 29th International Conference on Automated Deduction, Rome, Italy, July 1–4, 2023, Proceedings. Ed.: B. Pientka, 96 – 115, Springer Nature Switzerland. doi:10.1007/978-3-031-38499-8_6 -
Automated Integration of Heteregeneous Architecture Information into a Unified Model
Jordan, S.; König, C.; Linsbauer, L.; Schaefer, I.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 83 – 99, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_6 -
Brief Announcement: Let It TEE: Asynchronous Byzantine Atomic Broadcast with n ≥ 2f+1
Leinweber, M.; Hartenstein, H.
2023. 37th International Symposium on Distributed Computing (DISC 2023). Ed.: R. Oshman, 43:1–43:7, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.DISC.2023.43 -
Sparsely-gated Mixture-of-Expert Layers for CNN Interpretability
Pavlitska, S.; Hubschneider, C.; Struppek, L.; Zöllner, J. M.
2023. 2023 International Joint Conference on Neural Networks (IJCNN), 1–10, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IJCNN54540.2023.10191904 -
Replication Package: An Expert Survey on the Use of Informal Models in the Automotive Industry
Fuchß, D.; Kühn, T.; Pfeiffer, J.; Wortmann, A.; Koziolek, A.
2023. doi:10.5281/zenodo.8199850 -
Automated Reverse Engineering of the Technology-Induced Software System Structure
Kirschner, Y. R.; Keim, J.; Peter, N.; Koziolek, A.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 283–291, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_19 -
Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents
Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Architecture. Ed.: B. Tekinerdogan, 37–53, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_3 -
Dataset: Architecture-based Attack Path Analysis for Identifying Potential Security Incidents
Walter, M.; Heinrich, R.; Reussner, R.
2023. doi:10.5281/zenodo.7900356 -
Zu Risiken und Anonymisierungen von Verhaltensbiometrie
Hanisch, S.; Todt, J.; Volkamer, M.; Strufe, T.
2023. Daten-Fairness in einer globalisierten Welt. Ed.: M. Friedewald, 423–444, Nomos Verlagsgesellschaft. doi:10.5771/9783748938743-423 -
Disguising Attacks with Explanation-Aware Backdoors
Noppel, M.; Peter, L.; Wressnegger, C.
2023. 2023 IEEE Symposium on Security and Privacy (SP), 664 – 681, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SP46215.2023.10179308 -
Personalized Explanations
Becker, M.
2023. Proceedings of the 2022 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer, 1–10, KIT Scientific Publishing -
A Classification of Software-Architectural Uncertainty Regarding Confidentiality
Hahner, S.; Seifermann, S.; Heinrich, R.; Reussner, R.
2023. E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, 139–160, Springer International Publishing. doi:10.1007/978-3-031-36840-0_8 -
A Collection of Scenarios for the Decomposition and Composition of Model-based Analyses
Koch, S.; Reiche, F.; Weber, S.; Konersmann, M.; Stüber, S.; Wollenhaupt, L.; Taghavi, B.; Rumpe, B.; Heinrich, R.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000161276 -
Dataset: Tool-Supported Architecture-Based Data Flow Analysis for Confidentiality
Schwickerath, F.; Boltz, N.; Hahner, S.; Walter, M.; Gerking, C.; Heinrich, R.
2023. doi:10.5281/zenodo.8119378 -
Evaluating ML-based IDS with Mimicry Attacks
Sanchez, G.; Mumrez, A.; Elbez, G.; Wressnegger, C.; Hagenmeyer, V.
2023. Community Congress by StartUpSecure 2023- Critical Infrasructure and CyberSecruity (2023), Karlsruher Institut für Technologie, May 11, 2023 -
POET: A Self-learning Framework for PROFINET Industrial Operations Behaviour
Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. Tools for Design, Implementation and Verification of Emerging Information Technologies – 17th EAI International Conference, TridentCom 2022, Melbourne, Australia, November 23-25, 2022, Proceedings. Ed.: S. Yu, 3 – 19, Springer Nature Switzerland. doi:10.1007/978-3-031-33458-0_1 -
A Taxonomy for Design Decisions in Software Architecture Documentation
Keim, J.; Hey, T.; Sauer, B.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 439–454, Springer International Publishing. doi:10.1007/978-3-031-36889-9_29 -
Analysis and Prevention of Averaging Attacks Against Obfuscation Protocols
Becher, K.; Lagodzinski, J. A. G.; Parra-Arnau, J.; Strufe, T.
2023. Applied Cryptography and Network Security – 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part I. Ed.: M. Tibouchi, 451 – 475, Springer Nature Switzerland. doi:10.1007/978-3-031-33488-7_17 -
Establishing a Benchmark Dataset for Traceability Link Recovery Between Software Architecture Documentation and Models
Fuchß, D.; Corallo, S.; Keim, J.; Speit, J.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops, Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 455–464, Springer International Publishing. doi:10.1007/978-3-031-36889-9_30 -
Tool-Based Attack Graph Estimation and Scenario Analysis for Software Architectures
Walter, M.; Reussner, R.
2023. Software Architecture : ECSA 2022 Tracks and Workshops. Ed.: T. Batista, 45–61, Springer International Publishing. doi:10.1007/978-3-031-36889-9_5 -
Flexible Correct-by-Construction Programming
Runge, T.; Bordis, T.; Potanin, A.; Thüm, T.; Schaefer, I.
2023. Logical Methods in Computer Science, Volume 19, Issue 2 (2), 16:1 – 16:36. doi:10.46298/lmcs-19(2:16)2023 -
Automating GUI-based Software Testing with GPT-3
Zimmermann, D.; Koziolek, A.
2023. 2023 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 62 – 65, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSTW58534.2023.00022 -
Towards a Formal Verification of the Lightning Network with TLA+
Grundmann, M.; Hartenstein, H.
2023. doi:10.5445/IR/1000160211 -
A design theory for transparency of information privacy practices
Dehling, T.; Sunyaev, A.
2023. Information Systems Research. doi:10.1287/isre.2019.0239 -
Sender-binding Key Encapsulation
Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2023. Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I. Ed.: A. Boldyreva, 744 – 773, Springer Nature Switzerland. doi:10.1007/978-3-031-31368-4_26 -
Refinements of Hybrid Dynamical Systems Logic
Platzer, A.
2023. Rigorous State-Based Methods – 9th International Conference, ABZ 2023, Nancy, France, May 30–June 2, 2023, Proceedings. Ed.: U. Glässer, 3 – 14, Springer Nature Switzerland. doi:10.1007/978-3-031-33163-3_1 -
Forschungsstand der Sicherheit von implantierbaren medizinischen Geräten. bachelor’s thesis
Palkowitsch-Amberger, M.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000159670 -
Automatic Derivation of Vulnerability Models for Software Architectures
Kirschner, Y. R.; Walter, M.; Bossert, F.; Heinrich, R.; Koziolek, A.
2023. doi:10.5281/zenodo.7413806 -
Adversarial Vulnerability of Temporal Feature Networks for Object Detection
Pavlitskaya, S.; Polley, N.; Weber, M.; Zöllner, J. M.
2023. Computer Vision – ECCV 2022 Workshops. Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part V, Ed.: L. Karlinsky, 510–525, Springer Nature Switzerland. doi:10.1007/978-3-031-25072-9_35 -
Council of Europe Guidelines on the Use of ICT in Electoral Processes
Driza Maurer, A.; Volkamer, M.; Krimmer, R.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 585–599, Springer International Publishing. doi:10.1007/978-3-031-25460-4_34 -
Why Is Online Voting Still Largely a Black Box?
Kirsten, M.; Volkamer, M.; Beckert, B.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 555–567, Springer International Publishing. doi:10.1007/978-3-031-25460-4_32 -
Evaluation Methods and Replicability of Software Architecture Research Objects
Konersmann, M.; Kaplan, A.; Kühn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2023. Software Engineering 2023 : Fachtagung des GI-Fachbereichs Softwaretechnik : 20.-24. Februar 2023 Paderborn. Ed.: G. Engels; M. Tichy, 75–76, Gesellschaft für Informatik (GI) -
SoK: Differentially Private Publication of Trajectory Data
Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies, 496–516, De Gruyter. doi:10.56553/popets-2023-0065 -
Ihre Website wurde gehackt: Awareness schaffen für ein unsichtbares Problem
Hennig, A.; Mayer, P.; Volkamer, M.
2023. 2023 Nationale Konferenz IT-Sicherheitsforschung : Die digital vernetzte Gesellschaft stärken (2023), Berlin, Germany, March 13–15, 2023 -
Randomness is the Root of All Evil: More Reliable Evaluation of Deep Active Learning
Ji, Y.; Kaestner, D.; Wirth, O.; Wressnegger, C.
2023. 2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 3932–3941, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WACV56688.2023.00393 -
SWaTEval: An Evaluation Framework for Stateful Web Application Testing
Borcherding, A.; Penkov, N.; Giraud, M.; Beyerer, J.
2023. Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP, 430–441, SciTePress. doi:10.5220/0011652200003405 -
Dynamic Access Control in Industry 4.0 Systems
Heinrich, R.; Seifermann, S.; Walter, M.; Hahner, S.; Reussner, R.; Bureš, T.; Hnětynka, P.; Pacovský, J.
2023. Digital Transformation. Ed.: B. Vogel-Heuser, 143–170, Springer Vieweg. doi:10.1007/978-3-662-65004-2_6 -
Identifizierung von Vertraulichkeitsproblemen mithilfe von Angriffsausbreitung auf Architektur
Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Engineering 2023. Hrsg.: R. Engels, 123–124, Gesellschaft für Informatik (GI) -
Secure Provisioning of OPC UA Applications Using the Asset Administration Shell
Meier, D.; Vogl, J.; Kohnhäuser, F.; Beyerer, J.
2023. 2022 IEEE 17th Conference on Industrial Electronics and Applications (ICIEA), 144–149, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICIEA54703.2022.10005899 -
MIDA: Micro-flow Independent Detection of DDoS Attacks with CNNs
Kopmann, S.; Heseding, H.; Zitterbart, M.
2023. Advances in Service-Oriented and Cloud Computing : International Workshops of ESOCC 2022, Wittenberg, Germany, March 22-24, 2022, Revised Selected Papers. Ed.: C. Zirpins, 32–43, Springer International Publishing. doi:10.1007/978-3-031-23298-5_3 -
Understanding Person Identification through Gait
Hanisch, S.; Muschter, E.; Hatzipanayioti, A.; Li, S.-C.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), 177–189. doi:10.56553/popets-2023-0011 -
"Surprised, Shocked, Worried": User Reactions to Facebook Data Collection from Third Parties
Arias-Cabarcos, P.; Kjalili, S.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open. doi:10.56553/popets-2023-0023 -
Artificial Intelligence-Driven Convergence and its Moderating Effect on Multi-Source Trust Transfer
Renner, M.; Lins, S.; Söllner, M.; Jarvenpaa, S. L.; Sunyaev, A.
2023. Proceedings of the 56th Annual Hawaii International Conference on System Sciences : January 3-6, 2023. Ed.: T. Bui, 5208–5217, University of Hawaii -
German Voters’ Attitudes Towards Voting Online with a Verifiable System
Kulyk, O.; Volkamer, M.; Fuhrberg, N.; Berens, B.; Krimmer, R.
2023. Financial Cryptography and Data Security. FC 2022 International Workshops – CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers, Ed.: S. Matsuo, 33 –350, Springer International Publishing. doi:10.1007/978-3-031-32415-4_23 -
Weighted attack graphs and behavioral cyber game theory for cyber risk quantification
Kaiser, F. K.; Wiens, M.; Schultmann, F.
2022. Advances in Cyber Security and Intelligent Analytics. Ed.: A. Verma, 27–42, CRC Press-Taylor & Francis Group -
The Phishing Master Anti-Phishing Game
Dietmann, H.; Länge, T.; Matheis, P.; Pawelek, A. A.; Berens, B.; Mossano, M.; Veit, M.; Mayer, P.; Volkamer, M.
2022, December 8. Annual Computer Security Applications Conference (ACSAC 2022), Austin, TX, USA, December 5–9, 2022 -
Preserving Consistency of Interrelated Models during View-Based Evolution of Variable Systems
Ananieva, S.; Kühn, T.; Reussner, R.
2022. Proceedings of the 21st ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, 148–163, Association for Computing Machinery (ACM). doi:10.1145/3564719.3568685 -
How to Protect the Public Opinion Against New Types of Bots?
Reubold, J. L.; Escher, S. C.; Wressnegger, C.; Strufe, T.
2022. IEEE International Conference on Big Data, 1671–1680, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BigData55660.2022.10020758 -
Intelligente Verkehrssysteme – IT-Sicherheit in offenen Infrastrukturen Teil 1
Sterz, L.; Werner, C.; Raabe, O.
2022. Recht der Datenverarbeitung, 2022 (6), 291–299 -
Grundlagen für ein gesetzliches IT-Sicherheitsrisikomanagement : Ansätze zur Vereinheitlichung von Rollenmodell, Risikomanagement und Definitionen für das IT-Sicherheitsrecht
Werner, C.; Brinker, N.; Raabe, O.
2022. Computer und Recht, 38 (12), 817–824. doi:10.9785/cr-2022-381219 -
Development and Evaluation of an Anti-Phishing Shooting Game
Dietmann, H.; Länge, T.; Matheis, P.; Pawelek, A. A.; Berens, B.; Mossano, M.; Veit, M.; Mayer, P.; Volkamer, M.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000153329 -
Self-learning Anomaly Detection in Industrial Production. PhD dissertation
Meshram, A.
2022, November 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000152361 -
Token-based plagiarism detection for metamodels
Sağlam, T.; Hahner, S.; Wittler, J. W.; Kühn, T.
2022. MODELS ’22: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion ProceedingsOctober 2022, 138–141, Association for Computing Machinery (ACM). doi:10.1145/3550356.3556508 -
Sharp: Short Relaxed Range Proofs
Couteau, G.; Goudarzi, D.; Klooß, M.; Reichle, M.
2022. CCS ’22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Ed.: H. Yin Conference: CCS ’22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA November 7 - 11, 2022, 609–622, Association for Computing Machinery (ACM). doi:10.1145/3548606.3560628 -
On Security Notions for Multi-Party Computation. PhD dissertation
Maier, S.
2022, November 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151951 -
A Mobility Case Study for Validating Attack Propagation Analyses. bachelor’s thesis
Evli, Y. E.
2022, November. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000152514 -
Scalability testing automation using multivariate characterization and detection of software performance antipatterns
Avritzer, A.; Britto, R.; Trubiani, C.; Camilli, M.; Janes, A.; Russo, B.; Hoorn, A. van; Heinrich, R.; Rapp, M.; Henß, J.; Chalawadi, R. K.
2022. Journal of Systems and Software, 193, Art.-Nr.: 111446. doi:10.1016/j.jss.2022.111446 -
Challenges and Common Solutions in Smart Contract Development
Kannengießer, N.; Lins, S.; Sander, C.; Winter, K.; Frey, H.; Sunyaev, A.
2022. IEEE transactions on software engineering, 48 (11), 4291–4318. doi:10.1109/TSE.2021.3116808 -
A Mobility Case Study Framework for Validating Uncertainty Impact Analyses regarding Confidentiality. bachelor’s thesis
Priss, D.
2022, October 21. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000153083 -
Uncertainty-aware Confidentiality Analysis Using Architectural Variations. bachelor’s thesis
Bitschi, T.
2022, October 21. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000153079 -
Dataset: Architecture-based Attack Propagation and Variation Analysis for Identifying Confidentiality Issues in Industry 4.0
Walter, M.; Hahner, S.; Bures, T.; Hnetynka, P.; Heinrich, R.; Reussner, R.
2022, October 17. doi:10.5281/zenodo.7214894 -
LiquidRust: Refinement Types for Imperative Languages with Ownership. master’s thesis
Csiky, C.
2022, October 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000152005 -
La Publicación de Trayectorias: un Estudio sobre la Protección de la Privacidad
Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2022. Proceedings of the XVII Spanish Meeting on Cryptology and Information Security (RECSI), Santader, 19th - 21st October, 2022. doi:10.22429/Euc2022.028 -
Design and Evaluation of an Anti-Phishing Artifact Based on Useful Transparency
Beckmann, C.; Berens, B.; Kühl, N.; Mayer, P.; Mossano, M.; Volkamer, M.
2022. International Workshop on Socio-Technical Aspects in Security -
Continuous Integration of Architectural Performance Models with Parametric Dependencies – The CIPM Approach
Mazkatli, M.; Monschein, D.; Armbruster, M.; Heinrich, R.; Koziolek, A.
2022. doi:10.5445/IR/1000151086/v3 -
Datenschutzkonforme Weitergabe von Versichertendaten aus dem Forschungsdatenzentrum
Orak, B.; Krempel, E.; Appenzeller, A.
2022. D. Demmler, D. Krupka & H. Federrath (Eds.), INFORMATIK 2022 Hrsg.: Demmler, Daniel AND Federrath, Hannes, Daniel AND Krupka, 533–549, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_45 -
ReCEIF: Reinforcement Learning-Controlled Effective Ingress Filtering
Heseding, H.; Zitterbart, M.
2022. 2022 IEEE 47th Conference on Local Computer Networks (LCN), 106–113, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN53696.2022.9843478 -
HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic
Kopmann, S.; Heseding, H.; Zitterbart, M.
2022. 2022 IEEE 47th Conference on Local Computer Networks (LCN), 90–97, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN53696.2022.9843465 -
PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren für Virtual Reality Head-Mounted Displays
Länge, T.; Matheis, P.; Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Mensch und Computer 2022 - Workshopband. Ed.: K. Marky, Gesellschaft für Informatik (GI). doi:10.18420/muc2022-mci-ws01-462 -
Dissecting chirping patterns of invasive Tweeter flocks in the German Twitter forest
Reubold, J. L.; Escher, S.; Pflugmacher, J.; Strufe, T.
2022. Online Social Networks and Media, 31, Art.-Nr.: 100228. doi:10.1016/j.osnem.2022.100228 -
Cookie Disclaimers: Impact of Design and Users’ Attitude
Berens, B. M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2022. Proceedings of the 17th International Conference on Availability, Reliability and Security, 1–20, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539008 -
Finding the Right Balance: Technical and Political Decentralization in the Token Economy
Pfister, M.; Kannengießer, N.; Sunyaev, A.
2022. Blockchains and the Token Economy. Ed.: M. C. Lacity, 53–86, Springer Nature Switzerland. doi:10.1007/978-3-030-95108-5_3 -
PassSec+ - An addon that protects your passwords, payment data and privacy
Veit, M. F.; Volkamer, M.
2022, August 8. 18th/31st Symposium on Usable Privacy and Security / Co-located with USENIX Security (SOUPS 2022), Online, August 7–9, 2022 -
Handling Environmental Uncertainty in Design Time Access Control Analysis
Boltz, N.; Hahner, S.; Walter, M.; Seifermann, S.; Heinrich, R.; Bures, T.; Hnetynka, P.
2022. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Gran Canaria, Spain, 31 August 2022 - 02 September 2022, 382–389, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA56994.2022.00067 -
Property Types for Mutable Data Structures in Java. master’s thesis
Bachmeier, J.
2022, August 1. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000150318 -
Why Users (Don’t) Use Password Managers at a Large Educational Institution
Mayer, P.; Munyendo, C. W.; Mazurek, M. L.; Aviv, A. J.
2022. 31st USENIX Security Symposium (USENIX Security 22), 1849–1866, USENIX Association -
"I don’t know why I check this...’’ - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks
Mayer, P.; Poddebniak, D.; Fischer, K.; Brinkmann, M.; Somorovsky, J.; Sasse, M. A.; Schinzel, S.; Volkamer, M.
2022. Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 77–96, USENIX Association -
On the Applicability of Payment Channel Networks for Allocation of Transport Ticket Revenues
Grundmann, M.; von Zastrow-Marcks, O.; Hartenstein, H.
2022. Proceedings - International Conference on Computer Communications and Networks, ICCCN : 31st International Conference on Computer Communications and Networks, ICCCN 2022, Virtual, Online, 25 - 28 July 2022, 7 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCCN54977.2022.9868881 -
External conformity assessment procedures for high-risk AI-systems: A game theoretic perspective
Winau, M.; Kaiser, F. K.; Wiens, M.; Schultmann, F.; Spiecker, I.
2022, July 25. 5th European Technology Assessment Conference "Digital Future(s). TA in and for a Changing World" (ETAC 2022), Karlsruhe, Germany, July 25–27, 2022 -
Non-Uniform Adversarially Robust Pruning
Zhao, Q.; Königl, T.; Wressnegger, C.
2022. Proc. of the 1st International Conference on Automated Machine Learning (AutoML) -
Design-time Performability Optimization of Runtime Adaptation Strategies
Rapp, M.; Scheerer, M.; Reussner, R.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 113–120, Association for Computing Machinery (ACM). doi:10.1145/3491204.3527471 -
Differentially private publication of database streams via hybrid video coding
Parra-Arnau, J.; Strufe, T.; Domingo-Ferrer, J.
2022. Knowledge-Based Systems, 247, Art.-Nr.: 108778. doi:10.1016/j.knosys.2022.108778 -
Towards Private Medical Data Donations by Using Privacy Preserving Technologies
Appenzeller, A.; Terzer, N.; Krempel, E.; Beyerer, J.
2022. The15th International Conference on PErvasive Technologies Related to Assistive Environments, 446–454, Association for Computing Machinery (ACM). doi:10.1145/3529190.3534768 -
Classification of Software Engineering Contributions to Support Validation Techniques and Research Applications
Kaplan, A.
2022. The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 323–328, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535345 -
A conceptual model for unifying variability in space and time: Rationale, validation, and illustrative applications
Ananieva, S.; Greiner, S.; Kehrer, T.; Krüger, J.; Kühn, T.; Linsbauer, L.; Grüner, S.; Koziolek, A.; Lönn, H.; Ramesh, S.; Reussner, R.
2022. Empirical Software Engineering, 27 (5), Article no: 101. doi:10.1007/s10664-021-10097-z -
On the Detection of Cyber-Attacks in the Communication Network of IEC 61850 Electrical Substations. PhD dissertation
Elbez, G.
2022, May 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000146668 -
Verifying Payment Channels with TLA+
Grundmann, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–3, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805487 -
Hybrid Intrusion Detection System for Smart Grids
Mumrez, A.; Khosravi, H.; Elbez, G.; Hagenmeyer, V.
2022, May 4. 1st CyberSecurity in Energy and Production Conference (2022), Karlsruhe, Germany, May 4, 2022 -
Preliminary study for an alarm correlation framework based on risk assessment in IEC 61850 substations
Canbolat, S.; Elbez, G.; Hagenmeyer, V.
2022, May 4. 1st CyberSecurity in Energy and Production Conference (2022), Karlsruhe, Germany, May 4, 2022 -
On the Peer Degree Distribution of the Bitcoin P2P Network
Grundmann, M.; Baumstark, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–5, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805511 -
Manipulative Designs von Cookies – Manipulative Designs von Cookies Tricks, um die Einwilligung von Website-Besucherinnen und -Besuchern zum Sammeln und Auswerten von Nutzerdaten über Cookies zu erhalten
Lehr, F.; Dietmann, H.; Krisam, C.; Volkamer, M.
2022. Datenschutz und Datensicherheit - DuD, 46 (5), 296–300. doi:10.1007/s11623-022-1606-7 -
Reproducibility and Replicability of Web Measurement Studies
Demir, N.; Große-Kampmann, M.; Urban, T.; Wressnegger, C.; Holz, T.; Pohlmann, N.
2022. WWW ’22: Proceedings of the ACM Web Conference 2022. Ed.: F. Laforest, 533–544, Association for Computing Machinery (ACM). doi:10.1145/3485447.3512214 -
Phishing awareness and education – When to best remind?
Berens, B. M.; Dimitrova, K.; Mossano, M.; Volkamer, M.
2022. Symposium on Usable Security and Privacy (USEC), co-located with the Network and Distributed System Security Symposium (NDSS 2022), San Diego, CA, April 23, 2022. doi:10.14722/usec.2022.23075 -
The Smart Grid: A Use-Case for Large-Scale SDN Deployment
Neumeister, F.; Zitterbart, M.
2022. 3. KuVS Fachgespräch "Network Softwarization" (7.4. - 8.4.2022). 3. KuVS Fachgespräch "Network Softwarization" (online) 7./8.4.2022, Universitätsbibliothek Tübingen. doi:10.15496/publikation-67443 -
Formal Foundations for Anonymous Communication. PhD dissertation
Kuhn, C.
2022, April 7. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000144491 -
Reinforcement Learning-Controlled Mitigation of Volumetric DDoS Attacks
Heseding, H.
2022. C. Wressnegger, D. Reinhardt, T. Barber, B. C. Witt, D. Arp & Z. Mann (Eds.), SICHERHEIT 2022 Hrsg.: Wressnegger, Christian; Reinhardt, Delphine; Barber, Thomas; Witt, Bernhard C.; Arp, Daniel; Mann, Zoltan, 237–242, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_20 -
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics
Fetzer, V.; Keller, M.; Maier, S.; Raiber, M.; Rupp, A.; Schwerdt, R.
2022. Proceedings on Privacy Enhancing Technologies, 2022 (2), 447–516. doi:10.2478/popets-2022-0054 -
Transparency for Bystanders in IoT regarding audiovisual Recordings
Escher, S.; Etzrodt, K.; Weller, B.; Kopsell, S.; Strufe, T.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops): 21–25 March 2022, Pisa, Italy, 649–654, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767212 -
Why Do Machine Learning Practitioners Still Use Manual Tuning? A Qualitative Study
Hasebrook, N.; Morsbach, F.; Kannengießer, N.; Zöller, M.; Franke, J.; Lindauer, M.; Hutter, F.; Sunyaev, A.
2022. Karlsruher Institut für Technologie (KIT). doi:10.48550/ARXIV.2203.01717 -
Replication Package of "Evaluation Methods and Replicability of Software Architecture Research Objects"
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; Al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 58, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00021 -
Architectural Pen-Test Generation and Vulnerability Prediction for Cyber-Physical Systems
Walter, T.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 45–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00016 -
Evaluation Methods and Replicability of Software Architecture Research Objects
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), Honolulu, HI, USA, 12-15 March 2022, 157–168, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00023 -
Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022. IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 12 -15 March 2022, Honolulu, HI, USA, 59, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00022 -
Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), 12 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00009 -
Architecture-based Uncertainty Impact Analysis for Confidentiality. master’s thesis
Benkler, N.
2022, February 23. doi:10.5445/IR/1000144641 -
Architecture-based Uncertainty Impact Analysis for Confidentiality (Reproduction Set)
Benkler, N.
2022, February 23. doi:10.5281/zenodo.6202285 -
Unified Operations for Variability in Space and Time
Ananieva, S.; Greiner, S.; Krueger, J.; Linsbauer, L.; Gruener, S.; Kehrer, T.; Kuehn, T.; Seidl, C.; Reussner, R.
2022. Proceedings of the 16th International Working Conference on Variability Modelling of Software-Intensive Systems, 1–10, Association for Computing Machinery (ACM). doi:10.1145/3510466.3510483 -
Continuous Secure Software Development and Analysis
Schulz, S.; Reiche, F.; Hahner, S.; Schiffl, J.
2022. Symposium on Software Performance 2021 : Short Paper Proceedings of Symposium on Software Performance, Leipzig, Germany, November 9.-10., 2021. Ed.: D. G. Reichelt, R. Müller, S. Becker, W. Hasselbring, A. v. Hoorn, S. Kounev, A. Koziolek, R. Reussner, RWTH Aachen -
Reproducibility and Replicability of Web Measurement Studies
Demir, N.; Große-Kampmann, M.; Urban, T.; Wressnegger, C.; Holz, T.; Pohlmann, N.
2022, February 3. doi:10.5445/IR/1000142435 -
Detecting Violations of Access Control and Information Flow Policies in Data Flow Diagrams
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2022. The journal of systems and software, 184, Art.-Nr. 111138. doi:10.1016/j.jss.2021.111138 -
Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022, January 10. doi:10.5445/IR/1000141655 -
Beauty and the Beast – A Case Study on Performance Prototyping of Data-Intensive Containerized Cloud Applications
Klinaku, F.; Rapp, M.; Henss, J.; Rhode, S.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 53–60, Association for Computing Machinery (ACM). doi:10.1145/3491204.3527482 -
Gewährleistung effektiven Grundrechtsschutzes auf Grundlage des Kommissionsentwurfs für eine KI-Verordnung?
Winau, M.
2022. Zeitschrift für das Recht der digitalen Wirtschaft (ZdiW), 3 (1), 14–19 -
Kopplung von Architekturanalysen und musterbasierten Quelltextanalysen für Sicherheitseigenschaften von Aufrufabhängigkeiten. bachelor’s thesis
Traub, L.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000161472 -
Dataset: Palladio Context-based Scenario Analysis
Walter, M.; Reussner, R.
2022. doi:10.5281/zenodo.7431562 -
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules
Doerner, D.; Mechler, J.; Müller-Quade, J.
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 83–99, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_05 -
How to best inform website owners about vulnerabilities on their websites
Hennig, A.; Neusser, F.; Pawelek, A. A.; Herrmann, D.; Mayer, P.
2022. European Symposium on Usable Security (EuroUSEC 2022), Karlsruhe, Germany, September 29–30, 2022 -
Model-Based Fault Classification for Automotive Software
Becker, M.; Meyer, R.; Runge, T.; Schaefer, I.; van der Wall, S.; Wolff, S.
2022. Programming Languages and Systems: 20th Asian Symposium, APLAS 2022, Auckland, New Zealand, December 5, 2022, Proceedings. Ed.: I. Sergey, 110–131, Springer Nature Switzerland. doi:10.1007/978-3-031-21037-2_6 -
Suppress with a Patch: Revisiting Universal Adversarial Patch Attacks against Object Detection
Pavlitskaya, S.; Hendl, J.; Kleim, S.; Muller, L. J.; Wylczoch, F.; Zollner, J. M.
2022. 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICECCME55909.2022.9988313 -
Electronic Voting: 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
Krimmer, R.; Volkamer, M.; Duenas-Cid, D.; Rønne, P.; Germann, M. (Eds.)
2022 -
Mining Legal Arguments in Court Decisions
Habernal, I.; Faber, D.; Recchia, N.; Bretthauer, S.; Gurevych, I.; Spiecker genannt Döhmann, I.; Burchard, C.
2022. arxiv. doi:10.48550/arXiv.2208.06178 -
Panorama-Abbildungen im Internet unter der DSGVO: Google Street View und Co revisited
Spiecker genannt Döhmann, I.
2022. Gestaltung der Informationsrechtsordnung: Festschrift für Thomas Dreier. Hrsg.: V. Fischer/G. Nolte/M. Senftleben/L. Specht-Riemenschneider, 427–444, Verlag C.H.Beck -
Artificial Intelligence and Data Protection
Spiecker genannt Döhmann, I.
2022. The Cambridge Handbook of Artificial Intelligence - Global Perspectives on Law and Ethics. Hrsg.: L. DiMatteo/Chr. Poncibo/M. Cannarsa, 132–145, Cambridge Univ. Press. doi:10.1017/9781009072168.015 -
The Law of Global Digitality
Kettemann, M. C.; Peukert, A.; Spiecker genannt Döhmann, I.
2022. Routledge. doi:10.4324/9781003283881 -
Data Protection: The more the merrier - a dynamic approach learning from prior misgovernance
Spiecker genannt Döhmann, I.
2022. The Law of Global Digitality. Hrsg.: M. Kettemann, 77–95, Taylor and Francis. doi:10.4324/9781003283881-6 -
§ 71: Grundrechte der Digitalisierung
Spiecker genannt Döhmann, I.
2022. Handbuch des Verwaltungsrechts, Band 3. Hrsg.: W. Kahl/M. Ludwigs, 535–564, C.F. Müller -
§ 24: Europäisches Datenschutzverwaltungsrecht
Spiecker genannt Döhmann, I.; Benecke, A.
2022. Verwaltungsrecht der Europäischen Union. Hrsg.: J.P. Terhechte, 997–1040, Nomos -
Challenges in Data Protection in Business Transactions: An Overview Over Civil Law Approaches to Data Protection and Data Ownership
Spiecker genannt Döhmann, I.; Benecke, A.
2022. Handbook Industry 4.0 – Law, Technology, Society, 159–178, Springer-Verlag. doi:10.1007/978-3-662-64448-5_9 -
Responsible Human-Robot Interaction with Anthropomorphic Service Robots: State of the Art of an Interdisciplinary Research Challenge
Stock-Homburg, R. M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; Rawal, N.; David, K.; Wendt, J.; Spiecker genannt Döhmann, I.; Stryk, O. von; Hannig, M.; Knof, M.
2022. Proceedings of the 55th Annual Hawaii International Conference on System Sciences : January 3-7, 2022. Ed.: T. X. Bui, 2065–2074, University of Hawaii. doi:10.24251/HICSS.2022.260 -
Datenschutz als Garant und Ermöglicher von Grundrechten
Kelber, U.; Müllmann, D.
2022. Datenschutz Nachrichten, 45 (3), 140–142 -
Extra DSGVO nulla salus? - Zur weiteren Zulässigkeit nicht akkreditierter Datenschutzsiegel neben akkreditierten Gütesiegeln im Sinne der Art. 42 f. DSGVO
Müllmann, D.; Spiecker genannt Döhmann, I.
2022. Deutsches Verwaltungsblatt, 137 (4), 208–214 -
Optimal human labelling for anomaly detection in industrial inspection
Zander, T.; Ziyan, P.; Birnstill, P.; Beyerer, J.
2022. Forum Bildverarbeitung 2022. Ed.: T. Längle, 49–59, KIT Scientific Publishing -
Demokratie und Öffentlichkeit im 21. Jahrhundert – zur Macht des Digitalen
Spiecker genannt Döhmann, I.; Westland, M.; Campos, R. (Eds.)
2022. Nomos Verlagsgesellschaft. doi:10.5771/9783748932741 -
Künstliche Intelligenz in der Forschung – Neue Möglichkeiten und Herausforderungen für die Wissenschaft
Gethmann, C. F.; Buxmann, P.; Distelrath, J.; Humm, B. G.; Lingner, S.; Nitsch, V.; Schmidt, J. C.; Spiecker genannt Döhmann, I.
2022. Springer-Verlag. doi:10.1007/978-3-662-63449-3 -
Fiat-Shamir Transformation of Multi-round Interactive Proofs
Attema, T.; Fehr, S.; Klooß, M.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Ed.: E. Kiltz, 113–142, Springer Nature Switzerland. doi:10.1007/978-3-031-22318-1_5 -
Anonymous Whistleblowing over Authenticated Channels
Agrikola, T.; Couteau, G.; Maier, S.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Ed.: E. Kiltz, 685–714, Springer Nature Switzerland. doi:10.1007/978-3-031-22365-5_24 -
Efficient Public Verification of Confidential Supply-Chain Transactions
Becher, K.; Schäfer, M.; Schröpfer, A.; Strufe, T.
2022. 2022 IEEE Conference on Communications and Network Security (CNS), 308–316, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CNS56114.2022.9947231 -
Uncertainty in coupled models of cyber-physical systems
Acosta, M.; Hahner, S.; Koziolek, A.; Kühn, T.; Mirandola, R.; Reussner, R.
2022. Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 569–578, Association for Computing Machinery (ACM). doi:10.1145/3550356.3561539 -
Towards a Usable and Sustainable Deductive Verification Tool
Beckert, B.; Bubel, R.; Hähnle, R.; Ulbrich, M.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 281–300, Springer Nature Switzerland. doi:10.1007/978-3-031-19756-7_16 -
Runtime Verification of Correct-by-Construction Driving Maneuvers
Kittelmann, A.; Runge, T.; Bordis, T.; Schaefer, I.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part I. Ed.: T. Margaria, 242–263, Springer International Publishing. doi:10.1007/978-3-031-19849-6_15 -
Immutability and Encapsulation for Sound OO Information Flow Control
Runge, T.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. ACM Transactions on Programming Languages and Systems, 45 (1), Art.Nr. 3. doi:10.1145/3573270 -
Privacy and Utility of Private Synthetic Data for Medical Data Analyses
Appenzeller, A.; Leitner, M.; Philipp, P.; Krempel, E.; Beyerer, J.
2022. Applied Sciences, 12 (23), Article no: 12320. doi:10.3390/app122312320 -
Decentralizing Watchtowers for Payment Channels using IPFS
Bonisch, H.; Grundmann, M.
2022. 2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW), 27–32, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICDCSW56584.2022.00015 -
On the Privacy–Utility Trade-Off in Differentially Private Hierarchical Text Classification
Wunderlich, D.; Bernau, D.; Aldà, F.; Parra-Arnau, J.; Strufe, T.
2022. Applied Sciences, 12 (21), Art.-Nr.: 11177. doi:10.3390/app122111177 -
CrossTest: a cross-domain physical testbed environment for cybersecurity performance evaluations
Karch, M.; Rösch, D.; André, K.; Meshram, A.; Haas, C.; Nicolai, S.
2022. 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA), 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA52439.2022.9921672 -
Early Detection of GOOSE Denial of Service (DoS) Attacks in IEC 61850 Substations
Elbez, G.; Nahrstedt, K.; Hagenmeyer, V.
2022. IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids 2022. doi:10.1109/SmartGridComm52983.2022.9961042 -
Modeling and Enforcing Access Control Policies for Smart Contracts
Töberg, J.-P.; Schiffl, J.; Reiche, F.; Beckert, B.; Heinrich, R.; Reussner, R.
2022. Conference Proceedings: 2022 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 38–47, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/DAPPS55202.2022.00013 -
Re-CorC-ing KeY: Correct-by-Construction Software Development Based on KeY
Bordis, T.; Cleophas, L.; Kittelmann, A.; Runge, T.; Schaefer, I.; Watson, B. W.
2022. The Logic of Software. A Tasting Menu of Formal Methods – Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday. Ed.: W. Ahrendt, 80–104, Springer International Publishing. doi:10.1007/978-3-031-08166-8_5 -
Cyber threat intelligence enabled automated attack incident response
Kaiser, F. K.; Andris, L.; Tenning, T.; Iser, J.; Wiens, M.; Schultmann, F.
2022. 2022 3rd International Conference on Next Generation Computing Applications (NextComp), IEEE, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NextComp55567.2022.9932254 -
Attuning Adaptation Rules via a Rule-Specific Neural Network
Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Proceedings. Vol. 3. Ed.: T. Margaria, 215–230, Springer Nature Switzerland. doi:10.1007/978-3-031-19759-8_14 -
Generalized Test Tables: A Domain-Specific Specification Language for Automated Production Systems
Beckert, B.; Ulbrich, M.; Vogel-Heuser, B.; Weigl, A.
2022. Theoretical Aspects of Computing – ICTAC 2022 – 19th International Colloquium, Tbilisi, Georgia, September 27–29, 2022, Proceedings. Ed.: H. Seidl, 7–13, Springer International Publishing. doi:10.1007/978-3-031-17715-6_2 -
Information Flow Control-by-Construction for an Object-Oriented Language
Runge, T.; Kittelmann, A.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. Software Engineering and Formal Methods – 20th International Conference, SEFM 2022, Berlin, Germany, September 26–30, 2022, Proceedings. Ed.: B.-H. Schlingloff, 209–226, Springer International Publishing. doi:10.1007/978-3-031-17108-6_13 -
A Model-Based Framework for Simplified Collaboration of Legal and Software Experts in Data Protection Assessments
Boltz, N.; Sterz, L.; Gerking, C.; Raabe, O.
2022. INFORMATIK 2022, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik. Ed.: D. Demmler, 521–532, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_44 -
Establishing a Benchmark Dataset for Traceability Link Recovery between Software Architecture Documentation and Models
Fuchß, D.; Corallo, S.; Keim, J.; Speit, J.; Koziolek, A.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151962 -
Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
Grundmann, M.; Amberg, H.; Baumstark, M.; Hartenstein, H.
2022. Financial Cryptography and Data Security – 26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers. Ed.: I. Eyal, 694–704, Springer International Publishing. doi:10.1007/978-3-031-18283-9_35 -
A Refactoring for Data Minimisation Using Formal Verification
Lanzinger, F.; Ulbrich, M.; Weigl, A.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 345–364, Springer Nature Switzerland. doi:10.1007/978-3-031-19756-7_19 -
Accurate Performance Predictions with Component-Based Models of Data Streaming Applications
Werle, D.; Seifermann, S.; Koziolek, A.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 83–98, Springer International Publishing. doi:10.1007/978-3-031-16697-6_6 -
Feasibility of Inconspicuous GAN-generated Adversarial Patches against Object Detection
Pavlitskaya, S.; Codău, B.-M.; Zöllner, J. M.
2022. Proceedings of the Workshop on Artificial Intelligence Safety 2022 (AISafety 2022) co-located with the Thirty-First International Joint Conference on Artificial Intelligence and the Twenty-Fifth European Conference on Artificial Intelligence (IJCAI-ECAI-2022) Ed.: G. Pedroza, CEUR-WS.org -
Towards an integrated approach for managing the variability and evolution of both software and hardware components
Wittler, J. W.; Kühn, T.; Reussner, R.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference - Volume B Ed.: A. Felfernig, 94–98, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547059 -
Membership Inference Attack Against Principal Component Analysis
Zari, O.; Parra-Arnau, J.; Ünsal, A.; Strufe, T.; Önen, M.
2022. Privacy in Statistical Databases – International Conference, PSD 2022, Paris, France, September 21–23, 2022, Proceedings. Ed.: J. Domingo-Ferrer, 269–282, Springer International Publishing. doi:10.1007/978-3-031-13945-1_19 -
ARCHI4MOM: Using Tracing Information to Extract the Architecture of Microservice-Based Systems from Message-Oriented Middleware
Singh, S.; Werle, D.; Koziolek, A.
2022. Software Architecture : 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos., 189–204, Springer International Publishing. doi:10.1007/978-3-031-16697-6_14 -
Universally Composable Verifiable Random Oracles. master’s thesis
Scheurer, T.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151607 -
Individual Verifiability with Return Codes: Manipulation Detection Efficacy
Thürwächter, P. T.; Volkamer, M.; Kulyk, O.
2022. Electronic Voting – 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4–7, 2022, Proceedings. Ed.: R. Krimmer, 139–156, Springer International Publishing. doi:10.1007/978-3-031-15911-4_9 -
A Cross-Disciplinary Process Modelling Language for Validating Reconfigured Production Processes
Koch, S.; Wunderlich, T.; Hansert, J.; Schlegel, T.; Ihlenfeldt, S.; Heinrich, R.
2022. Modellierung 2022 : 27.06.-01.07.2022 Hamburg, Germany. Ed.: Matthias Riebisch, 181–190, Köllen Druck+Verlag. doi:10.18420/modellierung2022-004 -
Toward Awareness Creation of Common Challenges Women are Facing in Academia: A Study from a German Perspective
Corallo, S.; Mazkatli, M.; Rapp, M.; Hajiabadi, H.; Kaplan, A.; Kuehn, R.; Schmid, L.; Singh, S.
2022. Software Architecture – 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021, Revised Selected Papers. Ed.: P. Scandurra, 47–62, Springer International Publishing. doi:10.1007/978-3-031-15116-3_3 -
Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Security Gründen
Müllmann, D.; Veit, M. F.; Volkamer, M.
2022. Informatik 2022. Hrsg.: D. Demmler, 601–615, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_49 -
Synchronizing software variants: A two-dimensional approach
König, C.; Rosiak, K.; Linsbauer, L.; Schaefer, I.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference (SPLC ’22), Graz, A, 12.-16. September 2022. Ed.: A. Felfernig. Vol. B, 82–89, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547053 -
Architectural Optimization for Confidentiality Under Structural Uncertainty
Walter, M.; Hahner, S.; Seifermann, S.; Bures, T.; Hnetynka, P.; Pacovský, J.; Heinrich, R.
2022. Software Architecture : 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021 : Revised Selected Papers. Ed.: P. Scandurra, 309–332, Springer Nature Switzerland. doi:10.1007/978-3-031-15116-3_14 -
Grasping the Concept of Decentralized Systems for Instant Messaging
Gebhardt, L.; Leinweber, M.; Jacob, F.; Hartenstein, H.
2022. Proceedings of the 17th Workshop in Primary and Secondary Computing Education, Art.-Nr. 10, Association for Computing Machinery (ACM). doi:10.1145/3556787.3556864 -
Shoulder-Surfing Resistant Authentication for Augmented Reality
Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Nordic Human Computer Interaction Conference (NordiCHI ’22), Art.Nr. 29, ACM Digital Library. doi:10.1145/3546155.3546663 -
Increasing security without decreasing usability: A comparison of various verifiable voting systems
Volkamer, M.; Kulyk, O.; Ludwig, J.; Fuhrberg, N.
2022. Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS 2022), Boston, MA, August 8-9, 2022, 233–252, USENIX Association -
A Taxonomy for Design Decisions in Software Architecture Documentation
Keim, J.; Hey, T.; Sauer, B.; Koziolek, A.
2022. doi:10.5445/IR/1000149966 -
Towards Heterogeneous Remote Attestation Protocols
Wagner, P. G.; Beyerer, J.
2022. Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT. Vol. 1. Ed.: S. De Capitani di Vimercati, 586–591, SciTePress. doi:10.5220/0011289000003283 -
Feature-based Investigation of Simulation Structure and Behaviour
Koch, S.; Hamann, E.; Heinrich, R.; Reussner, R.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 178–185, Springer. doi:10.1007/978-3-031-16697-6_13 -
Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks
Borcherding, A.; Takacs, P.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy, 334–344, SciTePress. doi:10.5220/0010806300003120 -
Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks
Borcherding, A.; Feldmann, L.; Karch, M.; Meshram, A.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, 314–325, SciTePress. doi:10.5220/0010795900003120 -
The Karlsruhe Java Verification Suite
Klamroth, J.; Lanzinger, F.; Pfeifer, W.; Ulbrich, M.
2022. The Logic of Software. A Tasting Menu of Formal Methods – Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday. Ed.: W. Ahrendt, 290–312, Springer International Publishing. doi:10.1007/978-3-031-08166-8_14 -
Anonymizing Trajectory Data: Limitations and Opportunities
Guerra-Balboa, P.; Miranda-Pascual, À.; Strufe, T.; Parra-Arnau, J.; Forné, J.
2022. AAAI Workshop on Privacy-Preserving Artificial Intelligence -
MPER - a Motion Profiling Experiment and Research system for human body movement
Rettlinger, S.; Knaus, B.; Wieczorek, F.; Ivakko, N.; Hanisch, S.; Nguyen, G. T.; Strufe, T.; Fitzek, F. H. P.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy, 21-25 March 2022, 88–90, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767484 -
Conceptualization of a Trust Dashboard for Distributed Usage Control Systems
Wagner, P. G.
2022. Proceedings of the 2021 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory, 169–188, Karlsruher Institut für Technologie (KIT) -
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays
Duezguen, R.; Noah, N.; Mayer, P.; Das, S.; Volkamer, M.
2022. International Conference on Availability, Reliability and Security, ARES 2022, August 23 - August 26, 2022, Vienna, Austria, Art.-No.: 36, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539011 -
Trustworthy Artificial Intelligence
Becker, M.
2022. Proceedings of the 2021 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory, 21–32, Karlsruher Institut für Technologie (KIT) -
Leveraging Distributed Ledger Technology for Decentralized Mobility-as-a-Service Ticket Systems
Leinweber, M.; Kannengießer, N.; Hartenstein, H.; Sunyaev, A.
2022. Towards the New Normal in Mobility : Technische und betriebswirtschaftliche Aspekte. Hrsg.: H. Proff, 547–567, Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-39438-7_32 -
Decentralized Review and Attestation of Software Attribute Claims
Stengele, O.; Westermeyer, C.; Hartenstein, H.
2022. IEEE Access, 10, 66694–66710. doi:10.1109/ACCESS.2022.3185046 -
Your Cookie Disclaimer is not in line with the ideas of the GDPR. Why?
Hennig, A.; Dietmann, H.; Lehr, F.; Mutter, M.; Volkamer, M.; Mayer, P.
2022. Human Aspects of Information Security and Assurance. Ed.: N. Clarke, 218–227, Springer-Verlag. doi:10.1007/978-3-031-12172-2_17 -
Supplementary Material for the Evaluation of the Publication – A Layered Reference Architecture for Model-based Quality Analysis
Koch, S.; Heinrich, R.; Reussner, R.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000146803/v2 -
BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots
Bayreuther, S.; Jacob, F.; Grotz, M.; Kartmann, R.; Peller-Konrad, F.; Paus, F.; Hartenstein, H.; Asfour, T.
2022. SACMAT ’22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesJune 2022, New York NY USA, June 8 - 10, 2022. Ed.: S. Dietrich, 185–194, Association for Computing Machinery (ACM). doi:10.1145/3532105.3535018 -
Introducing an Evaluation Method for Taxonomies
Kaplan, A.; Kühn, T.; Hahner, S.; Benkler, N.; Keim, J.; Fuchß, D.; Corallo, S.; Heinrich, R.
2022. Association for Computing Machinery (ACM). doi:10.5445/IR/1000145968 -
Introducing an Evaluation Method for Taxonomies
Kaplan, A.; Kühn, T.; Hahner, S.; Benkler, N.; Keim, J.; Fuchß, D.; Corallo, S.; Heinrich, R.; Corallo, S.; Heinrich, R.
2022. EASE 2022: The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 311–316, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535305 -
Quantifying Trustworthiness in Decentralized Trusted Applications
Wagner, P. G.; Beyerer, J.
2022. Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (Sat-CPS’22), 67–76, Association for Computing Machinery (ACM). doi:10.1145/3510547.3517930 -
PREUNN: Protocol Reverse Engineering using Neural Networks
Kiechle, V.; Börsig, M.; Nitzsche, S.; Baumgart, I.; Becker, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy. Ed.: P. Mori. Vol. 1, 345–356, SciTePress. doi:10.5220/0010813500003120 -
Die Regulierungsperspektive von KI/BigData in der Wissenschaft
Spiecker genannt Döhmann, I.
2022. Künstliche Intelligenz in der Forschung. Hrsg.: C.F. Gethmann, 147–172, Springer-Verlag. doi:10.1007/978-3-662-63449-3_6 -
Modelling and Enforcing Access Control Requirements for Smart Contracts. master’s thesis
Töberg, J.-P.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000144204 -
Standing out among the daily spam: How to catch website owners’ attention by means of vulnerability notifications
Hennig, A.; Neusser, F.; Pawelek, A. A.; Herrmann, D.; Mayer, P.
2022. Conference on Human Factors in Computing Systems (CHI ’22) : Extended Abstracts, Art.-Nr.: 317, Association for Computing Machinery (ACM). doi:10.1145/3491101.3519847 -
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
Beskorovajnov, W.; Gröll, R.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing. doi:10.1007/978-3-030-97131-1_11 -
SMILE - Smart eMaIl Link Domain Extractor
Mossano, M.; Berens, B.; Heller, P.; Beckmann, C.; Aldag, L.; Mayer, P.; Volkamer, M.
2022. Computer Security. ESORICS 2021 International Workshops – CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers. Ed.: S. Katsikas, 403–412, Springer International Publishing. doi:10.1007/978-3-030-95484-0_23 -
Sovereign Digital Consent through Privacy Impact Quantification and Dynamic Consent
Appenzeller, A.; Hornung, M.; Kadow, T.; Krempel, E.; Beyerer, J.
2022. Technologies, 10 (1), Article no: 35. doi:10.3390/technologies10010035 -
Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings
Byrenheid, M.; Roos, S.; Strufe, T.
2022. doi:10.5445/IR/1000143139 -
Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings
Byrenheid, M.; Roos, S.; Strufe, T.
2022. ICDCN ’22: Proceedings of the 2022 International Conference on Distributed Computing and Networking ; Jan 4th-7th, 2022, Virtual Conference, 107–116, Association for Computing Machinery (ACM). doi:10.1145/3491003.3491020 -
Recent Developments in the Context of Online Elections and Digital Polls in Germany
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_16 -
Research Opportunities in Evidence-Based Elections
Benaloh, J.; Stark, P. B.; Teague, V.; Volkamer, M.; Wallach, D.
2022. Computing Research Association (CRA) -
Dos and Don’ts of Machine Learning in Computer Security
Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2022. Proceedings of the 31st USENIX Security Symposium : August 10-12, 2022, Boston, MA, USA, 3971–3988, USENIX Association -
Towards a Formal Approach for Data Minimization in Programs (Short Paper)
Lanzinger, F.; Weigl, A.
2022. Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers. Ed.: J. Garcia-Alfaro, 161–169, Springer International Publishing. doi:10.1007/978-3-030-93944-1_11 -
Tackling Challenges of Robustness Measures for Autonomous Agent Collaboration in Open Multi-Agent Systems
Jin, D.; Kannengießer, N.; Sturm, B.; Sunyaev, A.
2022. Proceedings of the 55th Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, 03.01.2022-07.01.2022, 7585–7594. doi:10.24251/HICSS.2022.911 -
Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass
Renaud, K.; Volkamer, M.; Mayer, P.; Grimm, R.
2021. AIS transactions on human-computer interaction, 13 (4), 407–430. doi:10.17705/1thci.00155 -
ETHTID: Deployable Threshold Information Disclosure on Ethereum
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BCCA53669.2021.9657019 -
Architecture Matters: Investigating the Influence of Differential Privacy on Neural Network Design
Morsbach, F.; Dehling, T.; Sunyaev, A.
2021. Presented at NeurIPS 2021 Workshop on Privacy in Machine Learning (PriML 2021), 14.12.2021. doi:10.48550/arXiv.2111.14924 -
Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites
Krisam, C.; Dietmann, H.; Volkamer Melanie; Kulyk, O.
2021. EuroUSEC ’21: European Symposium on Usable Security 2021, Karlsruhe Germany, October 11 - 12, 2021, 8 S., Association for Computing Machinery (ACM). doi:10.1145/3481357.3481516 -
Ein Rahmenwerk für Evaluierung von Interdisziplinären Lerneinheiten für den Informatikunterricht. master’s thesis
Marquardt, K.
2021, December 8. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000143548 -
LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems
Kühnapfel, N.; Preußler, S.; Noppel, M.; Schneider, T.; Rieck, K.; Wressnegger, C.
2021. Proceedings of 37th Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 6-10, 2021, 796–811, Association for Computing Machinery (ACM). doi:10.1145/3485832.3485911 -
Need for Change: Business Functions Affected by the Use of Decentralized Information Systems
Heines, R.; Kannengießer, N.; Sturm, B.; Jung, R.; Sunyaev, A.
2021. 42nd International Conference on Information Systems (ICIS), Association for Information Systems (AIS) -
Table-based formal specification approaches for control engineers—empirical studies of usability
Cha, S.; Vogel-Heuser, B.; Weigl, A.; Ulbrich, M.; Beckert, B.
2021. IET Cyber-Physical Systems: Theory and Applications, 64, 193–207. doi:10.1049/cps2.12017 -
Security Engineering of Patient-Centered Health Care Information Systems in Peer-to-Peer Environments: Systematic Review
Yari, I. A.; Dehling, T.; Kluge, F.; Geck, J.; Sunyaev, A.; Eskofier, B.
2021. Journal of Medical Internet Research, 23 (11), e24460. doi:10.2196/24460 -
Side-Channel Attacks on Query-Based Data Anonymization
Boenisch, F.; Munz, R.; Tiepelt, M.; Hanisch, S.; Kuhn, C.; Francis, P.
2021. CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 1254–1265, Association for Computing Machinery (ACM). doi:10.1145/3460120.3484751 -
ConTra Corona : Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
Beskorovajnov, W.; Dörre, F.; Hartung, G.; Koch, A.; Müller-Quade, J.; Strufe, T.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139714 -
Towards Distributed Healthcare Systems – Virtual Data Pooling Between Cancer Registries as Backbone of Care and Research
Appenzeller, A.; Bartholomaus, S.; Breitschwerdt, R.; Claussen, C.; Geisler, S.; Hartz, T.; Kachel, P.; Krempel, E.; Robert, S.; Zeissig, S. R.
2021. 2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA), Tangier, Morocco, 30 Nov.-3 Dec. 2021, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/AICCSA53542.2021.9686918 -
NoPhish-Challenge-Karten – Evaluation in der Praxis
Aldag, L.; Berens, B.; Burgdorf, M.; Lorenz, A.; Thiery, M.-C.; Volkamer, M.
2021. Datenschutz und Datensicherheit - DuD, 45 (11), 721–726. doi:10.1007/s11623-021-1523-1 -
Coupling Smart Contracts: A Comparative Case Study
Friebe, S.; Stengele, O.; Hartenstein, H.; Zitterbart, M.
2021. 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 27-30 Sept. 2021, 137–144, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BRAINS52497.2021.9569830 -
Usable Verifiable Secrecy-Preserving E-Voting
Kulyk, O.; Ludwig, J.; Volkamer, M.; Koenig, R. E.; Locher, P.
2021. 6th Joint International Conference on Electronic Voting, E-Vote-ID 2021, 5-8 October 2021. Ed.: R. Krimmer ; M. Volkamer, 337–353, University of Tartu Press -
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
Broadnax, B.; Koch, A.; Mechler, J.; Müller, T.; Müller-Quade, J.; Nagel, M.
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338. doi:10.2478/popets-2021-0072 -
Datenschutz durch Technikgestaltung und unternehmerische Strategie in der Digitalwirtschaft - Verhaltenssteuernde Elemente der DSGVO im Licht einer spieltheoretischen Analyse am Beispiel von Art. 25 Abs. 1 Recht und Technik Datenschutz im Diskurs im Rahmen der GI-Jahrestagung
Winau, M.; Kaiser, F.; Wiens, M.; Schultmann, F.; Spiecker gen. Döhmann, I.
2021, September 27. 51. INFORMATIK 2021 - Jahrestagung der Gesellschaft für Informatik (2021), Online, September 27–October 1, 2021 -
Datenschutzrechtliche Aspekte neuer Mobilitätskonzepte im Öffentlichen Nahverkehr
Bretthauer, S.; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Nomos Verlagsgesellschaft -
Design Space Evaluation for Confidentiality under Architectural Uncertainty. bachelor’s thesis
Liu, O.
2021, September 10. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139590 -
Aktuelle Entwicklungen im Kontext von Online-Wahlen und digitalen Abstimmungen
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
2021. doi:10.5445/IR/1000137300 -
Privacy-Protecting Techniques for Behavioral Data: A Survey
Hanisch, S.; Arias-Cabarcos, P.; Parra-Arnau, J.; Strufe, T.
2021. arxiv. doi:10.5445/IR/1000139989 -
Aspect-Oriented Adaptation of Access Control Rules
Bures, T.; Gerostathopoulos, I.; Hnetynka, P.; Seifermann, S.; Walter, M.; Heinrich, R.
2021. 2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 363–370, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA53835.2021.00054 -
How to Increase Smart Home Security and Privacy Risk Perception
Duezguen, R.; Mayer, P.; Berens, B.; Beckmann, C.; Aldag, L.; Mossano, M.; Volkamer, M.; Strufe, T.
2021. 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 18 - 20 Augus 2021, Shenyang, China, 997–1004, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom53373.2021.00138 -
Die EU als Trendsetter weltweiter KI-Regulierung: Der Kommissionsentwurf für eine KI-Verordnung der EU
Ebert, A.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (16), 1188–1193 -
"Now I’m a bit angry:" Individuals’ Awareness, Perception, and Responses to Data Breaches that Affected Them
Mayer, P.; Zou, Y.; Schaub, F.; Aviv, A. J.
2021. 30th USENIX Security Symposium, Vancouver, CDN, August 11-13, 2021, 393–410, Advanced Computing Systems Association (USENIX) -
On the Security of IIoT Deployments: An Investigation of Secure Provisioning Solutions for OPC UA
Kohnhäuser, F.; Meier, D.; Patzer, F.; Finster, S.
2021. IEEE access, 9, 99299–99311. doi:10.1109/ACCESS.2021.3096062 -
A Literature Review on Virtual Reality Authentication
Jones, J. M.; Duezguen, R.; Mayer, P.; Volkamer, M.; Das, S.
2021. Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Ed.: S. Furnell, 189–198, Springer. doi:10.1007/978-3-030-81111-2_16 -
A Hitchhiker’s Guide to Model-Driven Engineering for Data-Centric Systems
Combemale, B.; Kienzle, J.; Mussbacher, G.; Ali, H.; Amyot, D.; Bagherzadeh, M.; Batot, E.; Bencomo, N.; Benni, B.; Bruel, J.-M.; Cabot, J.; Cheng, B. H. C.; Collet, P.; Engels, G.; Heinrich, R.; Jezequel, J.-M.; Koziolek, A.; Mosser, S.; Reussner, R.; Sahraoui, H.; Saini, R.; Sallou, J.; Stinckwich, S.; Syriani, E.; Wimmer, M.
2021. IEEE software, 38 (4), 71–84. doi:10.1109/MS.2020.2995125 -
Security in Distributed Ledger Technology: An Analysis of Vulnerabilities and Attack Vectors
Gojka, E.-E.; Kannengießer, N.; Sturm, B.; Bartsch, J.; Sunyaev, A.
2021. Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 3. Ed.: K. Arai, 722–742, Springer. doi:10.1007/978-3-030-80129-8_50 -
Generative Machine Learning for Resource-Aware 5G and IoT Systems
Piatkowski, N.; Mueller-Roemer, J. S.; Hasse, P.; Bachorek, A.; Werner, T.; Birnstill, P.; Morgenstern, A.; Stobbe, L.
2021. 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada, 14-23 June 2021, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCWorkshops50388.2021.9473625 -
Ansatzpunkte für eine Stärkung digitaler Pandemiebekämpfung
Druschel, P.; Federrath, H.; Hansen, M.; Lehr, T.; Lengauer, T.; Meyer-Hermann, M.; Munzert, S.; Priesemann, V.; Roemheld, L.; Schmidt, A.; Schölkopf, B.; Simon, J.; Spiecker gen. Döhmann, I.; Teichert, U.; Woopen, C.
2021. Deutsche Akademie der Naturforscher Leopoldina e. V. doi:10.26164/leopoldina_03_00354 -
CPIQ - A Privacy Impact Quantification for Digital Medical Consent
Appenzeller, A.; Kadow, T.; Krempel, E.; Beyer, J.
2021. PETRA ’21: The 14th PErvasive Technologies Related to Assistive Environments Conference Corfu Greece 29 June, 2021- 2 July, 2021, 534–543, Association for Computing Machinery (ACM). doi:10.1145/3453892.3461653 -
Towards Correct Smart Contracts: A Case Study on Formal Verification of Access Control
Schiffl, J.; Grundmann, M.; Leinweber, M.; Stengele, O.; Friebe, S.; Beckert, B.
2021. SACMAT ’21: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 125–130, Association for Computing Machinery (ACM). doi:10.1145/3450569.3463574 -
Towards extraction of message-based communication in mixed-technology architectures for performance model
Singh, S.; Kirschner, Y. R.; Koziolek, A.
2021. ICPE ’21: Companion of the ACM/SPEC International Conference on Performance Engineering, 133–138, Association for Computing Machinery (ACM). doi:10.1145/3447545.3451201 -
Ein Netzwerk für Europas Cybersicherheit
Wintzingerode, C. von; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (10), 690–695 -
Adversarial Robust Model Compression using In-Train Pruning
Vemparala, M. R.; Fasfous, N.; Frickenstein, A.; Sarkar, S.; Zhao, Q.; Kuhn, S.; Frickenstein, L.; Singh, A.; Unger, C.; Nagaraja, N. S.; Wressnegger, C.; Stechele, W.
2021. CVPR 3rd Workshop on Safe Artificial Intelligence for Automated Driving (SAIAD), June 19, 2021, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CVPRW53098.2021.00016 -
A Layered Reference Architecture for Metamodels to Tailor Quality Modeling and Analysis
Heinrich, R.; Strittmatter, M.; Reussner, R. H.
2021. IEEE transactions on software engineering, 47 (4), 775–800. doi:10.1109/TSE.2019.2903797 -
Vorsicht vor Betrügern im Internet - Was beim Kauf von Corona-Schnelltests im Netz zu beachten ist
Volkamer, M.; Mayer, P.; Hennig, A.
2021, March 8 -
Security Sensibilisierung für Beschäftigte. Empfehlungen für Informationssicherheitsbeauftragte
Volkamer, M.; Bachmann, B.
2021, March -
Covid notions: Towards formal definitions – and documented understanding – of privacy goals and claimed protection in proximity-tracing services
Kuhn, C.; Beck, M.; Strufe, T.
2021. Online Social Networks and Media, 22, Art.-Nr.: 100125. doi:10.1016/j.osnem.2021.100125 -
Dealing with Uncertainty in Architectural Confidentiality Analysis
Hahner, S.
2021. Proceedings of the Software Engineering 2021 Satellite Events, 1–6, Gesellschaft für Informatik (GI) -
Datensouveränität für Patienten im Gesundheitswesen
Bretthauer, S.; Appenzeller, A.; Birnstill, P.
2021. Datenschutz und Datensicherheit, 45 (3), 173–179. doi:10.1007/s11623-021-1413-6 -
Insights on Data Sensitivity from the Technical, Legal and the Users’ Perspectives — Practical suggestions on how to raise more awareness for the assumed exercise of informational self-determination
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Computer law review international, 22 (1), 8–15. doi:10.9785/cri-2021-220103 -
Modeling and Verifying Access Control for Ethereum Smart Contracts
Reiche, F.; Schiffl, J.; Beckert, B.; Heinrich, R.; Reussner, R.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000129607 -
Sicher durchs Internet - Aktionen der Forschungsgruppe SECUSO zum Safer Internet Day am 9. Februar 2021
Volkamer, M.; Hennig, A.
2021, February 9 -
Mitarbeiter Security Sensibilisierung - Empfehlung für Informationssicherheitsbeauftragte
Volkamer, M.; Bachmann, B.
2021, February 9 -
Ein neues "Datenkartellrecht" zum Schutz der informationellen Selbstbestimmung im Markt der sozialen Plattformen?
Steinbrück, A.; Wiens, M.; Birnstill, P.; Kaiser, F.; Zander, T.; Raabe, O.; Schultmann, F.; Volkamer, M.
2021. Recht der Datenverarbeitung, 37 (1), 7–13 -
Quantification of Correctness with Palladio and KeY: Case Study Data
Reiche, F.; Schiffl, J.; Weigl, A.
2021, February 1. doi:10.5445/IR/1000129008 -
Model-driven Quantification of Correctness with Palladio and KeY
Reiche, F.; Schiffl, J.; Weigl, A.; Heinrich, R.; Beckert, B.; Reussner, R.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000128855 -
Challenges in the Evolution of Palladio—Refactoring Design Smells in a Historically-Grown Approach to Software Architecture Analysis
Heinrich, R.; Henss, J.; Koch, S.; Reussner, R.
2021. Composing Model-Based Analysis Tools. Ed.: R. Heinrich, 235–257, Springer International Publishing. doi:10.1007/978-3-030-81915-6_11 -
Integration and Orchestration of Analysis Tools
Heinrich, R.; Bousse, E.; Koch, S.; Rensink, A.; Riccobene, E.; Ratiu, D.; Sirjani, M.
2021. Composing Model-Based Analysis Tools. Ed.: R. Heinrich, 71–95, Springer International Publishing. doi:10.1007/978-3-030-81915-6_5 -
Preface to the 3rd Multi-Paradigm Modeling for Cyber-Physical Systems (MPM4CPS 2021)
Amrani, M.; Blouin, D.; Challenger, M.; Deantoni, J.; Heinrich, R.; Wimmer, M.
2021. 24th International Conference on Model-Driven Engineering Languages and Systems: MODELS 2021 ; 10-15 October 2021, Virtual Event, 284–285, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C53483.2021.00049 -
Towards the Co-Evolution of Models and Artefacts of Industrial Tools Through External Views
Sağlam, T.; Kühn, T.
2021. 2021 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Fukuoka, J, October 10-15, 2021, 410–416, IEEEXplore. doi:10.1109/MODELS-C53483.2021.00064 -
Upper Bound Computation of Information Leakages for Unbounded Recursion
Bechberger, J.; Weigl, A.
2021. Software Engineering and Formal Methods: 19th International Conference, SEFM 2021, Virtual Event, December 6–10, 2021, Proceedings. Ed.: R. Calinescu, 160–177, Springer-Verlag. doi:10.1007/978-3-030-92124-8_10 -
Tactile computing: Essential building blocks for the Tactile Internet
Aßmann, U.; Baier, C.; Dubslaff, C.; Grzelak, D.; Hanisch, S.; Hartono, A. P. P.; Köpsell, S.; Lin, T.; Strufe, T.
2021. Tactile Internet. Ed.: F. H.P. Fitzek, 293–317, Academic Press. doi:10.1016/B978-0-12-821343-8.00025-3 -
Onion Routing with Replies
Kuhn, C.; Hofheinz, D.; Rupp, A.; Strufe, T.
2021. Advances in Cryptology – ASIACRYPT 2021 – 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 573–604, Springer International Publishing. doi:10.1007/978-3-030-92075-3_20 -
Black-Box Accumulation Based on Lattices
Faller, S. H.; Baumer, P.; Klooß, M.; Koch, A.; Ottenhues, A.; Raiber, M.
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer. doi:10.1007/978-3-030-92641-0_11 -
Angriffserkennungssysteme in ICS Netzwerken
Kippe, J.; Karch, M.
2021. Deutschland, Digital, Sicher : 30 Jahre BSI : Tagungsband zum 17. Deutschen IT-Sicherheitskongress, 1–11, SecuMedia Verlag -
A Secure Cell-Attachment Procedure of LDACS
Maurer, N.; Graupl, T.; Gentsch, C.; Guggemos, T.; Tiepelt, K. M.; Schmitt, C.; Rodosek, G. D.
2021. Proceedings 2021 IEEE European Symposium on Security and Privacy Workshops, EuroS&PW 2021: Virtual Conference, 6-10 September 2021, 113–122, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW54576.2021.00019 -
Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance
Arias-Cabarcos, P.; Habrich, T.; Becker, K.; Becker, C.; Strufe, T.
2021. Proceedings of the 30th USENIX Security Symposium : August 11-13, 2021, 55–72, USENIX Association -
2PPS – Publish/Subscribe with Provable Privacy
Abdelwahab Gaballah, S.; Coijanovic, C.; Strufe, T.; Mühlhäuser, M.
2021. 40th International Symposium on Reliable Distributed Systems (SRDS), Chicago, IL, USA, 20-23 Sept. 2021. Vol.: 1, 198–209, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SRDS53918.2021.00028 -
On Expected Polynomial Runtime in Cryptography
Klooß, M.
2021. Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 558–590, Springer International Publishing. doi:10.1007/978-3-030-90459-3_19 -
Classifying and Avoiding Compatibility Issues in Networks of Bidirectional Transformations
Sağlam, T.; Klare, H.
2021. STAF 2021 Workshop Proceedings: 9th International Workshop on Bidirectional Transformations. Hrsg.: Ludovico Lovino, Lars Michael Kristensen, 34–53, CEUR-WS.org -
Tackling Problems of Maintenance and Evolution in Industry 4.0 Scenarios Using a Distributed Architecture
Koch, S.; Wunderlich, T.; Hansert, J.; Heinrich, R.; Schlegel, T.
2021. SE-SE 2021 - Software Engineering 2021 Satellite Events - Workshops and Tools & Demos - Proceedings of the Software Engineering 2021 Satellite Events, Braunschweig/Virtual, Germany, February 22 - 26, 2021. Ed.: S. Götz, CEUR-WS -
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions
Broadnax, B.; Mechler, J.; Müller-Quade, J.
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25 -
Identifying confidentiality violations in architectural design using palladio
Seifermann, S.; Walter, M.; Hahner, S.; Heinrich, R.; Reussner, R.
2021. W. D. W. D. Heinrich R. Mirandola R. (Ed.), 15th European Conference on Software Architecture - Companion (ECSA-C 2021), Virtual online (originally: Växjö, Sweden), September, 13-17, 2021. Ed.: R. Heinrich, Code 172547, CEUR-WS.org -
Deductive Verification of Floating-Point Java Programs in KeY
Abbasi, R.; Schiffl, J.; Darulova, E.; Ulbrich, M.; Ahrendt, W.
2021. Tools and Algorithms for the Construction and Analysis of Systems : 27th International Conference, TACAS 2021, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021, Luxembourg City, Luxembourg, March 27 – April 1, 2021, Proceedings, Part II. Ed.: J. F. Groote, 242–261, Springer International Publishing. doi:10.1007/978-3-030-72013-1_13 -
Buchbesprechung Digitalisierung im Sozialrecht, Bundestagung des Deutschen Sozialrechtsverbandes e.V., 10/11. Oktober 2019 in Stuttgart, 2020
Spiecker gen. Döhmann, I.
2021. Vierteljahresschrift für Sozial- und Arbeitsrecht, 39 (3), 249–251, Carl Heymanns Verlag -
Herausforderungen der Digitalisierung im Gesundheitswesen Corona-Warn-App, Forschungsdaten und Künstliche Intelligenz
Bretthauer, S.
2021. Die Verwaltung, 54 (3), 411–441 -
Befugnisse des Staates nach dem Infektionsschutzgesetz
Bretthauer, S.
2021. Religionsfreiheit in Seuchenzeiten. Hrsg.: S. Mückl, 61–83, Duncker & Humblot -
Online-Wahlen zu Parlamenten als modernes Instrument demokratischer Partizipation in Zeiten von Pandemie und Digitalisierung
Bretthauer, S.
2021. Kritische Vierteljahresschrift für Gesetzgebung und Rechtswissenschaft, 104 (1), 3–33. doi:10.5771/2193-7869-2021-1-3 -
§ 23: Informationsverwaltung
Spiecker gen. Döhmann, I.
2021. Handbuch des Verwaltungsrechts. Hrsg.: W. Kahl. Bd. 1, 891–938, C.F. Müller -
The legal framework for access to data from a data protection viewpoint - especially under GDPR
Spiecker gen. Döhmann, I.
2021. Data Access, Consumer Interests and Public Welfare, 175–208, Nomos Verlagsgesellschaft. doi:10.5771/9783748924999-175 -
Effective Notification Campaigns on the Web : A matter of Trust, Framing, and Support
Maass, M.; Stöver, A.; Pridöhl, H.; Bretthauer, S.; Herrmann, D.; Hollick, M.; Spiecker gen. Döhmann, I.
2021. Proceedings of the 30th USENIV Security Symposium, 2489–2506, USENIX Association -
Governance im lernenden Gesundheitssystem : Anforderungen an eine gesamtheitliche Steuerung von Plattformen
Spiecker gen. Döhmann, I.
2021. Perspektive Gesundheit 2030. Hrsg.: J. Baas, 45–53, Medizinisch Wissenschaftliche Verlagsgesellschaft mbH & Co. KG (MWV) -
Recht und Technik: Datenschutz im Diskurs
Grimm, R.; Hornung, G.; Sorge, C.; Spiecker gen. Döhmann, I.
2021. Informatik 2020: Fachtagung vom 28. September–2. Oktober 2020 Karlsruhe. Hrsg.: R. H. Reussner, 813–814, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_72 -
Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis
Patzer, F.; Beyerer, J.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Hrsg:. Paolo Mori, Gabriele Lenzini, Steven Furnell, 550–557, SciTePress. doi:10.5220/0010285305500557 -
Scalability and Precision by Combining Expressive Type Systems and Deductive Verification
Lanzinger, F.; Weigl, A.; Ulbrich, M.; Dietl, W.
2021. Proceedings of the ACM on programming languages, 5 (OOPSLA), Article no: 143. doi:10.1145/3485520 -
Staatliche oder private Algorithmenregulierung?
Spiecker gen. Döhmann, I.
2021. Bitburger Gespräche : Jahrbuch 2020. Hrsg. von der Stiftung Gesellschaft für Rechtspolitik, Trier und dem Institut für Rechtspolitik an der Universität Trier, 37–57, Beck -
Section II: Health protection and personal data protection in selected Member States, The impact of EU Regulation 2016/679 on the German health system
Spiecker gen. Döhmann, I.
2021. The protection of personal data concerning health at the European level: a comparative analysis. Ed.: G. Fares, 83–100, G. Giapichelli -
§ 4 HDSIG - Videoüberwachung öffentlich zugänglicher Räume
Spiecker gen. Döhmann, I.
2021. Hessisches Datenschutz- und Informationsfreiheitsgesetz. Hrsg.: A. Roßnagel, 107–117, Nomos Verlagsgesellschaft -
§ 24 Europäisches Datenschutzrecht
Spiecker gen. Döhmann, I.; Benecke, A.
2021. Verwaltungsrecht der Europäischen Union. Hrsg.: J. Tierhechte, Nomos Verlagsgesellschaft -
A Step Towards Global Counterfactual Explanations: Approximating the Feature Space Through Hierarchical Division and Graph Search
Becker, M.; Burkart, N.; Birnstill, P.; Beyerer, J.
2021. Advances in Artificial Intelligence and Machine Learning, 1 (2), 90–110. doi:10.54364/aaiml.2021.1107 -
Architectural Access Control Policy Refinement and Verification under Uncertainty
Hahner, S.
2021. 15th European Conference on Software Architecture - Companion (ECSA-C 2021), Virtual online (originally: Växjö, Sweden), September, 13-17, 2021. Ed.: R. Heinrich, RWTH Aachen -
Tricks von Website-Betreibern, um Ihre Einwilligung zum Sammeln und Auswerten von Nutzerdaten über Cookies zu erhalten
Dietmann, H.; Krisam, C.; Volkamer, M.; Lehr, F.
2021 -
On Forging SPHINCS
-Haraka Signatures on a Fault-Tolerant Quantum Computer
Berger, R. M.; Tiepelt, M.
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing. doi:10.1007/978-3-030-88238-9_3 -
Electronic Voting: 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5–8, 2021: proceedings
Krimmer, R.; Volkamer, M.; Duenas-Cid, D.; Kulyk, O.; Rønne, P.; Solvak, M.; Germann, M. (Eds.)
2021. Springer Nature. doi:10.1007/978-3-030-86942-7 -
Quantifying Software Reliability via Model-Counting
Teuber, S.; Weigl, A.
2021. Quantitative Evaluation of Systems: 18th International Conference, QEST 2021, Paris, France, August 23–27, 2021, Proceedings. Ed.: A. Abate, 59–79, Springer-Verlag. doi:10.1007/978-3-030-85172-9_4 -
Trace Link Recovery for Software Architecture Documentation
Keim, J.; Schulz, S.; Fuchß, D.; Kocher, C.; Speit, J.; Koziolek, A.
2021. Software Architecture. Ed.: S. Biffl, 101–116, Springer-Verlag. doi:10.1007/978-3-030-86044-8_7 -
Plausible Deniability for Anonymous Communication
Kuhn, C.; Noppel, M.; Wressnegger, C.; Strufe, T.
2021. Proceedings of 20th Workshop on Privacy in the Electronic Society (WPES), Seoul, South Korea, November 15, 2021, 17–32, Association for Computing Machinery (ACM). doi:10.1145/3463676.3485605 -
Putting Privacy into Perspective – Comparing Technical, Legal, and Users’ View of Information Sensitivity
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Informatik 2020 - Back to the future : 50. Jahrestagung der Gesellschaft für Informatik vom 28. September - 2. Oktober 2020, virtual. Ed.: R.H. Reussner, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_76 -
Reconstructing z3 proofs in KeY: There and back again
Pfeifer, W.; Schiffl, J.; Ulbrich, M.
2021. Proceedings of the 23rd ACM International Workshop on Formal Techniques for Java-like Programs : 23rd ACM International Workshop on Formal Techniques for Java-Like Programs, FTfJP 2021, co-located with ECOOP/ISSTA 2021, Online, 13 July 2021 - null, 24–31, Association for Computing Machinery (ACM). doi:10.1145/3464971.3468421 -
Secure and privacy-respecting documentation for interactive manufacturing and quality assurance
Wagner, P. G.; Lengenfelder, C.; Holzbach, G.; Becker, M.; Birnstill, P.; Voit, M.; Bejhad, A.; Samorei, T.; Beyerer, J.
2021. Applied Sciences (Switzerland), 11 (16), Art.-Nr.: 7339. doi:10.3390/app11167339 -
Challenges in aligning enterprise application architectures to business process access control requirements in evolutional changes
Pilipchuk, R.; Seifermann, S.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 18th International Conference on e-Business, ICE-B 2021, Virtual, Online, 7 July 2021 - 9 July 2021, 13–24, SciTePress. doi:10.5220/0010511800130024 -
A unified model to detect information flow and access control violations in software architectures
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2021. Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, Virtual, Online, 6 July 2021 - 8 July 2021, 26–37, SciTePress. doi:10.5220/0010515300260037 -
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
Couteau, G.; Klooß, M.; Lin, H.; Reichle, M.
2021. Advances in Cryptology – EUROCRYPT 2021. Ed.: A. Canteaut, 247–277, Springer International Publishing. doi:10.1007/978-3-030-77883-5_9 -
Vision: What Johnny learns about Password Security from Videos posted on YouTube
Christmann, M.; Mayer, P.; Volkamer, M.
2021. European Symposium on Usable Security (EuroUSEC), 11 - 12 Oktober 2021, 124–128, Association for Computing Machinery (ACM). doi:10.1145/3481357.3481528 -
How to Effectively Communicate Benefits of Introducing a Modern Password Policy to Employees in Companies
Christmann, M.; Mayer, P.; Volkamer, M.
2021. Eighteenth Symposium on Usable Privacy and Security, August 7–9, 2022, Boston, MA, USA -
Evaluation der interaktiven NoPhish Präsenzschulung
Berens, B.; Aldag, L.; Volkamer, M.
2021. Mensch und Computer 2021 - Workshopband. Hrsg.: C. Wienrich, Gesellschaft für Informatik (GI). doi:10.18420/muc2021-mci-wsc-394 -
A classification for managing software engineering knowledge
Kaplan, A.; Walter, M.; Heinrich, R.
2021. EASE 2021: Evaluation and Assessment in Software Engineering. Ed.: R. Chitchyan, 340–346, Association for Computing Machinery (ACM). doi:10.1145/3463274.3463357 -
Classifying Usage Control and Data Provenance Architectures
Wagner, P. G.
2021. Proceedings of the 2020 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer; T. Zander, 135–154, KIT Scientific Publishing -
Multi-paradigm modelling for cyber–physical systems: a descriptive framework
Amrani, M.; Blouin, D.; Heinrich, R.; Rensink, A.; Vangheluwe, H.; Wortmann, A.
2021. Software and Systems Modeling, 20, 611–639. doi:10.1007/s10270-021-00876-z -
Modeling Data Flow Constraints for Design-Time Confidentiality Analyses
Hahner, S.; Seifermann, S.; Heinrich, R.; Walter, M.; Bures, T.; Hnetynka, P.
2021. Proceedings IEEE 18th International Conference on Software Architecture - Companion: ICSA-C 2021 ; 22 - 26 March 2021 ; virtual conference, 15–21, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C52384.2021.00009 -
Enabling Consistency between Software Artefacts for Software Adaption and Evolution
Monschein, D.; Mazkatli, M.; Heinrich, R.; Koziolek, A.
2021. Proceedings IEEE 18th International Conference on Software Architecture: 22-26 March 2021 ; virtual conference, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA51549.2021.00009 -
TagVet: Vetting Malware Tags using Explainable Machine Learning
Pirch, L.; Warnecke, A.; Wressnegger, C.; Rieck, K.
2021. EuroSec ’21: Proceedings of the 14th European Workshop on Systems Security, 34–40, Association for Computing Machinery (ACM). doi:10.1145/3447852.3458719 -
Human Factors in Security
Berens, B.; Ghiglieri, M.; Kulyk, O.; Mayer, P.; Volkamer, M.
2021. Sicherheitskritische Mensch-Computer-Interaktion. Hrsg.: C. Reuter, 89–110, Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-32795-8_5 -
A Multivariate Characterization and Detection of Software Performance Antipatterns
Avritzer, A.; Britto, R.; Trubiani, C.; Russo, B.; Janes, A.; Camilli, M.; Van Hoorn, A.; Heinrich, R.; Rapp, M.; Henß, J.
2021. ICPE ’21: Proceedings of the ACM/SPEC International Conference on Performance Engineering, 19-23 April 2021, Rennes, France (virtual), 61–72, Association for Computing Machinery (ACM). doi:10.1145/3427921.3450246 -
Finding a Universal Execution Strategy for Model Transformation Networks
Gleitze, J.; Klare, H.; Burger, E.
2021. Fundamental Approaches to Software Engineering. Ed.: E. Guerra, 87–107, Springer International Publishing. doi:10.1007/978-3-030-71500-7_5 -
A Practical Evaluation Method for Misbehavior Detection in the Presence of Selfish Attackers
Wehmer, M.; Baumgart, I.
2021. Proceedings of the 7th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2021), 529–537, SciTePress. doi:10.5220/0010451005290537 -
Use of digital healthcare solutions for care delivery during a pandemic-chances and (cyber) risks referring to the example of the COVID-19 pandemic
Kaiser, F. K.; Wiens, M.; Schultmann, F.
2021. Health and Technology, 11, 1125–1137. doi:10.1007/s12553-021-00541-x -
Automatically extracting business level access control requirements from BPMN Models to align RBAC policies
Pilipchuk, R.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Ed.: P. Mori, 300–307, SciTePress. doi:10.5220/0010184403000307 -
When Data Fly: An Open Data Trading System in Vehicular Ad Hoc Networks
Lücking, M.; Kretzer, F.; Kannengießer, N.; Beigl, M.; Sunyaev, A.; Stork, W.
2021. Electronics, 10 (6), 654. doi:10.3390/electronics10060654 -
Token Economy
Sunyaev, A.; Kannengießer, N.; Beck, R.; Treiblmaier, H.; Lacity, M.; Kranz, J.; Fridgen, G.; Spankowski, U.; Luckow, A.
2021. Business & information systems engineering, 63 (4), 457–478. doi:10.1007/s12599-021-00684-1 -
Meldepflicht von Mitarbeitenden bei IT Sicherheits- und Datenschutzvorfällen Betrachtung möglicher arbeitsrechtlicher Konsequenzen
Müllmann, D.; Volkamer, M.
2021. Zeitschrift für Datenschutz, 11 (1), 8–13 -
“Healthy surveillance”: Designing a concept for privacy-preserving mask recognition AI in the age of pandemics
Kühl, N.; Martin, D.; Wolff, C.; Volkamer, M.
2021. Hawaii International Conference on Systems Sciences (HICSS-54), January 5-8, 2021, 1–10 -
Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende - Betrachtung möglicher arbeitsrechtlicher Konsequenzen
Müllmann, D.; Volkamer, M.
2021. Informatik 2020 - Back to the future. Hrsg.: R. H. Reussner, 829–840, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_74
Publikationsliste
-
Security Analysis of Forward Secure Log Sealing in Journald
Dörre, F.; Ottenhues, A.
2025. International Conference on Applied Cryptography and Network Security, 27 S -
Analytical Evaluation of Time-based Cryptography
Ramadan, M.; Gadekar, P.; Hagenmeyer, V.; Elbez, G.
2025. Title: Proceedings of the 11th International Conference on Information Systems Security and Privacy 2025. Editor: Gabriele Lenzini, Paolo Mori, Steven Furnell (Eds.) -
Responsible and Sustainable AI: Considering Energy Consumption in Automated Text Classification Evaluation Tasks
Kaplan, A.; Keim, J.; Greiner, L.; Sieger, R.; Mirandola, R.; Reussner, R.
2025. Proceedings of the 2025 {IEEE/ACM} 47th International Conference on Software Engineering: Companion Proceedings, {ICSE} Companion 2025, Ottawa, 27th April - 3rd May 2025 -
Enabling Architecture Traceability by LLM-based Architecture Component Name Extraction
Fuchß, D.; Liu, H.; Hey, T.; Keim, J.; Koziolek, A.
2025. 22nd IEEE International Conference on Software Architecture (ICSA 2025) -
Requirements Traceability Link Recovery via Retrieval-Augmented Generation
Fuchß, D.; Keim, J.; Koziolek, A.; Hey, T.
2025. International Working Conference on Requirements Engineering (REFSQ 2025) -
LiSSA: Toward Generic Traceability Link Recovery through Retrieval-Augmented Generation
Fuchß, D.; Hey, T.; Keim, J.; Liu, H.; Ewald, N.; Thirolf, T.; Koziolek, A.
2025. 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE), 723–723, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSE55347.2025.00186 -
A Classification Framework for Scientific Documents to Support Knowledge Graph Population
Kaplan, A.; Keim, J.; Greiner, L.; Koziolek, A.; Reussner, R.
2025. Software Engineering 2025 – Companion Proceedings. Ed.: K. Feichtinger, 277–286, Gesellschaft für Informatik (GI). doi:10.18420/se2025-ws-28 -
Do Large Language Models Contain Software Architectural Knowledge? An Exploratory Case Study with GPT
Soliman, M.; Keim, J.
2025. 22nd IEEE International Conference on Software Architecture (ICSA 2025), Institute of Electrical and Electronics Engineers (IEEE) -
X-by-Construction Meets AI
ter Beek, M. H.; Cleophas, L.; Dubslaff, C.; Schaefer, I.
2025. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies – 12th International Symposium, ISoLA 2024, Crete, Greece, October 27–31, 2024, Proceedings, Part IV. Ed.: T. Margaria, 155–161, Springer Nature Switzerland. doi:10.1007/978-3-031-75387-9_10 -
Two Sides of the Same Coin: Learning the Backdoor to Remove the Backdoor
Zhao, Q.; Wressnegger, C.
2025. Proceedings of the 39th Annual AAAI Conference on Artificial Intelligence (AAAI) -
Integrated QoS- and Vulnerability-Driven Self-adaptation for Microservices Applications
Camilli, M.; Luccioletti, F.; Mirandola, R.; Scandurra, P.
2025. Service-Oriented Computing – 22nd International Conference, ICSOC 2024, Tunis, Tunisia, December 3–6, 2024, Proceedings, Part II. Ed.: W. Gaaloul, 55–71, Springer Nature Singapore. doi:10.1007/978-981-96-0808-9_5 -
DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing
Wachter, L.; Gremminger, J.; Wressnegger, C.; Payer, M.; Toffalini, F.
2025. Proceedings of the Network and Distributed System Security Symposium (NDSS) -
Data Distribution and Redistribution - A formal and practical Analysis of the DDS Security Standard
Müller, M.; Lauser, T.
2025. SAC ’25: Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing -
Literature Review: Misconceptions About Phishing
Mossano, M.; Volkamer, M.
2025. Human Aspects of Information Security and Assurance : 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024, Proceedings, Part I, 215–228, Springer Nature Switzerland. doi:10.1007/978-3-031-72559-3 -
Formal Foundations of Consistency in Model-Driven Development
Pascual, R.; Beckert, B.; Ulbrich, M.; Kirsten, M.; Pfeifer, W.
2025. Leveraging Applications of Formal Methods, Verification and Validation. Specification and Verification : 12th International Symposium, ISoLA 2024, Crete, Greece, October 27–31, 2024, Proceedings, Part III. Ed.: T. Margaria, 178–200, Springer Nature Switzerland. doi:10.1007/978-3-031-75380-0_11 -
Towards AI-Assisted Correctness-by-Construction Software Development
Kodetzki, M.; Bordis, T.; Kirsten, M.; Schaefer, I.
2025. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies – 12th International Symposium, ISoLA 2024, Crete, Greece, October 27–31, 2024, Proceedings, Part IV. Ed.: T. Margaria, 222–241, Springer Nature Switzerland. doi:10.1007/978-3-031-75387-9_14 -
ReP2P Matrix: Decentralized Relays to Improve Reliability and Performance of Peer-to-Peer Matrix
Schichtholz, B. D.; Bless, R.; Jacob, F.; Hartenstein, H.; Zitterbart, M.
2024. Proceedings of the ACM Conext-2024 Workshop on the Decentralization of the Internet (DIN ’24), Los Angeles, CA, USA, December 9–12, 2024, 8–14, Association for Computing Machinery (ACM). doi:10.1145/3694809.3700741 -
Model-Manipulation Attacks Against Black-Box Explanations
Hegde, A.; Noppel, M.; Wressnegger, C.
2024. Proceedings of the Annual Computer Security Applications Conference (ACSAC), Honolulu, HI, 9th - 13th December 2024 -
Analysis and Measurement of Attack Resilience of Differential Privacy
Guerra-Balboa, P.; Sauer, A.; Strufe, T.
2024. WPES ’24: Proceedings of the 23rd Workshop on Privacy in the Electronic Society. Ed.: E. Ayday, 155–171, Association for Computing Machinery (ACM). doi:10.1145/3689943.3695046 -
The Influence of Granularity of Transactions on Performance in Vitruvius
Weber, T.; Jutz, B.; Zacouris, Z.
2024. Softwaretechnik-Trends, Gesellschaft für Informatik (GI) -
Scalability of Consistency Preservation with Vitruvius
Jutz, B.; Weber, T.
2024. Softwaretechnik-Trends, Gesellschaft für Informatik (GI) -
Towards Integrating Low-Code in View-based Development
Hermann, A.-K.; König, L.; Burger, E.; Reussner, R.
2024. MODELS Companion ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering. Ed.: M. Wimmer, 866–875, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688333 -
Managing Variability of Cyber-Physical Production Systems: Towards Consistency Management
Fadhlillah, H. S.; Greiner, S.; Feichtinger, K.; Rabiser, R.; Zoitl, A.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, September 22-27, 2024, at the JKU Linz., 945–949, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688216 -
Towards Formalizing and Relating Different Notions of Consistency in Cyber-Physical Systems Engineering
Feichtinger, K.; Kegel, K.; Pascual, R.; Aßmann, U.; Beckert, B.; Reussner, R.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, Linz/Wien, 22nd - 27th September 2024, 915–919, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688565 -
Evaluating Drill-Down DDoS Destination Detection
Krack, T.; Kopmann, S.; Zitterbart, M.
2024. 2024 IEEE 49th Conference on Local Computer Networks (LCN), Normandy, France, 08-10 October 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN60385.2024.10639629 -
Unlocking the Potential of Composition for General Neighborhood Definitions
Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Strufe, T.
2024. Proceedings of the XVIII Spanish Meeting on Cryptology and Information Security (RECSI), León, 22th - 25st October, 2024 -
On Practical Realization of Evasion Attacks for Industrial Control Systems
Erba, A.; Murillo, A. F.; Taormina, R.; Galelli, S.; Tippenhauer, N. O.
2024. Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security (RICSS), Association for Computing Machinery (ACM). doi:10.1145/3689930.3695213 -
Adversarially Robust Anti-Backdoor Learning
Zhao, Q.; Wressnegger, C.
2024. Proceedings of the 2024 Workshop on Artificial Intelligence and Security (AISEC), Association for Computing Machinery (ACM). doi:10.1145/3689932.3694763 -
A Delta-Oracle for Fast Model Merge Conflict Estimation using Sketch-Based Critical Pair Analysis
Kegel, K.; Domanowski, A.; Feichtinger, K.; Pascual, R.; Aßmann, U.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 22.-27.09.2024, Linz, 1046–1055, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688341 -
ARC³N: A Collaborative Uncertainty Catalog to Address the Awareness Problem of Model-Based Confidentiality Analysis
Hahner, S.; Niehues, N.; Boltz, N.; Fuksa, M.; Heinrich, R.
2024. MODELS Companion ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems. Ed.: M. Wimmer, 640–644, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688556 -
Model Everything but with Intellectual Property Protection - The Deltachain Approach
Weber, T.; Weber, S.
2024. MODELS ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 49–56, Association for Computing Machinery (ACM). doi:10.1145/3640310.3674086 -
Modeling Languages for Automotive Digital Twins : A Survey Among the German Automotive Industry
Pfeiffer, J.; Fuchß, D.; Kühn, T.; Liebhart, R.; Neumann, D.; Neimöck, C.; Seiler, C.; Koziolek, A.; Wortmann, A.
2024. MODELS ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems. Ed.: A. Egyed, 92–103, Association for Computing Machinery (ACM). doi:10.1145/3640310.3674100 -
Machine Learning-Based Feature Selection for Intrusion Detection Systems in IEC 61850-Based Digital Substations
Eynawi, A.; Mumrez, A.; Elbez, G.; Hagenmeyer, V.
2024. 2024 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 7 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SmartGridComm60555.2024.10738031 -
LLM-based Control Code Generation using Image Recognition
Koziolek, H.; Koziolek, A.
2024. LLM4Code ’24: Proceedings of the 1st International Workshop on Large Language Models for Code (LLM4 Code), Lissabon, 20th April 2024, 38–45, Association for Computing Machinery (ACM). doi:10.1145/3643795.3648385 -
Variability modeling of products, processes, and resources in cyber-physical production systems engineering
Meixner, K.; Feichtinger, K.; Fadhlillah, H. S.; Greiner, S.; Marcher, H.; Rabiser, R.; Biffl, S.
2024. SPLC ’24 : 28th ACM International Systems and Software Product Line Conference. Volume B. Ed.: M. Cordy, 219, Association for Computing Machinery (ACM). doi:10.1145/3646548.3676547 -
Seventh International Workshop on Languages for Modelling Variability (MODEVAR@SPLC 2024)
Feichtinger, K.; Galasso-Carbonnel, J.
2024. SPLC ’24 : Proceedings of the 28th ACM International Systems and Software Product Line Conference - Volume B. Ed.: M. Cordy, 224, Association for Computing Machinery (ACM). doi:10.1145/3646548.3677006 -
MulTi-Wise Sampling: Trading Uniform T-Wise Feature Interaction Coverage for Smaller Samples
Pett, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2024. SPLC ’24: Proceedings of the 28th ACM International Systems and Software Product Line Conference - Volume B. Ed.: M. Cordy, 47–53, Association for Computing Machinery (ACM). doi:10.1145/3646548.3672589 -
Semantics Enhancing Model Transformation for Automated Constraint Validation of Palladio Software Architecture to MontiArc Models
Weber, S.; Henß, J.; Taghavi, B.; Weber, T.; Stüber, S.; Marin, A.; Rumpe, B.; Heinrich, R.
2024. Software Architecture. ECSA 2024 Tracks and Workshops – Luxembourg City, Luxembourg, September 3–6, 2024, Proceedings. Ed.: A. Ampatzoglou, J. Pérez, B. Buhnova, V. Lenarduzzi, C. C. Venters, U. Zdun, K. Drira, L. Rebelo, D. Di Pompeo, M. Tucci, E. Y. Nakagawa, E. Navarro, 30 – 38, Springer Nature Switzerland. doi:10.1007/978-3-031-71246-3_4 -
Consistency Management for Security Annotations for Continuous Verification
Reiche, F.; Weber, T.; Becker, S.; Weber, S.; Heinrich, R.; Burger, E.
2024. ACM / IEEE 27th International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), 1096–1105, Association for Computing Machinery (ACM). doi:10.1145/3652620 -
Composition in Differential Privacy for General Granularity Notions
Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Strufe, T.
2024. 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 8th-12th July 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSF61375.2024.00004 -
7D: Demonstrating Drill-Down DDoS Destination Detection
Kopmann, S.; Krack, T.; Zitterbart, M.
2024. 2024 IEEE International Conference on Machine Learning for Communication and Networking (ICMLCN), Stockholm, 5th-8th May 2024, 1–2, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICMLCN59089.2024.10624795 -
Inconsistencies in Production Workflows and How to Model Them
Kuder, N. D.; Weber, T.; Schneider, J.; Weber, S.; Völk, T. A.; Albers, A.; Koziolek, A.
2024. 2024 IEEE 21st International Conference on Software Architecture Companion (ICSA-C), Hyderabad, 4th - 8th June 2024, 84 – 86, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C63560.2024.00021 -
MoCoRe - A Generic Model-Driven Composition and Rule-Based Refinement Framework
Gstür, M.; Kirschner, Y. R.; Singh, S.; Koziolek, A.
2024. 2024 IEEE 21st International Conference on Software Architecture Companion (ICSA-C), Hyderabad, 4th - 8th June 2024, 273 – 280, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C63560.2024.00039 -
Towards a Single Source of Truth with a Freely Shareable Deltachain
Weber, T.; Weber, S.
2024. 2024 IEEE 21st International Conference on Software Architecture Companion (ICSA-C), Hyderabad, 4th -8th June 2024, 92 – 94, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C63560.2024.00023 -
SMILE4VIP: Intervention to Support Visually Impaired Users Against Phishing
Bohlender, M.; Morisco, R.; Mossano, M.; Schwarz, T.; Volkamer, M.
2024. 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Vienna, 8th-12th July 2024, 650 – 657, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW61312.2024.00079 -
Of Mothers and Managers – The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field
Gerber, N.; Stöver, A.; Mayer, P.
2024. Proceedings of the Twentieth Symposium on Usable Privacy and Security, August 12–13, 2024 • Philadelphia, PA, USA, 547–566, Advanced Computing Systems Association (USENIX) -
Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent Banners
Kriecherbauer, T.; Schwank, R.; Krauss, A.; Neureither, K.; Remme, L.; Volkamer, M.; Herrmann, D.
2024. ARES ’24: Proceedings of the 19th International Conference on Availability, Reliability and Security, 1–7, Association for Computing Machinery (ACM). doi:10.1145/3664476.3664499 -
DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote Attestation
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2024. Proceedings of the 19th International Conference on Availability, Reliability and Security, Art.-Nr.: 159, Association for Computing Machinery (ACM). doi:10.1145/3664476.3670442 -
SACfe: Secure Access Control in Functional Encryption with Unbounded Data
Dowerah, U.; Dutta, S.; Hartmann, F.; Mitrokotsa, A.; Mukherjee, S.; Pal, T.
2024. IEEE 9th European Symposium on Security and Privacy (Euro&SP 2024), 860–882, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSP60621.2024.00053 -
Complete Game Logic with Sabotage
Abou El Wafa, N.; Platzer, A.
2024. Proceedings of the 39th Annual ACM/IEEE Symposium on Logic in Computer Science, 1–15, Association for Computing Machinery (ACM). doi:10.1145/3661814.3662121 -
Interoperability Assessment of IEC 61850 Devices in a Multivendor Digital Substation
Keppler, G.; Bonetti, A.; Canbolat, S.; Mumrez, A.; Hagenmeyer, V.; Elbez, G.
2024. 6th Global Power, Energy and Communication Conference (GPECOM2024), Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/GPECOM61896.2024.10582663 -
SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret Sharing
Jiang, Y.; Mei, F.; Dai, T.; Li, Y.
2024. Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 274 – 288, Association for Computing Machinery (ACM). doi:10.1145/3634737.3657024 -
Explainability Engineering Challenges: Connecting Explainability Levels to Run-time Explainability
Schwammberger, M.; Mirandola, R.; Wenninghoff, N.
2024. Proceedings of 2nd World Conference on Explainable Artificial Intelligence Conference (XAI2024), Springer. doi:10.1007/978-3-031-63803-9_11 -
Iterative Filter Pruning for Concatenation-based CNN Architectures
Pavlitska, S.; Bagge, O.; Peccia, F.; Mammadov, T.; Zöllner, J. M.
2024. IJCNN 2024 conference proceedings, 10 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IJCNN60899.2024.10650334 -
BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots
Hemken, N.; Jacob, F.; Tërnava, F.; Kartmann, R.; Asfour, T.; Hartenstein, H.
2024. SACMAT 2024: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, San Antonio, 15th-17th May 2024, 117–125, Association for Computing Machinery (ACM). doi:10.1145/3649158.3657034 -
Identification of Inconsistencies in Agile CPS Engineering with Formula Student
Albers, A.; Koziolek, A.; Völk, T. A.; Klippert, M.; Pfaff, F.; Stolpmann, R.; Schwarz, S. E.
2024. Proceedings of The XXXV ISPIM Innovation Conference -
Uncertainty Flow Diagrams: Towards a Systematic Representation of Uncertainty Propagation and Interaction in Adaptive Systems
Camara, J.; Hahner, S.; Perez-Palacin, D.; Vallecillo, A.; Acosta, M.; Bencomo, N.; Calinescu, R.; Gerasimou, S.
2024. SEAMS ’24: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems; New York, 37 – 43, Association for Computing Machinery (ACM). doi:10.1145/3643915.3644084 -
Human empowerment in self-adaptive socio-technical systems
Boltz, N.; Getir Yaman, S.; Inverardi, P.; De Lemos, R.; Van Landuyt, D.; Zisman, A.
2024. SEAMS’ 24: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Lissabon, 15th-16th April 2024, 200 – 206, Association for Computing Machinery (ACM). doi:10.1145/3643915.3644082 -
RAMSES: An Exemplar for Engineering Self-Adaptive Microservice Applications
Riccio, V.; Sorrentino, G.; Zamponi, E.; Camilli, M.; Mirandola, R.; Scandurra, P.
2024. IEEE/ACM proceedings of the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS2024), Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3643915.3644110 -
Attacking Learning-based Models in Smart Grids: Current Challenges and New Frontiers
Sanchez, G.; Elbez, G.; Hagenmeyer, V.
2024. e-Energy ’24: Proceedings of the 15th ACM International Conference on Future and Sustainable Energy Systems, 589–595, Association for Computing Machinery (ACM). doi:10.1145/3632775.3661984 -
Short Paper: Unpredictable Transaction Arrangement for MEV Mitigation in Ethereum
Droll, J.; Stengele, O.; Hartenstein, H.
2024. 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 625–629, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC59979.2024.10634470 -
NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree
Dai, T.; Jiang, Y.; Li, Y.; Mei, F.
2024. 2024 IEEE Security and Privacy Workshops (SPW), 95 – 103, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SPW63631.2024.00015 -
Better Together: The Interplay Between a Phishing Awareness Video and a Link-centric Phishing Support Tool
Berens, B. M.; Schaub, F.; Mossano, M.; Volkamer, M.
2024. Proceedings of the CHI Conference on Human Factors in Computing Systems, 1–60, Association for Computing Machinery (ACM). doi:10.1145/3613904.3642843 -
Improving Resilience of Future Mobile Network Generations Implementing Zero Trust Paradigm
Abedi, K.; Nguyen, G. T.; Strufe, T.
2024. NOMS 2024-2024 IEEE Network Operations and Management Symposium, 06th-10th May 2024, Seoul, Korea, 1–5, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NOMS59830.2024.10574898 -
Understanding, describing, and mitigating the flow of personal data in ROS 2 systems to comply with the GDPR and beyond
Zander, T.; Wohnig, J.; Beyerer, J.
2024. 2024 IEEE International Conference on Advanced Robotics and Its Social Impacts (ARSO), 146 – 152, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARSO60199.2024.10557807 -
Logical Clocks and Monotonicity for Byzantine-Tolerant Replicated Data Types
Jacob, F.; Hartenstein, H.
2024. PaPoC ’24: Proceedings of the 11th Workshop on Principles and Practice of Consistency for Distributed Data, 37–43, Association for Computing Machinery (ACM). doi:10.1145/3642976.3653034 -
Explanation-driven Self-adaptation using Model-agnostic Interpretable Machine Learning
Negri, F. R.; Nicolosi, N.; Camilli, M.; Mirandola, R.
2024. IEEE/ACM proceedings of the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS2024). doi:10.1145/3643915.364408 -
Quantifying Software Correctness by Combining Architecture Modeling and Formal Program Analysis
Lanzinger, F.; Martin, C.; Reiche, F.; Teuber, S.; Heinrich, R.; Weigl, A.
2024. SAC ’24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing. Ed.: J. Hong, 1702–1711, Association for Computing Machinery (ACM). doi:10.1145/3605098.3636008 -
TRUST Issues: Multicast and Integrity Protection for the TRUST Redundancy Mechanism
Neumeister, F.; Zitterbart, M.
2024. 2024 IEEE International Conference on Industrial Technology (ICIT), 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICIT58233.2024.10540910 -
Vision: Towards Fully Shoulder-Surfing Resistant and Usable Authentication for Virtual Reality
Länge, T.; Matheis, P.; Düzgün, R.; Volkamer, M.; Mayer, P.
2024. Symposium on Usable Security and Privacy (USEC) 2024 : Co-located with NDSS Symposium 2024, San Diego, CA, 26th February - 1st March 2024. doi:10.14722/usec.2024.23092 -
Co-Simulation of Hardware and Software in Palladio
Weber, S.; Henss, J.; Reussner, R.
2024. 13th Symposium on Software Performance 2023, Stuttgart, 7th-9th November 2022, Ed.: Andrea Herrmann, 32–34, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43641 -
Kfeature: Rendering the Kconfig System into Feature Models
Yaman, K. B.; Wittler, J. W.; Gerking, C.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 134 – 138, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634731 -
RIXA - Explaining Artificial Intelligence in Natural Language
Becker, M.; Vishwesh, V.; Birnstill, P.; Schwall, F.; Wu, S.; Beyerer, J.
2024. 2023 IEEE International Conference on Data Mining Workshops (ICDMW), Shanghai, 1st-4th December 2023, 875–884, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICDMW60847.2023.00118 -
Verifiable Certificateless Signcryption Scheme for Smart Grids
Ramadan, M.; Elbez, G.; Hagenmeyer, V.
2024. 2023 7th International Conference on System Reliability and Safety (ICSRS), 181–189, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSRS59833.2023.10381069 -
E-Vote-ID 2024: Ninth International Joint Conference on Electronic Voting
Volkamer, M.; Duenas-Cid, D.; Rønne, P. B.; Budurushi, J.; Blom, M.; Rodriguez Pérez, A.; Spycher-Krivonosova, I.; Martin-Rozumilowicz, B.; Spycher, O.
2024. Gesellschaft für Informatik (GI) -
Resilience and Antifragility of Autonomous Systems
Burton, S.; Calinescu, R.; Mirandola, R.
2024. Report from Dagstuhl Seminar 24182, 142–163, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/DagRep.14.4.142 -
Performance Factors of Proxy Objects in the Eclipse Modeling Framework
Armbruster, M.
2024. Softwaretechnik-Trends, 42–44, Gesellschaft für Informatik (GI) -
Towards Bringing Vitruvius into the Cloud
Armbruster, M.; Weber, T.; König, L.
2024. Softwaretechnik-Trends, 18–20, Gesellschaft für Informatik (GI) -
Explainable fatigue detection in assembly tasks through graph neural networks
Vishwesh, V.; Becker, M.; Birnstill, P.; Beyerer, J.
2024. Forum Bildverarbeitung 2024. Hrsg.: T. Längle, M. Heizmann, 171–182, Karlsruher Institut für Technologie (KIT) -
Securing XAI through Trusted Computing
Becker, M.
2024. Proceedings of the 2023 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory, 13–20, KIT Scientific Publishing -
“Data Protection Can Sometimes Be a Nuisance” A Notification Study on Data Sharing Practices in City Apps
Drescher, J. N.; Moser, J.; Strangmann, N.; Spinner, J.; Herrmann, D.; Volkamer, M.
2024. Proceedings of Mensch und Computer 2024 (MuC’24). Ed. A. Maedche, 8 S., Association for Computing Machinery (ACM). doi:10.18420/muc2024-mci-ws17-159 -
Exploring Existing Tools for Managing Different Types of Research Data
Freund, A.; Hajiabadi, H.; Koziolek, A.
2024. INFORMATIK 2024 - Jahrestagung der Gesellschaft für Informatik e.V., 2181–2193, Gesellschaft für Informatik (GI). doi:10.18420/inf2024_189 -
Design and Evaluation of Verifiable Voting Systems Based on Tracking Code Verification
Nissen, C.; Kulyk, O.; Volkamer, M.; Friedrich, L. E.; Hermansen, H.
2024. Electronic voting : 9th international joint conference, E-Vote-ID 2024, Tarragona, Spain, October 2-4, 2024 : proceedings -
Erstellung eines Erklärvideos zur Verwendung von S/MIME (WIP)
Ballreich, F. L.; Volkamer, M.
2024. Mensch und Computer 2024 (MuC), Gesellschaft für Informatik (GI). doi:10.18420/muc2024-mci-ws17-152 -
R+R: Understanding Hyperparameter Effects in DP-SGD
Morsbach, F.; Reubold, J. L.; Strufe, T.
2024. Proceedings of the 40th Annual Computer Security Applications Conference -
Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on GPU
Dai, T.; Duan, L.; Jiang, Y.; Li, Y.; Mei, F.; Sun, Y.
2024. Secure IT Systems – 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16–17, 2023, Proceedings. Ed.: L. Fritsch, 330–349, Springer Nature Switzerland. doi:10.1007/978-3-031-47748-5_18 -
A Brief Systematization of Explanation-Aware Attacks
Noppel, M.; Wressnegger, C.
2024. KI 2024: Advances in Artificial Intelligence – 47th German Conference on AI, Würzburg, Germany, September 25–27, 2024, Proceedings. Ed.: A. Hotho, 350–354, Springer Nature Switzerland. doi:10.1007/978-3-031-70893-0_30 -
KI-generierte Abbildungen von Kindesmissbrauch: Technische Grundlagen und rechtliche Einordnung
Steinebach, M.; Hunter, J. C.; Schröder, L.
2024. Informatik 2024 : Tagung vom 24.-26. September 2024, Wiesbaden : Lock-in or log out? - Wie digitale Souveränität gelingt. Hrsg.: M. Klein, 247–261, Köllen Druck+Verlag. doi:10.18420/inf2024_17 -
Towards Deep Reactions in Multi-Level, Multi-View Modeling
Weber, T.; Ojha, M.; Sadeghi, M.; König, L.; Armbruster, M.; Lange, A.; Burger, E.; Atkinson, C.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, Linz Austria, 22nd - 27th September 2024, 760–769, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688208 -
SoK: Mechanisms Used in Practice for Verifiable Internet Voting
Moser, F.; Kirsten, M.; Dörre, F.
2024. 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024), 141–162, Gesellschaft für Informatik (GI). doi:10.18420/e-vote-id2024_10 -
Usability and Understanding of Individual Verifiability in the 2023 GI-Election
Hilt, T.; Matheis, P.; Volkamer, M.
2024. Mensch und Computer 2024 – Workshopband, September 2024, Karlsruhe, Germany, Gesellschaft für Informatik (GI). doi:10.18420/muc2024-mci-ws17-151 -
Recommendations for Implementing Independent Individual Verifiability in Internet Voting
Moser, F.; Grimm, R.; Hilt, T.; Kirsten, M.; Niederbudde, C.; Volkamer, M.
2024. 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024), 35–53, Gesellschaft für Informatik (GI). doi:10.18420/e-vote-id2024_02 -
Automated Reverse Engineering for MoM-Based Microservices (ARE4MOM) Using Static Analysis
Singh, S.; Koziolek, A.
2024. 2024 IEEE 21st International Conference on Software Architecture (ICSA), Hyderabad, 4th-8th June 2024, 12–22, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA59870.2024.00010 -
CESAR: Control Envelope Synthesis via Angelic Refinements
Kabra, A.; Laurent, J.; Mitsch, S.; Platzer, A.
2024. Tools and Algorithms for the Construction and Analysis of Systems. Proceedings., Part 1. Ed.: B. Finkbeiner, 144–164, Springer Nature Switzerland. doi:10.1007/978-3-031-57246-3_9 -
HiddenΔ-Fairness: A Novel Notion for Fair Secure Two-Party Computation
Bayreuther, S.; Berger, R.; Dörre, F.; Mechler, J.; Müller-Quade, J.
2024. Information Security and Privacy. Ed.: T. Zhu. Pt. 2, 330–349, Springer Nature Singapore. doi:10.1007/978-981-97-5028-3_17 -
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions
Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Gröll, R.; Müller, M.; Müller-Quade, J.
2024. Public-Key Cryptography – PKC 2024 : 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings. Part IV. Ed.: Q. Tang, 257–288, Springer Nature Switzerland. doi:10.1007/978-3-031-57728-4_9 -
An Extensible Framework for Architecture-Based Data Flow Analysis for Information Security
Boltz, N.; Hahner, S.; Gerking, C.; Heinrich, R.
2024. Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral Symposium : Istanbul, Turkey, September 18–22, 2023, Revised Selected Papers. Ed.: B. Tekinerdoğan, 342–358, Springer. doi:10.1007/978-3-031-66326-0_21 -
Uniform Substitution for Differential Refinement Logic
Prebet, E.; Platzer, A.
2024. Automated Reasoning. IJCAR 2024. Part 2. Ed.: C. Benzmüller, 196–215, Springer Nature Switzerland. doi:10.1007/978-3-031-63501-4_11 -
Combining a Functional Simulation with Multi-level Timing Simulation for Software Architecture Models to Improve Extensibility
Weber, S.; Weber, T.; Heinrich, R.; Henß, J.
2024. IEEE International Conference on Software Architecture (ICSA 2024). doi:10.1109/ICSA-C63560.2024.00019 -
Modeling and Analyzing Zero Trust Architectures Regarding Performance and Security
Boltz, N.; Schmid, L.; Taghavi, B.; Gerking, C.; Heinrich, R.
2024. Software Architecture : 18th European Conference, ECSA 2024, Luxembourg City, Luxembourg, September 3–6, 2024 ; Proceedings. Ed.: M. Galster, 253–269, Springer. doi:10.1007/978-3-031-70797-1_17 -
Fuzz Wars: The Voltage Awakens – Voltage-Guided Blackbox Fuzzing on FPGAs
Su, K.; Giraud, M.; Borcherding, A.; Krautter, J.; Nenninger, P.; Tahoori, M.
2024. 2024 IEEE 42nd VLSI Test Symposium (VTS), Tempe, 22nd-24th April 2024, 1–7, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/VTS60656.2024.10538727 -
A Practical Notion of Liveness in Smart Contract Applications
Schiffl, J.; Beckert, B.
2024. 5th International Workshop on Formal Methods for Blockchains (FMBC 2024). Ed.: B. Bernardo, 8:1–8:13, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/oasics.fmbc.2024.8 -
Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More
Hiroka, T.; Kitagawa, F.; Morimae, T.; Nishimaki, R.; Pal, T.; Yamakawa, T.
2024. Advances in Cryptology – EUROCRYPT 2024 – 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part III. Ed.: M. Joye, 434 – 456, Springer Nature Switzerland. doi:10.1007/978-3-031-58734-4_15 -
Combining Knowledge Graphs and Large Language Models to Ease Knowledge Access in Software Architecture Research
Kaplan, A.; Keim, J.; Schneider, M.; Koziolek, A.; Reussner, R.
2024. SemTech4STLD 2024 : Semantic Technologies and Deep Learning Models for Scientific, Technical and Legal Data 2024 : Second International Workshop on Semantic Technologies and Deep Learning Models for Scientific, Technical and Legal Data (SemTech4STLD) co-located with the Extended Semantic Web Conference 2024 (ESWC 2024). Ed.: R. Dessi, 76–82, CEUR-WS -
Cost-Efficient Construction of Performance Models
Schmid, L.; Saglam, T.; Selzer, M.; Koziolek, A.
2024. 4th Workshop on Performance EngineeRing, Modelling, Analysis, and VisualizatiOn STrategy (PERMAVOST ’24), Pisa, 3rd-4th June 2024, Association for Computing Machinery (ACM). doi:10.1145/3660317.3660322 -
Detecting Inconsistencies in Software Architecture Documentation Using Traceability Link Recovery
Keim, J.; Corallo, S.; Fuchß, D.; Koziolek, A.
2024. Software Engineering 2024 (SE 2024). Ed.: R. Rabiser, 119–120, Gesellschaft für Informatik (GI). doi:10.18420/sw2024_37 -
Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids
Canbolat, S.; Fruböse, C.; Elbez, G.; Hagenmeyer, V.
2024. 21st Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA ’24), Springer. doi:10.1007/978-3-031-64171-8_28 -
Requirements Classification for Traceability Link Recovery
Hey, T.; Keim, J.; Corallo, S.
2024. 32nd IEEE International Requirements Engineering Conference : 24-28 June 2024, Reykjavik, Iceland. Ed.: G. Liebel, 155–167, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/RE59067.2024.00024 -
Unraveling the Nuances of AI Accountability: A Synthesis of Dimensions Across Disciplines
Nguyen, L. H.; Lins, S.; Renner, M.; Sunyaev, A.
2024. ECIS 2024 Research Papers, AIS eLibrary (AISeL) -
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption
Berger, R.; Dörre, F.; Koch, A.
2024. Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings. Part I. Ed.: C. Pöpper, 288–317, Springer International Publishing. doi:10.1007/978-3-031-54770-6_12 -
Exploring Phishing Threats through QR Codes in Naturalistic Settings
Sharevski, F.; Mossano, M.; Veit, M. F.; Schiefer, G.; Volkamer, M.
2024. Symposium on Usable Security and Privacy (USEC) 2024. doi:10.14722/usec.2024.23050 -
Traffic Light Recognition using Convolutional Neural Networks: A Survey
Pavlitska, S.; Lambing, N.; Bangaru, A. K.; Zöllner, J. M.
2024. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), BIlbai, 24th-28th September 2023, 2790 – 2796, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10422041 -
Systematic User Evaluation of a Second Device based cast-as-intended verifiability Approach
Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.; Volkamer, M.
2024. Voting’24, Springer. doi:10.1007/978-3-031-69231-4_3 -
Architecture-based Propagation Analyses Regarding Security
Hahner, S.; Walter, M.; Heinrich, R.; Reussner, R.
2024. Software Engineering 2024 (SE 2024), 121–122, Gesellschaft für Informatik (GI). doi:10.18420/sw2024_38 -
Obfuscation-Resilient Software Plagiarism Detection with JPlag
Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. 46th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3639478.3643074 -
Automated Detection of AI-Obfuscated Plagiarism in Modeling Assignments
Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. Proceedings of the 46th International Conference on Software Engineering: Software Engineering Education and Training, ICSE SEET ’24, Lissabon, 14th-20th April 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3639474.3640084 -
Detecting Automatic Software Plagiarism via Token Sequence Normalization
Sağlam, T.; Brödel, M.; Schmid, L.; Hahner, S.
2024. Proceedings of the 46th International Conference on Software Engineering, ICSE ’24, Lissabon, April 14-20, 1–13, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3597503.3639192 -
Designing Gamification Concepts for Expert Explainable Artificial Intelligence Evaluation Tasks: A Problem Space Exploration
Toussaint, P. A.; Warsinsky, S. L.; Schmidt-Kraepelin, M.; Thiebes, S.; Sunyaev, A.
2024. Proceedings of the 57th Hawaii International Conference on System Sciences, Honolulu, HI, 3rd - 6th January 2024, 1338–1347, ScholarSpace -
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
Tiepelt, M.; Eaton, E.; Stebila, D.
2024. Computer Security – ESORICS 2023. Ed.: G. Tsudik. Pt. 1, 168–188, Springer Nature Switzerland. doi:10.1007/978-3-031-50594-2_9 -
Panini - Anonymous Anycast and an Instantiation
Coijanovic, C.; Weis, C.; Strufe, T.
2024. 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Springer-Verlag -
Recovering Trace Links Between Software Documentation And Code
Keim, J.; Corallo, S.; Fuchß, D.; Hey, T.; Telge, T.; Koziolek, A.
2024. ICSE ’24: Proceedings of the IEEE/ACM 46th International Conference on Software Engineering. Ed.: A. Paiva, Art.-Nr.: 215, Association for Computing Machinery (ACM). doi:10.1145/3597503.3639130 -
PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support
Schadt, D.; Coijanovic, C.; Weis, C.; Strufe, T.
2024. 2024 IEEE Symposium on Security and Privacy (SP), 44–44, IEEE Computer Society. doi:10.1109/SP54263.2024.00044 -
SoK: Explainable Machine Learning in Adversarial Environments
Noppel, M.; Wressnegger, C.
2024. Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P), San Francisco, 20th-22nd May 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SP54263.2024.00021 -
ABCperf: Performance Evaluation of Fault Tolerant State Machine Replication Made Simple: Demo Abstract
Spannagel, T.; Leinweber, M.; Castro, A.; Hartenstein, H.
2023. Proceedings of the 24th International Middleware Conference Demos, Posters and Doctoral Symposium, 35–36, Association for Computing Machinery (ACM). doi:10.1145/3626564.3629101 -
Multi-level Hardware Simulation in Palladio
Weber, S.; Taghavi, B.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 32–34, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43229 -
A Survey of Analysis Composition Operators in the Context of Palladio
Taghavi, B.; Weber, S.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 8–10, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43245 -
BAZAAR: Anonymous Resource Sharing
Coijanovic, C.; Schadt, D.; Weis, C.; Strufe, T.
2023. WPES ’23: Proceedings of the 22nd Workshop on Privacy in the Electronic Society, Kopenhagen, 26th November 2023, 135–139, Association for Computing Machinery (ACM). doi:10.1145/3603216.3624957 -
Poster: Towards Practical Brainwave-based User Authentication
Fallahi, M.; Arias-Cabarcos, P.; Strufe, T.
2023. CCS’ 23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Kopenhagen, 26th-30th November 2023, 3627–3629, Association for Computing Machinery (ACM). doi:10.1145/3576915.3624399 -
Poster: Fooling XAI with Explanation-Aware Backdoors
Noppel, M.; Wressnegger, C.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3612–3614, Association for Computing Machinery (ACM). doi:10.1145/3576915.3624379 -
"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers
Munyendo, C. W.; Mayer, P.; Aviv, A. J.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3123–3137, Association for Computing Machinery (ACM). doi:10.1145/3576915.3623150 -
SAFFIRRE: Selective Aggregate Filtering Through Filter Rule Refinement
Heseding, H.; Bachmann, F.; Bien, P. S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), Izmir, 4th-06th October 2023, 42–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NoF58724.2023.10302813 -
Encouraging Organisational Information Security Incident Reporting
Ballreich, F. L.; Volkamer, M.; Müllmann, D.; Berens, B. M.; Häußler, E. M.; Renaud, K. V.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 224–236, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617098 -
Influence of URL Formatting on Users’ Phishing URL Detection
Mossano, M.; Kulyk, O.; Berens, B. M.; Häußler, E. M.; Volkamer, M.
2023. Proceedings of the 2023 European Symposium on Usable Security, 318–333, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617111 -
A Proposal to Study Shoulder-Surfing Resistant Authentication for Augmented and Virtual Reality: Replication Study in the US
Noah, N.; Mayer, P.; Das, S.
2023. CSCW ’23 Companion: Companion Publication of the 2023 Conference on Computer-Supported Cooperative Work and Social Computing, (CSCW ’23 Companion), Minneapolis, 14th-18th October 2023, 317 – 322, Association for Computing Machinery (ACM). doi:10.1145/3584931.3607007 -
eMinD: Efficient and Micro-Flow Independent Detection of Distributed Network Attacks
Kopmann, S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), 159–167, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NoF58724.2023.10302763 -
How Students Plagiarize Modeling Assignments
Sağlam, T.; Schmid, L.; Hahner, S.; Burger, E.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, 1st - 6th October 2023, 98 – 101, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00032 -
Co-Evolving Meta-Models and View Types in View-Based Development
Muctadir, H. M.; König, L.; Weber, T.; Amrani, M.; Cleophas, L.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), 954–963, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00150 -
Consistency in the View-Based Development of Cyber-Physical Systems (Convide)
Reussner, R.; Schaefer, I.; Beckert, B.; Koziolek, A.; Burger, E.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, Sweden, 01-06 October 2023, 83–84, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00026 -
Vision: What the hack is going on? A first look at how website owners became aware that their website was hacked
Hennig, A.; Thi Thanh Vuong, N.; Mayer, P.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 312–317, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617101 -
Investigating the Role of Computing Education for Informed Usage Decision-Making
Gebhardt, L.; Leinweber, M.; Michaeli, T.
2023. WiPSCE ’23: The 18th WiPSCE Conference on Primary and Secondary Computing Education Research Cambridge United Kingdom September 27 - 29, 2023. Ed.: S. Sentance, 1–2, Association for Computing Machinery (ACM). doi:10.1145/3605468.3609776 -
The Fast Rise of Cautious Vehicle-to-X: Towards Evaluating Misbehavior Detection in the Field
Wehmer, M.; Baumgart, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), Bilbao, Spain, 24-28 September 2023, 3930–3936, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/itsc57777.2023.10422080 -
SOTIF-Compliant Scenario Generation Using Semi-Concrete Scenarios and Parameter Sampling
Birkemeyer, L.; Fuchs, J.; Gambi, A.; Schaefer, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), 2139–2144, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10422637 -
Is Scenario Generation Ready for SOTIF? A Systematic Literature Review
Birkemeyer, L.; King, C.; Schaefer, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), 472–479, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10422664 -
Towards Self-learning Industrial Process Behaviour from Payload Bytes for Anomaly Detection
Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA), Sinaia, Romania, 12-15 September 2023, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA54631.2023.10275358 -
Reducing memory footprints in purity estimations of volumetric DDoS traffic aggregates
Heseding, H.; Krack, T.; Zitterbart, M.
2023. M. Seufert, A. Blenk & O. Landsiedel (Eds.), 2nd Workshop on Machine Learning & Netwoking (MaLeNe) Proceedings. Co-located with the 5th International Conference on Networked Systems (NetSys 2023), Potsdam, Germany. Ed.: . Seufert, Universität Augsburg -
Impact of Adaptive Packet Sampling on ML-based DDoS Detection
Kopmann, S.; Zitterbart, M.
2023. 2nd Workshop “Machine Learning & Networking” (MaLeNe) Proceedings Co-Located with the 5th International Conference on Networked Systems (NETSYS 2023) Potsdam, Germany, September 4, 2023 (MaLeNe). Ed.: M. Seufert -
A user-centred approach to facilitate locating company security policies : Nutzerzentrierter Ansatz zur Vereinfachung des Auffindens von Security Policies
Aldag, L.; Ballreich, F.; Berens, B.; Volkamer, M.
2023. MuC ’23: Proceedings of Mensch und Computer. Ed.: M. Stolze, 173–185, Association for Computing Machinery (ACM). doi:10.1145/3603555.3603573 -
Continuous T-Wise Coverage
Pett, T.; Heß, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2023. SPLC ’23: Proceedings of the 27th ACM International Systems and Software Product Line Conference. Vol. A. Ed.: P. Arcaini, 87–98, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608980 -
True Variability Shining Through Taxonomy Mining
König, C.; Rosiak, K.; Cleophas, L.; Schaefer, I.
2023. Proceedings of the 27th ACM International Systems and Software Product Line Conference - Volume A, 182–193, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608989 -
A Toolchain for Simulation Component Specification and Identification
Koch, S.; Reiche, F.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 75–89, Springer International Publishing. doi:10.1007/978-3-031-36889-9_7 -
Usability for Data Sovereignty - Evaluation of Privacy Risk Quantification Interfaces
Appenzeller, A.; Balduf, F.; Beyerer, J.
2023. Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments, 206–214, Association for Computing Machinery (ACM). doi:10.1145/3594806.3594816 -
Adversarial Attacks on Traffic Sign Recognition: A Survey
Pavlitska, S.; Lambing, N.; Zöllner, J. M.
2023. 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Tenerife, Spain, 19-21 July 2023, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICECCME57830.2023.10252727 -
Protocol-Agnostic Detection of Stealth Attacks on Networked Control Systems
Heseding, H.; Dieing, M.; Meshram, A.; Zitterbart, M.
2023. 2023 IEEE 21st International Conference on Industrial Informatics (INDIN), Lemgo, Germany, 17-20 2023, 1–7, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INDIN51400.2023.10218314 -
TRUST: Transparent Redundancy for UDP STreams
Neumeister, F.; Göckel, M.; Zitterbart, M.
2023. IEEE 21st International Conference on Industrial Informatics (INDIN 2023), 7 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INDIN51400.2023.10218145 -
The Bandit’s States: Modeling State Selection for Stateful Network Fuzzing as Multi-armed Bandit Problem
Borcherding, A.; Giraud, M.; Fitzgerald, I.; Beyerer, J.
2023. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 345–350, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW59978.2023.00043 -
Investigating Software Engineering Artifacts in DevOps Through the Lens of Boundary Objects
Matthies, C.; Heinrich, R.; Wohlrab, R.
2023. EASE ’23: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 12–21, Association for Computing Machinery (ACM). doi:10.1145/3593434.3593441 -
On Extend-Only Directed Posets and Derived Byzantine-Tolerant Replicated Data Types
Jacob, F.; Hartenstein, H.
2023. PaPoC ’23: 10th Workshop on Principles and Practice of Consistency for Distributed Data Rome Italy 8 May 2023.Ed.: E. Gonzalez Boix, 63–69, Association for Computing Machinery (ACM). doi:10.1145/3578358.3591333 -
Holistic Adversarially Robust Pruning
Zhao, Q.; Wressnegger, C.
2023. 11th International Conference on Learning Representations (ICLR), Kigali, 1st-5th May 2023 -
Architecture-Based Uncertainty Impact Analysis to Ensure Confidentiality
Hahner, S.; Heinrich, R.; Reussner, R.
2023. 2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 126–132, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAMS59076.2023.00026 -
BrainNet: Improving Brainwave-based Biometric Recognition with Siamese Networks
Fallahi, M.; Strufe, T.; Arias-Cabarcos, P.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications (PerCom), 53–60, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PERCOM56429.2023.10099367 -
Design-time Performability Evaluation of Runtime Adaptation Strategies (Work In Progress Paper)
Rapp, M.; Scheerer, M.; Reussner, R.
2023. Companion of the 2023 ACM/SPEC International Conference on Performance Engineering, 9–15, Association for Computing Machinery (ACM). doi:10.1145/3578245.3585028 -
Applying Differential Privacy to Medical Questionnaires
Appenzeller, A.; Terzer, N.; Philipp, P.; Beyerer, J.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 608–613, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops56833.2023.10150373 -
Model-based Confidentiality Analysis under Uncertainty
Hahner, S.; Bitschi, T.; Walter, M.; Bureš, T.; Hnětynka, P.; Heinrich, R.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), 256–263, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00062 -
Automatic Derivation of Vulnerability Models for Software Architectures
Kirschner, Y. R.; Walter, M.; Bossert, F.; Heinrich, R.; Koziolek, A.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), L’Aquila, Italy, 13-17 March 2023, 276–283, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00065 -
Detecting Inconsistencies in Software Architecture Documentation Using Traceability Link Recovery
Keim, J.; Corallo, S.; Fuchß, D.; Koziolek, A.
2023. 20th IEEE International Conference on Software Architecture (ICSA), 141–152, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA56044.2023.00021 -
A First Complete Algorithm for Real Quantifier Elimination in Isabelle/HOL
Kosaian, K.; Tan, Y. K.; Platzer, A.
2023. Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs, 211–224, Association for Computing Machinery (ACM). doi:10.1145/3573105.3575672 -
German Social Elections in 2023: An Overview and first Analysis
Hilt, T.; Kulyk, O.; Volkamer, M.
2023. E-Vote-ID 2023 : Eight International Joint Conference on Electronic Voting, 221–237, Gesellschaft für Informatik (GI) -
E-Vote-ID 2023 : Eight International Joint Conference on Electronic Voting
Volkamer, M.; Duenas-Cid, D.; Rønne, P. B.; Ryan, P. Y. A.; Budurushi, J.; Kulyk, O.; Rodriguez Pérez, A.; Spycher-Krivonosova, I.; Kirsten, M.; Debant, A.; Goodman, N. (Eds.)
2023. Gesellschaft für Informatik (GI). doi:10.18420/e-vote-id2023_16 -
Verantwortlichkeit im Unternehmen und Verschuldensmaßstab im Rahmen des Art.83 DSGVO
Kemmler, K. J.
2023. INFORMATIK 2023. Hrsg.: M. Klein, 689–702, Gesellschaft für Informatik (GI). doi:10.18420/inf2023_79 -
Designing Automotive Case Studies for Architectural Security Analyses
Boltz, N.; Walter, M.; Gerking, C.
2023. 14th Symposium on Software Performance 2023 (SSP 2023), Karlsruhe, 6th-8th November 2023, 23–25 -
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from VOLE-in-the-Head
Baum, C.; Braun, L.; Saint Guilhem, C. D. De; Klooß, M.; Orsini, E.; Roy, L.; Scholl, P.
2023. Advances in Cryptology – CRYPTO 2023 – 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V. Ed.: H. Handschuh, 581–615, Springer Nature Switzerland. doi:10.1007/978-3-031-38554-4_19 -
Identifying Performance Challenges in Consistency Preserving View-Based Environments
König, L.; Weber, T.
2023. Softwaretechnik-Trends, 14th Symposium on Software Performance 2023, Karlsruhe, 6th - 8th November 2023, 26–28, Gesellschaft für Informatik (GI) -
Composable Long-Term Security with Rewinding
Berger, R.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
2023. Theory of Cryptography – 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part IV. Ed.: G. Rothblum, 510 – 541, Springer Nature Switzerland. doi:10.1007/978-3-031-48624-1_19 -
Explanation-Aware Backdoors in a Nutshell
Noppel, M.; Wressnegger, C.
2023. Proc. of 46th German Conference on Artificial Intelligence (KI) -
On Evasion of Machine Learning-based Intrusion Detection in Smart Grids
Mumrez, A.; Sánchez, G.; Elbez, G.; Hagenmeyer, V.
2023. IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids. doi:10.1109/SmartGridComm57358.2023.10333966 -
Comparative Study on Smart Grid Security Testbeds Using MITRE ATT&CK Matrix
Mumrez, A.; Muhammad M. Roomi; Heng Chuan Tan; Daisuke Mashima; Elbez, G.; Hagenmeyer, V.
2023. 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SmartGridComm57358.2023.10333902 -
Engineering Self-adaptive Microservice Applications: An Experience Report
Riccio, V.; Sorrentino, G.; Camilli, M.; Mirandola, R.; Scandurra, P.
2023. Service-Oriented Computing – 21st International Conference, ICSOC 2023, Rome, Italy, November 28 – December 1, 2023, Proceedings, Part I. Ed.: F. Monti, 227–242, Springer Nature Switzerland. doi:10.1007/978-3-031-48421-6_16 -
Are Formal Contracts a useful Digital Twin of Software Systems?
Schiffl, J.; Weigl, A.
2023. Proceedings of the Workshop on Applications of Formal Methods and Digital Twins co-located with 25th International Symposium on Formal Methods (FM 2023), Ed.: S. Hallerstede, CEUR-WS -
Universally Composable Auditable Surveillance
Fetzer, V.; Klooß, M.; Müller-Quade, J.; Raiber, M.; Rupp, A.
2023. Advances in Cryptology – ASIACRYPT 2023 – 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part II. Ed.: J. Guo, 453 – 487, Springer Nature Singapore. doi:10.1007/978-981-99-8724-5_14 -
Identifying Factors Studied for Voter Trust in E-Voting – Review of Literature
Erb, Y.; Duenas-Cid, D.; Volkamer, M.
2023. E-Vote-ID 2023 -
Voter Perception of Cast-as-Intended Verifiability in the Estonian I-Vote Protocol
Hilt, T.; Sein, K.; Mällo, T.; Willemson, J.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI) -
German Social Elections 2023: An Overview and first Analysis
Hilt, T.; Kulyk, O.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI) -
Practically Efficient Private Set Intersection From Trusted Hardware with Side-Channels
Dörre, F.; Mechler, J.; Müller-Quade, J.
2023. Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Springer-Verlag. doi:10.1007/978-981-99-8730-6_9 -
Static Capability-Based Security for Smart Contracts
Schiffl, J.; Weigl, A.; Beckert, B.
2023. 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 110 – 117, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/DAPPS57946.2023.00024 -
QIn: Enabling Formal Methods to Deal with Quantum Circuits
Klamroth, J.; Beckert, B.; Scheerer, M.; Denninger, O.
2023. 2023 IEEE International Conference on Quantum Software (QSW), Chicago, IL, 2nd - 8th July 2023, 175 – 185, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/QSW59989.2023.00029 -
Uniform Substitution for Dynamic Logic with Communicating Hybrid Programs
Brieger, M.; Mitsch, S.; Platzer, A.
2023. Automated Deduction – CADE 29 – 29th International Conference on Automated Deduction, Rome, Italy, July 1–4, 2023, Proceedings. Ed.: B. Pientka, 96 – 115, Springer Nature Switzerland. doi:10.1007/978-3-031-38499-8_6 -
Automated Integration of Heteregeneous Architecture Information into a Unified Model
Jordan, S.; König, C.; Linsbauer, L.; Schaefer, I.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 83 – 99, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_6 -
Brief Announcement: Let It TEE: Asynchronous Byzantine Atomic Broadcast with n ≥ 2f+1
Leinweber, M.; Hartenstein, H.
2023. 37th International Symposium on Distributed Computing (DISC 2023). Ed.: R. Oshman, 43:1–43:7, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.DISC.2023.43 -
Sparsely-gated Mixture-of-Expert Layers for CNN Interpretability
Pavlitska, S.; Hubschneider, C.; Struppek, L.; Zöllner, J. M.
2023. 2023 International Joint Conference on Neural Networks (IJCNN), 1–10, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IJCNN54540.2023.10191904 -
Automated Reverse Engineering of the Technology-Induced Software System Structure
Kirschner, Y. R.; Keim, J.; Peter, N.; Koziolek, A.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 283–291, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_19 -
Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents
Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Architecture. Ed.: B. Tekinerdogan, 37–53, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_3 -
Disguising Attacks with Explanation-Aware Backdoors
Noppel, M.; Peter, L.; Wressnegger, C.
2023. 2023 IEEE Symposium on Security and Privacy (SP), 664 – 681, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SP46215.2023.10179308 -
Personalized Explanations
Becker, M.
2023. Proceedings of the 2022 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer, 1–10, KIT Scientific Publishing -
A Classification of Software-Architectural Uncertainty Regarding Confidentiality
Hahner, S.; Seifermann, S.; Heinrich, R.; Reussner, R.
2023. E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, 139–160, Springer International Publishing. doi:10.1007/978-3-031-36840-0_8 -
POET: A Self-learning Framework for PROFINET Industrial Operations Behaviour
Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. Tools for Design, Implementation and Verification of Emerging Information Technologies – 17th EAI International Conference, TridentCom 2022, Melbourne, Australia, November 23-25, 2022, Proceedings. Ed.: S. Yu, 3 – 19, Springer Nature Switzerland. doi:10.1007/978-3-031-33458-0_1 -
A Taxonomy for Design Decisions in Software Architecture Documentation
Keim, J.; Hey, T.; Sauer, B.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 439–454, Springer International Publishing. doi:10.1007/978-3-031-36889-9_29 -
Analysis and Prevention of Averaging Attacks Against Obfuscation Protocols
Becher, K.; Lagodzinski, J. A. G.; Parra-Arnau, J.; Strufe, T.
2023. Applied Cryptography and Network Security – 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part I. Ed.: M. Tibouchi, 451 – 475, Springer Nature Switzerland. doi:10.1007/978-3-031-33488-7_17 -
Establishing a Benchmark Dataset for Traceability Link Recovery Between Software Architecture Documentation and Models
Fuchß, D.; Corallo, S.; Keim, J.; Speit, J.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops, Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 455–464, Springer International Publishing. doi:10.1007/978-3-031-36889-9_30 -
Tool-Based Attack Graph Estimation and Scenario Analysis for Software Architectures
Walter, M.; Reussner, R.
2023. Software Architecture : ECSA 2022 Tracks and Workshops. Ed.: T. Batista, 45–61, Springer International Publishing. doi:10.1007/978-3-031-36889-9_5 -
Automating GUI-based Software Testing with GPT-3
Zimmermann, D.; Koziolek, A.
2023. 2023 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 62 – 65, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSTW58534.2023.00022 -
Sender-binding Key Encapsulation
Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2023. Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I. Ed.: A. Boldyreva, 744 – 773, Springer Nature Switzerland. doi:10.1007/978-3-031-31368-4_26 -
Refinements of Hybrid Dynamical Systems Logic
Platzer, A.
2023. Rigorous State-Based Methods – 9th International Conference, ABZ 2023, Nancy, France, May 30–June 2, 2023, Proceedings. Ed.: U. Glässer, 3 – 14, Springer Nature Switzerland. doi:10.1007/978-3-031-33163-3_1 -
Adversarial Vulnerability of Temporal Feature Networks for Object Detection
Pavlitskaya, S.; Polley, N.; Weber, M.; Zöllner, J. M.
2023. Computer Vision – ECCV 2022 Workshops. Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part V, Ed.: L. Karlinsky, 510–525, Springer Nature Switzerland. doi:10.1007/978-3-031-25072-9_35 -
Council of Europe Guidelines on the Use of ICT in Electoral Processes
Driza Maurer, A.; Volkamer, M.; Krimmer, R.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 585–599, Springer International Publishing. doi:10.1007/978-3-031-25460-4_34 -
Why Is Online Voting Still Largely a Black Box?
Kirsten, M.; Volkamer, M.; Beckert, B.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 555–567, Springer International Publishing. doi:10.1007/978-3-031-25460-4_32 -
Evaluation Methods and Replicability of Software Architecture Research Objects
Konersmann, M.; Kaplan, A.; Kühn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2023. Software Engineering 2023 : Fachtagung des GI-Fachbereichs Softwaretechnik : 20.-24. Februar 2023 Paderborn. Ed.: G. Engels; M. Tichy, 75–76, Gesellschaft für Informatik (GI) -
SoK: Differentially Private Publication of Trajectory Data
Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies, 496–516, De Gruyter. doi:10.56553/popets-2023-0065 -
Randomness is the Root of All Evil: More Reliable Evaluation of Deep Active Learning
Ji, Y.; Kaestner, D.; Wirth, O.; Wressnegger, C.
2023. 2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 3932–3941, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WACV56688.2023.00393 -
SWaTEval: An Evaluation Framework for Stateful Web Application Testing
Borcherding, A.; Penkov, N.; Giraud, M.; Beyerer, J.
2023. Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP, 430–441, SciTePress. doi:10.5220/0011652200003405 -
Identifizierung von Vertraulichkeitsproblemen mithilfe von Angriffsausbreitung auf Architektur
Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Engineering 2023. Hrsg.: R. Engels, 123–124, Gesellschaft für Informatik (GI) -
Secure Provisioning of OPC UA Applications Using the Asset Administration Shell
Meier, D.; Vogl, J.; Kohnhäuser, F.; Beyerer, J.
2023. 2022 IEEE 17th Conference on Industrial Electronics and Applications (ICIEA), 144–149, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICIEA54703.2022.10005899 -
MIDA: Micro-flow Independent Detection of DDoS Attacks with CNNs
Kopmann, S.; Heseding, H.; Zitterbart, M.
2023. Advances in Service-Oriented and Cloud Computing : International Workshops of ESOCC 2022, Wittenberg, Germany, March 22-24, 2022, Revised Selected Papers. Ed.: C. Zirpins, 32–43, Springer International Publishing. doi:10.1007/978-3-031-23298-5_3 -
Understanding Person Identification through Gait
Hanisch, S.; Muschter, E.; Hatzipanayioti, A.; Li, S.-C.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), 177–189. doi:10.56553/popets-2023-0011 -
"Surprised, Shocked, Worried": User Reactions to Facebook Data Collection from Third Parties
Arias-Cabarcos, P.; Kjalili, S.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open. doi:10.56553/popets-2023-0023 -
Artificial Intelligence-Driven Convergence and its Moderating Effect on Multi-Source Trust Transfer
Renner, M.; Lins, S.; Söllner, M.; Jarvenpaa, S. L.; Sunyaev, A.
2023. Proceedings of the 56th Annual Hawaii International Conference on System Sciences : January 3-6, 2023. Ed.: T. Bui, 5208–5217, University of Hawaii -
German Voters’ Attitudes Towards Voting Online with a Verifiable System
Kulyk, O.; Volkamer, M.; Fuhrberg, N.; Berens, B.; Krimmer, R.
2023. Financial Cryptography and Data Security. FC 2022 International Workshops – CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers, Ed.: S. Matsuo, 33 –350, Springer International Publishing. doi:10.1007/978-3-031-32415-4_23 -
Preserving Consistency of Interrelated Models during View-Based Evolution of Variable Systems
Ananieva, S.; Kühn, T.; Reussner, R.
2022. Proceedings of the 21st ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, 148–163, Association for Computing Machinery (ACM). doi:10.1145/3564719.3568685 -
How to Protect the Public Opinion Against New Types of Bots?
Reubold, J. L.; Escher, S. C.; Wressnegger, C.; Strufe, T.
2022. IEEE International Conference on Big Data, 1671–1680, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BigData55660.2022.10020758 -
Token-based plagiarism detection for metamodels
Sağlam, T.; Hahner, S.; Wittler, J. W.; Kühn, T.
2022. MODELS ’22: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion ProceedingsOctober 2022, 138–141, Association for Computing Machinery (ACM). doi:10.1145/3550356.3556508 -
Sharp: Short Relaxed Range Proofs
Couteau, G.; Goudarzi, D.; Klooß, M.; Reichle, M.
2022. CCS ’22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Ed.: H. Yin Conference: CCS ’22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA November 7 - 11, 2022, 609–622, Association for Computing Machinery (ACM). doi:10.1145/3548606.3560628 -
La Publicación de Trayectorias: un Estudio sobre la Protección de la Privacidad
Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2022. Proceedings of the XVII Spanish Meeting on Cryptology and Information Security (RECSI), Santader, 19th - 21st October, 2022. doi:10.22429/Euc2022.028 -
Design and Evaluation of an Anti-Phishing Artifact Based on Useful Transparency
Beckmann, C.; Berens, B.; Kühl, N.; Mayer, P.; Mossano, M.; Volkamer, M.
2022. International Workshop on Socio-Technical Aspects in Security -
Datenschutzkonforme Weitergabe von Versichertendaten aus dem Forschungsdatenzentrum
Orak, B.; Krempel, E.; Appenzeller, A.
2022. D. Demmler, D. Krupka & H. Federrath (Eds.), INFORMATIK 2022 Hrsg.: Demmler, Daniel AND Federrath, Hannes, Daniel AND Krupka, 533–549, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_45 -
ReCEIF: Reinforcement Learning-Controlled Effective Ingress Filtering
Heseding, H.; Zitterbart, M.
2022. 2022 IEEE 47th Conference on Local Computer Networks (LCN), 106–113, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN53696.2022.9843478 -
HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic
Kopmann, S.; Heseding, H.; Zitterbart, M.
2022. 2022 IEEE 47th Conference on Local Computer Networks (LCN), 90–97, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN53696.2022.9843465 -
PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren für Virtual Reality Head-Mounted Displays
Länge, T.; Matheis, P.; Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Mensch und Computer 2022 - Workshopband. Ed.: K. Marky, Gesellschaft für Informatik (GI). doi:10.18420/muc2022-mci-ws01-462 -
Cookie Disclaimers: Impact of Design and Users’ Attitude
Berens, B. M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2022. Proceedings of the 17th International Conference on Availability, Reliability and Security, 1–20, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539008 -
Handling Environmental Uncertainty in Design Time Access Control Analysis
Boltz, N.; Hahner, S.; Walter, M.; Seifermann, S.; Heinrich, R.; Bures, T.; Hnetynka, P.
2022. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Gran Canaria, Spain, 31 August 2022 - 02 September 2022, 382–389, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA56994.2022.00067 -
Why Users (Don’t) Use Password Managers at a Large Educational Institution
Mayer, P.; Munyendo, C. W.; Mazurek, M. L.; Aviv, A. J.
2022. 31st USENIX Security Symposium (USENIX Security 22), 1849–1866, USENIX Association -
"I don’t know why I check this...’’ - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks
Mayer, P.; Poddebniak, D.; Fischer, K.; Brinkmann, M.; Somorovsky, J.; Sasse, M. A.; Schinzel, S.; Volkamer, M.
2022. Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 77–96, USENIX Association -
On the Applicability of Payment Channel Networks for Allocation of Transport Ticket Revenues
Grundmann, M.; von Zastrow-Marcks, O.; Hartenstein, H.
2022. Proceedings - International Conference on Computer Communications and Networks, ICCCN : 31st International Conference on Computer Communications and Networks, ICCCN 2022, Virtual, Online, 25 - 28 July 2022, 7 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCCN54977.2022.9868881 -
Non-Uniform Adversarially Robust Pruning
Zhao, Q.; Königl, T.; Wressnegger, C.
2022. Proc. of the 1st International Conference on Automated Machine Learning (AutoML) -
Design-time Performability Optimization of Runtime Adaptation Strategies
Rapp, M.; Scheerer, M.; Reussner, R.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 113–120, Association for Computing Machinery (ACM). doi:10.1145/3491204.3527471 -
Towards Private Medical Data Donations by Using Privacy Preserving Technologies
Appenzeller, A.; Terzer, N.; Krempel, E.; Beyerer, J.
2022. The15th International Conference on PErvasive Technologies Related to Assistive Environments, 446–454, Association for Computing Machinery (ACM). doi:10.1145/3529190.3534768 -
Classification of Software Engineering Contributions to Support Validation Techniques and Research Applications
Kaplan, A.
2022. The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 323–328, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535345 -
Verifying Payment Channels with TLA+
Grundmann, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–3, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805487 -
On the Peer Degree Distribution of the Bitcoin P2P Network
Grundmann, M.; Baumstark, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–5, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805511 -
Reproducibility and Replicability of Web Measurement Studies
Demir, N.; Große-Kampmann, M.; Urban, T.; Wressnegger, C.; Holz, T.; Pohlmann, N.
2022. WWW ’22: Proceedings of the ACM Web Conference 2022. Ed.: F. Laforest, 533–544, Association for Computing Machinery (ACM). doi:10.1145/3485447.3512214 -
Phishing awareness and education – When to best remind?
Berens, B. M.; Dimitrova, K.; Mossano, M.; Volkamer, M.
2022. Symposium on Usable Security and Privacy (USEC), co-located with the Network and Distributed System Security Symposium (NDSS 2022), San Diego, CA, April 23, 2022. doi:10.14722/usec.2022.23075 -
The Smart Grid: A Use-Case for Large-Scale SDN Deployment
Neumeister, F.; Zitterbart, M.
2022. 3. KuVS Fachgespräch "Network Softwarization" (7.4. - 8.4.2022). 3. KuVS Fachgespräch "Network Softwarization" (online) 7./8.4.2022, Universitätsbibliothek Tübingen. doi:10.15496/publikation-67443 -
Reinforcement Learning-Controlled Mitigation of Volumetric DDoS Attacks
Heseding, H.
2022. C. Wressnegger, D. Reinhardt, T. Barber, B. C. Witt, D. Arp & Z. Mann (Eds.), SICHERHEIT 2022 Hrsg.: Wressnegger, Christian; Reinhardt, Delphine; Barber, Thomas; Witt, Bernhard C.; Arp, Daniel; Mann, Zoltan, 237–242, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_20 -
Transparency for Bystanders in IoT regarding audiovisual Recordings
Escher, S.; Etzrodt, K.; Weller, B.; Kopsell, S.; Strufe, T.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops): 21–25 March 2022, Pisa, Italy, 649–654, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767212 -
Replication Package of "Evaluation Methods and Replicability of Software Architecture Research Objects"
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; Al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 58, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00021 -
Architectural Pen-Test Generation and Vulnerability Prediction for Cyber-Physical Systems
Walter, T.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 45–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00016 -
Evaluation Methods and Replicability of Software Architecture Research Objects
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), Honolulu, HI, USA, 12-15 March 2022, 157–168, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00023 -
Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022. IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 12 -15 March 2022, Honolulu, HI, USA, 59, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00022 -
Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), 12 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00009 -
Unified Operations for Variability in Space and Time
Ananieva, S.; Greiner, S.; Krueger, J.; Linsbauer, L.; Gruener, S.; Kehrer, T.; Kuehn, T.; Seidl, C.; Reussner, R.
2022. Proceedings of the 16th International Working Conference on Variability Modelling of Software-Intensive Systems, 1–10, Association for Computing Machinery (ACM). doi:10.1145/3510466.3510483 -
Continuous Secure Software Development and Analysis
Schulz, S.; Reiche, F.; Hahner, S.; Schiffl, J.
2022. Symposium on Software Performance 2021 : Short Paper Proceedings of Symposium on Software Performance, Leipzig, Germany, November 9.-10., 2021. Ed.: D. G. Reichelt, R. Müller, S. Becker, W. Hasselbring, A. v. Hoorn, S. Kounev, A. Koziolek, R. Reussner, RWTH Aachen -
Beauty and the Beast – A Case Study on Performance Prototyping of Data-Intensive Containerized Cloud Applications
Klinaku, F.; Rapp, M.; Henss, J.; Rhode, S.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 53–60, Association for Computing Machinery (ACM). doi:10.1145/3491204.3527482 -
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules
Doerner, D.; Mechler, J.; Müller-Quade, J.
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 83–99, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_05 -
Model-Based Fault Classification for Automotive Software
Becker, M.; Meyer, R.; Runge, T.; Schaefer, I.; van der Wall, S.; Wolff, S.
2022. Programming Languages and Systems: 20th Asian Symposium, APLAS 2022, Auckland, New Zealand, December 5, 2022, Proceedings. Ed.: I. Sergey, 110–131, Springer Nature Switzerland. doi:10.1007/978-3-031-21037-2_6 -
Suppress with a Patch: Revisiting Universal Adversarial Patch Attacks against Object Detection
Pavlitskaya, S.; Hendl, J.; Kleim, S.; Muller, L. J.; Wylczoch, F.; Zollner, J. M.
2022. 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICECCME55909.2022.9988313 -
Responsible Human-Robot Interaction with Anthropomorphic Service Robots: State of the Art of an Interdisciplinary Research Challenge
Stock-Homburg, R. M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; Rawal, N.; David, K.; Wendt, J.; Spiecker genannt Döhmann, I.; Stryk, O. von; Hannig, M.; Knof, M.
2022. Proceedings of the 55th Annual Hawaii International Conference on System Sciences : January 3-7, 2022. Ed.: T. X. Bui, 2065–2074, University of Hawaii. doi:10.24251/HICSS.2022.260 -
Optimal human labelling for anomaly detection in industrial inspection
Zander, T.; Ziyan, P.; Birnstill, P.; Beyerer, J.
2022. Forum Bildverarbeitung 2022. Ed.: T. Längle, 49–59, KIT Scientific Publishing -
Fiat-Shamir Transformation of Multi-round Interactive Proofs
Attema, T.; Fehr, S.; Klooß, M.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Ed.: E. Kiltz, 113–142, Springer Nature Switzerland. doi:10.1007/978-3-031-22318-1_5 -
Anonymous Whistleblowing over Authenticated Channels
Agrikola, T.; Couteau, G.; Maier, S.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Ed.: E. Kiltz, 685–714, Springer Nature Switzerland. doi:10.1007/978-3-031-22365-5_24 -
Efficient Public Verification of Confidential Supply-Chain Transactions
Becher, K.; Schäfer, M.; Schröpfer, A.; Strufe, T.
2022. 2022 IEEE Conference on Communications and Network Security (CNS), 308–316, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CNS56114.2022.9947231 -
Uncertainty in coupled models of cyber-physical systems
Acosta, M.; Hahner, S.; Koziolek, A.; Kühn, T.; Mirandola, R.; Reussner, R.
2022. Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 569–578, Association for Computing Machinery (ACM). doi:10.1145/3550356.3561539 -
Towards a Usable and Sustainable Deductive Verification Tool
Beckert, B.; Bubel, R.; Hähnle, R.; Ulbrich, M.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 281–300, Springer Nature Switzerland. doi:10.1007/978-3-031-19756-7_16 -
Runtime Verification of Correct-by-Construction Driving Maneuvers
Kittelmann, A.; Runge, T.; Bordis, T.; Schaefer, I.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part I. Ed.: T. Margaria, 242–263, Springer International Publishing. doi:10.1007/978-3-031-19849-6_15 -
Decentralizing Watchtowers for Payment Channels using IPFS
Bonisch, H.; Grundmann, M.
2022. 2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW), 27–32, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICDCSW56584.2022.00015 -
CrossTest: a cross-domain physical testbed environment for cybersecurity performance evaluations
Karch, M.; Rösch, D.; André, K.; Meshram, A.; Haas, C.; Nicolai, S.
2022. 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA), 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA52439.2022.9921672 -
Early Detection of GOOSE Denial of Service (DoS) Attacks in IEC 61850 Substations
Elbez, G.; Nahrstedt, K.; Hagenmeyer, V.
2022. IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids 2022. doi:10.1109/SmartGridComm52983.2022.9961042 -
Modeling and Enforcing Access Control Policies for Smart Contracts
Töberg, J.-P.; Schiffl, J.; Reiche, F.; Beckert, B.; Heinrich, R.; Reussner, R.
2022. Conference Proceedings: 2022 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 38–47, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/DAPPS55202.2022.00013 -
Cyber threat intelligence enabled automated attack incident response
Kaiser, F. K.; Andris, L.; Tenning, T.; Iser, J.; Wiens, M.; Schultmann, F.
2022. 2022 3rd International Conference on Next Generation Computing Applications (NextComp), IEEE, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NextComp55567.2022.9932254 -
Attuning Adaptation Rules via a Rule-Specific Neural Network
Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Proceedings. Vol. 3. Ed.: T. Margaria, 215–230, Springer Nature Switzerland. doi:10.1007/978-3-031-19759-8_14 -
Generalized Test Tables: A Domain-Specific Specification Language for Automated Production Systems
Beckert, B.; Ulbrich, M.; Vogel-Heuser, B.; Weigl, A.
2022. Theoretical Aspects of Computing – ICTAC 2022 – 19th International Colloquium, Tbilisi, Georgia, September 27–29, 2022, Proceedings. Ed.: H. Seidl, 7–13, Springer International Publishing. doi:10.1007/978-3-031-17715-6_2 -
Information Flow Control-by-Construction for an Object-Oriented Language
Runge, T.; Kittelmann, A.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. Software Engineering and Formal Methods – 20th International Conference, SEFM 2022, Berlin, Germany, September 26–30, 2022, Proceedings. Ed.: B.-H. Schlingloff, 209–226, Springer International Publishing. doi:10.1007/978-3-031-17108-6_13 -
A Model-Based Framework for Simplified Collaboration of Legal and Software Experts in Data Protection Assessments
Boltz, N.; Sterz, L.; Gerking, C.; Raabe, O.
2022. INFORMATIK 2022, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik. Ed.: D. Demmler, 521–532, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_44 -
Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
Grundmann, M.; Amberg, H.; Baumstark, M.; Hartenstein, H.
2022. Financial Cryptography and Data Security – 26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers. Ed.: I. Eyal, 694–704, Springer International Publishing. doi:10.1007/978-3-031-18283-9_35 -
A Refactoring for Data Minimisation Using Formal Verification
Lanzinger, F.; Ulbrich, M.; Weigl, A.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 345–364, Springer Nature Switzerland. doi:10.1007/978-3-031-19756-7_19 -
Accurate Performance Predictions with Component-Based Models of Data Streaming Applications
Werle, D.; Seifermann, S.; Koziolek, A.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 83–98, Springer International Publishing. doi:10.1007/978-3-031-16697-6_6 -
Feasibility of Inconspicuous GAN-generated Adversarial Patches against Object Detection
Pavlitskaya, S.; Codău, B.-M.; Zöllner, J. M.
2022. Proceedings of the Workshop on Artificial Intelligence Safety 2022 (AISafety 2022) co-located with the Thirty-First International Joint Conference on Artificial Intelligence and the Twenty-Fifth European Conference on Artificial Intelligence (IJCAI-ECAI-2022) Ed.: G. Pedroza, CEUR-WS.org -
Towards an integrated approach for managing the variability and evolution of both software and hardware components
Wittler, J. W.; Kühn, T.; Reussner, R.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference - Volume B Ed.: A. Felfernig, 94–98, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547059 -
Membership Inference Attack Against Principal Component Analysis
Zari, O.; Parra-Arnau, J.; Ünsal, A.; Strufe, T.; Önen, M.
2022. Privacy in Statistical Databases – International Conference, PSD 2022, Paris, France, September 21–23, 2022, Proceedings. Ed.: J. Domingo-Ferrer, 269–282, Springer International Publishing. doi:10.1007/978-3-031-13945-1_19 -
ARCHI4MOM: Using Tracing Information to Extract the Architecture of Microservice-Based Systems from Message-Oriented Middleware
Singh, S.; Werle, D.; Koziolek, A.
2022. Software Architecture : 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos., 189–204, Springer International Publishing. doi:10.1007/978-3-031-16697-6_14 -
Individual Verifiability with Return Codes: Manipulation Detection Efficacy
Thürwächter, P. T.; Volkamer, M.; Kulyk, O.
2022. Electronic Voting – 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4–7, 2022, Proceedings. Ed.: R. Krimmer, 139–156, Springer International Publishing. doi:10.1007/978-3-031-15911-4_9 -
A Cross-Disciplinary Process Modelling Language for Validating Reconfigured Production Processes
Koch, S.; Wunderlich, T.; Hansert, J.; Schlegel, T.; Ihlenfeldt, S.; Heinrich, R.
2022. Modellierung 2022 : 27.06.-01.07.2022 Hamburg, Germany. Ed.: Matthias Riebisch, 181–190, Köllen Druck+Verlag. doi:10.18420/modellierung2022-004 -
Toward Awareness Creation of Common Challenges Women are Facing in Academia: A Study from a German Perspective
Corallo, S.; Mazkatli, M.; Rapp, M.; Hajiabadi, H.; Kaplan, A.; Kuehn, R.; Schmid, L.; Singh, S.
2022. Software Architecture – 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021, Revised Selected Papers. Ed.: P. Scandurra, 47–62, Springer International Publishing. doi:10.1007/978-3-031-15116-3_3 -
Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Security Gründen
Müllmann, D.; Veit, M. F.; Volkamer, M.
2022. Informatik 2022. Hrsg.: D. Demmler, 601–615, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_49 -
Synchronizing software variants: A two-dimensional approach
König, C.; Rosiak, K.; Linsbauer, L.; Schaefer, I.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference (SPLC ’22), Graz, A, 12.-16. September 2022. Ed.: A. Felfernig. Vol. B, 82–89, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547053 -
Architectural Optimization for Confidentiality Under Structural Uncertainty
Walter, M.; Hahner, S.; Seifermann, S.; Bures, T.; Hnetynka, P.; Pacovský, J.; Heinrich, R.
2022. Software Architecture : 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021 : Revised Selected Papers. Ed.: P. Scandurra, 309–332, Springer Nature Switzerland. doi:10.1007/978-3-031-15116-3_14 -
Grasping the Concept of Decentralized Systems for Instant Messaging
Gebhardt, L.; Leinweber, M.; Jacob, F.; Hartenstein, H.
2022. Proceedings of the 17th Workshop in Primary and Secondary Computing Education, Art.-Nr. 10, Association for Computing Machinery (ACM). doi:10.1145/3556787.3556864 -
Shoulder-Surfing Resistant Authentication for Augmented Reality
Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Nordic Human Computer Interaction Conference (NordiCHI ’22), Art.Nr. 29, ACM Digital Library. doi:10.1145/3546155.3546663 -
Increasing security without decreasing usability: A comparison of various verifiable voting systems
Volkamer, M.; Kulyk, O.; Ludwig, J.; Fuhrberg, N.
2022. Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS 2022), Boston, MA, August 8-9, 2022, 233–252, USENIX Association -
Towards Heterogeneous Remote Attestation Protocols
Wagner, P. G.; Beyerer, J.
2022. Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT. Vol. 1. Ed.: S. De Capitani di Vimercati, 586–591, SciTePress. doi:10.5220/0011289000003283 -
Feature-based Investigation of Simulation Structure and Behaviour
Koch, S.; Hamann, E.; Heinrich, R.; Reussner, R.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 178–185, Springer. doi:10.1007/978-3-031-16697-6_13 -
Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks
Borcherding, A.; Takacs, P.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy, 334–344, SciTePress. doi:10.5220/0010806300003120 -
Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks
Borcherding, A.; Feldmann, L.; Karch, M.; Meshram, A.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, 314–325, SciTePress. doi:10.5220/0010795900003120 -
Anonymizing Trajectory Data: Limitations and Opportunities
Guerra-Balboa, P.; Miranda-Pascual, À.; Strufe, T.; Parra-Arnau, J.; Forné, J.
2022. AAAI Workshop on Privacy-Preserving Artificial Intelligence -
MPER - a Motion Profiling Experiment and Research system for human body movement
Rettlinger, S.; Knaus, B.; Wieczorek, F.; Ivakko, N.; Hanisch, S.; Nguyen, G. T.; Strufe, T.; Fitzek, F. H. P.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy, 21-25 March 2022, 88–90, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767484 -
Conceptualization of a Trust Dashboard for Distributed Usage Control Systems
Wagner, P. G.
2022. Proceedings of the 2021 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory, 169–188, Karlsruher Institut für Technologie (KIT) -
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays
Duezguen, R.; Noah, N.; Mayer, P.; Das, S.; Volkamer, M.
2022. International Conference on Availability, Reliability and Security, ARES 2022, August 23 - August 26, 2022, Vienna, Austria, Art.-No.: 36, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539011 -
Trustworthy Artificial Intelligence
Becker, M.
2022. Proceedings of the 2021 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory, 21–32, Karlsruher Institut für Technologie (KIT) -
Leveraging Distributed Ledger Technology for Decentralized Mobility-as-a-Service Ticket Systems
Leinweber, M.; Kannengießer, N.; Hartenstein, H.; Sunyaev, A.
2022. Towards the New Normal in Mobility : Technische und betriebswirtschaftliche Aspekte. Hrsg.: H. Proff, 547–567, Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-39438-7_32 -
Your Cookie Disclaimer is not in line with the ideas of the GDPR. Why?
Hennig, A.; Dietmann, H.; Lehr, F.; Mutter, M.; Volkamer, M.; Mayer, P.
2022. Human Aspects of Information Security and Assurance. Ed.: N. Clarke, 218–227, Springer-Verlag. doi:10.1007/978-3-031-12172-2_17 -
BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots
Bayreuther, S.; Jacob, F.; Grotz, M.; Kartmann, R.; Peller-Konrad, F.; Paus, F.; Hartenstein, H.; Asfour, T.
2022. SACMAT ’22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesJune 2022, New York NY USA, June 8 - 10, 2022. Ed.: S. Dietrich, 185–194, Association for Computing Machinery (ACM). doi:10.1145/3532105.3535018 -
Introducing an Evaluation Method for Taxonomies
Kaplan, A.; Kühn, T.; Hahner, S.; Benkler, N.; Keim, J.; Fuchß, D.; Corallo, S.; Heinrich, R.; Corallo, S.; Heinrich, R.
2022. EASE 2022: The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 311–316, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535305 -
Quantifying Trustworthiness in Decentralized Trusted Applications
Wagner, P. G.; Beyerer, J.
2022. Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (Sat-CPS’22), 67–76, Association for Computing Machinery (ACM). doi:10.1145/3510547.3517930 -
PREUNN: Protocol Reverse Engineering using Neural Networks
Kiechle, V.; Börsig, M.; Nitzsche, S.; Baumgart, I.; Becker, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy. Ed.: P. Mori. Vol. 1, 345–356, SciTePress. doi:10.5220/0010813500003120 -
Standing out among the daily spam: How to catch website owners’ attention by means of vulnerability notifications
Hennig, A.; Neusser, F.; Pawelek, A. A.; Herrmann, D.; Mayer, P.
2022. Conference on Human Factors in Computing Systems (CHI ’22) : Extended Abstracts, Art.-Nr.: 317, Association for Computing Machinery (ACM). doi:10.1145/3491101.3519847 -
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
Beskorovajnov, W.; Gröll, R.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing. doi:10.1007/978-3-030-97131-1_11 -
SMILE - Smart eMaIl Link Domain Extractor
Mossano, M.; Berens, B.; Heller, P.; Beckmann, C.; Aldag, L.; Mayer, P.; Volkamer, M.
2022. Computer Security. ESORICS 2021 International Workshops – CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers. Ed.: S. Katsikas, 403–412, Springer International Publishing. doi:10.1007/978-3-030-95484-0_23 -
Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings
Byrenheid, M.; Roos, S.; Strufe, T.
2022. ICDCN ’22: Proceedings of the 2022 International Conference on Distributed Computing and Networking ; Jan 4th-7th, 2022, Virtual Conference, 107–116, Association for Computing Machinery (ACM). doi:10.1145/3491003.3491020 -
Recent Developments in the Context of Online Elections and Digital Polls in Germany
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_16 -
Dos and Don’ts of Machine Learning in Computer Security
Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2022. Proceedings of the 31st USENIX Security Symposium : August 10-12, 2022, Boston, MA, USA, 3971–3988, USENIX Association -
Towards a Formal Approach for Data Minimization in Programs (Short Paper)
Lanzinger, F.; Weigl, A.
2022. Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers. Ed.: J. Garcia-Alfaro, 161–169, Springer International Publishing. doi:10.1007/978-3-030-93944-1_11 -
Tackling Challenges of Robustness Measures for Autonomous Agent Collaboration in Open Multi-Agent Systems
Jin, D.; Kannengießer, N.; Sturm, B.; Sunyaev, A.
2022. Proceedings of the 55th Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, 03.01.2022-07.01.2022, 7585–7594. doi:10.24251/HICSS.2022.911 -
ETHTID: Deployable Threshold Information Disclosure on Ethereum
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BCCA53669.2021.9657019 -
Architecture Matters: Investigating the Influence of Differential Privacy on Neural Network Design
Morsbach, F.; Dehling, T.; Sunyaev, A.
2021. Presented at NeurIPS 2021 Workshop on Privacy in Machine Learning (PriML 2021), 14.12.2021. doi:10.48550/arXiv.2111.14924 -
Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites
Krisam, C.; Dietmann, H.; Volkamer Melanie; Kulyk, O.
2021. EuroUSEC ’21: European Symposium on Usable Security 2021, Karlsruhe Germany, October 11 - 12, 2021, 8 S., Association for Computing Machinery (ACM). doi:10.1145/3481357.3481516 -
LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems
Kühnapfel, N.; Preußler, S.; Noppel, M.; Schneider, T.; Rieck, K.; Wressnegger, C.
2021. Proceedings of 37th Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 6-10, 2021, 796–811, Association for Computing Machinery (ACM). doi:10.1145/3485832.3485911 -
Need for Change: Business Functions Affected by the Use of Decentralized Information Systems
Heines, R.; Kannengießer, N.; Sturm, B.; Jung, R.; Sunyaev, A.
2021. 42nd International Conference on Information Systems (ICIS), Association for Information Systems (AIS) -
Side-Channel Attacks on Query-Based Data Anonymization
Boenisch, F.; Munz, R.; Tiepelt, M.; Hanisch, S.; Kuhn, C.; Francis, P.
2021. CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 1254–1265, Association for Computing Machinery (ACM). doi:10.1145/3460120.3484751 -
Towards Distributed Healthcare Systems – Virtual Data Pooling Between Cancer Registries as Backbone of Care and Research
Appenzeller, A.; Bartholomaus, S.; Breitschwerdt, R.; Claussen, C.; Geisler, S.; Hartz, T.; Kachel, P.; Krempel, E.; Robert, S.; Zeissig, S. R.
2021. 2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA), Tangier, Morocco, 30 Nov.-3 Dec. 2021, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/AICCSA53542.2021.9686918 -
Coupling Smart Contracts: A Comparative Case Study
Friebe, S.; Stengele, O.; Hartenstein, H.; Zitterbart, M.
2021. 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 27-30 Sept. 2021, 137–144, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BRAINS52497.2021.9569830 -
Usable Verifiable Secrecy-Preserving E-Voting
Kulyk, O.; Ludwig, J.; Volkamer, M.; Koenig, R. E.; Locher, P.
2021. 6th Joint International Conference on Electronic Voting, E-Vote-ID 2021, 5-8 October 2021. Ed.: R. Krimmer ; M. Volkamer, 337–353, University of Tartu Press -
Aspect-Oriented Adaptation of Access Control Rules
Bures, T.; Gerostathopoulos, I.; Hnetynka, P.; Seifermann, S.; Walter, M.; Heinrich, R.
2021. 2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 363–370, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA53835.2021.00054 -
How to Increase Smart Home Security and Privacy Risk Perception
Duezguen, R.; Mayer, P.; Berens, B.; Beckmann, C.; Aldag, L.; Mossano, M.; Volkamer, M.; Strufe, T.
2021. 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 18 - 20 Augus 2021, Shenyang, China, 997–1004, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom53373.2021.00138 -
"Now I’m a bit angry:" Individuals’ Awareness, Perception, and Responses to Data Breaches that Affected Them
Mayer, P.; Zou, Y.; Schaub, F.; Aviv, A. J.
2021. 30th USENIX Security Symposium, Vancouver, CDN, August 11-13, 2021, 393–410, Advanced Computing Systems Association (USENIX) -
A Literature Review on Virtual Reality Authentication
Jones, J. M.; Duezguen, R.; Mayer, P.; Volkamer, M.; Das, S.
2021. Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Ed.: S. Furnell, 189–198, Springer. doi:10.1007/978-3-030-81111-2_16 -
Security in Distributed Ledger Technology: An Analysis of Vulnerabilities and Attack Vectors
Gojka, E.-E.; Kannengießer, N.; Sturm, B.; Bartsch, J.; Sunyaev, A.
2021. Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 3. Ed.: K. Arai, 722–742, Springer. doi:10.1007/978-3-030-80129-8_50 -
Generative Machine Learning for Resource-Aware 5G and IoT Systems
Piatkowski, N.; Mueller-Roemer, J. S.; Hasse, P.; Bachorek, A.; Werner, T.; Birnstill, P.; Morgenstern, A.; Stobbe, L.
2021. 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada, 14-23 June 2021, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCWorkshops50388.2021.9473625 -
CPIQ - A Privacy Impact Quantification for Digital Medical Consent
Appenzeller, A.; Kadow, T.; Krempel, E.; Beyer, J.
2021. PETRA ’21: The 14th PErvasive Technologies Related to Assistive Environments Conference Corfu Greece 29 June, 2021- 2 July, 2021, 534–543, Association for Computing Machinery (ACM). doi:10.1145/3453892.3461653 -
Towards Correct Smart Contracts: A Case Study on Formal Verification of Access Control
Schiffl, J.; Grundmann, M.; Leinweber, M.; Stengele, O.; Friebe, S.; Beckert, B.
2021. SACMAT ’21: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 125–130, Association for Computing Machinery (ACM). doi:10.1145/3450569.3463574 -
Towards extraction of message-based communication in mixed-technology architectures for performance model
Singh, S.; Kirschner, Y. R.; Koziolek, A.
2021. ICPE ’21: Companion of the ACM/SPEC International Conference on Performance Engineering, 133–138, Association for Computing Machinery (ACM). doi:10.1145/3447545.3451201 -
Adversarial Robust Model Compression using In-Train Pruning
Vemparala, M. R.; Fasfous, N.; Frickenstein, A.; Sarkar, S.; Zhao, Q.; Kuhn, S.; Frickenstein, L.; Singh, A.; Unger, C.; Nagaraja, N. S.; Wressnegger, C.; Stechele, W.
2021. CVPR 3rd Workshop on Safe Artificial Intelligence for Automated Driving (SAIAD), June 19, 2021, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CVPRW53098.2021.00016 -
Dealing with Uncertainty in Architectural Confidentiality Analysis
Hahner, S.
2021. Proceedings of the Software Engineering 2021 Satellite Events, 1–6, Gesellschaft für Informatik (GI) -
Preface to the 3rd Multi-Paradigm Modeling for Cyber-Physical Systems (MPM4CPS 2021)
Amrani, M.; Blouin, D.; Challenger, M.; Deantoni, J.; Heinrich, R.; Wimmer, M.
2021. 24th International Conference on Model-Driven Engineering Languages and Systems: MODELS 2021 ; 10-15 October 2021, Virtual Event, 284–285, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C53483.2021.00049 -
Towards the Co-Evolution of Models and Artefacts of Industrial Tools Through External Views
Sağlam, T.; Kühn, T.
2021. 2021 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Fukuoka, J, October 10-15, 2021, 410–416, IEEEXplore. doi:10.1109/MODELS-C53483.2021.00064 -
Upper Bound Computation of Information Leakages for Unbounded Recursion
Bechberger, J.; Weigl, A.
2021. Software Engineering and Formal Methods: 19th International Conference, SEFM 2021, Virtual Event, December 6–10, 2021, Proceedings. Ed.: R. Calinescu, 160–177, Springer-Verlag. doi:10.1007/978-3-030-92124-8_10 -
Onion Routing with Replies
Kuhn, C.; Hofheinz, D.; Rupp, A.; Strufe, T.
2021. Advances in Cryptology – ASIACRYPT 2021 – 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 573–604, Springer International Publishing. doi:10.1007/978-3-030-92075-3_20 -
Black-Box Accumulation Based on Lattices
Faller, S. H.; Baumer, P.; Klooß, M.; Koch, A.; Ottenhues, A.; Raiber, M.
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer. doi:10.1007/978-3-030-92641-0_11 -
Angriffserkennungssysteme in ICS Netzwerken
Kippe, J.; Karch, M.
2021. Deutschland, Digital, Sicher : 30 Jahre BSI : Tagungsband zum 17. Deutschen IT-Sicherheitskongress, 1–11, SecuMedia Verlag -
A Secure Cell-Attachment Procedure of LDACS
Maurer, N.; Graupl, T.; Gentsch, C.; Guggemos, T.; Tiepelt, K. M.; Schmitt, C.; Rodosek, G. D.
2021. Proceedings 2021 IEEE European Symposium on Security and Privacy Workshops, EuroS&PW 2021: Virtual Conference, 6-10 September 2021, 113–122, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW54576.2021.00019 -
Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance
Arias-Cabarcos, P.; Habrich, T.; Becker, K.; Becker, C.; Strufe, T.
2021. Proceedings of the 30th USENIX Security Symposium : August 11-13, 2021, 55–72, USENIX Association -
2PPS – Publish/Subscribe with Provable Privacy
Abdelwahab Gaballah, S.; Coijanovic, C.; Strufe, T.; Mühlhäuser, M.
2021. 40th International Symposium on Reliable Distributed Systems (SRDS), Chicago, IL, USA, 20-23 Sept. 2021. Vol.: 1, 198–209, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SRDS53918.2021.00028 -
On Expected Polynomial Runtime in Cryptography
Klooß, M.
2021. Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 558–590, Springer International Publishing. doi:10.1007/978-3-030-90459-3_19 -
Classifying and Avoiding Compatibility Issues in Networks of Bidirectional Transformations
Sağlam, T.; Klare, H.
2021. STAF 2021 Workshop Proceedings: 9th International Workshop on Bidirectional Transformations. Hrsg.: Ludovico Lovino, Lars Michael Kristensen, 34–53, CEUR-WS.org -
Tackling Problems of Maintenance and Evolution in Industry 4.0 Scenarios Using a Distributed Architecture
Koch, S.; Wunderlich, T.; Hansert, J.; Heinrich, R.; Schlegel, T.
2021. SE-SE 2021 - Software Engineering 2021 Satellite Events - Workshops and Tools & Demos - Proceedings of the Software Engineering 2021 Satellite Events, Braunschweig/Virtual, Germany, February 22 - 26, 2021. Ed.: S. Götz, CEUR-WS -
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions
Broadnax, B.; Mechler, J.; Müller-Quade, J.
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25 -
Identifying confidentiality violations in architectural design using palladio
Seifermann, S.; Walter, M.; Hahner, S.; Heinrich, R.; Reussner, R.
2021. W. D. W. D. Heinrich R. Mirandola R. (Ed.), 15th European Conference on Software Architecture - Companion (ECSA-C 2021), Virtual online (originally: Växjö, Sweden), September, 13-17, 2021. Ed.: R. Heinrich, Code 172547, CEUR-WS.org -
Deductive Verification of Floating-Point Java Programs in KeY
Abbasi, R.; Schiffl, J.; Darulova, E.; Ulbrich, M.; Ahrendt, W.
2021. Tools and Algorithms for the Construction and Analysis of Systems : 27th International Conference, TACAS 2021, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021, Luxembourg City, Luxembourg, March 27 – April 1, 2021, Proceedings, Part II. Ed.: J. F. Groote, 242–261, Springer International Publishing. doi:10.1007/978-3-030-72013-1_13 -
Effective Notification Campaigns on the Web : A matter of Trust, Framing, and Support
Maass, M.; Stöver, A.; Pridöhl, H.; Bretthauer, S.; Herrmann, D.; Hollick, M.; Spiecker gen. Döhmann, I.
2021. Proceedings of the 30th USENIV Security Symposium, 2489–2506, USENIX Association -
Recht und Technik: Datenschutz im Diskurs
Grimm, R.; Hornung, G.; Sorge, C.; Spiecker gen. Döhmann, I.
2021. Informatik 2020: Fachtagung vom 28. September–2. Oktober 2020 Karlsruhe. Hrsg.: R. H. Reussner, 813–814, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_72 -
Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis
Patzer, F.; Beyerer, J.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Hrsg:. Paolo Mori, Gabriele Lenzini, Steven Furnell, 550–557, SciTePress. doi:10.5220/0010285305500557 -
Architectural Access Control Policy Refinement and Verification under Uncertainty
Hahner, S.
2021. 15th European Conference on Software Architecture - Companion (ECSA-C 2021), Virtual online (originally: Växjö, Sweden), September, 13-17, 2021. Ed.: R. Heinrich, RWTH Aachen -
On Forging SPHINCS
-Haraka Signatures on a Fault-Tolerant Quantum Computer
Berger, R. M.; Tiepelt, M.
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing. doi:10.1007/978-3-030-88238-9_3 -
Quantifying Software Reliability via Model-Counting
Teuber, S.; Weigl, A.
2021. Quantitative Evaluation of Systems: 18th International Conference, QEST 2021, Paris, France, August 23–27, 2021, Proceedings. Ed.: A. Abate, 59–79, Springer-Verlag. doi:10.1007/978-3-030-85172-9_4 -
Trace Link Recovery for Software Architecture Documentation
Keim, J.; Schulz, S.; Fuchß, D.; Kocher, C.; Speit, J.; Koziolek, A.
2021. Software Architecture. Ed.: S. Biffl, 101–116, Springer-Verlag. doi:10.1007/978-3-030-86044-8_7 -
Plausible Deniability for Anonymous Communication
Kuhn, C.; Noppel, M.; Wressnegger, C.; Strufe, T.
2021. Proceedings of 20th Workshop on Privacy in the Electronic Society (WPES), Seoul, South Korea, November 15, 2021, 17–32, Association for Computing Machinery (ACM). doi:10.1145/3463676.3485605 -
Putting Privacy into Perspective – Comparing Technical, Legal, and Users’ View of Information Sensitivity
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Informatik 2020 - Back to the future : 50. Jahrestagung der Gesellschaft für Informatik vom 28. September - 2. Oktober 2020, virtual. Ed.: R.H. Reussner, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_76 -
Reconstructing z3 proofs in KeY: There and back again
Pfeifer, W.; Schiffl, J.; Ulbrich, M.
2021. Proceedings of the 23rd ACM International Workshop on Formal Techniques for Java-like Programs : 23rd ACM International Workshop on Formal Techniques for Java-Like Programs, FTfJP 2021, co-located with ECOOP/ISSTA 2021, Online, 13 July 2021 - null, 24–31, Association for Computing Machinery (ACM). doi:10.1145/3464971.3468421 -
Challenges in aligning enterprise application architectures to business process access control requirements in evolutional changes
Pilipchuk, R.; Seifermann, S.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 18th International Conference on e-Business, ICE-B 2021, Virtual, Online, 7 July 2021 - 9 July 2021, 13–24, SciTePress. doi:10.5220/0010511800130024 -
A unified model to detect information flow and access control violations in software architectures
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2021. Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, Virtual, Online, 6 July 2021 - 8 July 2021, 26–37, SciTePress. doi:10.5220/0010515300260037 -
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
Couteau, G.; Klooß, M.; Lin, H.; Reichle, M.
2021. Advances in Cryptology – EUROCRYPT 2021. Ed.: A. Canteaut, 247–277, Springer International Publishing. doi:10.1007/978-3-030-77883-5_9 -
Vision: What Johnny learns about Password Security from Videos posted on YouTube
Christmann, M.; Mayer, P.; Volkamer, M.
2021. European Symposium on Usable Security (EuroUSEC), 11 - 12 Oktober 2021, 124–128, Association for Computing Machinery (ACM). doi:10.1145/3481357.3481528 -
How to Effectively Communicate Benefits of Introducing a Modern Password Policy to Employees in Companies
Christmann, M.; Mayer, P.; Volkamer, M.
2021. Eighteenth Symposium on Usable Privacy and Security, August 7–9, 2022, Boston, MA, USA -
Evaluation der interaktiven NoPhish Präsenzschulung
Berens, B.; Aldag, L.; Volkamer, M.
2021. Mensch und Computer 2021 - Workshopband. Hrsg.: C. Wienrich, Gesellschaft für Informatik (GI). doi:10.18420/muc2021-mci-wsc-394 -
A classification for managing software engineering knowledge
Kaplan, A.; Walter, M.; Heinrich, R.
2021. EASE 2021: Evaluation and Assessment in Software Engineering. Ed.: R. Chitchyan, 340–346, Association for Computing Machinery (ACM). doi:10.1145/3463274.3463357 -
Classifying Usage Control and Data Provenance Architectures
Wagner, P. G.
2021. Proceedings of the 2020 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer; T. Zander, 135–154, KIT Scientific Publishing -
Modeling Data Flow Constraints for Design-Time Confidentiality Analyses
Hahner, S.; Seifermann, S.; Heinrich, R.; Walter, M.; Bures, T.; Hnetynka, P.
2021. Proceedings IEEE 18th International Conference on Software Architecture - Companion: ICSA-C 2021 ; 22 - 26 March 2021 ; virtual conference, 15–21, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C52384.2021.00009 -
Enabling Consistency between Software Artefacts for Software Adaption and Evolution
Monschein, D.; Mazkatli, M.; Heinrich, R.; Koziolek, A.
2021. Proceedings IEEE 18th International Conference on Software Architecture: 22-26 March 2021 ; virtual conference, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA51549.2021.00009 -
TagVet: Vetting Malware Tags using Explainable Machine Learning
Pirch, L.; Warnecke, A.; Wressnegger, C.; Rieck, K.
2021. EuroSec ’21: Proceedings of the 14th European Workshop on Systems Security, 34–40, Association for Computing Machinery (ACM). doi:10.1145/3447852.3458719 -
A Multivariate Characterization and Detection of Software Performance Antipatterns
Avritzer, A.; Britto, R.; Trubiani, C.; Russo, B.; Janes, A.; Camilli, M.; Van Hoorn, A.; Heinrich, R.; Rapp, M.; Henß, J.
2021. ICPE ’21: Proceedings of the ACM/SPEC International Conference on Performance Engineering, 19-23 April 2021, Rennes, France (virtual), 61–72, Association for Computing Machinery (ACM). doi:10.1145/3427921.3450246 -
Finding a Universal Execution Strategy for Model Transformation Networks
Gleitze, J.; Klare, H.; Burger, E.
2021. Fundamental Approaches to Software Engineering. Ed.: E. Guerra, 87–107, Springer International Publishing. doi:10.1007/978-3-030-71500-7_5 -
A Practical Evaluation Method for Misbehavior Detection in the Presence of Selfish Attackers
Wehmer, M.; Baumgart, I.
2021. Proceedings of the 7th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2021), 529–537, SciTePress. doi:10.5220/0010451005290537 -
Automatically extracting business level access control requirements from BPMN Models to align RBAC policies
Pilipchuk, R.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Ed.: P. Mori, 300–307, SciTePress. doi:10.5220/0010184403000307 -
“Healthy surveillance”: Designing a concept for privacy-preserving mask recognition AI in the age of pandemics
Kühl, N.; Martin, D.; Wolff, C.; Volkamer, M.
2021. Hawaii International Conference on Systems Sciences (HICSS-54), January 5-8, 2021, 1–10 -
Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende - Betrachtung möglicher arbeitsrechtlicher Konsequenzen
Müllmann, D.; Volkamer, M.
2021. Informatik 2020 - Back to the future. Hrsg.: R. H. Reussner, 829–840, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_74