Publications
-
Composition in Differential Privacy for General Granularity Notions
Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Strufe, T.
2024. 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 8th-12th July 2024. doi:10.48550/arXiv.2308.14649 -
Attacking Learning-based Models in Smart Grids: Current Challenges and New Frontiers
Sanchez, G.; Elbez, G.; Hagenmeyer, V.
2024. Proceedings of the 15thACM International Conference on Future and Sustainable Energy Systems (e-Energy ’24), Association for Computing Machinery (ACM). doi:10.1145/3632775.3661984 -
Interview Results, Production Workflows, Inconsistencies in Production Workflows
Kuder, N. D.; Weber, T.
2024, March 28. doi:10.35097/YVtjSZhutJKPvdBi -
Systematic User Evaluation of a Second Device based cast-as-intended verifiability Approach
Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.; Volkamer, M.
2024, February 27. doi:10.35097/1934 -
Co-Simulation of Hardware and Software in Palladio
Weber, S.; Henss, J.; Reussner, R.
2024. 13th Symposium on Software Performance 2023, Stuttgart, 7th-9th November 2022, Ed.: Andrea Herrmann, 32–34, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43641 -
Kfeature: Rendering the Kconfig System into Feature Models
Yaman, K. B.; Wittler, J. W.; Gerking, C.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 134 – 138, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634731 -
Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video
Berens, B. M.; Mossano, M.; Volkamer, M.
2024. Computers & Security, 137, Art.-Nr.: 103620. doi:10.1016/j.cose.2023.103620 -
Verifiable Certificateless Signcryption Scheme for Smart Grids
Ramadan, M.; Elbez, G.; Hagenmeyer, V.
2024. 2023 7th International Conference on System Reliability and Safety (ICSRS), 181–189, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSRS59833.2023.10381069 -
Requirements Classification for Traceability Link Recovery
Hey, T.; Keim, J.; Corallo, S.
2024. 2024 IEEE 32nd International Requirements Engineering Conference (RE’24), Institute of Electrical and Electronics Engineers (IEEE) -
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption
Berger, R.; Dörre, F.; Koch, A.
2024. Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings. Part I. Ed.: C. Pöpper, 288–317, Springer International Publishing. doi:10.1007/978-3-031-54770-6_12 -
Exploring Phishing Threats through QR Codes in Naturalistic Settings
Sharevski, F.; Mossano, M.; Veit, M. F.; Schiefer, G.; Volkamer, M.
2024. Symposium on Usable Security and Privacy (USEC) 2024. doi:10.14722/usec.2024.23050 -
Systematic User Evaluation of a Second Device based cast-as-intended verifiability Approach
Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.; Volkamer, M.
2024. Voting’24, Springer -
Architecture-based Propagation Analyses Regarding Security
Hahner, S.; Walter, M.; Heinrich, R.; Reussner, R.
2024. Software Engineering 2024 (SE 2024), Gesellschaft für Informatik e.V. doi:10.18420/sw2024_38 -
Obfuscation-Resilient Software Plagiarism Detection with JPlag
Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. 46th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3639478.3643074 -
DGRI-Jahrestagung 2023: KI, Cybersicherheit/Cyberresilienz, Datenökonomie
Dieler, P.
2024. Computer und Recht, 40 (1), R9-R11 -
Automated Detection of AI-Obfuscated Plagiarism in Modeling Assignments
Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. Proceedings of the 46th International Conference on Software Engineering: Software Engineering Education and Training, ICSE SEET ’24, Lissabon, 14th-20th April 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3639474.3640084 -
Detecting Automatic Software Plagiarism via Token Sequence Normalization
Sağlam, T.; Brödel, M.; Schmid, L.; Hahner, S.
2024. Proceedings of the 46th International Conference on Software Engineering, ICSE ’24, Lissabon, April 14-20, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3597503.3639192 -
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
Tiepelt, M.; Eaton, E.; Stebila, D.
2024. Computer Security – ESORICS 2023. Ed.: G. Tsudik. Pt. 1, 168–188, Springer Nature Switzerland. doi:10.1007/978-3-031-50594-2_9 -
Panini - Anonymous Anycast and an Instantiation
Coijanovic, C.; Weis, C.; Strufe, T.
2024. 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Springer-Verlag -
Exploring Contrasting Effects of Trust in Organizational Security Practices and Protective Structures on Employees’ Security-Related Precaution Taking
Greulich, M.; Lins, S.; Pienta, D.; Thatcher, J. B.; Sunyaev, A.
2024. Information systems research. doi:10.1287/isre.2021.0528 -
Recovering Trace Links Between Software Documentation And Code
Keim, J.; Corallo, S.; Fuchß, D.; Hey, T.; Telge, T.; Koziolek, A.
2024. Proceedings of 46th International Conference on Software Engineering (ICSE 2024) -
PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support
Schadt, D.; Coijanovic, C.; Weis, C.; Strufe, T.
2024. 2024 IEEE Symposium on Security and Privacy (SP), 44–44, IEEE Computer Society. doi:10.1109/SP54263.2024.00044 -
SoK: Explainable Machine Learning in Adversarial Environments
Noppel, M.; Wressnegger, C.
2024. Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P), San Francisco, 20th-22nd May 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SP54263.2024.00021 -
Scalable and Precise Refinement Types for Imperative Languages
Lanzinger, F.; Bachmeier, J.; Ulbrich, M.; Dietl, W.
2024. iFM 2023 – 18th International Conference, iFM 2023, Leiden, The Netherlands, November 13–15, 2023, Proceedings. Ed.: P. Herber, 377–383, Springer Nature Switzerland. doi:10.1007/978-3-031-47705-8_20 -
Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure
Adavoudi Jolfaei, A.; Rupp, A.; Schiffner, S.; Engel, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (1), 232–257. doi:10.56553/popets-2024-0014 -
Cookie disclaimers: Dark patterns and lack of transparency
Berens, B. M.; Bohlender, M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2024. Computers & Security, 136, Art.-Nr.: 103507. doi:10.1016/j.cose.2023.103507 -
A False Sense of Privacy: Towards a Reliable Evaluation Methodology for the Anonymization of Biometric Data
Hanisch, S.; Todt, J.; Patino, J.; Evans, N.; Strufe, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (1), 116–132. doi:10.56553/popets-2024-0008 -
Early Attack Detection for Securing GOOSE Network Traffic
Elbez, G.; Nahrstedt, K.; Hagenmeyer, V.
2024. IEEE Transactions on Smart Grid, 15 (1), 899–910. doi:10.1109/TSG.2023.3272749 -
Online-Wahlen und digitale Abstimmungen – eine Einordnung aktueller Entwicklungen
Volkamer, M.; Mayer, A.; Neumann, S.; Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Müller-Quade, J.
2023. DGRI Jahrbuch 2021/2022, 141–160, Verlag Dr. Otto Schmidt. doi:10.9785/9783504387914-010 -
“Complete” Independence of the ICO and Strategic Priorities of the UK Government?
Winau, M.
2023. Computer law review international, 24 (6), 180–187. doi:10.9785/cri-2023-240605 -
ABCperf: Performance Evaluation of Fault Tolerant State Machine Replication Made Simple: Demo Abstract
Spannagel, T.; Leinweber, M.; Castro, A.; Hartenstein, H.
2023. Proceedings of the 24th International Middleware Conference Demos, Posters and Doctoral Symposium, 35–36, Association for Computing Machinery (ACM). doi:10.1145/3626564.3629101 -
Multi-level Hardware Simulation in Palladio
Weber, S.; Taghavi, B.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 32–34, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43229 -
A Survey of Analysis Composition Operators in the Context of Palladio
Taghavi, B.; Weber, S.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 8–10, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43245 -
BAZAAR: Anonymous Resource Sharing
Coijanovic, C.; Schadt, D.; Weis, C.; Strufe, T.
2023. WPES ’23: Proceedings of the 22nd Workshop on Privacy in the Electronic Society, Kopenhagen, 26th November 2023, 135–139, Association for Computing Machinery (ACM). doi:10.1145/3603216.3624957 -
Poster: Towards Practical Brainwave-based User Authentication
Fallahi, M.; Arias-Cabarcos, P.; Strufe, T.
2023. CCS’ 23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Kopenhagen, 26th-30th November 2023, 3627–3629, Association for Computing Machinery (ACM). doi:10.1145/3576915.3624399 -
Poster: Fooling XAI with Explanation-Aware Backdoors
Noppel, M.; Wressnegger, C.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3612–3614, Association for Computing Machinery (ACM). doi:10.1145/3576915.3624379 -
"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers
Munyendo, C. W.; Mayer, P.; Aviv, A. J.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3123–3137, Association for Computing Machinery (ACM). doi:10.1145/3576915.3623150 -
Enabling the Collaborative Collection of Uncertainty Sources Regarding Confidentiality. bachelor’s thesis
Gehrig, G.
2023, November 3. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000164576 -
Data Companion Set - Bachelor’s Thesis - Gabriel Gehrig
Gehrig, G.
2023, November 3. doi:10.5281/zenodo.10034691 -
SAFFIRRE: Selective Aggregate Filtering Through Filter Rule Refinement
Heseding, H.; Bachmann, F.; Bien, P. S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), Izmir, 4th-06th October 2023, 42–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NoF58724.2023.10302813 -
Awareness, Intention, (In)Action: Individuals’ Reactions to Data Breaches
Mayer, P.; Zou, Y.; Lowens, B. M.; Dyer, H. A.; Le, K.; Schaub, F.; Aviv, A. J.
2023. ACM Transactions on Computer-Human Interaction, 30 (5), 1–53. doi:10.1145/3589958 -
Encouraging Organisational Information Security Incident Reporting
Ballreich, F. L.; Volkamer, M.; Müllmann, D.; Berens, B. M.; Häußler, E. M.; Renaud, K. V.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 224–236, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617098 -
Influence of URL Formatting on Users’ Phishing URL Detection
Mossano, M.; Kulyk, O.; Berens, B. M.; Häußler, E. M.; Volkamer, M.
2023. Proceedings of the 2023 European Symposium on Usable Security, 318–333, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617111 -
eMinD: Efficient and Micro-Flow Independent Detection of Distributed Network Attacks
Kopmann, S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), 159–167, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NoF58724.2023.10302763 -
How Students Plagiarize Modeling Assignments
Sağlam, T.; Schmid, L.; Hahner, S.; Burger, E.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, 1st - 6th October 2023, 98 – 101, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00032 -
Co-Evolving Meta-Models and View Types in View-Based Development
Muctadir, H. M.; König, L.; Weber, T.; Amrani, M.; Cleophas, L.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), 954–963, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00150 -
Vision: What the hack is going on? A first look at how website owners became aware that their website was hacked
Hennig, A.; Thi Thanh Vuong, N.; Mayer, P.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 312–317, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617101 -
A Design Toolbox for the Development of Collaborative Distributed Machine Learning Systems
Jin, D.; Kannengießer, N.; Rank, S.; Sunyaev, A.
2023. doi:10.5445/IR/1000162704 -
Investigating the Role of Computing Education for Informed Usage Decision-Making
Gebhardt, L.; Leinweber, M.; Michaeli, T.
2023. WiPSCE ’23: The 18th WiPSCE Conference on Primary and Secondary Computing Education Research Cambridge United Kingdom September 27 - 29, 2023. Ed.: S. Sentance, 1–2, Association for Computing Machinery (ACM). doi:10.1145/3605468.3609776 -
Cybersecurity for industrial automation and control systems
Haas, C.; Bretthauer, G.; Beyerer, J.
2023. at - Automatisierungstechnik, 71 (9), 723–725. doi:10.1515/auto-2023-0141 -
How Automated Market Makers Approach the Thin Market Problem in Cryptoeconomic Systems
Kirste, D.; Kannengießer, N.; Lamberty, R.; Sunyaev, A.
2023. arxiv. doi:10.48550/arXiv.2309.12818 -
Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems
Ramadan, M.; Raza, S.
2023. IEEE Internet of Things Journal, 10 (18), 16594–16604. doi:10.1109/JIOT.2023.3269222 -
Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models
Borcherding, A.; Morawetz, M.; Pfrang, S.
2023. Sensors, 23 (18), Art.-Nr.: 7864. doi:10.3390/s23187864 -
Towards Self-learning Industrial Process Behaviour from Payload Bytes for Anomaly Detection
Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA), Sinaia, Romania, 12-15 September 2023, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA54631.2023.10275358 -
A new hybrid risk assessment process for cyber security design of smart grids using fuzzy analytic hierarchy processes
Canbolat, S.; Elbez, G.; Hagenmeyer, V.
2023. Automatisierungstechnik. doi:10.1515/auto-2023-0089 -
Lessons Learned on Machine Learning for Computer Security
Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2023. IEEE Security & Privacy, 21 (5), 72–77. doi:10.1109/MSEC.2023.3287207 -
Reducing memory footprints in purity estimations of volumetric DDoS traffic aggregates
Heseding, H.; Krack, T.; Zitterbart, M.
2023. M. Seufert, A. Blenk & O. Landsiedel (Eds.), 2nd Workshop on Machine Learning & Netwoking (MaLeNe) Proceedings. Co-located with the 5th International Conference on Networked Systems (NetSys 2023), Potsdam, Germany, Universität Augsburg -
Impact of Adaptive Packet Sampling on ML-based DDoS Detection
Kopmann, S.; Zitterbart, M.
2023. 2nd Workshop “Machine Learning & Networking” (MaLeNe) Proceedings Co-Located with the 5th International Conference on Networked Systems (NETSYS 2023) Potsdam, Germany, September 4, 2023 (MaLeNe). Ed.: M. Seufert -
A user-centred approach to facilitate locating company security policies : Nutzerzentrierter Ansatz zur Vereinfachung des Auffindens von Security Policies
Aldag, L.; Ballreich, F.; Berens, B.; Volkamer, M.
2023. MuC ’23: Proceedings of Mensch und Computer. Ed.: M. Stolze, 173–185, Association for Computing Machinery (ACM). doi:10.1145/3603555.3603573 -
A Translation Layer for Information Flow Verification Systems: Bridging Type Systems with Theorem Provers. bachelor’s thesis
Mühlenberend, F.
2023, September 1. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165079 -
A Survey on Privacy-Preserving Electronic Toll Collection Schemes for Intelligent Transportation Systems
Adavoudi Jolfaei, A.; Boualouache, A.; Rupp, A.; Schiffner, S.; Engel, T.
2023. IEEE Transactions on Intelligent Transportation Systems, 24 (9), 8945–8962. doi:10.1109/TITS.2023.3266828 -
An Expert Survey on the Use of Informal Models in the Automotive Industry
Fuchß, D.; Kühn, T.; Wortmann, A.; Pfeiffer, J.; Koziolek, A.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000162389 -
Continuous T-Wise Coverage
Pett, T.; Heß, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2023. SPLC ’23: Proceedings of the 27th ACM International Systems and Software Product Line Conference. Vol. A. Ed.: P. Arcaini, 87–98, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608980 -
True Variability Shining Through Taxonomy Mining
König, C.; Rosiak, K.; Cleophas, L.; Schaefer, I.
2023. Proceedings of the 27th ACM International Systems and Software Product Line Conference - Volume A, 182–193, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608989 -
A Toolchain for Simulation Component Specification and Identification
Koch, S.; Reiche, F.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 75–89, Springer International Publishing. doi:10.1007/978-3-031-36889-9_7 -
Usability for Data Sovereignty - Evaluation of Privacy Risk Quantification Interfaces
Appenzeller, A.; Balduf, F.; Beyerer, J.
2023. Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments, 206–214, Association for Computing Machinery (ACM). doi:10.1145/3594806.3594816 -
Tool-Supported Architecture-Based Data Flow Analysis for Confidentiality
Schwickerath, F.; Boltz, N.; Hahner, S.; Walter, M.; Gerking, C.; Heinrich, R.
2023. arxiv. doi:10.48550/arXiv.2308.01645 -
Areas of Tension in the Application of AI and Data Protection Law
Winau, M.
2023. European Data Protection Law Review, 9 (2), 123 – 135. doi:10.21552/edpl/2023/2/7 -
Toward Joining DDoS Mitigation and Image Segmentation – Leveraging Computer Vision for Network Security
Kopmann, S.; Heseding, H.; Zitterbart, M.
2023. Datenschutz und Datensicherheit - DuD, 47 (8), 475–477. doi:10.1007/s11623-023-1801-1 -
Beware of website hackers: Developing an awareness video to warn for website hacking
Hennig, A.; Schmidt-Enke, L.; Mutter, M.; Mayer, P.
2023, August. 19th Symposium on Usable Privacy and Security. Co-located with USENIX Security ’23 (SOUPS 2023), Anaheim, CA, USA, August 6–8, 2023 -
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices
Arias-Cabarcos, P.; Fallahi, M.; Habrich, T.; Schulze, K.; Becker, C.; Strufe, T.
2023. ACM Transactions on Privacy and Security, 26 (3), Art.-Nr.: 26. doi:10.1145/3579356 -
Finding optimal decision boundaries for human intervention in one-class machine-learning models for industrial inspection
Zander, T.; Pan, Z.; Birnstill, P.; Beyerer, J.
2023. tm - Technisches Messen, 90 (7-8), 478–488. doi:10.1515/teme-2023-0010 -
Adversarial Attacks on Traffic Sign Recognition: A Survey
Pavlitska, S.; Lambing, N.; Zöllner, J. M.
2023. 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Tenerife, Spain, 19-21 July 2023, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICECCME57830.2023.10252727 -
Protocol-Agnostic Detection of Stealth Attacks on Networked Control Systems
Heseding, H.; Dieing, M.; Meshram, A.; Zitterbart, M.
2023. 2023 IEEE 21st International Conference on Industrial Informatics (INDIN), Lemgo, Germany, 17-20 2023, 1–7, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INDIN51400.2023.10218314 -
TRUST: Transparent Redundancy for UDP STreams
Neumeister, F.; Göckel, M.; Zitterbart, M.
2023. IEEE 21st International Conference on Industrial Informatics (INDIN 2023), 7 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INDIN51400.2023.10218145 -
Evaluating Model Differencing for the Consistency Preservation of State-based Views
Wittler, J. W.; Saglam, T.; Kühn, T.
2023. The Journal of Object Technology, 22 (2), 2:1–14. doi:10.5381/jot.2023.22.2.a4 -
The Bandit’s States: Modeling State Selection for Stateful Network Fuzzing as Multi-armed Bandit Problem
Borcherding, A.; Giraud, M.; Fitzgerald, I.; Beyerer, J.
2023. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 345–350, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW59978.2023.00043 -
Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0
Walter, M.; Hahner, S.; Bureš, T.; Hnětynka, P.; Heinrich, R.; Reussner, R.
2023. at - Automatisierungstechnik, 71 (6), 443–452. doi:10.1515/auto-2022-0135 -
A design theory for transparency of information privacy practices
Dehling, T.; Sunyaev, A.
2023. Information Systems Research, accepted manusript, 1–45. doi:10.1287/isre.2019.0239 -
Investigating Software Engineering Artifacts in DevOps Through the Lens of Boundary Objects
Matthies, C.; Heinrich, R.; Wohlrab, R.
2023. EASE ’23: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 12–21, Association for Computing Machinery (ACM). doi:10.1145/3593434.3593441 -
Decentralizing Software Identity Management. PhD dissertation
Stengele, O.
2023, June 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000159237 -
Hybrid Risk Assessment Process for Smart Grids
Canbolat, S.; Elbez, G.; Hagenmeyer, V.
2023, May 10. 10th KIT-Zentrum Energie Promovierenden-Symposium // KIT Energy Center Doctoral Symposium (2023), Karlsruhe, Germany, May 10, 2023 -
Let It TEE: Asynchronous Byzantine Atomic Broadcast with n ≥ 2f + 1
Leinweber, M.; Hartenstein, H.
2023. doi:10.48550/arXiv.2305.06123 -
On Extend-Only Directed Posets and Derived Byzantine-Tolerant Replicated Data Types
Jacob, F.; Hartenstein, H.
2023. PaPoC ’23: 10th Workshop on Principles and Practice of Consistency for Distributed Data Rome Italy 8 May 2023.Ed.: E. Gonzalez Boix, 63–69, Association for Computing Machinery (ACM). doi:10.1145/3578358.3591333 -
Holistic Adversarially Robust Pruning
Zhao, Q.; Wressnegger, C.
2023. 11th International Conference on Learning Representations (ICLR), Kigali, 1st-5th May 2023 -
Architecture-Based Uncertainty Impact Analysis to Ensure Confidentiality
Hahner, S.; Heinrich, R.; Reussner, R.
2023. 2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 126–132, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAMS59076.2023.00026 -
Weiterleitungs-URLs in E-Mails – Technische und rechtliche Aspekte
Müllmann, D.; Veit, M. F.; Volkamer, M.
2023. Datenschutz und Datensicherheit - DuD, 47 (5), 275–282. doi:10.1007/s11623-023-1761-5 -
Cookie-Nutzung nach Inkrafttreten des TTDSG – Zur Datenschutzkonformität des Cookie-Einsatzes auf den meistgenutzten deutschen Websites
Bohlender, M.; Dietmann, H.; Volkamer, M.
2023. Datenschutz und Datensicherheit - DuD, 47 (5), 283–288. doi:10.1007/s11623-023-1762-4 -
BrainNet: Improving Brainwave-based Biometric Recognition with Siamese Networks
Fallahi, M.; Strufe, T.; Arias-Cabarcos, P.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications (PerCom), 53–60, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PERCOM56429.2023.10099367 -
Design-time Performability Evaluation of Runtime Adaptation Strategies (Work In Progress Paper)
Rapp, M.; Scheerer, M.; Reussner, R.
2023. Companion of the 2023 ACM/SPEC International Conference on Performance Engineering, 9–15, Association for Computing Machinery (ACM). doi:10.1145/3578245.3585028 -
Intelligente Verkehrssysteme – IT-Sicherheit in offenen Infrastrukturen Teil 2
Sterz, L.; Werner, C.; Raabe, O.
2023. Recht der Datenverarbeitung, 39 (2), 97–105 -
Combining rule- and SMT-based reasoning for verifying floating-point Java programs in KeY
Abbasi, R.; Schiffl, J.; Darulova, E.; Ulbrich, M.; Ahrendt, W.
2023. International Journal on Software Tools for Technology Transfer, 25 (2), 185–204. doi:10.1007/s10009-022-00691-x -
Applying Differential Privacy to Medical Questionnaires
Appenzeller, A.; Terzer, N.; Philipp, P.; Beyerer, J.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 608–613, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops56833.2023.10150373 -
Model-based Confidentiality Analysis under Uncertainty
Hahner, S.; Bitschi, T.; Walter, M.; Bureš, T.; Hnětynka, P.; Heinrich, R.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), 256–263, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00062 -
Automatic Derivation of Vulnerability Models for Software Architectures
Kirschner, Y. R.; Walter, M.; Bossert, F.; Heinrich, R.; Koziolek, A.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), L’Aquila, Italy, 13-17 March 2023, 276–283, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00065 -
Detecting Inconsistencies in Software Architecture Documentation Using Traceability Link Recovery
Keim, J.; Corallo, S.; Fuchß, D.; Koziolek, A.
2023. 20th IEEE International Conference on Software Architecture (ICSA), 141–152, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA56044.2023.00021 -
On Efficient Zero-Knowledge Arguments. PhD dissertation
Klooß, M.
2023, February 20. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000156118 -
A First Complete Algorithm for Real Quantifier Elimination in Isabelle/HOL
Kosaian, K.; Tan, Y. K.; Platzer, A.
2023. Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs, 211–224, Association for Computing Machinery (ACM). doi:10.1145/3573105.3575672 -
The Democratization of News - Analysis and Behavior Modeling of Users in the Context of Online News Consumption. PhD dissertation
Reubold, J. L.
2023, January 11. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000154353 -
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph
Kaiser, F. K.; Dardik, U.; Elitzur, A.; Zilberman, P.; Daniel, N.; Wiens, M.; Schultmann, F.; Elovici, Y.; Puzis, R.
2023. IEEE transactions on dependable and secure computing, 1–17. doi:10.1109/TDSC.2022.3233703 -
RIXA - Explaining Artificial Intelligence in Natural Language
Becker, M.; Schwall, F.; Vishwesh, V.; Wu, S.; Birnstill, P.; Beyerer, J.
2023. doi:10.5445/IR/1000167428 -
Explainable Artificial Intelligence for Interpretable Data Minimization
Becker, M.; Toprak, E.; Beyerer, J.
2023. doi:10.5445/IR/1000167427 -
Identifying Performance Challenges in Consistency Preserving View-Based Environments
König, L.; Weber, T.
2023. Softwaretechnik-Trends, 14th Symposium on Software Performance 2023, Karlsruhe, 6th - 8th November 2023, 26–28, Gesellschaft für Informatik (GI) -
Composable Long-Term Security with Rewinding
Berger, R.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
2023. Theory of Cryptography – 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part IV. Ed.: G. Rothblum, 510 – 541, Springer Nature Switzerland. doi:10.1007/978-3-031-48624-1_19 -
Explanation-Aware Backdoors in a Nutshell
Noppel, M.; Wressnegger, C.
2023. Proc. of 46th German Conference on Artificial Intelligence (KI) -
On Evasion of Machine Learning-based Intrusion Detection in Smart Grids
Mumrez, A.; Sánchez, G.; Elbez, G.; Hagenmeyer, V.
2023. IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids. doi:10.1109/SmartGridComm57358.2023.10333966 -
Comparative Study on Smart Grid Security Testbeds Using MITRE ATT&CK Matrix
Mumrez, A.; Muhammad M. Roomi; Heng Chuan Tan; Daisuke Mashima; Elbez, G.; Hagenmeyer, V.
2023. 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SmartGridComm57358.2023.10333902 -
Understanding issues related to personal data and data protection in open source projects on GitHub
Hennig, A.; Schulte, L.; Herbold, S.; Kulyk, O.; Mayer, P.
2023. arxiv. doi:10.48550/arXiv.2304.06367 -
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
Tiepelt, M.; Eaton, E.; Stebila, D.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000164970 -
Universally Composable Auditable Surveillance
Fetzer, V.; Klooß, M.; Müller-Quade, J.; Raiber, M.; Rupp, A.
2023. Advances in Cryptology – ASIACRYPT 2023 – 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part II. Ed.: J. Guo, 453 – 487, Springer Nature Singapore. doi:10.1007/978-981-99-8724-5_14 -
Data sovereignty and informed consent as enablers for patient-oriented AI-driven clinical research: Requirements from a clinical, technical, legal and economic perspective
Spiecker genannt Döhmann, I.; Radic, M.; Busch-Casler, J.; Vosen, A.; Appenzeller, A.; Mucha, H.; Patrick, P.; Kevin, K.; Dauth, S.; Köhm, M.; Orak, B.
2023 -
§ 20: Digitalisierung, Informationsgesellschaft, Massendaten
Spiecker genannt Döhmann, I.
2023. Handbuch des Staatsrechts, Band I: Grundlagen, Wandel und Herausforderungen. Hrsg.: Uwe Kischel, Hanno Kube, 899–934, C.F. Müller -
Das Allgemeine Gleichbehandlungsgesetz und der Schutz vor Diskriminierung durch algorithmische Entscheidungssysteme
Spiecker genannt Döhmann, I.; Towfigh, E. V.
2023. Antidiskriminierungsstelle des Bundes. doi:10.5445/IR/1000164292 -
General Data Protection Regulation. Article-by-Article Commentary
Papakonstantinou, V.; Hornung, G.
2023. (P. De Hert & I. Spiecker genannt Döhmann, Eds.), Nomos -
Rechtliche Studie zum Cypher Social Contracts Konzept „Fides“
Spiecker genannt Döhmann, I.; Müllmann, D.; Bretthauer, S.
2023. KIT, Karlsruhe. doi:10.5281/zenodo.7680213 -
Die Zukunft der Gesundheitsberufe in Bildung und Migration
Spiecker gen. Döhmann, I.; Lehner, R.
2023. Lang -
Fracking: eine Option für Deutschland? Chancen, Risiken und Ungewissheiten beim Fracking in nicht konventionellen Lagerstätten
Gierds, J.; Stephanos, C.; Erlach, B.; Fischedick, M.; Henning, H.-M.; Matthies, E.; Pittel, K.; Renn, J.; Sauer, D. U.; Spiecker genannt Döhmann, I. (Eds.)
2023. Deutsche Akademie der Naturforscher Leopoldina e. V. doi:https://doi.org/10.48669/esys_2023-5 -
Online-Bundestagswahlen - Verfassungsrechtliche Grenzen und technische Herausforderungen
Gutjahr, A.; Spiecker gen. Döhmann, I.; Volkamer, M.
2023. Computer und Recht, 39 (11), 767–776. doi:10.9785/cr-2023-391124 -
Geschlechtergerechtigkeit im Spannungsfeld von nachhaltiger und digitaler Transformation – eine interdisziplinäre Annäherung
Spiecker genannt Döhmann, I.; Ohde, F.; Blättel-Mink, B.; Draude, C.
2023. Gender, (2), 132–147. doi:10.3224/gender.v15i2.10 -
Abschreckungseffekte und Überwachungsgefühl im Datenschutzrecht. Auswirkungen auf betroffene Personen
Spiecker genannt Döhmann, I.; Büscher, M.; Gutjahr, A.; Hornung, G.; Schindler, S.; Selzer, A.; Stummer, S.; Wilmer, T.; Zurawski, P.
2023. Datenschutz und Datensicherheit, 503–512. doi:10.1007/s11623-023-1807-8 -
Neue alte Entwicklungen für das Verwaltungsrecht: Von Kooperation und Dreiecksverhältnissen zur Konfliktbefriedung und Vertrauensbildung im Wirtschaftsverwaltungs- und Gesundheitsrecht
Spiecker genannt Döhmann, I.
2023. Schutz des Individuums durch das Recht: Festschrift für Professor Rainer Hofmann zum 70. Geburtstag. Bd.2. Hrsg.: Philipp B. Donath, Alexnader Heger, Moritz Malkmus, Orhan Bayrak, 1135–1150, Springer. doi:10.1007/978-3-662-66978-5_73 -
Governance Foundations for the European Cybersecurity Community
Spiecker genannt Döhmann, I.; Ferreira, A.; Wintzingerode, C. von; Müllmann, D.; Benzekri, A.; Cros, P.-H.; Prochilo, E.
2023. Digital Sovereignty in Cyber Security: New Challenges in Future Vision: First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers, 132–148, Springer Nature Switzerland. doi:10.1007/978-3-031-36096-1_9 -
Dienstleistungsroboter im Handel: Einsatzmöglichkeiten und verantwortungsbewusster Einsatz
Spiecker genannt Döhmann, I.; Stock-Homburg, R.; Knof, M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; David, K.; Wendt, J.; Stryk, O. von; Hannig, M.
2023. L. Binckebanck, R. Elste & A. Haas (Eds.), Digitalisierung im Vertrieb : Strategien zum Einsatz neuer Technologien in Vertriebsorganisationen / Lars Binckebanck, Rainer Elste, Alexander Haas, 533–568, Springer. doi:10.1007/978-3-658-38433-3_21 -
How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Noti-fication Study Reveals Diverse Circumstances and Challenges
Spiecker genannt Döhmann, I.; Stöver, A.; Gerber, N.; Pridöhl, H.; Maass, M.; Bretthauer, S.; Hollick, M.; Herrmann, D.
2023. Proceedings on privacy enhancing technologies, 2023, 251–264. doi:10.56553/popets-2023-0051 -
Generating adaptation rule-specific neural networks
Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2023. International Journal on Software Tools for Technology Transfer, 25, 733–746. doi:10.1007/s10009-023-00725-y -
Roboter im Supermarkt - Eine Betrachtung haftungs- und datenschutzrechtlicher Probleme beim Einsatz von Robotern im Einzelhandel
Ebert, A.; Busch, P.; Spiecker genannt Döhmann, I.; Wendt, J.
2023. Zeitschrift für Product Compliance, (1), 16–29 -
Human-Centered Design for Data-Sparse Tailored Privacy Information Provision
Goram, M.; Dehling, T.; Morsbach, F.; Sunyaev, A.
2023. Human Factors in Privacy Research. Ed.: N. Gerber, 283–298, Springer International Publishing. doi:10.1007/978-3-031-28643-8_14 -
The Future of Enterprise Information Systems
Sunyaev, A.; Dehling, T.; Strahringer, S.; Da Xu, L.; Heinig, M.; Perscheid, M.; Alt, R.; Rossi, M.
2023. Business & Information Systems Engineering, 65, 731–751. doi:10.1007/s12599-023-00839-2 -
Voter Perception of Cast-as-Intended Verifiability in the Estonian I-Vote Protocol
Hilt, T.; Sein, K.; Mällo, T.; Willemson, J.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI) -
German Social Elections 2023: An Overview and first Analysis
Hilt, T.; Kulyk, O.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI) -
Practically Efficient Private Set Intersection From Trusted Hardware with Side-Channels
Dörre, F.; Mechler, J.; Müller-Quade, J.
2023. Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Springer-Verlag. doi:10.1007/978-981-99-8730-6_9 -
Static Capability-Based Security for Smart Contracts
Schiffl, J.; Weigl, A.; Beckert, B.
2023. 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 110 – 117, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/DAPPS57946.2023.00024 -
QIn: Enabling Formal Methods to Deal with Quantum Circuits
Klamroth, J.; Beckert, B.; Scheerer, M.; Denninger, O.
2023. 2023 IEEE International Conference on Quantum Software (QSW), Chicago, IL, 2nd - 8th July 2023, 175 – 185, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/QSW59989.2023.00029 -
Exact and Efficient Bayesian Inference for Privacy Risk Quantification (Extended Version)
Rønneberg, R. C.; Pardo, R.; Wąsowski, A.
2023. doi:10.48550/arXiv.2308.16700 -
Uniform Substitution for Dynamic Logic with Communicating Hybrid Programs
Brieger, M.; Mitsch, S.; Platzer, A.
2023. Automated Deduction – CADE 29 – 29th International Conference on Automated Deduction, Rome, Italy, July 1–4, 2023, Proceedings. Ed.: B. Pientka, 96 – 115, Springer Nature Switzerland. doi:10.1007/978-3-031-38499-8_6 -
Automated Integration of Heteregeneous Architecture Information into a Unified Model
Jordan, S.; König, C.; Linsbauer, L.; Schaefer, I.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 83 – 99, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_6 -
Brief Announcement: Let It TEE: Asynchronous Byzantine Atomic Broadcast with n ≥ 2f+1
Leinweber, M.; Hartenstein, H.
2023. 37th International Symposium on Distributed Computing (DISC 2023). Ed.: R. Oshman, 43:1–43:7, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.DISC.2023.43 -
Sparsely-gated Mixture-of-Expert Layers for CNN Interpretability
Pavlitska, S.; Hubschneider, C.; Struppek, L.; Zöllner, J. M.
2023. 2023 International Joint Conference on Neural Networks (IJCNN), 1–10, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IJCNN54540.2023.10191904 -
Replication Package: An Expert Survey on the Use of Informal Models in the Automotive Industry
Fuchß, D.; Kühn, T.; Pfeiffer, J.; Wortmann, A.; Koziolek, A.
2023. doi:10.5281/zenodo.8199850 -
Automated Reverse Engineering of the Technology-Induced Software System Structure
Kirschner, Y. R.; Keim, J.; Peter, N.; Koziolek, A.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 283–291, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_19 -
Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents
Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Architecture. Ed.: B. Tekinerdogan, 37–53, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_3 -
Dataset: Architecture-based Attack Path Analysis for Identifying Potential Security Incidents
Walter, M.; Heinrich, R.; Reussner, R.
2023. doi:10.5281/zenodo.7900356 -
Zu Risiken und Anonymisierungen von Verhaltensbiometrie
Hanisch, S.; Todt, J.; Volkamer, M.; Strufe, T.
2023. Daten-Fairness in einer globalisierten Welt. Ed.: M. Friedewald, 423–444, Nomos Verlagsgesellschaft. doi:10.5771/9783748938743-423 -
Disguising Attacks with Explanation-Aware Backdoors
Noppel, M.; Peter, L.; Wressnegger, C.
2023. 2023 IEEE Symposium on Security and Privacy (SP), 664 – 681, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SP46215.2023.10179308 -
Personalized Explanations
Becker, M.
2023. Proceedings of the 2022 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer, 1–10, KIT Scientific Publishing -
A Classification of Software-Architectural Uncertainty Regarding Confidentiality
Hahner, S.; Seifermann, S.; Heinrich, R.; Reussner, R.
2023. E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, 139–160, Springer International Publishing. doi:10.1007/978-3-031-36840-0_8 -
Dataset: Tool-Supported Architecture-Based Data Flow Analysis for Confidentiality
Schwickerath, F.; Boltz, N.; Hahner, S.; Walter, M.; Gerking, C.; Heinrich, R.
2023. doi:10.5281/zenodo.8119378 -
Evaluating ML-based IDS with Mimicry Attacks
Sanchez, G.; Mumrez, A.; Elbez, G.; Wressnegger, C.; Hagenmeyer, V.
2023. Community Congress by StartUpSecure 2023- Critical Infrasructure and CyberSecruity (2023), Karlsruher Institut für Technologie, May 11, 2023 -
POET: A Self-learning Framework for PROFINET Industrial Operations Behaviour
Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. Tools for Design, Implementation and Verification of Emerging Information Technologies – 17th EAI International Conference, TridentCom 2022, Melbourne, Australia, November 23-25, 2022, Proceedings. Ed.: S. Yu, 3 – 19, Springer Nature Switzerland. doi:10.1007/978-3-031-33458-0_1 -
A Taxonomy for Design Decisions in Software Architecture Documentation
Keim, J.; Hey, T.; Sauer, B.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 439–454, Springer International Publishing. doi:10.1007/978-3-031-36889-9_29 -
Analysis and Prevention of Averaging Attacks Against Obfuscation Protocols
Becher, K.; Lagodzinski, J. A. G.; Parra-Arnau, J.; Strufe, T.
2023. Applied Cryptography and Network Security – 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part I. Ed.: M. Tibouchi, 451 – 475, Springer Nature Switzerland. doi:10.1007/978-3-031-33488-7_17 -
Establishing a Benchmark Dataset for Traceability Link Recovery Between Software Architecture Documentation and Models
Fuchß, D.; Corallo, S.; Keim, J.; Speit, J.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops, Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 455–464, Springer International Publishing. doi:10.1007/978-3-031-36889-9_30 -
Tool-Based Attack Graph Estimation and Scenario Analysis for Software Architectures
Walter, M.; Reussner, R.
2023. Software Architecture : ECSA 2022 Tracks and Workshops. Ed.: T. Batista, 45–61, Springer International Publishing. doi:10.1007/978-3-031-36889-9_5 -
Flexible Correct-by-Construction Programming
Runge, T.; Bordis, T.; Potanin, A.; Thüm, T.; Schaefer, I.
2023. Logical Methods in Computer Science, Volume 19, Issue 2 (2), 16:1 – 16:36. doi:10.46298/lmcs-19(2:16)2023 -
Automating GUI-based Software Testing with GPT-3
Zimmermann, D.; Koziolek, A.
2023. 2023 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 62 – 65, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSTW58534.2023.00022 -
Towards a Formal Verification of the Lightning Network with TLA+
Grundmann, M.; Hartenstein, H.
2023. doi:10.5445/IR/1000160211 -
Sender-binding Key Encapsulation
Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2023. Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I. Ed.: A. Boldyreva, 744 – 773, Springer Nature Switzerland. doi:10.1007/978-3-031-31368-4_26 -
Refinements of Hybrid Dynamical Systems Logic
Platzer, A.
2023. Rigorous State-Based Methods – 9th International Conference, ABZ 2023, Nancy, France, May 30–June 2, 2023, Proceedings. Ed.: U. Glässer, 3 – 14, Springer Nature Switzerland. doi:10.1007/978-3-031-33163-3_1 -
Forschungsstand der Sicherheit von implantierbaren medizinischen Geräten. bachelor’s thesis
Palkowitsch-Amberger, M.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000159670 -
Automatic Derivation of Vulnerability Models for Software Architectures
Kirschner, Y. R.; Walter, M.; Bossert, F.; Heinrich, R.; Koziolek, A.
2023. doi:10.5281/zenodo.7413806 -
Adversarial Vulnerability of Temporal Feature Networks for Object Detection
Pavlitskaya, S.; Polley, N.; Weber, M.; Zöllner, J. M.
2023. Computer Vision – ECCV 2022 Workshops. Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part V, Ed.: L. Karlinsky, 510–525, Springer Nature Switzerland. doi:10.1007/978-3-031-25072-9_35 -
Council of Europe Guidelines on the Use of ICT in Electoral Processes
Driza Maurer, A.; Volkamer, M.; Krimmer, R.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 585–599, Springer International Publishing. doi:10.1007/978-3-031-25460-4_34 -
Why Is Online Voting Still Largely a Black Box?
Kirsten, M.; Volkamer, M.; Beckert, B.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 555–567, Springer International Publishing. doi:10.1007/978-3-031-25460-4_32 -
Evaluation Methods and Replicability of Software Architecture Research Objects
Konersmann, M.; Kaplan, A.; Kühn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2023. Software Engineering 2023 : Fachtagung des GI-Fachbereichs Softwaretechnik : 20.-24. Februar 2023 Paderborn. Ed.: G. Engels; M. Tichy, 75–76, Gesellschaft für Informatik (GI) -
SoK: Differentially Private Publication of Trajectory Data
Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies, 496–516, De Gruyter. doi:10.56553/popets-2023-0065 -
Ihre Website wurde gehackt: Awareness schaffen für ein unsichtbares Problem
Hennig, A.; Mayer, P.; Volkamer, M.
2023. 2023 Nationale Konferenz IT-Sicherheitsforschung : Die digital vernetzte Gesellschaft stärken (2023), Berlin, Germany, March 13–15, 2023 -
Randomness is the Root of All Evil: More Reliable Evaluation of Deep Active Learning
Ji, Y.; Kaestner, D.; Wirth, O.; Wressnegger, C.
2023. 2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 3932–3941, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WACV56688.2023.00393 -
SWaTEval: An Evaluation Framework for Stateful Web Application Testing
Borcherding, A.; Penkov, N.; Giraud, M.; Beyerer, J.
2023. Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP, 430–441, SciTePress. doi:10.5220/0011652200003405 -
Dynamic Access Control in Industry 4.0 Systems
Heinrich, R.; Seifermann, S.; Walter, M.; Hahner, S.; Reussner, R.; Bureš, T.; Hnětynka, P.; Pacovský, J.
2023. Digital Transformation. Ed.: B. Vogel-Heuser, 143–170, Springer Vieweg. doi:10.1007/978-3-662-65004-2_6 -
Identifizierung von Vertraulichkeitsproblemen mithilfe von Angriffsausbreitung auf Architektur
Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Engineering 2023. Hrsg.: R. Engels, 123–124, Gesellschaft für Informatik (GI) -
Secure Provisioning of OPC UA Applications Using the Asset Administration Shell
Meier, D.; Vogl, J.; Kohnhäuser, F.; Beyerer, J.
2023. 2022 IEEE 17th Conference on Industrial Electronics and Applications (ICIEA), 144–149, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICIEA54703.2022.10005899 -
MIDA: Micro-flow Independent Detection of DDoS Attacks with CNNs
Kopmann, S.; Heseding, H.; Zitterbart, M.
2023. Advances in Service-Oriented and Cloud Computing : International Workshops of ESOCC 2022, Wittenberg, Germany, March 22-24, 2022, Revised Selected Papers. Ed.: C. Zirpins, 32–43, Springer International Publishing. doi:10.1007/978-3-031-23298-5_3 -
Understanding Person Identification through Gait
Hanisch, S.; Muschter, E.; Hatzipanayioti, A.; Li, S.-C.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), 177–189. doi:10.56553/popets-2023-0011 -
"Surprised, Shocked, Worried": User Reactions to Facebook Data Collection from Third Parties
Arias-Cabarcos, P.; Kjalili, S.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open. doi:10.56553/popets-2023-0023 -
German Voters’ Attitudes Towards Voting Online with a Verifiable System
Kulyk, O.; Volkamer, M.; Fuhrberg, N.; Berens, B.; Krimmer, R.
2023. Financial Cryptography and Data Security. FC 2022 International Workshops – CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers, Ed.: S. Matsuo, 33 –350, Springer International Publishing. doi:10.1007/978-3-031-32415-4_23 -
Weighted attack graphs and behavioral cyber game theory for cyber risk quantification
Kaiser, F. K.; Wiens, M.; Schultmann, F.
2022. Advances in Cyber Security and Intelligent Analytics. Ed.: A. Verma, 27–42, CRC Press-Taylor & Francis Group -
The Phishing Master Anti-Phishing Game
Dietmann, H.; Länge, T.; Matheis, P.; Pawelek, A. A.; Berens, B.; Mossano, M.; Veit, M.; Mayer, P.; Volkamer, M.
2022, December 8. Annual Computer Security Applications Conference (ACSAC 2022), Austin, TX, USA, December 5–9, 2022 -
How to Protect the Public Opinion Against New Types of Bots?
Reubold, J. L.; Escher, S. C.; Wressnegger, C.; Strufe, T.
2022. IEEE International Conference on Big Data, 1671–1680, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BigData55660.2022.10020758 -
Intelligente Verkehrssysteme – IT-Sicherheit in offenen Infrastrukturen Teil 1
Sterz, L.; Werner, C.; Raabe, O.
2022. Recht der Datenverarbeitung, 2022 (6), 291–299 -
Grundlagen für ein gesetzliches IT-Sicherheitsrisikomanagement : Ansätze zur Vereinheitlichung von Rollenmodell, Risikomanagement und Definitionen für das IT-Sicherheitsrecht
Werner, C.; Brinker, N.; Raabe, O.
2022. Computer und Recht, 38 (12), 817–824. doi:10.9785/cr-2022-381219 -
Development and Evaluation of an Anti-Phishing Shooting Game
Dietmann, H.; Länge, T.; Matheis, P.; Pawelek, A. A.; Berens, B.; Mossano, M.; Veit, M.; Mayer, P.; Volkamer, M.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000153329 -
Self-learning Anomaly Detection in Industrial Production. PhD dissertation
Meshram, A.
2022, November 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000152361 -
Token-based plagiarism detection for metamodels
Sağlam, T.; Hahner, S.; Wittler, J. W.; Kühn, T.
2022. MODELS ’22: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion ProceedingsOctober 2022, 138–141, Association for Computing Machinery (ACM). doi:10.1145/3550356.3556508 -
Sharp: Short Relaxed Range Proofs
Couteau, G.; Goudarzi, D.; Klooß, M.; Reichle, M.
2022. CCS ’22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Ed.: H. Yin Conference: CCS ’22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA November 7 - 11, 2022, 609–622, Association for Computing Machinery (ACM). doi:10.1145/3548606.3560628 -
On Security Notions for Multi-Party Computation. PhD dissertation
Maier, S.
2022, November 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151951 -
A Mobility Case Study for Validating Attack Propagation Analyses. bachelor’s thesis
Evli, Y. E.
2022, November. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000152514 -
Scalability testing automation using multivariate characterization and detection of software performance antipatterns
Avritzer, A.; Britto, R.; Trubiani, C.; Camilli, M.; Janes, A.; Russo, B.; Hoorn, A. van; Heinrich, R.; Rapp, M.; Henß, J.; Chalawadi, R. K.
2022. Journal of Systems and Software, 193, Art.-Nr.: 111446. doi:10.1016/j.jss.2022.111446 -
Challenges and Common Solutions in Smart Contract Development
Kannengießer, N.; Lins, S.; Sander, C.; Winter, K.; Frey, H.; Sunyaev, A.
2022. IEEE transactions on software engineering, 48 (11), 4291–4318. doi:10.1109/TSE.2021.3116808 -
A Mobility Case Study Framework for Validating Uncertainty Impact Analyses regarding Confidentiality. bachelor’s thesis
Priss, D.
2022, October 21. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000153083 -
Uncertainty-aware Confidentiality Analysis Using Architectural Variations. bachelor’s thesis
Bitschi, T.
2022, October 21. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000153079 -
Dataset: Architecture-based Attack Propagation and Variation Analysis for Identifying Confidentiality Issues in Industry 4.0
Walter, M.; Hahner, S.; Bures, T.; Hnetynka, P.; Heinrich, R.; Reussner, R.
2022, October 17. doi:10.5281/zenodo.7214894 -
LiquidRust: Refinement Types for Imperative Languages with Ownership. master’s thesis
Csiky, C.
2022, October 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000152005 -
La Publicación de Trayectorias: un Estudio sobre la Protección de la Privacidad
Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2022. Proceedings of the XVII Spanish Meeting on Cryptology and Information Security (RECSI), Santader, 19th - 21st October, 2022. doi:10.22429/Euc2022.028 -
Design and Evaluation of an Anti-Phishing Artifact Based on Useful Transparency
Beckmann, C.; Berens, B.; Kühl, N.; Mayer, P.; Mossano, M.; Volkamer, M.
2022. International Workshop on Socio-Technical Aspects in Security -
Continuous Integration of Architectural Performance Models with Parametric Dependencies – The CIPM Approach
Mazkatli, M.; Monschein, D.; Armbruster, M.; Heinrich, R.; Koziolek, A.
2022. doi:10.5445/IR/1000151086/v2 -
Datenschutzkonforme Weitergabe von Versichertendaten aus dem Forschungsdatenzentrum
Orak, B.; Krempel, E.; Appenzeller, A.
2022. D. Demmler, D. Krupka & H. Federrath (Eds.), INFORMATIK 2022 Hrsg.: Demmler, Daniel AND Federrath, Hannes, Daniel AND Krupka, 533–549, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_45 -
ReCEIF: Reinforcement Learning-Controlled Effective Ingress Filtering
Heseding, H.; Zitterbart, M.
2022. 2022 IEEE 47th Conference on Local Computer Networks (LCN), 106–113, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN53696.2022.9843478 -
HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic
Kopmann, S.; Heseding, H.; Zitterbart, M.
2022. 2022 IEEE 47th Conference on Local Computer Networks (LCN), 90–97, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN53696.2022.9843465 -
PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren für Virtual Reality Head-Mounted Displays
Länge, T.; Matheis, P.; Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Mensch und Computer 2022 - Workshopband. Ed.: K. Marky, Gesellschaft für Informatik (GI). doi:10.18420/muc2022-mci-ws01-462 -
Dissecting chirping patterns of invasive Tweeter flocks in the German Twitter forest
Reubold, J. L.; Escher, S.; Pflugmacher, J.; Strufe, T.
2022. Online Social Networks and Media, 31, Art.-Nr.: 100228. doi:10.1016/j.osnem.2022.100228 -
Cookie Disclaimers: Impact of Design and Users’ Attitude
Berens, B. M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2022. Proceedings of the 17th International Conference on Availability, Reliability and Security, 1–20, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539008 -
Finding the Right Balance: Technical and Political Decentralization in the Token Economy
Pfister, M.; Kannengießer, N.; Sunyaev, A.
2022. Blockchains and the Token Economy. Ed.: M. C. Lacity, 53–86, Springer Nature Switzerland. doi:10.1007/978-3-030-95108-5_3 -
PassSec+ - An addon that protects your passwords, payment data and privacy
Veit, M. F.; Volkamer, M.
2022, August 8. 18th/31st Symposium on Usable Privacy and Security / Co-located with USENIX Security (SOUPS 2022), Online, August 7–9, 2022 -
Handling Environmental Uncertainty in Design Time Access Control Analysis
Boltz, N.; Hahner, S.; Walter, M.; Seifermann, S.; Heinrich, R.; Bures, T.; Hnetynka, P.
2022. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Gran Canaria, Spain, 31 August 2022 - 02 September 2022, 382–389, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA56994.2022.00067 -
Property Types for Mutable Data Structures in Java. master’s thesis
Bachmeier, J.
2022, August 1. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000150318 -
Why Users (Don’t) Use Password Managers at a Large Educational Institution
Mayer, P.; Munyendo, C. W.; Mazurek, M. L.; Aviv, A. J.
2022. 31st USENIX Security Symposium (USENIX Security 22), 1849–1866, USENIX Association -
"I don’t know why I check this...’’ - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks
Mayer, P.; Poddebniak, D.; Fischer, K.; Brinkmann, M.; Somorovsky, J.; Sasse, M. A.; Schinzel, S.; Volkamer, M.
2022. Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 77–96, USENIX Association -
On the Applicability of Payment Channel Networks for Allocation of Transport Ticket Revenues
Grundmann, M.; von Zastrow-Marcks, O.; Hartenstein, H.
2022. Proceedings - International Conference on Computer Communications and Networks, ICCCN : 31st International Conference on Computer Communications and Networks, ICCCN 2022, Virtual, Online, 25 - 28 July 2022, 7 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCCN54977.2022.9868881 -
External conformity assessment procedures for high-risk AI-systems: A game theoretic perspective
Winau, M.; Kaiser, F. K.; Wiens, M.; Schultmann, F.; Spiecker, I.
2022, July 25. 5th European Technology Assessment Conference "Digital Future(s). TA in and for a Changing World" (ETAC 2022), Karlsruhe, Germany, July 25–27, 2022 -
Non-Uniform Adversarially Robust Pruning
Zhao, Q.; Königl, T.; Wressnegger, C.
2022. Proc. of the 1st International Conference on Automated Machine Learning (AutoML) -
Design-time Performability Optimization of Runtime Adaptation Strategies
Rapp, M.; Scheerer, M.; Reussner, R.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 113–120, Association for Computing Machinery (ACM). doi:10.1145/3491204.3527471 -
Differentially private publication of database streams via hybrid video coding
Parra-Arnau, J.; Strufe, T.; Domingo-Ferrer, J.
2022. Knowledge-Based Systems, 247, Art.-Nr.: 108778. doi:10.1016/j.knosys.2022.108778 -
Towards Private Medical Data Donations by Using Privacy Preserving Technologies
Appenzeller, A.; Terzer, N.; Krempel, E.; Beyerer, J.
2022. The15th International Conference on PErvasive Technologies Related to Assistive Environments, 446–454, Association for Computing Machinery (ACM). doi:10.1145/3529190.3534768 -
Classification of Software Engineering Contributions to Support Validation Techniques and Research Applications
Kaplan, A.
2022. The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 323–328, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535345 -
A conceptual model for unifying variability in space and time: Rationale, validation, and illustrative applications
Ananieva, S.; Greiner, S.; Kehrer, T.; Krüger, J.; Kühn, T.; Linsbauer, L.; Grüner, S.; Koziolek, A.; Lönn, H.; Ramesh, S.; Reussner, R.
2022. Empirical Software Engineering, 27 (5), Article no: 101. doi:10.1007/s10664-021-10097-z -
On the Detection of Cyber-Attacks in the Communication Network of IEC 61850 Electrical Substations. PhD dissertation
Elbez, G.
2022, May 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000146668 -
Verifying Payment Channels with TLA+
Grundmann, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–3, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805487 -
Hybrid Intrusion Detection System for Smart Grids
Mumrez, A.; Khosravi, H.; Elbez, G.; Hagenmeyer, V.
2022, May 4. 1st CyberSecurity in Energy and Production Conference (2022), Karlsruhe, Germany, May 4, 2022 -
Preliminary study for an alarm correlation framework based on risk assessment in IEC 61850 substations
Canbolat, S.; Elbez, G.; Hagenmeyer, V.
2022, May 4. 1st CyberSecurity in Energy and Production Conference (2022), Karlsruhe, Germany, May 4, 2022 -
On the Peer Degree Distribution of the Bitcoin P2P Network
Grundmann, M.; Baumstark, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–5, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805511 -
Manipulative Designs von Cookies – Manipulative Designs von Cookies Tricks, um die Einwilligung von Website-Besucherinnen und -Besuchern zum Sammeln und Auswerten von Nutzerdaten über Cookies zu erhalten
Lehr, F.; Dietmann, H.; Krisam, C.; Volkamer, M.
2022. Datenschutz und Datensicherheit - DuD, 46 (5), 296–300. doi:10.1007/s11623-022-1606-7 -
Reproducibility and Replicability of Web Measurement Studies
Demir, N.; Große-Kampmann, M.; Urban, T.; Wressnegger, C.; Holz, T.; Pohlmann, N.
2022. WWW ’22: Proceedings of the ACM Web Conference 2022. Ed.: F. Laforest, 533–544, Association for Computing Machinery (ACM). doi:10.1145/3485447.3512214 -
Phishing awareness and education – When to best remind?
Berens, B. M.; Dimitrova, K.; Mossano, M.; Volkamer, M.
2022. Symposium on Usable Security and Privacy (USEC), co-located with the Network and Distributed System Security Symposium (NDSS 2022), San Diego, CA, April 23, 2022. doi:10.14722/usec.2022.23075 -
The Smart Grid: A Use-Case for Large-Scale SDN Deployment
Neumeister, F.; Zitterbart, M.
2022. 3. KuVS Fachgespräch "Network Softwarization" (7.4. - 8.4.2022). 3. KuVS Fachgespräch "Network Softwarization" (online) 7./8.4.2022, Universitätsbibliothek Tübingen. doi:10.15496/publikation-67443 -
Formal Foundations for Anonymous Communication. PhD dissertation
Kuhn, C.
2022, April 7. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000144491 -
Reinforcement Learning-Controlled Mitigation of Volumetric DDoS Attacks
Heseding, H.
2022. C. Wressnegger, D. Reinhardt, T. Barber, B. C. Witt, D. Arp & Z. Mann (Eds.), SICHERHEIT 2022 Hrsg.: Wressnegger, Christian; Reinhardt, Delphine; Barber, Thomas; Witt, Bernhard C.; Arp, Daniel; Mann, Zoltan, 237–242, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_20 -
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics
Fetzer, V.; Keller, M.; Maier, S.; Raiber, M.; Rupp, A.; Schwerdt, R.
2022. Proceedings on Privacy Enhancing Technologies, 2022 (2), 447–516. doi:10.2478/popets-2022-0054 -
Transparency for Bystanders in IoT regarding audiovisual Recordings
Escher, S.; Etzrodt, K.; Weller, B.; Kopsell, S.; Strufe, T.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops): 21–25 March 2022, Pisa, Italy, 649–654, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767212 -
Why Do Machine Learning Practitioners Still Use Manual Tuning? A Qualitative Study
Hasebrook, N.; Morsbach, F.; Kannengießer, N.; Zöller, M.; Franke, J.; Lindauer, M.; Hutter, F.; Sunyaev, A.
2022. Karlsruher Institut für Technologie (KIT). doi:10.48550/ARXIV.2203.01717 -
Replication Package of "Evaluation Methods and Replicability of Software Architecture Research Objects"
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; Al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 58, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00021 -
Architectural Pen-Test Generation and Vulnerability Prediction for Cyber-Physical Systems
Walter, T.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 45–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00016 -
Evaluation Methods and Replicability of Software Architecture Research Objects
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), Honolulu, HI, USA, 12-15 March 2022, 157–168, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00023 -
Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022. IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 12 -15 March 2022, Honolulu, HI, USA, 59, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00022 -
Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), 12 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00009 -
Architecture-based Uncertainty Impact Analysis for Confidentiality. master’s thesis
Benkler, N.
2022, February 23. doi:10.5445/IR/1000144641 -
Architecture-based Uncertainty Impact Analysis for Confidentiality (Reproduction Set)
Benkler, N.
2022, February 23. doi:10.5281/zenodo.6202285 -
Unified Operations for Variability in Space and Time
Ananieva, S.; Greiner, S.; Krueger, J.; Linsbauer, L.; Gruener, S.; Kehrer, T.; Kuehn, T.; Seidl, C.; Reussner, R.
2022. Proceedings of the 16th International Working Conference on Variability Modelling of Software-Intensive Systems, 1–10, Association for Computing Machinery (ACM). doi:10.1145/3510466.3510483 -
Continuous Secure Software Development and Analysis
Schulz, S.; Reiche, F.; Hahner, S.; Schiffl, J.
2022. Symposium on Software Performance 2021 : Short Paper Proceedings of Symposium on Software Performance, Leipzig, Germany, November 9.-10., 2021. Ed.: D. G. Reichelt, R. Müller, S. Becker, W. Hasselbring, A. v. Hoorn, S. Kounev, A. Koziolek, R. Reussner, RWTH Aachen -
Reproducibility and Replicability of Web Measurement Studies
Demir, N.; Große-Kampmann, M.; Urban, T.; Wressnegger, C.; Holz, T.; Pohlmann, N.
2022, February 3. doi:10.5445/IR/1000142435 -
Detecting Violations of Access Control and Information Flow Policies in Data Flow Diagrams
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2022. The journal of systems and software, 184, Art.-Nr. 111138. doi:10.1016/j.jss.2021.111138 -
Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022, January 10. doi:10.5445/IR/1000141655 -
Beauty and the Beast – A Case Study on Performance Prototyping of Data-Intensive Containerized Cloud Applications
Klinaku, F.; Rapp, M.; Henss, J.; Rhode, S.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 53–60, Association for Computing Machinery (ACM). doi:10.1145/3491204.3527482 -
Gewährleistung effektiven Grundrechtsschutzes auf Grundlage des Kommissionsentwurfs für eine KI-Verordnung?
Winau, M.
2022. Zeitschrift für das Recht der digitalen Wirtschaft (ZdiW), 3 (1), 14–19 -
Kopplung von Architekturanalysen und musterbasierten Quelltextanalysen für Sicherheitseigenschaften von Aufrufabhängigkeiten. bachelor’s thesis
Traub, L.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000161472 -
Dataset: Palladio Context-based Scenario Analysis
Walter, M.; Reussner, R.
2022. doi:10.5281/zenodo.7431562 -
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules
Doerner, D.; Mechler, J.; Müller-Quade, J.
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 83–99, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_05 -
How to best inform website owners about vulnerabilities on their websites
Hennig, A.; Neusser, F.; Pawelek, A. A.; Herrmann, D.; Mayer, P.
2022. European Symposium on Usable Security (EuroUSEC 2022), Karlsruhe, Germany, September 29–30, 2022 -
Electronic Voting: 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
Krimmer, R.; Volkamer, M.; Duenas-Cid, D.; Rønne, P.; Germann, M. (Eds.)
2022 -
Mining Legal Arguments in Court Decisions
Habernal, I.; Faber, D.; Recchia, N.; Bretthauer, S.; Gurevych, I.; Spiecker genannt Döhmann, I.; Burchard, C.
2022. arxiv. doi:10.48550/arXiv.2208.06178 -
Panorama-Abbildungen im Internet unter der DSGVO: Google Street View und Co revisited
Spiecker genannt Döhmann, I.
2022. Gestaltung der Informationsrechtsordnung: Festschrift für Thomas Dreier. Hrsg.: V. Fischer/G. Nolte/M. Senftleben/L. Specht-Riemenschneider, 427–444, Verlag C.H.Beck -
Artificial Intelligence and Data Protection
Spiecker genannt Döhmann, I.
2022. The Cambridge Handbook of Artificial Intelligence - Global Perspectives on Law and Ethics. Hrsg.: L. DiMatteo/Chr. Poncibo/M. Cannarsa, 132–145, Cambridge Univ. Press. doi:10.1017/9781009072168.015 -
The Law of Global Digitality
Kettemann, M. C.; Peukert, A.; Spiecker genannt Döhmann, I.
2022. Routledge. doi:10.4324/9781003283881 -
Data Protection: The more the merrier - a dynamic approach learning from prior misgovernance
Spiecker genannt Döhmann, I.
2022. The Law of Global Digitality. Hrsg.: M. Kettemann, 77–95, Taylor and Francis. doi:10.4324/9781003283881-6 -
§ 71: Grundrechte der Digitalisierung
Spiecker genannt Döhmann, I.
2022. Handbuch des Verwaltungsrechts, Band 3. Hrsg.: W. Kahl/M. Ludwigs, 535–564, C.F. Müller -
§ 24: Europäisches Datenschutzverwaltungsrecht
Spiecker genannt Döhmann, I.; Benecke, A.
2022. Verwaltungsrecht der Europäischen Union. Hrsg.: J.P. Terhechte, 997–1040, Nomos -
Challenges in Data Protection in Business Transactions: An Overview Over Civil Law Approaches to Data Protection and Data Ownership
Spiecker genannt Döhmann, I.; Benecke, A.
2022. Handbook Industry 4.0 – Law, Technology, Society, 159–178, Springer-Verlag. doi:10.1007/978-3-662-64448-5_9 -
Responsible Human-Robot Interaction with Anthropomorphic Service Robots: State of the Art of an Interdisciplinary Research Challenge
Stock-Homburg, R. M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; Rawal, N.; David, K.; Wendt, J.; Spiecker genannt Döhmann, I.; Stryk, O. von; Hannig, M.; Knof, M.
2022. Proceedings of the 55th Annual Hawaii International Conference on System Sciences : January 3-7, 2022. Ed.: T. X. Bui, 2065–2074, University of Hawaii. doi:10.24251/HICSS.2022.260 -
Datenschutz als Garant und Ermöglicher von Grundrechten
Kelber, U.; Müllmann, D.
2022. Datenschutz Nachrichten, 45 (3), 140–142 -
Extra DSGVO nulla salus? - Zur weiteren Zulässigkeit nicht akkreditierter Datenschutzsiegel neben akkreditierten Gütesiegeln im Sinne der Art. 42 f. DSGVO
Müllmann, D.; Spiecker genannt Döhmann, I.
2022. Deutsches Verwaltungsblatt, 137 (4), 208–214 -
Optimal human labelling for anomaly detection in industrial inspection
Zander, T.; Ziyan, P.; Birnstill, P.; Beyerer, J.
2022. Forum Bildverarbeitung 2022. Ed.: T. Längle, 49–59, KIT Scientific Publishing -
Demokratie und Öffentlichkeit im 21. Jahrhundert – zur Macht des Digitalen
Spiecker genannt Döhmann, I.; Westland, M.; Campos, R. (Eds.)
2022. Nomos Verlagsgesellschaft. doi:10.5771/9783748932741 -
Künstliche Intelligenz in der Forschung – Neue Möglichkeiten und Herausforderungen für die Wissenschaft
Gethmann, C. F.; Buxmann, P.; Distelrath, J.; Humm, B. G.; Lingner, S.; Nitsch, V.; Schmidt, J. C.; Spiecker genannt Döhmann, I.
2022. Springer-Verlag. doi:10.1007/978-3-662-63449-3 -
Fiat-Shamir Transformation of Multi-round Interactive Proofs
Attema, T.; Fehr, S.; Klooß, M.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Ed.: E. Kiltz, 113–142, Springer Nature Switzerland. doi:10.1007/978-3-031-22318-1_5 -
Anonymous Whistleblowing over Authenticated Channels
Agrikola, T.; Couteau, G.; Maier, S.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Ed.: E. Kiltz, 685–714, Springer Nature Switzerland. doi:10.1007/978-3-031-22365-5_24 -
Efficient Public Verification of Confidential Supply-Chain Transactions
Becher, K.; Schäfer, M.; Schröpfer, A.; Strufe, T.
2022. 2022 IEEE Conference on Communications and Network Security (CNS), 308–316, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CNS56114.2022.9947231 -
Uncertainty in coupled models of cyber-physical systems
Acosta, M.; Hahner, S.; Koziolek, A.; Kühn, T.; Mirandola, R.; Reussner, R.
2022. Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 569–578, Association for Computing Machinery (ACM). doi:10.1145/3550356.3561539 -
Towards a Usable and Sustainable Deductive Verification Tool
Beckert, B.; Bubel, R.; Hähnle, R.; Ulbrich, M.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 281–300, Springer Nature Switzerland. doi:10.1007/978-3-031-19756-7_16 -
Immutability and Encapsulation for Sound OO Information Flow Control
Runge, T.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. ACM Transactions on Programming Languages and Systems, 45 (1), Art.Nr. 3. doi:10.1145/3573270 -
Privacy and Utility of Private Synthetic Data for Medical Data Analyses
Appenzeller, A.; Leitner, M.; Philipp, P.; Krempel, E.; Beyerer, J.
2022. Applied Sciences, 12 (23), Article no: 12320. doi:10.3390/app122312320 -
Decentralizing Watchtowers for Payment Channels using IPFS
Bonisch, H.; Grundmann, M.
2022. 2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW), 27–32, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICDCSW56584.2022.00015 -
On the Privacy–Utility Trade-Off in Differentially Private Hierarchical Text Classification
Wunderlich, D.; Bernau, D.; Aldà, F.; Parra-Arnau, J.; Strufe, T.
2022. Applied Sciences, 12 (21), Art.-Nr.: 11177. doi:10.3390/app122111177 -
CrossTest: a cross-domain physical testbed environment for cybersecurity performance evaluations
Karch, M.; Rösch, D.; André, K.; Meshram, A.; Haas, C.; Nicolai, S.
2022. 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA), 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA52439.2022.9921672 -
Early Detection of GOOSE Denial of Service (DoS) Attacks in IEC 61850 Substations
Elbez, G.; Nahrstedt, K.; Hagenmeyer, V.
2022. IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids 2022. doi:10.1109/SmartGridComm52983.2022.9961042 -
Modeling and Enforcing Access Control Policies for Smart Contracts
Töberg, J.-P.; Schiffl, J.; Reiche, F.; Beckert, B.; Heinrich, R.; Reussner, R.
2022. Conference Proceedings: 2022 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 38–47, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/DAPPS55202.2022.00013 -
Re-CorC-ing KeY: Correct-by-Construction Software Development Based on KeY
Bordis, T.; Cleophas, L.; Kittelmann, A.; Runge, T.; Schaefer, I.; Watson, B. W.
2022. The Logic of Software. A Tasting Menu of Formal Methods – Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday. Ed.: W. Ahrendt, 80–104, Springer International Publishing. doi:10.1007/978-3-031-08166-8_5 -
Cyber threat intelligence enabled automated attack incident response
Kaiser, F. K.; Andris, L.; Tenning, T.; Iser, J.; Wiens, M.; Schultmann, F.
2022. 2022 3rd International Conference on Next Generation Computing Applications (NextComp), IEEE, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NextComp55567.2022.9932254 -
Attuning Adaptation Rules via a Rule-Specific Neural Network
Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Proceedings. Vol. 3. Ed.: T. Margaria, 215–230, Springer Nature Switzerland. doi:10.1007/978-3-031-19759-8_14 -
Generalized Test Tables: A Domain-Specific Specification Language for Automated Production Systems
Beckert, B.; Ulbrich, M.; Vogel-Heuser, B.; Weigl, A.
2022. Theoretical Aspects of Computing – ICTAC 2022 – 19th International Colloquium, Tbilisi, Georgia, September 27–29, 2022, Proceedings. Ed.: H. Seidl, 7–13, Springer International Publishing. doi:10.1007/978-3-031-17715-6_2 -
Information Flow Control-by-Construction for an Object-Oriented Language
Runge, T.; Kittelmann, A.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. Software Engineering and Formal Methods – 20th International Conference, SEFM 2022, Berlin, Germany, September 26–30, 2022, Proceedings. Ed.: B.-H. Schlingloff, 209–226, Springer International Publishing. doi:10.1007/978-3-031-17108-6_13 -
A Model-Based Framework for Simplified Collaboration of Legal and Software Experts in Data Protection Assessments
Boltz, N.; Sterz, L.; Gerking, C.; Raabe, O.
2022. INFORMATIK 2022, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik. Ed.: D. Demmler, 521–532, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_44 -
Establishing a Benchmark Dataset for Traceability Link Recovery between Software Architecture Documentation and Models
Fuchß, D.; Corallo, S.; Keim, J.; Speit, J.; Koziolek, A.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151962 -
Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
Grundmann, M.; Amberg, H.; Baumstark, M.; Hartenstein, H.
2022. Financial Cryptography and Data Security – 26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers. Ed.: I. Eyal, 694–704, Springer International Publishing. doi:10.1007/978-3-031-18283-9_35 -
A Refactoring for Data Minimisation Using Formal Verification
Lanzinger, F.; Ulbrich, M.; Weigl, A.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 345–364, Springer Nature Switzerland. doi:10.1007/978-3-031-19756-7_19 -
Accurate Performance Predictions with Component-Based Models of Data Streaming Applications
Werle, D.; Seifermann, S.; Koziolek, A.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 83–98, Springer International Publishing. doi:10.1007/978-3-031-16697-6_6 -
Towards an integrated approach for managing the variability and evolution of both software and hardware components
Wittler, J. W.; Kühn, T.; Reussner, R.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference - Volume B Ed.: A. Felfernig, 94–98, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547059 -
Membership Inference Attack Against Principal Component Analysis
Zari, O.; Parra-Arnau, J.; Ünsal, A.; Strufe, T.; Önen, M.
2022. Privacy in Statistical Databases – International Conference, PSD 2022, Paris, France, September 21–23, 2022, Proceedings. Ed.: J. Domingo-Ferrer, 269–282, Springer International Publishing. doi:10.1007/978-3-031-13945-1_19 -
ARCHI4MOM: Using Tracing Information to Extract the Architecture of Microservice-Based Systems from Message-Oriented Middleware
Singh, S.; Werle, D.; Koziolek, A.
2022. Software Architecture : 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 189–204, Springer International Publishing. doi:10.1007/978-3-031-16697-6_14 -
Universally Composable Verifiable Random Oracles. master’s thesis
Scheurer, T.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151607 -
Individual Verifiability with Return Codes: Manipulation Detection Efficacy
Thürwächter, P. T.; Volkamer, M.; Kulyk, O.
2022. Electronic Voting – 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4–7, 2022, Proceedings. Ed.: R. Krimmer, 139–156, Springer International Publishing. doi:10.1007/978-3-031-15911-4_9 -
A Cross-Disciplinary Process Modelling Language for Validating Reconfigured Production Processes
Koch, S.; Wunderlich, T.; Hansert, J.; Schlegel, T.; Ihlenfeldt, S.; Heinrich, R.
2022. Modellierung 2022 : 27.06.-01.07.2022 Hamburg, Germany. Ed.: Matthias Riebisch, 181–190, Köllen Druck+Verlag. doi:10.18420/modellierung2022-004 -
Toward Awareness Creation of Common Challenges Women are Facing in Academia: A Study from a German Perspective
Corallo, S.; Mazkatli, M.; Rapp, M.; Hajiabadi, H.; Kaplan, A.; Kuehn, R.; Schmid, L.; Singh, S.
2022. Software Architecture – 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021, Revised Selected Papers. Ed.: P. Scandurra, 47–62, Springer International Publishing. doi:10.1007/978-3-031-15116-3_3 -
Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Security Gründen
Müllmann, D.; Veit, M. F.; Volkamer, M.
2022. Informatik 2022. Hrsg.: D. Demmler, 601–615, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_49 -
Synchronizing software variants: A two-dimensional approach
König, C.; Rosiak, K.; Linsbauer, L.; Schaefer, I.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference (SPLC ’22), Graz, A, 12.-16. September 2022. Ed.: A. Felfernig. Vol. B, 82–89, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547053 -
Architectural Optimization for Confidentiality Under Structural Uncertainty
Walter, M.; Hahner, S.; Seifermann, S.; Bures, T.; Hnetynka, P.; Pacovský, J.; Heinrich, R.
2022. Software Architecture : 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021 : Revised Selected Papers. Ed.: P. Scandurra, 309–332, Springer Nature Switzerland. doi:10.1007/978-3-031-15116-3_14 -
Grasping the Concept of Decentralized Systems for Instant Messaging
Gebhardt, L.; Leinweber, M.; Jacob, F.; Hartenstein, H.
2022. Proceedings of the 17th Workshop in Primary and Secondary Computing Education, Art.-Nr. 10, Association for Computing Machinery (ACM). doi:10.1145/3556787.3556864 -
Shoulder-Surfing Resistant Authentication for Augmented Reality
Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Nordic Human Computer Interaction Conference (NordiCHI ’22), Art.Nr. 29, ACM Digital Library. doi:10.1145/3546155.3546663 -
Increasing security without decreasing usability: A comparison of various verifiable voting systems
Volkamer, M.; Kulyk, O.; Ludwig, J.; Fuhrberg, N.
2022. Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS 2022), Boston, MA, August 8-9, 2022, 233–252, USENIX Association -
A Taxonomy for Design Decisions in Software Architecture Documentation
Keim, J.; Hey, T.; Sauer, B.; Koziolek, A.
2022. doi:10.5445/IR/1000149966 -
Towards Heterogeneous Remote Attestation Protocols
Wagner, P. G.; Beyerer, J.
2022. Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT. Vol. 1. Ed.: S. De Capitani di Vimercati, 586–591, SciTePress. doi:10.5220/0011289000003283 -
Feature-based Investigation of Simulation Structure and Behaviour
Koch, S.; Hamann, E.; Heinrich, R.; Reussner, R.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 178–185, Springer. doi:10.1007/978-3-031-16697-6_13 -
Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks
Borcherding, A.; Takacs, P.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy, 334–344, SciTePress. doi:10.5220/0010806300003120 -
Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks
Borcherding, A.; Feldmann, L.; Karch, M.; Meshram, A.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, 314–325, SciTePress. doi:10.5220/0010795900003120 -
The Karlsruhe Java Verification Suite
Klamroth, J.; Lanzinger, F.; Pfeifer, W.; Ulbrich, M.
2022. The Logic of Software. A Tasting Menu of Formal Methods – Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday. Ed.: W. Ahrendt, 290–312, Springer International Publishing. doi:10.1007/978-3-031-08166-8_14 -
Anonymizing Trajectory Data: Limitations and Opportunities
Guerra-Balboa, P.; Miranda-Pascual, À.; Strufe, T.; Parra-Arnau, J.; Forné, J.
2022. AAAI Workshop on Privacy-Preserving Artificial Intelligence -
MPER - a Motion Profiling Experiment and Research system for human body movement
Rettlinger, S.; Knaus, B.; Wieczorek, F.; Ivakko, N.; Hanisch, S.; Nguyen, G. T.; Strufe, T.; Fitzek, F. H. P.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy, 21-25 March 2022, 88–90, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767484 -
Conceptualization of a Trust Dashboard for Distributed Usage Control Systems
Wagner, P. G.
2022. Proceedings of the 2021 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory, 169–188, Karlsruher Institut für Technologie (KIT) -
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays
Duezguen, R.; Noah, N.; Mayer, P.; Das, S.; Volkamer, M.
2022. International Conference on Availability, Reliability and Security, ARES 2022, August 23 - August 26, 2022, Vienna, Austria, Art.-No.: 36, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539011 -
Trustworthy Artificial Intelligence
Becker, M.
2022. Proceedings of the 2021 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory, 21–32, Karlsruher Institut für Technologie (KIT) -
Leveraging Distributed Ledger Technology for Decentralized Mobility-as-a-Service Ticket Systems
Leinweber, M.; Kannengießer, N.; Hartenstein, H.; Sunyaev, A.
2022. Towards the New Normal in Mobility : Technische und betriebswirtschaftliche Aspekte. Hrsg.: H. Proff, 547–567, Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-39438-7_32 -
Decentralized Review and Attestation of Software Attribute Claims
Stengele, O.; Westermeyer, C.; Hartenstein, H.
2022. IEEE Access, 10, 66694–66710. doi:10.1109/ACCESS.2022.3185046 -
Your Cookie Disclaimer is not in line with the ideas of the GDPR. Why?
Hennig, A.; Dietmann, H.; Lehr, F.; Mutter, M.; Volkamer, M.; Mayer, P.
2022. Human Aspects of Information Security and Assurance. Ed.: N. Clarke, 218–227, Springer-Verlag. doi:10.1007/978-3-031-12172-2_17 -
Supplementary Material for the Evaluation of the Publication – A Layered Reference Architecture for Model-based Quality Analysis
Koch, S.; Heinrich, R.; Reussner, R.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000146803/v2 -
BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots
Bayreuther, S.; Jacob, F.; Grotz, M.; Kartmann, R.; Peller-Konrad, F.; Paus, F.; Hartenstein, H.; Asfour, T.
2022. SACMAT ’22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesJune 2022, New York NY USA, June 8 - 10, 2022. Ed.: S. Dietrich, 185–194, Association for Computing Machinery (ACM). doi:10.1145/3532105.3535018 -
Introducing an Evaluation Method for Taxonomies
Kaplan, A.; Kühn, T.; Hahner, S.; Benkler, N.; Keim, J.; Fuchß, D.; Corallo, S.; Heinrich, R.
2022. Association for Computing Machinery (ACM). doi:10.5445/IR/1000145968 -
Introducing an Evaluation Method for Taxonomies
Kaplan, A.; Kühn, T.; Hahner, S.; Benkler, N.; Keim, J.; Fuchß, D.; Corallo, S.; Heinrich, R.; Corallo, S.; Heinrich, R.
2022. EASE 2022: The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 311–316, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535305 -
Quantifying Trustworthiness in Decentralized Trusted Applications
Wagner, P. G.; Beyerer, J.
2022. Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (Sat-CPS’22), 67–76, Association for Computing Machinery (ACM). doi:10.1145/3510547.3517930 -
PREUNN: Protocol Reverse Engineering using Neural Networks
Kiechle, V.; Börsig, M.; Nitzsche, S.; Baumgart, I.; Becker, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy. Ed.: P. Mori. Vol. 1, 345–356, SciTePress. doi:10.5220/0010813500003120 -
Die Regulierungsperspektive von KI/BigData in der Wissenschaft
Spiecker genannt Döhmann, I.
2022. Künstliche Intelligenz in der Forschung. Hrsg.: C.F. Gethmann, 147–172, Springer-Verlag. doi:10.1007/978-3-662-63449-3_6 -
Modelling and Enforcing Access Control Requirements for Smart Contracts. master’s thesis
Töberg, J.-P.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000144204 -
Standing out among the daily spam: How to catch website owners’ attention by means of vulnerability notifications
Hennig, A.; Neusser, F.; Pawelek, A. A.; Herrmann, D.; Mayer, P.
2022. Conference on Human Factors in Computing Systems (CHI ’22) : Extended Abstracts, Art.-Nr.: 317, Association for Computing Machinery (ACM). doi:10.1145/3491101.3519847 -
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
Beskorovajnov, W.; Gröll, R.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing. doi:10.1007/978-3-030-97131-1_11 -
SMILE - Smart eMaIl Link Domain Extractor
Mossano, M.; Berens, B.; Heller, P.; Beckmann, C.; Aldag, L.; Mayer, P.; Volkamer, M.
2022. Computer Security. ESORICS 2021 International Workshops – CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers. Ed.: S. Katsikas, 403–412, Springer International Publishing. doi:10.1007/978-3-030-95484-0_23 -
Sovereign Digital Consent through Privacy Impact Quantification and Dynamic Consent
Appenzeller, A.; Hornung, M.; Kadow, T.; Krempel, E.; Beyerer, J.
2022. Technologies, 10 (1), Article no: 35. doi:10.3390/technologies10010035 -
Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings
Byrenheid, M.; Roos, S.; Strufe, T.
2022. doi:10.5445/IR/1000143139 -
Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings
Byrenheid, M.; Roos, S.; Strufe, T.
2022. ICDCN ’22: Proceedings of the 2022 International Conference on Distributed Computing and Networking ; Jan 4th-7th, 2022, Virtual Conference, 107–116, Association for Computing Machinery (ACM). doi:10.1145/3491003.3491020 -
Recent Developments in the Context of Online Elections and Digital Polls in Germany
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_16 -
Research Opportunities in Evidence-Based Elections
Benaloh, J.; Stark, P. B.; Teague, V.; Volkamer, M.; Wallach, D.
2022. Computing Research Association (CRA) -
Dos and Don’ts of Machine Learning in Computer Security
Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2022. Proc. of the USENIX Security Symposium 2022 -
Towards a Formal Approach for Data Minimization in Programs (Short Paper)
Lanzinger, F.; Weigl, A.
2022. Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers. Ed.: J. Garcia-Alfaro, 161–169, Springer International Publishing. doi:10.1007/978-3-030-93944-1_11 -
Tackling Challenges of Robustness Measures for Autonomous Agent Collaboration in Open Multi-Agent Systems
Jin, D.; Kannengießer, N.; Sturm, B.; Sunyaev, A.
2022. Proceedings of the 55th Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, 03.01.2022-07.01.2022, 7585–7594. doi:10.24251/HICSS.2022.911 -
Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass
Renaud, K.; Volkamer, M.; Mayer, P.; Grimm, R.
2021. AIS transactions on human-computer interaction, 13 (4), 407–430. doi:10.17705/1thci.00155 -
ETHTID: Deployable Threshold Information Disclosure on Ethereum
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BCCA53669.2021.9657019 -
Architecture Matters: Investigating the Influence of Differential Privacy on Neural Network Design
Morsbach, F.; Dehling, T.; Sunyaev, A.
2021. Presented at NeurIPS 2021 Workshop on Privacy in Machine Learning (PriML 2021), 14.12.2021. doi:10.48550/arXiv.2111.14924 -
Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites
Krisam, C.; Dietmann, H.; Volkamer Melanie; Kulyk, O.
2021. EuroUSEC ’21: European Symposium on Usable Security 2021, Karlsruhe Germany, October 11 - 12, 2021, 8 S., Association for Computing Machinery (ACM). doi:10.1145/3481357.3481516 -
LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems
Kühnapfel, N.; Preußler, S.; Noppel, M.; Schneider, T.; Rieck, K.; Wressnegger, C.
2021. Proceedings of 37th Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 6-10, 2021, 796–811, Association for Computing Machinery (ACM). doi:10.1145/3485832.3485911 -
Need for Change: Business Functions Affected by the Use of Decentralized Information Systems
Heines, R.; Kannengießer, N.; Sturm, B.; Jung, R.; Sunyaev, A.
2021. 42nd International Conference on Information Systems (ICIS), Association for Information Systems (AIS) -
Table-based formal specification approaches for control engineers—empirical studies of usability
Cha, S.; Vogel-Heuser, B.; Weigl, A.; Ulbrich, M.; Beckert, B.
2021. IET Cyber-Physical Systems: Theory and Applications, 64, 193–207. doi:10.1049/cps2.12017 -
Security Engineering of Patient-Centered Health Care Information Systems in Peer-to-Peer Environments: Systematic Review
Yari, I. A.; Dehling, T.; Kluge, F.; Geck, J.; Sunyaev, A.; Eskofier, B.
2021. Journal of Medical Internet Research, 23 (11), e24460. doi:10.2196/24460 -
Side-Channel Attacks on Query-Based Data Anonymization
Boenisch, F.; Munz, R.; Tiepelt, M.; Hanisch, S.; Kuhn, C.; Francis, P.
2021. CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 1254–1265, Association for Computing Machinery (ACM). doi:10.1145/3460120.3484751 -
ConTra Corona : Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
Beskorovajnov, W.; Dörre, F.; Hartung, G.; Koch, A.; Müller-Quade, J.; Strufe, T.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139714 -
NoPhish-Challenge-Karten – Evaluation in der Praxis
Aldag, L.; Berens, B.; Burgdorf, M.; Lorenz, A.; Thiery, M.-C.; Volkamer, M.
2021. Datenschutz und Datensicherheit - DuD, 45 (11), 721–726. doi:10.1007/s11623-021-1523-1 -
Coupling Smart Contracts: A Comparative Case Study
Friebe, S.; Stengele, O.; Hartenstein, H.; Zitterbart, M.
2021. 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 27-30 Sept. 2021, 137–144, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BRAINS52497.2021.9569830 -
Usable Verifiable Secrecy-Preserving E-Voting
Kulyk, O.; Ludwig, J.; Volkamer, M.; Koenig, R. E.; Locher, P.
2021. 6th Joint International Conference on Electronic Voting, E-Vote-ID 2021, 5-8 October 2021. Ed.: R. Krimmer ; M. Volkamer, 337–353, University of Tartu Press -
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
Broadnax, B.; Koch, A.; Mechler, J.; Müller, T.; Müller-Quade, J.; Nagel, M.
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338. doi:10.2478/popets-2021-0072 -
Datenschutz durch Technikgestaltung und unternehmerische Strategie in der Digitalwirtschaft - Verhaltenssteuernde Elemente der DSGVO im Licht einer spieltheoretischen Analyse am Beispiel von Art. 25 Abs. 1 Recht und Technik Datenschutz im Diskurs im Rahmen der GI-Jahrestagung
Winau, M.; Kaiser, F.; Wiens, M.; Schultmann, F.; Spiecker gen. Döhmann, I.
2021, September 27. 51. INFORMATIK 2021 - Jahrestagung der Gesellschaft für Informatik (2021), Online, September 27–October 1, 2021 -
Datenschutzrechtliche Aspekte neuer Mobilitätskonzepte im Öffentlichen Nahverkehr
Bretthauer, S.; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Nomos Verlagsgesellschaft -
Design Space Evaluation for Confidentiality under Architectural Uncertainty. bachelor’s thesis
Liu, O.
2021, September 10. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139590 -
Aktuelle Entwicklungen im Kontext von Online-Wahlen und digitalen Abstimmungen
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
2021. doi:10.5445/IR/1000137300 -
Privacy-Protecting Techniques for Behavioral Data: A Survey
Hanisch, S.; Arias-Cabarcos, P.; Parra-Arnau, J.; Strufe, T.
2021. arxiv. doi:10.5445/IR/1000139989 -
Aspect-Oriented Adaptation of Access Control Rules
Bures, T.; Gerostathopoulos, I.; Hnetynka, P.; Seifermann, S.; Walter, M.; Heinrich, R.
2021. 2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 363–370, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA53835.2021.00054 -
How to Increase Smart Home Security and Privacy Risk Perception
Duezguen, R.; Mayer, P.; Berens, B.; Beckmann, C.; Aldag, L.; Mossano, M.; Volkamer, M.; Strufe, T.
2021. 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 18 - 20 Augus 2021, Shenyang, China, 997–1004, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom53373.2021.00138 -
Die EU als Trendsetter weltweiter KI-Regulierung: Der Kommissionsentwurf für eine KI-Verordnung der EU
Ebert, A.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (16), 1188–1193 -
"Now I’m a bit angry:" Individuals’ Awareness, Perception, and Responses to Data Breaches that Affected Them
Mayer, P.; Zou, Y.; Schaub, F.; Aviv, A. J.
2021. 30th USENIX Security Symposium, Vancouver, CDN, August 11-13, 2021, 393–410, Advanced Computing Systems Association (USENIX) -
On the Security of IIoT Deployments: An Investigation of Secure Provisioning Solutions for OPC UA
Kohnhäuser, F.; Meier, D.; Patzer, F.; Finster, S.
2021. IEEE access, 9, 99299–99311. doi:10.1109/ACCESS.2021.3096062 -
A Literature Review on Virtual Reality Authentication
Jones, J. M.; Duezguen, R.; Mayer, P.; Volkamer, M.; Das, S.
2021. Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Ed.: S. Furnell, 189–198, Springer. doi:10.1007/978-3-030-81111-2_16 -
A Hitchhiker’s Guide to Model-Driven Engineering for Data-Centric Systems
Combemale, B.; Kienzle, J.; Mussbacher, G.; Ali, H.; Amyot, D.; Bagherzadeh, M.; Batot, E.; Bencomo, N.; Benni, B.; Bruel, J.-M.; Cabot, J.; Cheng, B. H. C.; Collet, P.; Engels, G.; Heinrich, R.; Jezequel, J.-M.; Koziolek, A.; Mosser, S.; Reussner, R.; Sahraoui, H.; Saini, R.; Sallou, J.; Stinckwich, S.; Syriani, E.; Wimmer, M.
2021. IEEE software, 38 (4), 71–84. doi:10.1109/MS.2020.2995125 -
Security in Distributed Ledger Technology: An Analysis of Vulnerabilities and Attack Vectors
Gojka, E.-E.; Kannengießer, N.; Sturm, B.; Bartsch, J.; Sunyaev, A.
2021. Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 3. Ed.: K. Arai, 722–742, Springer. doi:10.1007/978-3-030-80129-8_50 -
Generative Machine Learning for Resource-Aware 5G and IoT Systems
Piatkowski, N.; Mueller-Roemer, J. S.; Hasse, P.; Bachorek, A.; Werner, T.; Birnstill, P.; Morgenstern, A.; Stobbe, L.
2021. 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada, 14-23 June 2021, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCWorkshops50388.2021.9473625 -
Ansatzpunkte für eine Stärkung digitaler Pandemiebekämpfung
Druschel, P.; Federrath, H.; Hansen, M.; Lehr, T.; Lengauer, T.; Meyer-Hermann, M.; Munzert, S.; Priesemann, V.; Roemheld, L.; Schmidt, A.; Schölkopf, B.; Simon, J.; Spiecker gen. Döhmann, I.; Teichert, U.; Woopen, C.
2021. Deutsche Akademie der Naturforscher Leopoldina e. V. doi:10.26164/leopoldina_03_00354 -
Towards Correct Smart Contracts: A Case Study on Formal Verification of Access Control
Schiffl, J.; Grundmann, M.; Leinweber, M.; Stengele, O.; Friebe, S.; Beckert, B.
2021. SACMAT ’21: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 125–130, Association for Computing Machinery (ACM). doi:10.1145/3450569.3463574 -
Towards extraction of message-based communication in mixed-technology architectures for performance model
Singh, S.; Kirschner, Y. R.; Koziolek, A.
2021. ICPE ’21: Companion of the ACM/SPEC International Conference on Performance Engineering, 133–138, Association for Computing Machinery (ACM). doi:10.1145/3447545.3451201 -
Ein Netzwerk für Europas Cybersicherheit
Wintzingerode, C. von; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (10), 690–695 -
Adversarial Robust Model Compression using In-Train Pruning
Vemparala, M. R.; Fasfous, N.; Frickenstein, A.; Sarkar, S.; Zhao, Q.; Kuhn, S.; Frickenstein, L.; Singh, A.; Unger, C.; Nagaraja, N. S.; Wressnegger, C.; Stechele, W.
2021. CVPR 3rd Workshop on Safe Artificial Intelligence for Automated Driving (SAIAD), June 19, 2021, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CVPRW53098.2021.00016 -
A Layered Reference Architecture for Metamodels to Tailor Quality Modeling and Analysis
Heinrich, R.; Strittmatter, M.; Reussner, R. H.
2021. IEEE transactions on software engineering, 47 (4), 775–800. doi:10.1109/TSE.2019.2903797 -
Vorsicht vor Betrügern im Internet - Was beim Kauf von Corona-Schnelltests im Netz zu beachten ist
Volkamer, M.; Mayer, P.; Hennig, A.
2021, March 8 -
Security Sensibilisierung für Beschäftigte. Empfehlungen für Informationssicherheitsbeauftragte
Volkamer, M.; Bachmann, B.
2021, March -
Dealing with Uncertainty in Architectural Confidentiality Analysis
Hahner, S.
2021. Proceedings of the Software Engineering 2021 Satellite Events, 1–6, Gesellschaft für Informatik (GI) -
Datensouveränität für Patienten im Gesundheitswesen
Bretthauer, S.; Appenzeller, A.; Birnstill, P.
2021. Datenschutz und Datensicherheit, 45 (3), 173–179. doi:10.1007/s11623-021-1413-6 -
Insights on Data Sensitivity from the Technical, Legal and the Users’ Perspectives — Practical suggestions on how to raise more awareness for the assumed exercise of informational self-determination
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Computer law review international, 22 (1), 8–15. doi:10.9785/cri-2021-220103 -
Sicher durchs Internet - Aktionen der Forschungsgruppe SECUSO zum Safer Internet Day am 9. Februar 2021
Volkamer, M.; Hennig, A.
2021, February 9 -
Mitarbeiter Security Sensibilisierung - Empfehlung für Informationssicherheitsbeauftragte
Volkamer, M.; Bachmann, B.
2021, February 9 -
Ein neues "Datenkartellrecht" zum Schutz der informationellen Selbstbestimmung im Markt der sozialen Plattformen?
Steinbrück, A.; Wiens, M.; Birnstill, P.; Kaiser, F.; Zander, T.; Raabe, O.; Schultmann, F.; Volkamer, M.
2021. Recht der Datenverarbeitung, 37 (1), 7–13 -
Challenges in the Evolution of Palladio—Refactoring Design Smells in a Historically-Grown Approach to Software Architecture Analysis
Heinrich, R.; Henss, J.; Koch, S.; Reussner, R.
2021. Composing Model-Based Analysis Tools. Ed.: R. Heinrich, 235–257, Springer International Publishing. doi:10.1007/978-3-030-81915-6_11 -
Integration and Orchestration of Analysis Tools
Heinrich, R.; Bousse, E.; Koch, S.; Rensink, A.; Riccobene, E.; Ratiu, D.; Sirjani, M.
2021. Composing Model-Based Analysis Tools. Ed.: R. Heinrich, 71–95, Springer International Publishing. doi:10.1007/978-3-030-81915-6_5 -
Preface to the 3rd Multi-Paradigm Modeling for Cyber-Physical Systems (MPM4CPS 2021)
Amrani, M.; Blouin, D.; Challenger, M.; Deantoni, J.; Heinrich, R.; Wimmer, M.
2021. 24th International Conference on Model-Driven Engineering Languages and Systems: MODELS 2021 ; 10-15 October 2021, Virtual Event, 284–285, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C53483.2021.00049 -
Towards the Co-Evolution of Models and Artefacts of Industrial Tools Through External Views
Sağlam, T.; Kühn, T.
2021. 2021 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Fukuoka, J, October 10-15, 2021, 410–416, IEEEXplore. doi:10.1109/MODELS-C53483.2021.00064 -
Tactile computing: Essential building blocks for the Tactile Internet
Aßmann, U.; Baier, C.; Dubslaff, C.; Grzelak, D.; Hanisch, S.; Hartono, A. P. P.; Köpsell, S.; Lin, T.; Strufe, T.
2021. Tactile Internet. Ed.: F. H.P. Fitzek, 293–317, Academic Press. doi:10.1016/B978-0-12-821343-8.00025-3 -
Onion Routing with Replies
Kuhn, C.; Hofheinz, D.; Rupp, A.; Strufe, T.
2021. Advances in Cryptology – ASIACRYPT 2021 – 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 573–604, Springer International Publishing. doi:10.1007/978-3-030-92075-3_20 -
Black-Box Accumulation Based on Lattices
Faller, S. H.; Baumer, P.; Klooß, M.; Koch, A.; Ottenhues, A.; Raiber, M.
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer. doi:10.1007/978-3-030-92641-0_11 -
Angriffserkennungssysteme in ICS Netzwerken
Kippe, J.; Karch, M.
2021. Deutschland, Digital, Sicher : 30 Jahre BSI : Tagungsband zum 17. Deutschen IT-Sicherheitskongress, 1–11, SecuMedia Verlag -
A Secure Cell-Attachment Procedure of LDACS
Maurer, N.; Graupl, T.; Gentsch, C.; Guggemos, T.; Tiepelt, K. M.; Schmitt, C.; Rodosek, G. D.
2021. Proceedings 2021 IEEE European Symposium on Security and Privacy Workshops, EuroS&PW 2021: Virtual Conference, 6-10 September 2021, 113–122, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW54576.2021.00019 -
Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance
Arias-Cabarcos, P.; Habrich, T.; Becker, K.; Becker, C.; Strufe, T.
2021. Proceedings of the 30th USENIX Security Symposium : August 11-13, 2021, 55–72, USENIX Association -
2PPS – Publish/Subscribe with Provable Privacy
Abdelwahab Gaballah, S.; Coijanovic, C.; Strufe, T.; Mühlhäuser, M.
2021. 40th International Symposium on Reliable Distributed Systems (SRDS), Chicago, IL, USA, 20-23 Sept. 2021. Vol.: 1, 198–209, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SRDS53918.2021.00028 -
On Expected Polynomial Runtime in Cryptography
Klooß, M.
2021. Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 558–590, Springer International Publishing. doi:10.1007/978-3-030-90459-3_19 -
Classifying and Avoiding Compatibility Issues in Networks of Bidirectional Transformations
Sağlam, T.; Klare, H.
2021. STAF 2021 Workshop Proceedings: 9th International Workshop on Bidirectional Transformations. Hrsg.: Ludovico Lovino, Lars Michael Kristensen, 34–53, CEUR-WS.org -
Tackling Problems of Maintenance and Evolution in Industry 4.0 Scenarios Using a Distributed Architecture
Koch, S.; Wunderlich, T.; Hansert, J.; Heinrich, R.; Schlegel, T.
2021. SE-SE 2021 - Software Engineering 2021 Satellite Events - Workshops and Tools & Demos - Proceedings of the Software Engineering 2021 Satellite Events, Braunschweig/Virtual, Germany, February 22 - 26, 2021. Ed.: S. Götz, CEUR-WS -
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions
Broadnax, B.; Mechler, J.; Müller-Quade, J.
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25 -
Identifying confidentiality violations in architectural design using palladio
Seifermann, S.; Walter, M.; Hahner, S.; Heinrich, R.; Reussner, R.
2021. W. D. W. D. Heinrich R. Mirandola R. (Ed.), 15th European Conference on Software Architecture - Companion, ECSA-C 2021, Virtual, Online, 13 September 2021 through 17 September 2021. Ed.: R. Heinrich, Code 172547, CEUR-WS.org -
Deductive Verification of Floating-Point Java Programs in KeY
Abbasi, R.; Schiffl, J.; Darulova, E.; Ulbrich, M.; Ahrendt, W.
2021. Tools and Algorithms for the Construction and Analysis of Systems : 27th International Conference, TACAS 2021, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021, Luxembourg City, Luxembourg, March 27 – April 1, 2021, Proceedings, Part II. Ed.: J. F. Groote, 242–261, Springer International Publishing. doi:10.1007/978-3-030-72013-1_13 -
Buchbesprechung Digitalisierung im Sozialrecht, Bundestagung des Deutschen Sozialrechtsverbandes e.V., 10/11. Oktober 2019 in Stuttgart, 2020
Spiecker gen. Döhmann, I.
2021. Vierteljahresschrift für Sozial- und Arbeitsrecht, 39 (3), 249–251, Carl Heymanns Verlag -
Herausforderungen der Digitalisierung im Gesundheitswesen Corona-Warn-App, Forschungsdaten und Künstliche Intelligenz
Bretthauer, S.
2021. Die Verwaltung, 54 (3), 411–441 -
Befugnisse des Staates nach dem Infektionsschutzgesetz
Bretthauer, S.
2021. Religionsfreiheit in Seuchenzeiten. Hrsg.: S. Mückl, 61–83, Duncker & Humblot -
Online-Wahlen zu Parlamenten als modernes Instrument demokratischer Partizipation in Zeiten von Pandemie und Digitalisierung
Bretthauer, S.
2021. Kritische Vierteljahresschrift für Gesetzgebung und Rechtswissenschaft, 104 (1), 3–33. doi:10.5771/2193-7869-2021-1-3 -
§ 23: Informationsverwaltung
Spiecker gen. Döhmann, I.
2021. Handbuch des Verwaltungsrechts. Hrsg.: W. Kahl. Bd. 1, 891–938, C.F. Müller -
The legal framework for access to data from a data protection viewpoint - especially under GDPR
Spiecker gen. Döhmann, I.
2021. Data Access, Consumer Interests and Public Welfare, 175–208, Nomos Verlagsgesellschaft. doi:10.5771/9783748924999-175 -
Effective Notification Campaigns on the Web : A matter of Trust, Framing, and Support
Maass, M.; Stöver, A.; Pridöhl, H.; Bretthauer, S.; Herrmann, D.; Hollick, M.; Spiecker gen. Döhmann, I.
2021. Proceedings of the 30th USENIV Security Symposium, 2489–2506, USENIX Association -
Governance im lernenden Gesundheitssystem : Anforderungen an eine gesamtheitliche Steuerung von Plattformen
Spiecker gen. Döhmann, I.
2021. Perspektive Gesundheit 2030. Hrsg.: J. Baas, 45–53, Medizinisch Wissenschaftliche Verlagsgesellschaft mbH & Co. KG (MWV) -
Recht und Technik: Datenschutz im Diskurs
Grimm, R.; Hornung, G.; Sorge, C.; Spiecker gen. Döhmann, I.
2021. Informatik 2020: Fachtagung vom 28. September–2. Oktober 2020 Karlsruhe. Hrsg.: R. H. Reussner, 813–814, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_72 -
Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis
Patzer, F.; Beyerer, J.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Hrsg:. Paolo Mori, Gabriele Lenzini, Steven Furnell, 550–557, SciTePress. doi:10.5220/0010285305500557 -
Scalability and Precision by Combining Expressive Type Systems and Deductive Verification
Lanzinger, F.; Weigl, A.; Ulbrich, M.; Dietl, W.
2021. Proceedings of the ACM on programming languages, 5 (OOPSLA), Article no: 143. doi:10.1145/3485520 -
Staatliche oder private Algorithmenregulierung?
Spiecker gen. Döhmann, I.
2021. Bitburger Gespräche : Jahrbuch 2020. Hrsg. von der Stiftung Gesellschaft für Rechtspolitik, Trier und dem Institut für Rechtspolitik an der Universität Trier, 37–57, Beck -
Section II: Health protection and personal data protection in selected Member States, The impact of EU Regulation 2016/679 on the German health system
Spiecker gen. Döhmann, I.
2021. The protection of personal data concerning health at the European level: a comparative analysis. Ed.: G. Fares, 83–100, G. Giapichelli -
§ 4 HDSIG - Videoüberwachung öffentlich zugänglicher Räume
Spiecker gen. Döhmann, I.
2021. Hessisches Datenschutz- und Informationsfreiheitsgesetz. Hrsg.: A. Roßnagel, 107–117, Nomos Verlagsgesellschaft -
§ 24 Europäisches Datenschutzrecht
Spiecker gen. Döhmann, I.; Benecke, A.
2021. Verwaltungsrecht der Europäischen Union. Hrsg.: J. Tierhechte, Nomos Verlagsgesellschaft -
A Step Towards Global Counterfactual Explanations: Approximating the Feature Space Through Hierarchical Division and Graph Search
Becker, M.; Burkart, N.; Birnstill, P.; Beyerer, J.
2021. Advances in Artificial Intelligence and Machine Learning, 1 (2), 90–110. doi:10.54364/aaiml.2021.1107 -
Architectural Access Control Policy Refinement and Verification under Uncertainty
Hahner, S.
2021. Companion Proceedings of the 15th European Conference on Software Architecture, RWTH Aachen -
Tricks von Website-Betreibern, um Ihre Einwilligung zum Sammeln und Auswerten von Nutzerdaten über Cookies zu erhalten
Dietmann, H.; Krisam, C.; Volkamer, M.; Lehr, F.
2021 -
On Forging SPHINCS-Haraka Signatures on a Fault-Tolerant Quantum Computer
Berger, R. M.; Tiepelt, M.
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing. doi:10.1007/978-3-030-88238-9_3 -
Electronic Voting: 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5–8, 2021: proceedings
Krimmer, R.; Volkamer, M.; Duenas-Cid, D.; Kulyk, O.; Rønne, P.; Solvak, M.; Germann, M. (Eds.)
2021. Springer Nature. doi:10.1007/978-3-030-86942-7 -
Trace Link Recovery for Software Architecture Documentation
Keim, J.; Schulz, S.; Fuchß, D.; Kocher, C.; Speit, J.; Koziolek, A.
2021. Software Architecture: 15th European Conference, ECSA 2021, Virtual Event, Sweden, September 13-17, 2021, Proceedings. Ed.: S. Biffl, 101–116, Springer-Verlag. doi:10.1007/978-3-030-86044-8_7 -
Plausible Deniability for Anonymous Communication
Kuhn, C.; Noppel, M.; Wressnegger, C.; Strufe, T.
2021. Proceedings of 20th Workshop on Privacy in the Electronic Society (WPES), Seoul, South Korea, November 15, 2021, 17–32, Association for Computing Machinery (ACM). doi:10.1145/3463676.3485605 -
Putting Privacy into Perspective – Comparing Technical, Legal, and Users’ View of Information Sensitivity
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Informatik 2020 - Back to the future : 50. Jahrestagung der Gesellschaft für Informatik vom 28. September - 2. Oktober 2020, virtual. Ed.: R.H. Reussner, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_76 -
Reconstructing z3 proofs in KeY: There and back again
Pfeifer, W.; Schiffl, J.; Ulbrich, M.
2021. Proceedings of the 23rd ACM International Workshop on Formal Techniques for Java-like Programs : 23rd ACM International Workshop on Formal Techniques for Java-Like Programs, FTfJP 2021, co-located with ECOOP/ISSTA 2021, Online, 13 July 2021 - null, 24–31, Association for Computing Machinery (ACM). doi:10.1145/3464971.3468421 -
Secure and privacy-respecting documentation for interactive manufacturing and quality assurance
Wagner, P. G.; Lengenfelder, C.; Holzbach, G.; Becker, M.; Birnstill, P.; Voit, M.; Bejhad, A.; Samorei, T.; Beyerer, J.
2021. Applied Sciences (Switzerland), 11 (16), Art.-Nr.: 7339. doi:10.3390/app11167339 -
Challenges in aligning enterprise application architectures to business process access control requirements in evolutional changes
Pilipchuk, R.; Seifermann, S.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 18th International Conference on e-Business, ICE-B 2021, Virtual, Online, 7 July 2021 - 9 July 2021, 13–24, SciTePress. doi:10.5220/0010511800130024 -
A unified model to detect information flow and access control violations in software architectures
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2021. Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, Virtual, Online, 6 July 2021 - 8 July 2021, 26–37, SciTePress. doi:10.5220/0010515300260037 -
Vision: What Johnny learns about Password Security from Videos posted on YouTube
Christmann, M.; Mayer, P.; Volkamer, M.
2021. European Symposium on Usable Security (EuroUSEC), 11 - 12 Oktober 2021, 124–128, Association for Computing Machinery (ACM). doi:10.1145/3481357.3481528 -
How to Effectively Communicate Benefits of Introducing a Modern Password Policy to Employees in Companies
Christmann, M.; Mayer, P.; Volkamer, M.
2021. Eighteenth Symposium on Usable Privacy and Security, August 7–9, 2022, Boston, MA, USA -
Evaluation der interaktiven NoPhish Präsenzschulung
Berens, B.; Aldag, L.; Volkamer, M.
2021. Mensch und Computer 2021 - Workshopband. Hrsg.: C. Wienrich, Gesellschaft für Informatik (GI). doi:10.18420/muc2021-mci-wsc-394 -
A classification for managing software engineering knowledge
Kaplan, A.; Walter, M.; Heinrich, R.
2021. EASE 2021: Evaluation and Assessment in Software Engineering. Ed.: R. Chitchyan, 340–346, Association for Computing Machinery (ACM). doi:10.1145/3463274.3463357 -
Classifying Usage Control and Data Provenance Architectures
Wagner, P. G.
2021. Proceedings of the 2020 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer; T. Zander, 135–154, KIT Scientific Publishing -
Multi-paradigm modelling for cyber–physical systems: a descriptive framework
Amrani, M.; Blouin, D.; Heinrich, R.; Rensink, A.; Vangheluwe, H.; Wortmann, A.
2021. Software and Systems Modeling, 20, 611–639. doi:10.1007/s10270-021-00876-z -
Modeling Data Flow Constraints for Design-Time Confidentiality Analyses
Hahner, S.; Seifermann, S.; Heinrich, R.; Walter, M.; Bures, T.; Hnetynka, P.
2021. Proceedings IEEE 18th International Conference on Software Architecture - Companion: ICSA-C 2021 ; 22 - 26 March 2021 ; virtual conference, 15–21, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C52384.2021.00009 -
Enabling Consistency between Software Artefacts for Software Adaption and Evolution
Monschein, D.; Mazkatli, M.; Heinrich, R.; Koziolek, A.
2021. Proceedings IEEE 18th International Conference on Software Architecture: 22-26 March 2021 ; virtual conference, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA51549.2021.00009 -
TagVet: Vetting Malware Tags using Explainable Machine Learning
Pirch, L.; Warnecke, A.; Wressnegger, C.; Rieck, K.
2021. EuroSec ’21: Proceedings of the 14th European Workshop on Systems Security, 34–40, Association for Computing Machinery (ACM). doi:10.1145/3447852.3458719 -
Human Factors in Security
Berens, B.; Ghiglieri, M.; Kulyk, O.; Mayer, P.; Volkamer, M.
2021. Sicherheitskritische Mensch-Computer-Interaktion. Hrsg.: C. Reuter, 89–110, Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-32795-8_5 -
A Multivariate Characterization and Detection of Software Performance Antipatterns
Avritzer, A.; Britto, R.; Trubiani, C.; Russo, B.; Janes, A.; Camilli, M.; Van Hoorn, A.; Heinrich, R.; Rapp, M.; Henß, J.
2021. ICPE ’21: Proceedings of the ACM/SPEC International Conference on Performance Engineering, 19-23 April 2021, Rennes, France (virtual), 61–72, Association for Computing Machinery (ACM). doi:10.1145/3427921.3450246 -
Finding a Universal Execution Strategy for Model Transformation Networks
Gleitze, J.; Klare, H.; Burger, E.
2021. Fundamental Approaches to Software Engineering. Ed.: E. Guerra, 87–107, Springer International Publishing. doi:10.1007/978-3-030-71500-7_5 -
A Practical Evaluation Method for Misbehavior Detection in the Presence of Selfish Attackers
Wehmer, M.; Baumgart, I.
2021. Proceedings of the 7th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2021), 529–537, SciTePress. doi:10.5220/0010451005290537 -
Use of digital healthcare solutions for care delivery during a pandemic-chances and (cyber) risks referring to the example of the COVID-19 pandemic
Kaiser, F. K.; Wiens, M.; Schultmann, F.
2021. Health and Technology, 11, 1125–1137. doi:10.1007/s12553-021-00541-x -
Automatically extracting business level access control requirements from BPMN Models to align RBAC policies
Pilipchuk, R.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Ed.: P. Mori, 300–307, SciTePress. doi:10.5220/0010184403000307 -
When Data Fly: An Open Data Trading System in Vehicular Ad Hoc Networks
Lücking, M.; Kretzer, F.; Kannengießer, N.; Beigl, M.; Sunyaev, A.; Stork, W.
2021. Electronics, 10 (6), 654. doi:10.3390/electronics10060654 -
Token Economy
Sunyaev, A.; Kannengießer, N.; Beck, R.; Treiblmaier, H.; Lacity, M.; Kranz, J.; Fridgen, G.; Spankowski, U.; Luckow, A.
2021. Business & information systems engineering, 63 (4), 457–478. doi:10.1007/s12599-021-00684-1 -
Meldepflicht von Mitarbeitenden bei IT Sicherheits- und Datenschutzvorfällen Betrachtung möglicher arbeitsrechtlicher Konsequenzen
Müllmann, D.; Volkamer, M.
2021. Zeitschrift für Datenschutz, 11 (1), 8–13 -
“Healthy surveillance”: Designing a concept for privacy-preserving mask recognition AI in the age of pandemics
Kühl, N.; Martin, D.; Wolff, C.; Volkamer, M.
2021. Hawaii International Conference on Systems Sciences (HICSS-54), January 5-8, 2021 -
Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende - Betrachtung möglicher arbeitsrechtlicher Konsequenzen
Müllmann, D.; Volkamer, M.
2021. Informatik 2020 - Back to the future. Hrsg.: R. H. Reussner, 829–840, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_74
Publikationsliste
-
Composition in Differential Privacy for General Granularity Notions
Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Strufe, T.
2024. 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 8th-12th July 2024. doi:10.48550/arXiv.2308.14649 -
Attacking Learning-based Models in Smart Grids: Current Challenges and New Frontiers
Sanchez, G.; Elbez, G.; Hagenmeyer, V.
2024. Proceedings of the 15thACM International Conference on Future and Sustainable Energy Systems (e-Energy ’24), Association for Computing Machinery (ACM). doi:10.1145/3632775.3661984 -
Co-Simulation of Hardware and Software in Palladio
Weber, S.; Henss, J.; Reussner, R.
2024. 13th Symposium on Software Performance 2023, Stuttgart, 7th-9th November 2022, Ed.: Andrea Herrmann, 32–34, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43641 -
Kfeature: Rendering the Kconfig System into Feature Models
Yaman, K. B.; Wittler, J. W.; Gerking, C.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 134 – 138, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634731 -
Verifiable Certificateless Signcryption Scheme for Smart Grids
Ramadan, M.; Elbez, G.; Hagenmeyer, V.
2024. 2023 7th International Conference on System Reliability and Safety (ICSRS), 181–189, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSRS59833.2023.10381069 -
Requirements Classification for Traceability Link Recovery
Hey, T.; Keim, J.; Corallo, S.
2024. 2024 IEEE 32nd International Requirements Engineering Conference (RE’24), Institute of Electrical and Electronics Engineers (IEEE) -
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption
Berger, R.; Dörre, F.; Koch, A.
2024. Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings. Part I. Ed.: C. Pöpper, 288–317, Springer International Publishing. doi:10.1007/978-3-031-54770-6_12 -
Exploring Phishing Threats through QR Codes in Naturalistic Settings
Sharevski, F.; Mossano, M.; Veit, M. F.; Schiefer, G.; Volkamer, M.
2024. Symposium on Usable Security and Privacy (USEC) 2024. doi:10.14722/usec.2024.23050 -
Systematic User Evaluation of a Second Device based cast-as-intended verifiability Approach
Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.; Volkamer, M.
2024. Voting’24, Springer -
Architecture-based Propagation Analyses Regarding Security
Hahner, S.; Walter, M.; Heinrich, R.; Reussner, R.
2024. Software Engineering 2024 (SE 2024), Gesellschaft für Informatik e.V. doi:10.18420/sw2024_38 -
Obfuscation-Resilient Software Plagiarism Detection with JPlag
Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. 46th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3639478.3643074 -
Automated Detection of AI-Obfuscated Plagiarism in Modeling Assignments
Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. Proceedings of the 46th International Conference on Software Engineering: Software Engineering Education and Training, ICSE SEET ’24, Lissabon, 14th-20th April 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3639474.3640084 -
Detecting Automatic Software Plagiarism via Token Sequence Normalization
Sağlam, T.; Brödel, M.; Schmid, L.; Hahner, S.
2024. Proceedings of the 46th International Conference on Software Engineering, ICSE ’24, Lissabon, April 14-20, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3597503.3639192 -
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
Tiepelt, M.; Eaton, E.; Stebila, D.
2024. Computer Security – ESORICS 2023. Ed.: G. Tsudik. Pt. 1, 168–188, Springer Nature Switzerland. doi:10.1007/978-3-031-50594-2_9 -
Panini - Anonymous Anycast and an Instantiation
Coijanovic, C.; Weis, C.; Strufe, T.
2024. 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Springer-Verlag -
Recovering Trace Links Between Software Documentation And Code
Keim, J.; Corallo, S.; Fuchß, D.; Hey, T.; Telge, T.; Koziolek, A.
2024. Proceedings of 46th International Conference on Software Engineering (ICSE 2024) -
PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support
Schadt, D.; Coijanovic, C.; Weis, C.; Strufe, T.
2024. 2024 IEEE Symposium on Security and Privacy (SP), 44–44, IEEE Computer Society. doi:10.1109/SP54263.2024.00044 -
SoK: Explainable Machine Learning in Adversarial Environments
Noppel, M.; Wressnegger, C.
2024. Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P), San Francisco, 20th-22nd May 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SP54263.2024.00021 -
ABCperf: Performance Evaluation of Fault Tolerant State Machine Replication Made Simple: Demo Abstract
Spannagel, T.; Leinweber, M.; Castro, A.; Hartenstein, H.
2023. Proceedings of the 24th International Middleware Conference Demos, Posters and Doctoral Symposium, 35–36, Association for Computing Machinery (ACM). doi:10.1145/3626564.3629101 -
Multi-level Hardware Simulation in Palladio
Weber, S.; Taghavi, B.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 32–34, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43229 -
A Survey of Analysis Composition Operators in the Context of Palladio
Taghavi, B.; Weber, S.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 8–10, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43245 -
BAZAAR: Anonymous Resource Sharing
Coijanovic, C.; Schadt, D.; Weis, C.; Strufe, T.
2023. WPES ’23: Proceedings of the 22nd Workshop on Privacy in the Electronic Society, Kopenhagen, 26th November 2023, 135–139, Association for Computing Machinery (ACM). doi:10.1145/3603216.3624957 -
Poster: Towards Practical Brainwave-based User Authentication
Fallahi, M.; Arias-Cabarcos, P.; Strufe, T.
2023. CCS’ 23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Kopenhagen, 26th-30th November 2023, 3627–3629, Association for Computing Machinery (ACM). doi:10.1145/3576915.3624399 -
Poster: Fooling XAI with Explanation-Aware Backdoors
Noppel, M.; Wressnegger, C.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3612–3614, Association for Computing Machinery (ACM). doi:10.1145/3576915.3624379 -
"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers
Munyendo, C. W.; Mayer, P.; Aviv, A. J.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3123–3137, Association for Computing Machinery (ACM). doi:10.1145/3576915.3623150 -
SAFFIRRE: Selective Aggregate Filtering Through Filter Rule Refinement
Heseding, H.; Bachmann, F.; Bien, P. S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), Izmir, 4th-06th October 2023, 42–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NoF58724.2023.10302813 -
Encouraging Organisational Information Security Incident Reporting
Ballreich, F. L.; Volkamer, M.; Müllmann, D.; Berens, B. M.; Häußler, E. M.; Renaud, K. V.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 224–236, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617098 -
Influence of URL Formatting on Users’ Phishing URL Detection
Mossano, M.; Kulyk, O.; Berens, B. M.; Häußler, E. M.; Volkamer, M.
2023. Proceedings of the 2023 European Symposium on Usable Security, 318–333, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617111 -
eMinD: Efficient and Micro-Flow Independent Detection of Distributed Network Attacks
Kopmann, S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), 159–167, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NoF58724.2023.10302763 -
How Students Plagiarize Modeling Assignments
Sağlam, T.; Schmid, L.; Hahner, S.; Burger, E.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, 1st - 6th October 2023, 98 – 101, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00032 -
Co-Evolving Meta-Models and View Types in View-Based Development
Muctadir, H. M.; König, L.; Weber, T.; Amrani, M.; Cleophas, L.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), 954–963, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00150 -
Vision: What the hack is going on? A first look at how website owners became aware that their website was hacked
Hennig, A.; Thi Thanh Vuong, N.; Mayer, P.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 312–317, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617101 -
Investigating the Role of Computing Education for Informed Usage Decision-Making
Gebhardt, L.; Leinweber, M.; Michaeli, T.
2023. WiPSCE ’23: The 18th WiPSCE Conference on Primary and Secondary Computing Education Research Cambridge United Kingdom September 27 - 29, 2023. Ed.: S. Sentance, 1–2, Association for Computing Machinery (ACM). doi:10.1145/3605468.3609776 -
Towards Self-learning Industrial Process Behaviour from Payload Bytes for Anomaly Detection
Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA), Sinaia, Romania, 12-15 September 2023, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA54631.2023.10275358 -
Reducing memory footprints in purity estimations of volumetric DDoS traffic aggregates
Heseding, H.; Krack, T.; Zitterbart, M.
2023. M. Seufert, A. Blenk & O. Landsiedel (Eds.), 2nd Workshop on Machine Learning & Netwoking (MaLeNe) Proceedings. Co-located with the 5th International Conference on Networked Systems (NetSys 2023), Potsdam, Germany, Universität Augsburg -
Impact of Adaptive Packet Sampling on ML-based DDoS Detection
Kopmann, S.; Zitterbart, M.
2023. 2nd Workshop “Machine Learning & Networking” (MaLeNe) Proceedings Co-Located with the 5th International Conference on Networked Systems (NETSYS 2023) Potsdam, Germany, September 4, 2023 (MaLeNe). Ed.: M. Seufert -
A user-centred approach to facilitate locating company security policies : Nutzerzentrierter Ansatz zur Vereinfachung des Auffindens von Security Policies
Aldag, L.; Ballreich, F.; Berens, B.; Volkamer, M.
2023. MuC ’23: Proceedings of Mensch und Computer. Ed.: M. Stolze, 173–185, Association for Computing Machinery (ACM). doi:10.1145/3603555.3603573 -
Continuous T-Wise Coverage
Pett, T.; Heß, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2023. SPLC ’23: Proceedings of the 27th ACM International Systems and Software Product Line Conference. Vol. A. Ed.: P. Arcaini, 87–98, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608980 -
True Variability Shining Through Taxonomy Mining
König, C.; Rosiak, K.; Cleophas, L.; Schaefer, I.
2023. Proceedings of the 27th ACM International Systems and Software Product Line Conference - Volume A, 182–193, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608989 -
A Toolchain for Simulation Component Specification and Identification
Koch, S.; Reiche, F.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 75–89, Springer International Publishing. doi:10.1007/978-3-031-36889-9_7 -
Usability for Data Sovereignty - Evaluation of Privacy Risk Quantification Interfaces
Appenzeller, A.; Balduf, F.; Beyerer, J.
2023. Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments, 206–214, Association for Computing Machinery (ACM). doi:10.1145/3594806.3594816 -
Adversarial Attacks on Traffic Sign Recognition: A Survey
Pavlitska, S.; Lambing, N.; Zöllner, J. M.
2023. 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Tenerife, Spain, 19-21 July 2023, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICECCME57830.2023.10252727 -
Protocol-Agnostic Detection of Stealth Attacks on Networked Control Systems
Heseding, H.; Dieing, M.; Meshram, A.; Zitterbart, M.
2023. 2023 IEEE 21st International Conference on Industrial Informatics (INDIN), Lemgo, Germany, 17-20 2023, 1–7, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INDIN51400.2023.10218314 -
TRUST: Transparent Redundancy for UDP STreams
Neumeister, F.; Göckel, M.; Zitterbart, M.
2023. IEEE 21st International Conference on Industrial Informatics (INDIN 2023), 7 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INDIN51400.2023.10218145 -
The Bandit’s States: Modeling State Selection for Stateful Network Fuzzing as Multi-armed Bandit Problem
Borcherding, A.; Giraud, M.; Fitzgerald, I.; Beyerer, J.
2023. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 345–350, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW59978.2023.00043 -
Investigating Software Engineering Artifacts in DevOps Through the Lens of Boundary Objects
Matthies, C.; Heinrich, R.; Wohlrab, R.
2023. EASE ’23: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 12–21, Association for Computing Machinery (ACM). doi:10.1145/3593434.3593441 -
On Extend-Only Directed Posets and Derived Byzantine-Tolerant Replicated Data Types
Jacob, F.; Hartenstein, H.
2023. PaPoC ’23: 10th Workshop on Principles and Practice of Consistency for Distributed Data Rome Italy 8 May 2023.Ed.: E. Gonzalez Boix, 63–69, Association for Computing Machinery (ACM). doi:10.1145/3578358.3591333 -
Holistic Adversarially Robust Pruning
Zhao, Q.; Wressnegger, C.
2023. 11th International Conference on Learning Representations (ICLR), Kigali, 1st-5th May 2023 -
Architecture-Based Uncertainty Impact Analysis to Ensure Confidentiality
Hahner, S.; Heinrich, R.; Reussner, R.
2023. 2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 126–132, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAMS59076.2023.00026 -
BrainNet: Improving Brainwave-based Biometric Recognition with Siamese Networks
Fallahi, M.; Strufe, T.; Arias-Cabarcos, P.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications (PerCom), 53–60, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PERCOM56429.2023.10099367 -
Design-time Performability Evaluation of Runtime Adaptation Strategies (Work In Progress Paper)
Rapp, M.; Scheerer, M.; Reussner, R.
2023. Companion of the 2023 ACM/SPEC International Conference on Performance Engineering, 9–15, Association for Computing Machinery (ACM). doi:10.1145/3578245.3585028 -
Applying Differential Privacy to Medical Questionnaires
Appenzeller, A.; Terzer, N.; Philipp, P.; Beyerer, J.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 608–613, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops56833.2023.10150373 -
Model-based Confidentiality Analysis under Uncertainty
Hahner, S.; Bitschi, T.; Walter, M.; Bureš, T.; Hnětynka, P.; Heinrich, R.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), 256–263, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00062 -
Automatic Derivation of Vulnerability Models for Software Architectures
Kirschner, Y. R.; Walter, M.; Bossert, F.; Heinrich, R.; Koziolek, A.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), L’Aquila, Italy, 13-17 March 2023, 276–283, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00065 -
Detecting Inconsistencies in Software Architecture Documentation Using Traceability Link Recovery
Keim, J.; Corallo, S.; Fuchß, D.; Koziolek, A.
2023. 20th IEEE International Conference on Software Architecture (ICSA), 141–152, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA56044.2023.00021 -
A First Complete Algorithm for Real Quantifier Elimination in Isabelle/HOL
Kosaian, K.; Tan, Y. K.; Platzer, A.
2023. Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs, 211–224, Association for Computing Machinery (ACM). doi:10.1145/3573105.3575672 -
Identifying Performance Challenges in Consistency Preserving View-Based Environments
König, L.; Weber, T.
2023. Softwaretechnik-Trends, 14th Symposium on Software Performance 2023, Karlsruhe, 6th - 8th November 2023, 26–28, Gesellschaft für Informatik (GI) -
Composable Long-Term Security with Rewinding
Berger, R.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
2023. Theory of Cryptography – 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part IV. Ed.: G. Rothblum, 510 – 541, Springer Nature Switzerland. doi:10.1007/978-3-031-48624-1_19 -
Explanation-Aware Backdoors in a Nutshell
Noppel, M.; Wressnegger, C.
2023. Proc. of 46th German Conference on Artificial Intelligence (KI) -
On Evasion of Machine Learning-based Intrusion Detection in Smart Grids
Mumrez, A.; Sánchez, G.; Elbez, G.; Hagenmeyer, V.
2023. IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids. doi:10.1109/SmartGridComm57358.2023.10333966 -
Comparative Study on Smart Grid Security Testbeds Using MITRE ATT&CK Matrix
Mumrez, A.; Muhammad M. Roomi; Heng Chuan Tan; Daisuke Mashima; Elbez, G.; Hagenmeyer, V.
2023. 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SmartGridComm57358.2023.10333902 -
Universally Composable Auditable Surveillance
Fetzer, V.; Klooß, M.; Müller-Quade, J.; Raiber, M.; Rupp, A.
2023. Advances in Cryptology – ASIACRYPT 2023 – 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part II. Ed.: J. Guo, 453 – 487, Springer Nature Singapore. doi:10.1007/978-981-99-8724-5_14 -
Voter Perception of Cast-as-Intended Verifiability in the Estonian I-Vote Protocol
Hilt, T.; Sein, K.; Mällo, T.; Willemson, J.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI) -
German Social Elections 2023: An Overview and first Analysis
Hilt, T.; Kulyk, O.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI) -
Practically Efficient Private Set Intersection From Trusted Hardware with Side-Channels
Dörre, F.; Mechler, J.; Müller-Quade, J.
2023. Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Springer-Verlag. doi:10.1007/978-981-99-8730-6_9 -
Static Capability-Based Security for Smart Contracts
Schiffl, J.; Weigl, A.; Beckert, B.
2023. 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 110 – 117, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/DAPPS57946.2023.00024 -
QIn: Enabling Formal Methods to Deal with Quantum Circuits
Klamroth, J.; Beckert, B.; Scheerer, M.; Denninger, O.
2023. 2023 IEEE International Conference on Quantum Software (QSW), Chicago, IL, 2nd - 8th July 2023, 175 – 185, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/QSW59989.2023.00029 -
Uniform Substitution for Dynamic Logic with Communicating Hybrid Programs
Brieger, M.; Mitsch, S.; Platzer, A.
2023. Automated Deduction – CADE 29 – 29th International Conference on Automated Deduction, Rome, Italy, July 1–4, 2023, Proceedings. Ed.: B. Pientka, 96 – 115, Springer Nature Switzerland. doi:10.1007/978-3-031-38499-8_6 -
Automated Integration of Heteregeneous Architecture Information into a Unified Model
Jordan, S.; König, C.; Linsbauer, L.; Schaefer, I.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 83 – 99, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_6 -
Brief Announcement: Let It TEE: Asynchronous Byzantine Atomic Broadcast with n ≥ 2f+1
Leinweber, M.; Hartenstein, H.
2023. 37th International Symposium on Distributed Computing (DISC 2023). Ed.: R. Oshman, 43:1–43:7, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.DISC.2023.43 -
Sparsely-gated Mixture-of-Expert Layers for CNN Interpretability
Pavlitska, S.; Hubschneider, C.; Struppek, L.; Zöllner, J. M.
2023. 2023 International Joint Conference on Neural Networks (IJCNN), 1–10, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IJCNN54540.2023.10191904 -
Automated Reverse Engineering of the Technology-Induced Software System Structure
Kirschner, Y. R.; Keim, J.; Peter, N.; Koziolek, A.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 283–291, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_19 -
Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents
Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Architecture. Ed.: B. Tekinerdogan, 37–53, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_3 -
Disguising Attacks with Explanation-Aware Backdoors
Noppel, M.; Peter, L.; Wressnegger, C.
2023. 2023 IEEE Symposium on Security and Privacy (SP), 664 – 681, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SP46215.2023.10179308 -
Personalized Explanations
Becker, M.
2023. Proceedings of the 2022 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer, 1–10, KIT Scientific Publishing -
A Classification of Software-Architectural Uncertainty Regarding Confidentiality
Hahner, S.; Seifermann, S.; Heinrich, R.; Reussner, R.
2023. E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, 139–160, Springer International Publishing. doi:10.1007/978-3-031-36840-0_8 -
POET: A Self-learning Framework for PROFINET Industrial Operations Behaviour
Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. Tools for Design, Implementation and Verification of Emerging Information Technologies – 17th EAI International Conference, TridentCom 2022, Melbourne, Australia, November 23-25, 2022, Proceedings. Ed.: S. Yu, 3 – 19, Springer Nature Switzerland. doi:10.1007/978-3-031-33458-0_1 -
A Taxonomy for Design Decisions in Software Architecture Documentation
Keim, J.; Hey, T.; Sauer, B.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 439–454, Springer International Publishing. doi:10.1007/978-3-031-36889-9_29 -
Analysis and Prevention of Averaging Attacks Against Obfuscation Protocols
Becher, K.; Lagodzinski, J. A. G.; Parra-Arnau, J.; Strufe, T.
2023. Applied Cryptography and Network Security – 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part I. Ed.: M. Tibouchi, 451 – 475, Springer Nature Switzerland. doi:10.1007/978-3-031-33488-7_17 -
Establishing a Benchmark Dataset for Traceability Link Recovery Between Software Architecture Documentation and Models
Fuchß, D.; Corallo, S.; Keim, J.; Speit, J.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops, Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 455–464, Springer International Publishing. doi:10.1007/978-3-031-36889-9_30 -
Tool-Based Attack Graph Estimation and Scenario Analysis for Software Architectures
Walter, M.; Reussner, R.
2023. Software Architecture : ECSA 2022 Tracks and Workshops. Ed.: T. Batista, 45–61, Springer International Publishing. doi:10.1007/978-3-031-36889-9_5 -
Automating GUI-based Software Testing with GPT-3
Zimmermann, D.; Koziolek, A.
2023. 2023 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 62 – 65, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSTW58534.2023.00022 -
Sender-binding Key Encapsulation
Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2023. Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I. Ed.: A. Boldyreva, 744 – 773, Springer Nature Switzerland. doi:10.1007/978-3-031-31368-4_26 -
Refinements of Hybrid Dynamical Systems Logic
Platzer, A.
2023. Rigorous State-Based Methods – 9th International Conference, ABZ 2023, Nancy, France, May 30–June 2, 2023, Proceedings. Ed.: U. Glässer, 3 – 14, Springer Nature Switzerland. doi:10.1007/978-3-031-33163-3_1 -
Adversarial Vulnerability of Temporal Feature Networks for Object Detection
Pavlitskaya, S.; Polley, N.; Weber, M.; Zöllner, J. M.
2023. Computer Vision – ECCV 2022 Workshops. Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part V, Ed.: L. Karlinsky, 510–525, Springer Nature Switzerland. doi:10.1007/978-3-031-25072-9_35 -
Council of Europe Guidelines on the Use of ICT in Electoral Processes
Driza Maurer, A.; Volkamer, M.; Krimmer, R.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 585–599, Springer International Publishing. doi:10.1007/978-3-031-25460-4_34 -
Why Is Online Voting Still Largely a Black Box?
Kirsten, M.; Volkamer, M.; Beckert, B.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 555–567, Springer International Publishing. doi:10.1007/978-3-031-25460-4_32 -
Evaluation Methods and Replicability of Software Architecture Research Objects
Konersmann, M.; Kaplan, A.; Kühn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2023. Software Engineering 2023 : Fachtagung des GI-Fachbereichs Softwaretechnik : 20.-24. Februar 2023 Paderborn. Ed.: G. Engels; M. Tichy, 75–76, Gesellschaft für Informatik (GI) -
SoK: Differentially Private Publication of Trajectory Data
Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies, 496–516, De Gruyter. doi:10.56553/popets-2023-0065 -
Randomness is the Root of All Evil: More Reliable Evaluation of Deep Active Learning
Ji, Y.; Kaestner, D.; Wirth, O.; Wressnegger, C.
2023. 2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 3932–3941, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WACV56688.2023.00393 -
SWaTEval: An Evaluation Framework for Stateful Web Application Testing
Borcherding, A.; Penkov, N.; Giraud, M.; Beyerer, J.
2023. Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP, 430–441, SciTePress. doi:10.5220/0011652200003405 -
Identifizierung von Vertraulichkeitsproblemen mithilfe von Angriffsausbreitung auf Architektur
Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Engineering 2023. Hrsg.: R. Engels, 123–124, Gesellschaft für Informatik (GI) -
Secure Provisioning of OPC UA Applications Using the Asset Administration Shell
Meier, D.; Vogl, J.; Kohnhäuser, F.; Beyerer, J.
2023. 2022 IEEE 17th Conference on Industrial Electronics and Applications (ICIEA), 144–149, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICIEA54703.2022.10005899 -
MIDA: Micro-flow Independent Detection of DDoS Attacks with CNNs
Kopmann, S.; Heseding, H.; Zitterbart, M.
2023. Advances in Service-Oriented and Cloud Computing : International Workshops of ESOCC 2022, Wittenberg, Germany, March 22-24, 2022, Revised Selected Papers. Ed.: C. Zirpins, 32–43, Springer International Publishing. doi:10.1007/978-3-031-23298-5_3 -
Understanding Person Identification through Gait
Hanisch, S.; Muschter, E.; Hatzipanayioti, A.; Li, S.-C.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), 177–189. doi:10.56553/popets-2023-0011 -
"Surprised, Shocked, Worried": User Reactions to Facebook Data Collection from Third Parties
Arias-Cabarcos, P.; Kjalili, S.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open. doi:10.56553/popets-2023-0023 -
German Voters’ Attitudes Towards Voting Online with a Verifiable System
Kulyk, O.; Volkamer, M.; Fuhrberg, N.; Berens, B.; Krimmer, R.
2023. Financial Cryptography and Data Security. FC 2022 International Workshops – CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers, Ed.: S. Matsuo, 33 –350, Springer International Publishing. doi:10.1007/978-3-031-32415-4_23 -
How to Protect the Public Opinion Against New Types of Bots?
Reubold, J. L.; Escher, S. C.; Wressnegger, C.; Strufe, T.
2022. IEEE International Conference on Big Data, 1671–1680, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BigData55660.2022.10020758 -
Token-based plagiarism detection for metamodels
Sağlam, T.; Hahner, S.; Wittler, J. W.; Kühn, T.
2022. MODELS ’22: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion ProceedingsOctober 2022, 138–141, Association for Computing Machinery (ACM). doi:10.1145/3550356.3556508 -
Sharp: Short Relaxed Range Proofs
Couteau, G.; Goudarzi, D.; Klooß, M.; Reichle, M.
2022. CCS ’22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Ed.: H. Yin Conference: CCS ’22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA November 7 - 11, 2022, 609–622, Association for Computing Machinery (ACM). doi:10.1145/3548606.3560628 -
La Publicación de Trayectorias: un Estudio sobre la Protección de la Privacidad
Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2022. Proceedings of the XVII Spanish Meeting on Cryptology and Information Security (RECSI), Santader, 19th - 21st October, 2022. doi:10.22429/Euc2022.028 -
Design and Evaluation of an Anti-Phishing Artifact Based on Useful Transparency
Beckmann, C.; Berens, B.; Kühl, N.; Mayer, P.; Mossano, M.; Volkamer, M.
2022. International Workshop on Socio-Technical Aspects in Security -
Datenschutzkonforme Weitergabe von Versichertendaten aus dem Forschungsdatenzentrum
Orak, B.; Krempel, E.; Appenzeller, A.
2022. D. Demmler, D. Krupka & H. Federrath (Eds.), INFORMATIK 2022 Hrsg.: Demmler, Daniel AND Federrath, Hannes, Daniel AND Krupka, 533–549, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_45 -
ReCEIF: Reinforcement Learning-Controlled Effective Ingress Filtering
Heseding, H.; Zitterbart, M.
2022. 2022 IEEE 47th Conference on Local Computer Networks (LCN), 106–113, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN53696.2022.9843478 -
HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic
Kopmann, S.; Heseding, H.; Zitterbart, M.
2022. 2022 IEEE 47th Conference on Local Computer Networks (LCN), 90–97, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN53696.2022.9843465 -
PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren für Virtual Reality Head-Mounted Displays
Länge, T.; Matheis, P.; Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Mensch und Computer 2022 - Workshopband. Ed.: K. Marky, Gesellschaft für Informatik (GI). doi:10.18420/muc2022-mci-ws01-462 -
Cookie Disclaimers: Impact of Design and Users’ Attitude
Berens, B. M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2022. Proceedings of the 17th International Conference on Availability, Reliability and Security, 1–20, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539008 -
Handling Environmental Uncertainty in Design Time Access Control Analysis
Boltz, N.; Hahner, S.; Walter, M.; Seifermann, S.; Heinrich, R.; Bures, T.; Hnetynka, P.
2022. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Gran Canaria, Spain, 31 August 2022 - 02 September 2022, 382–389, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA56994.2022.00067 -
Why Users (Don’t) Use Password Managers at a Large Educational Institution
Mayer, P.; Munyendo, C. W.; Mazurek, M. L.; Aviv, A. J.
2022. 31st USENIX Security Symposium (USENIX Security 22), 1849–1866, USENIX Association -
"I don’t know why I check this...’’ - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks
Mayer, P.; Poddebniak, D.; Fischer, K.; Brinkmann, M.; Somorovsky, J.; Sasse, M. A.; Schinzel, S.; Volkamer, M.
2022. Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 77–96, USENIX Association -
On the Applicability of Payment Channel Networks for Allocation of Transport Ticket Revenues
Grundmann, M.; von Zastrow-Marcks, O.; Hartenstein, H.
2022. Proceedings - International Conference on Computer Communications and Networks, ICCCN : 31st International Conference on Computer Communications and Networks, ICCCN 2022, Virtual, Online, 25 - 28 July 2022, 7 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCCN54977.2022.9868881 -
Non-Uniform Adversarially Robust Pruning
Zhao, Q.; Königl, T.; Wressnegger, C.
2022. Proc. of the 1st International Conference on Automated Machine Learning (AutoML) -
Design-time Performability Optimization of Runtime Adaptation Strategies
Rapp, M.; Scheerer, M.; Reussner, R.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 113–120, Association for Computing Machinery (ACM). doi:10.1145/3491204.3527471 -
Towards Private Medical Data Donations by Using Privacy Preserving Technologies
Appenzeller, A.; Terzer, N.; Krempel, E.; Beyerer, J.
2022. The15th International Conference on PErvasive Technologies Related to Assistive Environments, 446–454, Association for Computing Machinery (ACM). doi:10.1145/3529190.3534768 -
Classification of Software Engineering Contributions to Support Validation Techniques and Research Applications
Kaplan, A.
2022. The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 323–328, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535345 -
Verifying Payment Channels with TLA+
Grundmann, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–3, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805487 -
On the Peer Degree Distribution of the Bitcoin P2P Network
Grundmann, M.; Baumstark, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–5, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805511 -
Reproducibility and Replicability of Web Measurement Studies
Demir, N.; Große-Kampmann, M.; Urban, T.; Wressnegger, C.; Holz, T.; Pohlmann, N.
2022. WWW ’22: Proceedings of the ACM Web Conference 2022. Ed.: F. Laforest, 533–544, Association for Computing Machinery (ACM). doi:10.1145/3485447.3512214 -
Phishing awareness and education – When to best remind?
Berens, B. M.; Dimitrova, K.; Mossano, M.; Volkamer, M.
2022. Symposium on Usable Security and Privacy (USEC), co-located with the Network and Distributed System Security Symposium (NDSS 2022), San Diego, CA, April 23, 2022. doi:10.14722/usec.2022.23075 -
The Smart Grid: A Use-Case for Large-Scale SDN Deployment
Neumeister, F.; Zitterbart, M.
2022. 3. KuVS Fachgespräch "Network Softwarization" (7.4. - 8.4.2022). 3. KuVS Fachgespräch "Network Softwarization" (online) 7./8.4.2022, Universitätsbibliothek Tübingen. doi:10.15496/publikation-67443 -
Reinforcement Learning-Controlled Mitigation of Volumetric DDoS Attacks
Heseding, H.
2022. C. Wressnegger, D. Reinhardt, T. Barber, B. C. Witt, D. Arp & Z. Mann (Eds.), SICHERHEIT 2022 Hrsg.: Wressnegger, Christian; Reinhardt, Delphine; Barber, Thomas; Witt, Bernhard C.; Arp, Daniel; Mann, Zoltan, 237–242, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_20 -
Transparency for Bystanders in IoT regarding audiovisual Recordings
Escher, S.; Etzrodt, K.; Weller, B.; Kopsell, S.; Strufe, T.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops): 21–25 March 2022, Pisa, Italy, 649–654, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767212 -
Replication Package of "Evaluation Methods and Replicability of Software Architecture Research Objects"
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; Al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 58, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00021 -
Architectural Pen-Test Generation and Vulnerability Prediction for Cyber-Physical Systems
Walter, T.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 45–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00016 -
Evaluation Methods and Replicability of Software Architecture Research Objects
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), Honolulu, HI, USA, 12-15 March 2022, 157–168, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00023 -
Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022. IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 12 -15 March 2022, Honolulu, HI, USA, 59, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00022 -
Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), 12 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00009 -
Unified Operations for Variability in Space and Time
Ananieva, S.; Greiner, S.; Krueger, J.; Linsbauer, L.; Gruener, S.; Kehrer, T.; Kuehn, T.; Seidl, C.; Reussner, R.
2022. Proceedings of the 16th International Working Conference on Variability Modelling of Software-Intensive Systems, 1–10, Association for Computing Machinery (ACM). doi:10.1145/3510466.3510483 -
Continuous Secure Software Development and Analysis
Schulz, S.; Reiche, F.; Hahner, S.; Schiffl, J.
2022. Symposium on Software Performance 2021 : Short Paper Proceedings of Symposium on Software Performance, Leipzig, Germany, November 9.-10., 2021. Ed.: D. G. Reichelt, R. Müller, S. Becker, W. Hasselbring, A. v. Hoorn, S. Kounev, A. Koziolek, R. Reussner, RWTH Aachen -
Beauty and the Beast – A Case Study on Performance Prototyping of Data-Intensive Containerized Cloud Applications
Klinaku, F.; Rapp, M.; Henss, J.; Rhode, S.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 53–60, Association for Computing Machinery (ACM). doi:10.1145/3491204.3527482 -
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules
Doerner, D.; Mechler, J.; Müller-Quade, J.
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 83–99, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_05 -
Responsible Human-Robot Interaction with Anthropomorphic Service Robots: State of the Art of an Interdisciplinary Research Challenge
Stock-Homburg, R. M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; Rawal, N.; David, K.; Wendt, J.; Spiecker genannt Döhmann, I.; Stryk, O. von; Hannig, M.; Knof, M.
2022. Proceedings of the 55th Annual Hawaii International Conference on System Sciences : January 3-7, 2022. Ed.: T. X. Bui, 2065–2074, University of Hawaii. doi:10.24251/HICSS.2022.260 -
Optimal human labelling for anomaly detection in industrial inspection
Zander, T.; Ziyan, P.; Birnstill, P.; Beyerer, J.
2022. Forum Bildverarbeitung 2022. Ed.: T. Längle, 49–59, KIT Scientific Publishing -
Fiat-Shamir Transformation of Multi-round Interactive Proofs
Attema, T.; Fehr, S.; Klooß, M.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Ed.: E. Kiltz, 113–142, Springer Nature Switzerland. doi:10.1007/978-3-031-22318-1_5 -
Anonymous Whistleblowing over Authenticated Channels
Agrikola, T.; Couteau, G.; Maier, S.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Ed.: E. Kiltz, 685–714, Springer Nature Switzerland. doi:10.1007/978-3-031-22365-5_24 -
Efficient Public Verification of Confidential Supply-Chain Transactions
Becher, K.; Schäfer, M.; Schröpfer, A.; Strufe, T.
2022. 2022 IEEE Conference on Communications and Network Security (CNS), 308–316, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CNS56114.2022.9947231 -
Uncertainty in coupled models of cyber-physical systems
Acosta, M.; Hahner, S.; Koziolek, A.; Kühn, T.; Mirandola, R.; Reussner, R.
2022. Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 569–578, Association for Computing Machinery (ACM). doi:10.1145/3550356.3561539 -
Towards a Usable and Sustainable Deductive Verification Tool
Beckert, B.; Bubel, R.; Hähnle, R.; Ulbrich, M.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 281–300, Springer Nature Switzerland. doi:10.1007/978-3-031-19756-7_16 -
Decentralizing Watchtowers for Payment Channels using IPFS
Bonisch, H.; Grundmann, M.
2022. 2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW), 27–32, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICDCSW56584.2022.00015 -
CrossTest: a cross-domain physical testbed environment for cybersecurity performance evaluations
Karch, M.; Rösch, D.; André, K.; Meshram, A.; Haas, C.; Nicolai, S.
2022. 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA), 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA52439.2022.9921672 -
Early Detection of GOOSE Denial of Service (DoS) Attacks in IEC 61850 Substations
Elbez, G.; Nahrstedt, K.; Hagenmeyer, V.
2022. IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids 2022. doi:10.1109/SmartGridComm52983.2022.9961042 -
Modeling and Enforcing Access Control Policies for Smart Contracts
Töberg, J.-P.; Schiffl, J.; Reiche, F.; Beckert, B.; Heinrich, R.; Reussner, R.
2022. Conference Proceedings: 2022 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 38–47, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/DAPPS55202.2022.00013 -
Cyber threat intelligence enabled automated attack incident response
Kaiser, F. K.; Andris, L.; Tenning, T.; Iser, J.; Wiens, M.; Schultmann, F.
2022. 2022 3rd International Conference on Next Generation Computing Applications (NextComp), IEEE, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NextComp55567.2022.9932254 -
Attuning Adaptation Rules via a Rule-Specific Neural Network
Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Proceedings. Vol. 3. Ed.: T. Margaria, 215–230, Springer Nature Switzerland. doi:10.1007/978-3-031-19759-8_14 -
Generalized Test Tables: A Domain-Specific Specification Language for Automated Production Systems
Beckert, B.; Ulbrich, M.; Vogel-Heuser, B.; Weigl, A.
2022. Theoretical Aspects of Computing – ICTAC 2022 – 19th International Colloquium, Tbilisi, Georgia, September 27–29, 2022, Proceedings. Ed.: H. Seidl, 7–13, Springer International Publishing. doi:10.1007/978-3-031-17715-6_2 -
Information Flow Control-by-Construction for an Object-Oriented Language
Runge, T.; Kittelmann, A.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. Software Engineering and Formal Methods – 20th International Conference, SEFM 2022, Berlin, Germany, September 26–30, 2022, Proceedings. Ed.: B.-H. Schlingloff, 209–226, Springer International Publishing. doi:10.1007/978-3-031-17108-6_13 -
A Model-Based Framework for Simplified Collaboration of Legal and Software Experts in Data Protection Assessments
Boltz, N.; Sterz, L.; Gerking, C.; Raabe, O.
2022. INFORMATIK 2022, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik. Ed.: D. Demmler, 521–532, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_44 -
Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
Grundmann, M.; Amberg, H.; Baumstark, M.; Hartenstein, H.
2022. Financial Cryptography and Data Security – 26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers. Ed.: I. Eyal, 694–704, Springer International Publishing. doi:10.1007/978-3-031-18283-9_35 -
A Refactoring for Data Minimisation Using Formal Verification
Lanzinger, F.; Ulbrich, M.; Weigl, A.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 345–364, Springer Nature Switzerland. doi:10.1007/978-3-031-19756-7_19 -
Accurate Performance Predictions with Component-Based Models of Data Streaming Applications
Werle, D.; Seifermann, S.; Koziolek, A.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 83–98, Springer International Publishing. doi:10.1007/978-3-031-16697-6_6 -
Towards an integrated approach for managing the variability and evolution of both software and hardware components
Wittler, J. W.; Kühn, T.; Reussner, R.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference - Volume B Ed.: A. Felfernig, 94–98, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547059 -
Membership Inference Attack Against Principal Component Analysis
Zari, O.; Parra-Arnau, J.; Ünsal, A.; Strufe, T.; Önen, M.
2022. Privacy in Statistical Databases – International Conference, PSD 2022, Paris, France, September 21–23, 2022, Proceedings. Ed.: J. Domingo-Ferrer, 269–282, Springer International Publishing. doi:10.1007/978-3-031-13945-1_19 -
ARCHI4MOM: Using Tracing Information to Extract the Architecture of Microservice-Based Systems from Message-Oriented Middleware
Singh, S.; Werle, D.; Koziolek, A.
2022. Software Architecture : 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 189–204, Springer International Publishing. doi:10.1007/978-3-031-16697-6_14 -
Individual Verifiability with Return Codes: Manipulation Detection Efficacy
Thürwächter, P. T.; Volkamer, M.; Kulyk, O.
2022. Electronic Voting – 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4–7, 2022, Proceedings. Ed.: R. Krimmer, 139–156, Springer International Publishing. doi:10.1007/978-3-031-15911-4_9 -
A Cross-Disciplinary Process Modelling Language for Validating Reconfigured Production Processes
Koch, S.; Wunderlich, T.; Hansert, J.; Schlegel, T.; Ihlenfeldt, S.; Heinrich, R.
2022. Modellierung 2022 : 27.06.-01.07.2022 Hamburg, Germany. Ed.: Matthias Riebisch, 181–190, Köllen Druck+Verlag. doi:10.18420/modellierung2022-004 -
Toward Awareness Creation of Common Challenges Women are Facing in Academia: A Study from a German Perspective
Corallo, S.; Mazkatli, M.; Rapp, M.; Hajiabadi, H.; Kaplan, A.; Kuehn, R.; Schmid, L.; Singh, S.
2022. Software Architecture – 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021, Revised Selected Papers. Ed.: P. Scandurra, 47–62, Springer International Publishing. doi:10.1007/978-3-031-15116-3_3 -
Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Security Gründen
Müllmann, D.; Veit, M. F.; Volkamer, M.
2022. Informatik 2022. Hrsg.: D. Demmler, 601–615, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_49 -
Synchronizing software variants: A two-dimensional approach
König, C.; Rosiak, K.; Linsbauer, L.; Schaefer, I.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference (SPLC ’22), Graz, A, 12.-16. September 2022. Ed.: A. Felfernig. Vol. B, 82–89, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547053 -
Architectural Optimization for Confidentiality Under Structural Uncertainty
Walter, M.; Hahner, S.; Seifermann, S.; Bures, T.; Hnetynka, P.; Pacovský, J.; Heinrich, R.
2022. Software Architecture : 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021 : Revised Selected Papers. Ed.: P. Scandurra, 309–332, Springer Nature Switzerland. doi:10.1007/978-3-031-15116-3_14 -
Grasping the Concept of Decentralized Systems for Instant Messaging
Gebhardt, L.; Leinweber, M.; Jacob, F.; Hartenstein, H.
2022. Proceedings of the 17th Workshop in Primary and Secondary Computing Education, Art.-Nr. 10, Association for Computing Machinery (ACM). doi:10.1145/3556787.3556864 -
Shoulder-Surfing Resistant Authentication for Augmented Reality
Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Nordic Human Computer Interaction Conference (NordiCHI ’22), Art.Nr. 29, ACM Digital Library. doi:10.1145/3546155.3546663 -
Increasing security without decreasing usability: A comparison of various verifiable voting systems
Volkamer, M.; Kulyk, O.; Ludwig, J.; Fuhrberg, N.
2022. Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS 2022), Boston, MA, August 8-9, 2022, 233–252, USENIX Association -
Towards Heterogeneous Remote Attestation Protocols
Wagner, P. G.; Beyerer, J.
2022. Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT. Vol. 1. Ed.: S. De Capitani di Vimercati, 586–591, SciTePress. doi:10.5220/0011289000003283 -
Feature-based Investigation of Simulation Structure and Behaviour
Koch, S.; Hamann, E.; Heinrich, R.; Reussner, R.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 178–185, Springer. doi:10.1007/978-3-031-16697-6_13 -
Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks
Borcherding, A.; Takacs, P.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy, 334–344, SciTePress. doi:10.5220/0010806300003120 -
Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks
Borcherding, A.; Feldmann, L.; Karch, M.; Meshram, A.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, 314–325, SciTePress. doi:10.5220/0010795900003120 -
Anonymizing Trajectory Data: Limitations and Opportunities
Guerra-Balboa, P.; Miranda-Pascual, À.; Strufe, T.; Parra-Arnau, J.; Forné, J.
2022. AAAI Workshop on Privacy-Preserving Artificial Intelligence -
MPER - a Motion Profiling Experiment and Research system for human body movement
Rettlinger, S.; Knaus, B.; Wieczorek, F.; Ivakko, N.; Hanisch, S.; Nguyen, G. T.; Strufe, T.; Fitzek, F. H. P.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy, 21-25 March 2022, 88–90, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767484 -
Conceptualization of a Trust Dashboard for Distributed Usage Control Systems
Wagner, P. G.
2022. Proceedings of the 2021 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory, 169–188, Karlsruher Institut für Technologie (KIT) -
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays
Duezguen, R.; Noah, N.; Mayer, P.; Das, S.; Volkamer, M.
2022. International Conference on Availability, Reliability and Security, ARES 2022, August 23 - August 26, 2022, Vienna, Austria, Art.-No.: 36, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539011 -
Trustworthy Artificial Intelligence
Becker, M.
2022. Proceedings of the 2021 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory, 21–32, Karlsruher Institut für Technologie (KIT) -
Leveraging Distributed Ledger Technology for Decentralized Mobility-as-a-Service Ticket Systems
Leinweber, M.; Kannengießer, N.; Hartenstein, H.; Sunyaev, A.
2022. Towards the New Normal in Mobility : Technische und betriebswirtschaftliche Aspekte. Hrsg.: H. Proff, 547–567, Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-39438-7_32 -
Your Cookie Disclaimer is not in line with the ideas of the GDPR. Why?
Hennig, A.; Dietmann, H.; Lehr, F.; Mutter, M.; Volkamer, M.; Mayer, P.
2022. Human Aspects of Information Security and Assurance. Ed.: N. Clarke, 218–227, Springer-Verlag. doi:10.1007/978-3-031-12172-2_17 -
BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots
Bayreuther, S.; Jacob, F.; Grotz, M.; Kartmann, R.; Peller-Konrad, F.; Paus, F.; Hartenstein, H.; Asfour, T.
2022. SACMAT ’22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesJune 2022, New York NY USA, June 8 - 10, 2022. Ed.: S. Dietrich, 185–194, Association for Computing Machinery (ACM). doi:10.1145/3532105.3535018 -
Introducing an Evaluation Method for Taxonomies
Kaplan, A.; Kühn, T.; Hahner, S.; Benkler, N.; Keim, J.; Fuchß, D.; Corallo, S.; Heinrich, R.; Corallo, S.; Heinrich, R.
2022. EASE 2022: The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 311–316, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535305 -
Quantifying Trustworthiness in Decentralized Trusted Applications
Wagner, P. G.; Beyerer, J.
2022. Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (Sat-CPS’22), 67–76, Association for Computing Machinery (ACM). doi:10.1145/3510547.3517930 -
PREUNN: Protocol Reverse Engineering using Neural Networks
Kiechle, V.; Börsig, M.; Nitzsche, S.; Baumgart, I.; Becker, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy. Ed.: P. Mori. Vol. 1, 345–356, SciTePress. doi:10.5220/0010813500003120 -
Standing out among the daily spam: How to catch website owners’ attention by means of vulnerability notifications
Hennig, A.; Neusser, F.; Pawelek, A. A.; Herrmann, D.; Mayer, P.
2022. Conference on Human Factors in Computing Systems (CHI ’22) : Extended Abstracts, Art.-Nr.: 317, Association for Computing Machinery (ACM). doi:10.1145/3491101.3519847 -
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
Beskorovajnov, W.; Gröll, R.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing. doi:10.1007/978-3-030-97131-1_11 -
SMILE - Smart eMaIl Link Domain Extractor
Mossano, M.; Berens, B.; Heller, P.; Beckmann, C.; Aldag, L.; Mayer, P.; Volkamer, M.
2022. Computer Security. ESORICS 2021 International Workshops – CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers. Ed.: S. Katsikas, 403–412, Springer International Publishing. doi:10.1007/978-3-030-95484-0_23 -
Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings
Byrenheid, M.; Roos, S.; Strufe, T.
2022. ICDCN ’22: Proceedings of the 2022 International Conference on Distributed Computing and Networking ; Jan 4th-7th, 2022, Virtual Conference, 107–116, Association for Computing Machinery (ACM). doi:10.1145/3491003.3491020 -
Recent Developments in the Context of Online Elections and Digital Polls in Germany
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_16 -
Dos and Don’ts of Machine Learning in Computer Security
Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2022. Proc. of the USENIX Security Symposium 2022 -
Towards a Formal Approach for Data Minimization in Programs (Short Paper)
Lanzinger, F.; Weigl, A.
2022. Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers. Ed.: J. Garcia-Alfaro, 161–169, Springer International Publishing. doi:10.1007/978-3-030-93944-1_11 -
Tackling Challenges of Robustness Measures for Autonomous Agent Collaboration in Open Multi-Agent Systems
Jin, D.; Kannengießer, N.; Sturm, B.; Sunyaev, A.
2022. Proceedings of the 55th Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, 03.01.2022-07.01.2022, 7585–7594. doi:10.24251/HICSS.2022.911 -
ETHTID: Deployable Threshold Information Disclosure on Ethereum
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BCCA53669.2021.9657019 -
Architecture Matters: Investigating the Influence of Differential Privacy on Neural Network Design
Morsbach, F.; Dehling, T.; Sunyaev, A.
2021. Presented at NeurIPS 2021 Workshop on Privacy in Machine Learning (PriML 2021), 14.12.2021. doi:10.48550/arXiv.2111.14924 -
Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites
Krisam, C.; Dietmann, H.; Volkamer Melanie; Kulyk, O.
2021. EuroUSEC ’21: European Symposium on Usable Security 2021, Karlsruhe Germany, October 11 - 12, 2021, 8 S., Association for Computing Machinery (ACM). doi:10.1145/3481357.3481516 -
LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems
Kühnapfel, N.; Preußler, S.; Noppel, M.; Schneider, T.; Rieck, K.; Wressnegger, C.
2021. Proceedings of 37th Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 6-10, 2021, 796–811, Association for Computing Machinery (ACM). doi:10.1145/3485832.3485911 -
Need for Change: Business Functions Affected by the Use of Decentralized Information Systems
Heines, R.; Kannengießer, N.; Sturm, B.; Jung, R.; Sunyaev, A.
2021. 42nd International Conference on Information Systems (ICIS), Association for Information Systems (AIS) -
Side-Channel Attacks on Query-Based Data Anonymization
Boenisch, F.; Munz, R.; Tiepelt, M.; Hanisch, S.; Kuhn, C.; Francis, P.
2021. CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 1254–1265, Association for Computing Machinery (ACM). doi:10.1145/3460120.3484751 -
Coupling Smart Contracts: A Comparative Case Study
Friebe, S.; Stengele, O.; Hartenstein, H.; Zitterbart, M.
2021. 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 27-30 Sept. 2021, 137–144, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BRAINS52497.2021.9569830 -
Usable Verifiable Secrecy-Preserving E-Voting
Kulyk, O.; Ludwig, J.; Volkamer, M.; Koenig, R. E.; Locher, P.
2021. 6th Joint International Conference on Electronic Voting, E-Vote-ID 2021, 5-8 October 2021. Ed.: R. Krimmer ; M. Volkamer, 337–353, University of Tartu Press -
Aspect-Oriented Adaptation of Access Control Rules
Bures, T.; Gerostathopoulos, I.; Hnetynka, P.; Seifermann, S.; Walter, M.; Heinrich, R.
2021. 2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 363–370, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA53835.2021.00054 -
How to Increase Smart Home Security and Privacy Risk Perception
Duezguen, R.; Mayer, P.; Berens, B.; Beckmann, C.; Aldag, L.; Mossano, M.; Volkamer, M.; Strufe, T.
2021. 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 18 - 20 Augus 2021, Shenyang, China, 997–1004, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom53373.2021.00138 -
"Now I’m a bit angry:" Individuals’ Awareness, Perception, and Responses to Data Breaches that Affected Them
Mayer, P.; Zou, Y.; Schaub, F.; Aviv, A. J.
2021. 30th USENIX Security Symposium, Vancouver, CDN, August 11-13, 2021, 393–410, Advanced Computing Systems Association (USENIX) -
A Literature Review on Virtual Reality Authentication
Jones, J. M.; Duezguen, R.; Mayer, P.; Volkamer, M.; Das, S.
2021. Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Ed.: S. Furnell, 189–198, Springer. doi:10.1007/978-3-030-81111-2_16 -
Security in Distributed Ledger Technology: An Analysis of Vulnerabilities and Attack Vectors
Gojka, E.-E.; Kannengießer, N.; Sturm, B.; Bartsch, J.; Sunyaev, A.
2021. Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 3. Ed.: K. Arai, 722–742, Springer. doi:10.1007/978-3-030-80129-8_50 -
Generative Machine Learning for Resource-Aware 5G and IoT Systems
Piatkowski, N.; Mueller-Roemer, J. S.; Hasse, P.; Bachorek, A.; Werner, T.; Birnstill, P.; Morgenstern, A.; Stobbe, L.
2021. 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada, 14-23 June 2021, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCWorkshops50388.2021.9473625 -
Towards Correct Smart Contracts: A Case Study on Formal Verification of Access Control
Schiffl, J.; Grundmann, M.; Leinweber, M.; Stengele, O.; Friebe, S.; Beckert, B.
2021. SACMAT ’21: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 125–130, Association for Computing Machinery (ACM). doi:10.1145/3450569.3463574 -
Towards extraction of message-based communication in mixed-technology architectures for performance model
Singh, S.; Kirschner, Y. R.; Koziolek, A.
2021. ICPE ’21: Companion of the ACM/SPEC International Conference on Performance Engineering, 133–138, Association for Computing Machinery (ACM). doi:10.1145/3447545.3451201 -
Adversarial Robust Model Compression using In-Train Pruning
Vemparala, M. R.; Fasfous, N.; Frickenstein, A.; Sarkar, S.; Zhao, Q.; Kuhn, S.; Frickenstein, L.; Singh, A.; Unger, C.; Nagaraja, N. S.; Wressnegger, C.; Stechele, W.
2021. CVPR 3rd Workshop on Safe Artificial Intelligence for Automated Driving (SAIAD), June 19, 2021, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CVPRW53098.2021.00016 -
Dealing with Uncertainty in Architectural Confidentiality Analysis
Hahner, S.
2021. Proceedings of the Software Engineering 2021 Satellite Events, 1–6, Gesellschaft für Informatik (GI) -
Preface to the 3rd Multi-Paradigm Modeling for Cyber-Physical Systems (MPM4CPS 2021)
Amrani, M.; Blouin, D.; Challenger, M.; Deantoni, J.; Heinrich, R.; Wimmer, M.
2021. 24th International Conference on Model-Driven Engineering Languages and Systems: MODELS 2021 ; 10-15 October 2021, Virtual Event, 284–285, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C53483.2021.00049 -
Towards the Co-Evolution of Models and Artefacts of Industrial Tools Through External Views
Sağlam, T.; Kühn, T.
2021. 2021 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Fukuoka, J, October 10-15, 2021, 410–416, IEEEXplore. doi:10.1109/MODELS-C53483.2021.00064 -
Onion Routing with Replies
Kuhn, C.; Hofheinz, D.; Rupp, A.; Strufe, T.
2021. Advances in Cryptology – ASIACRYPT 2021 – 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 573–604, Springer International Publishing. doi:10.1007/978-3-030-92075-3_20 -
Black-Box Accumulation Based on Lattices
Faller, S. H.; Baumer, P.; Klooß, M.; Koch, A.; Ottenhues, A.; Raiber, M.
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer. doi:10.1007/978-3-030-92641-0_11 -
Angriffserkennungssysteme in ICS Netzwerken
Kippe, J.; Karch, M.
2021. Deutschland, Digital, Sicher : 30 Jahre BSI : Tagungsband zum 17. Deutschen IT-Sicherheitskongress, 1–11, SecuMedia Verlag -
A Secure Cell-Attachment Procedure of LDACS
Maurer, N.; Graupl, T.; Gentsch, C.; Guggemos, T.; Tiepelt, K. M.; Schmitt, C.; Rodosek, G. D.
2021. Proceedings 2021 IEEE European Symposium on Security and Privacy Workshops, EuroS&PW 2021: Virtual Conference, 6-10 September 2021, 113–122, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW54576.2021.00019 -
Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance
Arias-Cabarcos, P.; Habrich, T.; Becker, K.; Becker, C.; Strufe, T.
2021. Proceedings of the 30th USENIX Security Symposium : August 11-13, 2021, 55–72, USENIX Association -
2PPS – Publish/Subscribe with Provable Privacy
Abdelwahab Gaballah, S.; Coijanovic, C.; Strufe, T.; Mühlhäuser, M.
2021. 40th International Symposium on Reliable Distributed Systems (SRDS), Chicago, IL, USA, 20-23 Sept. 2021. Vol.: 1, 198–209, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SRDS53918.2021.00028 -
On Expected Polynomial Runtime in Cryptography
Klooß, M.
2021. Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 558–590, Springer International Publishing. doi:10.1007/978-3-030-90459-3_19 -
Classifying and Avoiding Compatibility Issues in Networks of Bidirectional Transformations
Sağlam, T.; Klare, H.
2021. STAF 2021 Workshop Proceedings: 9th International Workshop on Bidirectional Transformations. Hrsg.: Ludovico Lovino, Lars Michael Kristensen, 34–53, CEUR-WS.org -
Tackling Problems of Maintenance and Evolution in Industry 4.0 Scenarios Using a Distributed Architecture
Koch, S.; Wunderlich, T.; Hansert, J.; Heinrich, R.; Schlegel, T.
2021. SE-SE 2021 - Software Engineering 2021 Satellite Events - Workshops and Tools & Demos - Proceedings of the Software Engineering 2021 Satellite Events, Braunschweig/Virtual, Germany, February 22 - 26, 2021. Ed.: S. Götz, CEUR-WS -
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions
Broadnax, B.; Mechler, J.; Müller-Quade, J.
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25 -
Identifying confidentiality violations in architectural design using palladio
Seifermann, S.; Walter, M.; Hahner, S.; Heinrich, R.; Reussner, R.
2021. W. D. W. D. Heinrich R. Mirandola R. (Ed.), 15th European Conference on Software Architecture - Companion, ECSA-C 2021, Virtual, Online, 13 September 2021 through 17 September 2021. Ed.: R. Heinrich, Code 172547, CEUR-WS.org -
Deductive Verification of Floating-Point Java Programs in KeY
Abbasi, R.; Schiffl, J.; Darulova, E.; Ulbrich, M.; Ahrendt, W.
2021. Tools and Algorithms for the Construction and Analysis of Systems : 27th International Conference, TACAS 2021, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021, Luxembourg City, Luxembourg, March 27 – April 1, 2021, Proceedings, Part II. Ed.: J. F. Groote, 242–261, Springer International Publishing. doi:10.1007/978-3-030-72013-1_13 -
Effective Notification Campaigns on the Web : A matter of Trust, Framing, and Support
Maass, M.; Stöver, A.; Pridöhl, H.; Bretthauer, S.; Herrmann, D.; Hollick, M.; Spiecker gen. Döhmann, I.
2021. Proceedings of the 30th USENIV Security Symposium, 2489–2506, USENIX Association -
Recht und Technik: Datenschutz im Diskurs
Grimm, R.; Hornung, G.; Sorge, C.; Spiecker gen. Döhmann, I.
2021. Informatik 2020: Fachtagung vom 28. September–2. Oktober 2020 Karlsruhe. Hrsg.: R. H. Reussner, 813–814, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_72 -
Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis
Patzer, F.; Beyerer, J.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Hrsg:. Paolo Mori, Gabriele Lenzini, Steven Furnell, 550–557, SciTePress. doi:10.5220/0010285305500557 -
Architectural Access Control Policy Refinement and Verification under Uncertainty
Hahner, S.
2021. Companion Proceedings of the 15th European Conference on Software Architecture, RWTH Aachen -
On Forging SPHINCS-Haraka Signatures on a Fault-Tolerant Quantum Computer
Berger, R. M.; Tiepelt, M.
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing. doi:10.1007/978-3-030-88238-9_3 -
Trace Link Recovery for Software Architecture Documentation
Keim, J.; Schulz, S.; Fuchß, D.; Kocher, C.; Speit, J.; Koziolek, A.
2021. Software Architecture: 15th European Conference, ECSA 2021, Virtual Event, Sweden, September 13-17, 2021, Proceedings. Ed.: S. Biffl, 101–116, Springer-Verlag. doi:10.1007/978-3-030-86044-8_7 -
Plausible Deniability for Anonymous Communication
Kuhn, C.; Noppel, M.; Wressnegger, C.; Strufe, T.
2021. Proceedings of 20th Workshop on Privacy in the Electronic Society (WPES), Seoul, South Korea, November 15, 2021, 17–32, Association for Computing Machinery (ACM). doi:10.1145/3463676.3485605 -
Putting Privacy into Perspective – Comparing Technical, Legal, and Users’ View of Information Sensitivity
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Informatik 2020 - Back to the future : 50. Jahrestagung der Gesellschaft für Informatik vom 28. September - 2. Oktober 2020, virtual. Ed.: R.H. Reussner, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_76 -
Reconstructing z3 proofs in KeY: There and back again
Pfeifer, W.; Schiffl, J.; Ulbrich, M.
2021. Proceedings of the 23rd ACM International Workshop on Formal Techniques for Java-like Programs : 23rd ACM International Workshop on Formal Techniques for Java-Like Programs, FTfJP 2021, co-located with ECOOP/ISSTA 2021, Online, 13 July 2021 - null, 24–31, Association for Computing Machinery (ACM). doi:10.1145/3464971.3468421 -
Challenges in aligning enterprise application architectures to business process access control requirements in evolutional changes
Pilipchuk, R.; Seifermann, S.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 18th International Conference on e-Business, ICE-B 2021, Virtual, Online, 7 July 2021 - 9 July 2021, 13–24, SciTePress. doi:10.5220/0010511800130024 -
A unified model to detect information flow and access control violations in software architectures
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2021. Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, Virtual, Online, 6 July 2021 - 8 July 2021, 26–37, SciTePress. doi:10.5220/0010515300260037 -
Vision: What Johnny learns about Password Security from Videos posted on YouTube
Christmann, M.; Mayer, P.; Volkamer, M.
2021. European Symposium on Usable Security (EuroUSEC), 11 - 12 Oktober 2021, 124–128, Association for Computing Machinery (ACM). doi:10.1145/3481357.3481528 -
How to Effectively Communicate Benefits of Introducing a Modern Password Policy to Employees in Companies
Christmann, M.; Mayer, P.; Volkamer, M.
2021. Eighteenth Symposium on Usable Privacy and Security, August 7–9, 2022, Boston, MA, USA -
Evaluation der interaktiven NoPhish Präsenzschulung
Berens, B.; Aldag, L.; Volkamer, M.
2021. Mensch und Computer 2021 - Workshopband. Hrsg.: C. Wienrich, Gesellschaft für Informatik (GI). doi:10.18420/muc2021-mci-wsc-394 -
A classification for managing software engineering knowledge
Kaplan, A.; Walter, M.; Heinrich, R.
2021. EASE 2021: Evaluation and Assessment in Software Engineering. Ed.: R. Chitchyan, 340–346, Association for Computing Machinery (ACM). doi:10.1145/3463274.3463357 -
Classifying Usage Control and Data Provenance Architectures
Wagner, P. G.
2021. Proceedings of the 2020 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer; T. Zander, 135–154, KIT Scientific Publishing -
Modeling Data Flow Constraints for Design-Time Confidentiality Analyses
Hahner, S.; Seifermann, S.; Heinrich, R.; Walter, M.; Bures, T.; Hnetynka, P.
2021. Proceedings IEEE 18th International Conference on Software Architecture - Companion: ICSA-C 2021 ; 22 - 26 March 2021 ; virtual conference, 15–21, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C52384.2021.00009 -
Enabling Consistency between Software Artefacts for Software Adaption and Evolution
Monschein, D.; Mazkatli, M.; Heinrich, R.; Koziolek, A.
2021. Proceedings IEEE 18th International Conference on Software Architecture: 22-26 March 2021 ; virtual conference, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA51549.2021.00009 -
TagVet: Vetting Malware Tags using Explainable Machine Learning
Pirch, L.; Warnecke, A.; Wressnegger, C.; Rieck, K.
2021. EuroSec ’21: Proceedings of the 14th European Workshop on Systems Security, 34–40, Association for Computing Machinery (ACM). doi:10.1145/3447852.3458719 -
A Multivariate Characterization and Detection of Software Performance Antipatterns
Avritzer, A.; Britto, R.; Trubiani, C.; Russo, B.; Janes, A.; Camilli, M.; Van Hoorn, A.; Heinrich, R.; Rapp, M.; Henß, J.
2021. ICPE ’21: Proceedings of the ACM/SPEC International Conference on Performance Engineering, 19-23 April 2021, Rennes, France (virtual), 61–72, Association for Computing Machinery (ACM). doi:10.1145/3427921.3450246 -
Finding a Universal Execution Strategy for Model Transformation Networks
Gleitze, J.; Klare, H.; Burger, E.
2021. Fundamental Approaches to Software Engineering. Ed.: E. Guerra, 87–107, Springer International Publishing. doi:10.1007/978-3-030-71500-7_5 -
A Practical Evaluation Method for Misbehavior Detection in the Presence of Selfish Attackers
Wehmer, M.; Baumgart, I.
2021. Proceedings of the 7th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2021), 529–537, SciTePress. doi:10.5220/0010451005290537 -
Automatically extracting business level access control requirements from BPMN Models to align RBAC policies
Pilipchuk, R.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Ed.: P. Mori, 300–307, SciTePress. doi:10.5220/0010184403000307 -
“Healthy surveillance”: Designing a concept for privacy-preserving mask recognition AI in the age of pandemics
Kühl, N.; Martin, D.; Wolff, C.; Volkamer, M.
2021. Hawaii International Conference on Systems Sciences (HICSS-54), January 5-8, 2021 -
Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende - Betrachtung möglicher arbeitsrechtlicher Konsequenzen
Müllmann, D.; Volkamer, M.
2021. Informatik 2020 - Back to the future. Hrsg.: R. H. Reussner, 829–840, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_74