Our
Research

Research Areas

ATHENE is accompanying the digitalization of society, economy and government from the perspective of cybersecurity and privacy with application-oriented cutting-edge research and development. The research is divided into various research areas headed by coordinators. In projects assigned to these research areas, concepts, methods and technologies are being developed that sustainably improve and ensure cyber security and privacy protection across all areas of life. An interdisciplinary approach to the problems involves different sciences such as psychology, ergonomics, economics, etc.


Category according to ACM classification:

Applied computingComputer systems organizationComputing methodologiesGeneral and referenceHardwareHuman-centered computingInformation systemsMathematics of computingNetworksSecurity and privacySocial and professional topicsSoftware and its engineeringTheory of computation

Analytics Based Cybersecurity (ABC)

Coordinator:
Prof. Haya Shulman
  • Collaborative P2P Botnet Monitoring and Data-Analysis
    Prof. Max Mühlhäuser
  • Research Platform Internet Cybersecurity
    Prof. Haya Shulman
  • Routing Security
    Prof. Haya Shulman
  • Visual Analytics
    Prof. Jörn Kohlhammer
  • SecSan
    Prof. Michael Waidner
  • ABC New Directions
    Prof. Haya Shulman
  • Automatic Vulnerability Scanner for Mobile Applications
    Dr. Steven Arzt
  • Automatic Vulnerability Verification
    Dr. Steven Arzt
  • Further development of the CogniCrypt Assistant to ensure the correct use of crypto libraries
    Prof. Mira Mezini
  • Machine Learning for Vulnerability Detection
    Prof. Kristian Kersting
  • User-centric visualization of security problems
    Prof. Jörn Kohlhammer
  • Vulnerability Detection for Hybrid Apps using Generic Analyses
    Prof. Mira Mezini
  • Code transformers and knowledge graphs for ​vulnerability detection
    Prof. Mira Mezini

Cryptography (Crypto)

Coordinator:
Prof. Marc Fischlin
  • Agile and Easy-to-use Integration of PQC Schemes
    Prof. Andreas Heinemann
    Prof. Alexander Wiesmaier
  • High Performance Implementations of PQC Schemes
    Norman Lahr
  • PORTUNUS
    Prof. Andreas Koch
  • Quantum-Resistance of Symmetric-Key Primitives
    Prof. Marc Fischlin

Next Generation Biometric Systems (NGBS)

Coordinator:
Prof. Christoph Busch
  • Bias and Fairness in Biometric Systems
    Prof. Christoph Busch
    Dr. Jascha Kolberg
  • Biometric sample quality assessment
    Florian Kirchbuchner, M. Sc.
    Dr. Olaf Henniger
  • Biometric Tampering Detection
    Prof. Christoph Busch
    Dr. Christian Rathgeb
  • Embedded Biometrics
    Florian Kirchbuchner, M. Sc.
    Dr. Naser Damer
  • Operational Challenges in Face Recognition
    Prof. Christoph Busch
    Dr. Christian Rathgeb
  • Fair Biometric Systems ​
    Prof. Christoph Busch
    Dr. Jascha Kolberg

OPen and Sustainable IoT Security (OPSIS)

Acting Coordinator:
Dr. Hagen Lauer
  • Cryptographic Evaluation of Bluetooth (CryptoBlue)
    Prof. Marc Fischlin
  • Efficient practical tests of the security properties of IoT systems through the use of novel return channels (ETCH)
    Andreas Fuchs
  • Next Generation Secure Wireless Communications (NGWiSec)
    Prof. Matthias Hollick
    Dr. Jiska Classen
  • Open Side-Channel-Resilient Trusted Execution Environment (TEE) Design (TrusTEE)
    Prof. Ahmad-Reza Sadeghi
  • Secure Hardware Monitors for Data and Control Flows (SHMoDaCo)
    Prof. Andreas Koch
  • Security and Privacy of IoT Communication Technologies (SPIC)
    Andreas Fuchs

Secure Autonomous Driving (SAD)

Coordinator:
Prof. Christoph Krauß
  • Automotive Forensic Processing (AuFoP)
    Prof. Christoph Busch
  • REadyness for FOrensics in Mobility (ReForM)
    Prof. Martin Steinebach
  • SEcure Automotive COmmunication Protocols (SEACOP)
    Prof. Christoph Krauß
  • SECurity Test and Evaluation platform for Autonomous driving – used for IDPS (SECTEA)
    Andreas Fuchs
  • Disinformation and Corona
    Prof. Martin Steinebach
  • Fake News and Conspiracy Theories
    Prof. Iryna Gurevych
  • JAB Codes for Secure Ad-hoc Documents
    Prof. Martin Steinebach
  • Know Your App
    Prof. Mira Mezini
  • Quality Assurance of Biomedical Literature
    Prof. Iryna Gurevych
  • Secure Medical Data Sharing
    Dr. Stefan Wesarg
  • Security Analysis of the German Corona Warn App
    Dr. Steven Arzt

Secure Urban Infrastructures (SecUrban)

Coordinator:
Prof. Christian Reuter
  • Architecture and Processes for Effective Cybersecurity and Privacy Protection in Smart Cities (SecArch)
    Prof. Haya Shulman
  • Integrating Safety and Security Aspects in Secure Urban Infrastructures (SaSec)
    Prof. Joachim Vogt
  • Secure Urban Mesh Networks (Smesh)
    Prof. Matthias Hollick
  • Security Modelling and Si­mu­la­tion of Secure Urban Infrastructures (SeMS)
    Prof. Max Mühlhäuser
  • Security of Urban Infrastructures Against Cyberattacks (SecAttack)
    Prof. Christian Reuter
  • Situation Awareness for Smart Cities (SiAware)
    Florian Kirchbuchner, M. Sc.
  • Adversarial Attacks on NLP systems
    Prof. Iryna Gurevych
  • EXplainable REinforcement Learning for Secure Intelligent Systems (XReLeaS)
    Prof. Jan Peters
  • Robustness in Machine Learning (RoMa)
    Prof. Martin Steinebach
  • Security and Privacy in Automated OSINT (SePiA)
    Prof. Martin Steinebach

Trustworthy Data Ecosystems (TRUDATA)

Coordinators:
Prof. Carsten Binnig
Prof. Sebastian Faust
  • Federated Machine Learning
    Prof. Carsten Binnig
  • Trusted Utilization of Personal Data
    Prof. Mira Mezini
  • Hardware-assisted Data Protection
    Prof. Ahmad-Reza Sadeghi
  • Distributed Ledger & Multiparty Computation
    Prof. Sebastian Faust
  • Trusted Multiparty Computation as a Service
    Prof. Sebastian Faust
  • Cryptographic Primitives for Secure Decentralized Protocols
    Dr. Jean Paul Degabriele
  • Encryption Meets Search
    Prof. Marc Fischlin
  • Securing Refinements of Distributed Workflows
    Prof. Heiko Mantel
  • Model-centric Deductive Verification of Smart Contracts
    Dr. Richard Bubel
    Prof. Reiner Hähnle
  • Probabilistic Data Structures in Adversarial Environments
    Dr. Jean Paul Degabriele

User-centered Security and Privacy (UCSP)

Coordinators:
Prof. Max Mühlhäuser
Prof. Peter Buxmann
  • Data Economy and Privacy—An International and Intercultural Perspective
    Prof. Peter Buxmann
  • Easy-to-use Processes and Tools for User-Centric Co-Development of PETs
    Prof. Andreas Heinemann
  • PETs for Smart Cities in Security Situations
    Prof. Christian Reuter
  • Practical Private Set Intersection for Data Protection
    Prof. Thomas Schneider
  • Privacy Risks and Safety in Machine Learning (PRisMa)
    Prof. Martin Steinebach
  • Technical Support for the Implementation of Requirements in Applications in Accordance with GDPR (TECHIRA)
    Dr. Annika Selzer
  • Visualization of Critical Aspects for Data Analysis and Privacy
    Prof. Jörn Kohlhammer
  • Comprehensive Probabilistic QoSec-Assessment (ComPAss)
    Prof. Max Mühlhäuser
  • Economics of Cybersecurity (EcoSec)
    Prof. Peter Buxmann
  • Formal QoSec for Comparison and Composition (FoCC)
    Prof. Heiko Mantel
  • Quantitative and Probabilistic QoSec in Complex HW/SW-Systems (QPSys)
    Prof. Matthias Hollick
  • Fingerprinting Detection and Remediation in Mobile Apps​
    Dr. Jens Heider