Unsere
Forschung

Forschungsbereiche

Die ATHENE-Forschung ist in Forschungsbereiche gegliedert, die jeweils einem klaren Auftrag folgen. Mit einer Reihe von Forschungs- und Entwicklungsprojekten tragen diese Forschungsbereiche zum Gesamtauftrag von ATHENE bei.


Kategorie nach ACM Klassifikation:

Applied computingComputer systems organizationComputing methodologiesGeneral and referenceHardwareHuman-centered computingInformation systemsMathematics of computingNetworksSecurity and privacySocial and professional topicsSoftware and its engineeringTheory of computation

Analytics Based Cybersecurity (ABC)

Koordinatorin:
Prof. Haya Schulmann
  • ABC New Directions
    Prof. Haya Schulmann
  • Active Cyber Defense
    Prof. Haya Schulmann
  • Control-Flow Fingerprinting for Malware Detection (CFFP)
    Prof. Haya Schulmann
    Prof. Michael Waidner
    Prof. Reiner Hähnle
  • Large-scale LDAP and S/MIME Analysis (LLAMA)
    Prof. Sebastian Schinzel
  • Research Platform Internet Cybersecurity
    Prof. Haya Schulmann
  • Routing Security
    Prof. Haya Schulmann
  • SecScan
    Prof. Michael Waidner
  • Security of Critical Infrastructures
    Prof. Haya Schulmann
  • Collaborative P2P Botnet Monitoring and Data-Analysis
  • Visual Analytics
  • Code transformers and knowledge graphs for ​vulnerability detection
    Prof. Mira Mezini
  • Cross-Language Library-Aware Security Analysis of Complex Software Systems
    Prof. Mira Mezini
  • Enhanced Vulnerability Detection
    Dr. Steven Arzt
  • Hybrid Fuzzing for Apps and Web Applications
    Dr. Steven Arzt
  • Visual and User-Centric Support for Verifying and Avoiding Vulnerabilities
    Prof. Jörn Kohlhammer
  • Automatic Vulnerability Scanner for Mobile Applications
  • Automatic Vulnerability Verification
  • Further development of the CogniCrypt Assistant to ensure the correct use of crypto libraries
  • Machine Learning for Vulnerability Detection
  • User-centric visualization of security problems
  • Vulnerability Detection for Hybrid Apps using Generic Analyses

Cryptography (Crypto)

Koordinator:
Prof. Marc Fischlin
  • Cryptography and Game Theory for Decentralized Exchanges
    Prof. Sebastian Faust
  • High Performance Implementations of PQC Schemes
    Dr. Fabian Ising
  • Leakage Models for Masking: Bridging the gap between theory and practice
    Prof. Sebastian Faust
  • PORTUNUS
    Prof. Andreas Koch
  • PQC Building Blocks for eCard Applications - Quantum-resilient PACE
    Prof. Alexander Wiesmaier
  • Quantum-Resistance of Symmetric-Key Primitives
    Prof. Marc Fischlin
  • Agile and Easy-to-use Integration of PQC Schemes
  • Design and Analysis of PQC Primitives
  • Legal aspects of offensive cybersecurity research in dark-X environments (Dark-X)
    Dr. Annika Selzer
  • Legal framework for offensive cybersecurity research (LegRes)
    Dr. Annika Selzer
  • Privacy at Large (P@L)
    Dr. Annika Selzer
  • Systematic privacy for large, real-life data processing systems
    Dr. Annika Selzer

Next Generation Biometric Systems (NGBS)

Koordinatoren:
Prof. Christian Rathgeb
Prof. Christoph Busch
Dr. Naser Damer
  • Bias and Fairness in Biometric Systems
  • Biometric sample quality assessment
    Florian Kirchbuchner, M. Sc.
    Dr. Olaf Henniger
  • Embedded Biometrics
    Florian Kirchbuchner, M. Sc.
    Dr. Naser Damer
  • Fair Biometric Systems ​
    Prof. Christoph Busch
  • Operational Challenges in Face Recognition
  • Secure Identity Management
    Florian Kirchbuchner, M. Sc.
    Dr. Naser Damer
  • Trustworthy Biometrics (TrustBio)
    Prof. Christoph Busch
    Prof. Christian Rathgeb
  • Biometric Tampering Detection
  • Cross-Domain Disinformation Analysis (CRISIS)
    Prof. Martin Steinebach
  • Deepfake REcognition and Artificial Media (DREAM)
    Prof. Martin Steinebach
  • Chat Control, Age Verification and Resilience for Minors (ChARM)
    Prof. Martin Steinebach
  • Security and Privacy in Automated OSINT
  • Collecting and Sharing Distributed Medical Data of a Digital Twin - Securely, Privacy-friendly and User-centered
    Prof. Jörn Kohlhammer
  • Fake News and Conspiracy Theories
    Prof. Iryna Gurevych
  • JAB Codes for Secure Ad-hoc Documents
    Prof. Martin Steinebach
  • Privacy-Aware Domain-Adaptive Medical NLP (PADAM)
    Prof. Iryna Gurevych
  • Quality Assurance of Biomedical Literature
    Prof. Iryna Gurevych
  • Disinformation and Corona
    Prof. Martin Steinebach
  • Know Your App
  • Security Analysis of the German Corona Warn App
    Dr. Steven Arzt
  • Secure Medical Data Sharing

Secure Urban Infrastructures (SecUrban)

Koordinator:
Prof. Christian Reuter
  • Architecture and Processes for Effective Cybersecurity and Privacy Protection in Smart Cities (SecArch)
    Dr. Michael Kreutzer
  • Security of Fiber-Optic Critical Infrastructures (SecFOCI)
    Prof. Christian Reuter
  • Security and Privacy of Security and Privacy of Location Systems in Urban Environments (SPLocS)
    Prof. Matthias Hollick
  • Integrating Safety and Security Aspects in Secure Urban Infrastructures (SaSec)
  • Secure Urban Mesh Networks (Smesh)
  • Security Modelling and Si­mu­la­tion of Secure Urban Infrastructures (SeMS)
  • Security of Urban Infrastructures Against Cyberattacks (SecAttack)
  • Situation Awareness for Smart Cities (SiAware)
  • EXplainable REinforcement Learning for Secure Intelligent Systems (XReLeaS)
    Prof. Kristian Kersting
  • Forensic and OSINT Technology with Machine Learning (FROST + ML)
    Prof. Martin Steinebach
  • Protecting Privacy and Sensitive Information in Texts
    Prof. Iryna Gurevych
  • Robustness in Machine Learning (RoMa)
    Prof. Martin Steinebach
  • Security and Privacy in Automated OSINT (SePiA)
    Prof. Martin Steinebach
  • Security in Large Language Models (SecLLM)
    Prof. Iryna Gurevych
  • Adversarial Attacks on NLP systems
    Prof. Iryna Gurevych

Trustworthy Data Ecosystems (TRUDATA)

Koordinatoren:
Prof. Carsten Binnig
Prof. Sebastian Faust
  • Encryption Meets Search
    Prof. Marc Fischlin
  • Hardware-assisted Data Protection
    Prof. Ahmad-Reza Sadeghi
  • Model-centric Deductive Verification of Smart Contracts
    Dr. Richard Bubel
    Prof. Reiner Hähnle
  • Probabilistic Data Structures in Adversarial Environments
  • Securing Refinements of Distributed Workflows
    Prof. Heiko Mantel
  • Trusted and Scalable Shared Databases
    Prof. Carsten Binnig
  • Trusted Multiparty Computation as a Service
    Prof. Sebastian Faust
  • Trusted Utilization of Personal Data
    Prof. Mira Mezini
  • Cryptographic Primitives for Secure Decentralized Protocols
  • Distributed Ledger & Multiparty Computation
  • Federated Machine Learning

User-centered Security and Privacy (UCSP)

Koordinatoren:
Prof. Andreas Heinemann
Prof. Christian Reuter
  • A PrIvacy companion for mOtivatioN andknowlEdge transfER (PIONEER)
    Dr. Ephraim Zimmer
    Dr. Nina Gerber
  • A Security Mechanism to Detect and MitigatePerceptual Manipulations in Extended Reality (XR-GUARD)
    Prof. Jan Gugenheimer
  • Comprehensive Probabilistic QoSec-Assessment (ComPAss)
  • Fingerprinting Detection and Remediation in Mobile Apps​
    Dr. Jens Heider
  • Systematic privacy for large, real-life data processing systems
    Dr. Annika Selzer
  • User-Centered Technology Design for Cyber Situational Awareness
    Prof. Christian Reuter
  • Data Economy and Privacy—An International and Intercultural Perspective
  • Visualization-based Technologies as Enablers for Privacy Sovereignty Online (PriVis)
    Prof. Jörn Kohlhammer
  • Easy-to-use Processes and Tools for User-Centric Co-Development of PETs
  • Economics of Cybersecurity (EcoSec)
  • Formal QoSec for Comparison and Composition (FoCC)
  • PETs for Smart Cities in Security Situations
  • Practical Private Set Intersection for Data Protection
  • PETs in Disease-Management Programs to Reduce Health Care Costs
  • Privacy Risks and Safety in Machine Learning (PRisMa)
  • Quantitative and Probabilistic QoSec in Complex HW/SW-Systems (QPSys)
  • Technical Support for the Implementation of Requirements in Applications in Accordance with GDPR (TECHIRA)
  • Visualization of Critical Aspects for Data Analysis and Privacy