Unsere
Forschung

Forschungsbereiche

Die ATHENE-Forschung ist in Forschungsbereiche gegliedert, die jeweils einem klaren Auftrag folgen. Mit einer Reihe von Forschungs- und Entwicklungsprojekten tragen diese Forschungsbereiche zum Gesamtauftrag von ATHENE bei.


Kategorie nach ACM Klassifikation:

Applied computingComputer systems organizationComputing methodologiesGeneral and referenceHardwareHuman-centered computingInformation systemsMathematics of computingNetworksSecurity and privacySocial and professional topicsSoftware and its engineeringTheory of computation

Analytics Based Cybersecurity (ABC)

Koordinatorin:
Prof. Haya Schulmann
  • ABC New Directions
    Prof. Haya Schulmann
  • Active Cyber Defense
    Prof. Haya Schulmann
  • Collaborative P2P Botnet Monitoring and Data-Analysis
    Prof. Max Mühlhäuser
  • Research Platform Internet Cybersecurity
    Prof. Haya Schulmann
  • Routing Security
    Prof. Haya Schulmann
  • SecSan
    Prof. Michael Waidner
  • Security of Critical Infrastructures
    Prof. Haya Schulmann
  • Visual Analytics
  • Automatic Vulnerability Scanner for Mobile Applications
  • Automatic Vulnerability Verification
  • Code transformers and knowledge graphs for ​vulnerability detection
    Prof. Mira Mezini
  • Cross-Language Library-Aware Security Analysis of Complex Software Systems
    Prof. Mira Mezini
  • Enhanced Vulnerability Detection
    Dr. Steven Arzt
  • Further development of the CogniCrypt Assistant to ensure the correct use of crypto libraries
  • Hybrid Fuzzing for Apps and Web Applications
    Dr. Steven Arzt
  • Machine Learning for Vulnerability Detection
  • User-centric visualization of security problems
  • Visual and User-Centric Support for Verifying and Avoiding Vulnerabilities
    Prof. Jörn Kohlhammer
  • Vulnerability Detection for Hybrid Apps using Generic Analyses

Cryptography (Crypto)

Koordinator:
Prof. Marc Fischlin
  • Agile and Easy-to-use Integration of PQC Schemes
    Prof. Andreas Heinemann
    Prof. Alexander Wiesmaier
  • Cryptography and Game Theory for Decentralized Exchanges
    Prof. Sebastian Faust
  • Design and Analysis of PQC Primitives
  • High Performance Implementations of PQC Schemes
  • Leakage Models for Masking: Bridging the gap between theory and practice
    Prof. Sebastian Faust
  • PORTUNUS
    Prof. Andreas Koch
  • PQC Building Blocks for eCard Applications - Quantum-resilient PACE
    Prof. Alexander Wiesmaier
  • Quantum-Resistance of Symmetric-Key Primitives
    Prof. Marc Fischlin

Legal Aspects of Privacy and IT Security (LeAP)

Koordinatorinnen:
Dr. Annika Selzer
Prof. Indra Spiecker gen. Döhmann
  • Legal framework for offensive cybersecurity research (LegRes)
    Dr. Annika Selzer
  • Privacy at Large (P@L)
    Dr. Annika Selzer
  • Systematic privacy for large, real-life data processing systems
    Dr. Annika Selzer

Next Generation Biometric Systems (NGBS)

Koordinatoren:
Prof. Christian Rathgeb
Prof. Christoph Busch
Dr. Naser Damer
  • Bias and Fairness in Biometric Systems
  • Biometric sample quality assessment
    Florian Kirchbuchner, M. Sc.
    Dr. Olaf Henniger
  • Biometric Tampering Detection
  • Embedded Biometrics
    Florian Kirchbuchner, M. Sc.
    Dr. Naser Damer
  • Fair Biometric Systems ​
    Prof. Christoph Busch
  • Operational Challenges in Face Recognition
  • Secure Identity Management
    Florian Kirchbuchner, M. Sc.
    Dr. Naser Damer
  • Trustworthy Biometrics (TrustBio)
    Prof. Christoph Busch
    Prof. Christian Rathgeb
  • Cross-Domain Disinformation Analysis (CRISIS)
    Prof. Martin Steinebach
  • Deepfake REcognition and Artificial Media (DREAM)
    Prof. Martin Steinebach

Secure Autonomous Driving (SAD)

Koordinator:
Prof. Christoph Krauß
  • Automotive Forensic Processing (AuFoP)
    Prof. Christoph Busch
  • REadyness for FOrensics in Mobility (ReForM)
  • SEcure Automotive COmmunication Protocols (SEACOP)
    Prof. Christoph Krauß
  • SECurity Test and Evaluation platform for Autonomous driving – used for IDPS (SECTEA)
  • Collecting and Sharing Distributed Medical Data of a Digital Twin - Securely, Privacy-friendly and User-centered
    Prof. Jörn Kohlhammer
  • Disinformation and Corona
    Prof. Martin Steinebach
  • Fake News and Conspiracy Theories
    Prof. Iryna Gurevych
  • JAB Codes for Secure Ad-hoc Documents
    Prof. Martin Steinebach
  • Know Your App
  • Security Analysis of the German Corona Warn App
    Dr. Steven Arzt
  • Secure Medical Data Sharing
  • Privacy-Aware Domain-Adaptive Medical NLP (PADAM)
    Prof. Iryna Gurevych
  • Quality Assurance of Biomedical Literature
    Prof. Iryna Gurevych

Secure Urban Infrastructures (SecUrban)

Koordinator:
Prof. Christian Reuter
  • Architecture and Processes for Effective Cybersecurity and Privacy Protection in Smart Cities (SecArch)
    Dr. Michael Kreutzer
  • Integrating Safety and Security Aspects in Secure Urban Infrastructures (SaSec)
  • Secure Urban Mesh Networks (Smesh)
  • Security and Privacy of Security and Privacy of Location Systems in Urban Environments (SPLocS)
    Prof. Matthias Hollick
  • Security Modelling and Si­mu­la­tion of Secure Urban Infrastructures (SeMS)
  • Security of Fiber-Optic Critical Infrastructures (SecFOCI)
    Prof. Christian Reuter
  • Security of Urban Infrastructures Against Cyberattacks (SecAttack)
  • Situation Awareness for Smart Cities (SiAware)
  • Adversarial Attacks on NLP systems
    Prof. Iryna Gurevych
  • EXplainable REinforcement Learning for Secure Intelligent Systems (XReLeaS)
    Prof. Kristian Kersting
  • Protecting Privacy and Sensitive Information in Texts
    Prof. Iryna Gurevych
  • Robustness in Machine Learning (RoMa)
    Prof. Martin Steinebach
  • Security and Privacy in Automated OSINT (SePiA)
    Prof. Martin Steinebach
  • Security in Large Language Models (SecLLM)
    Prof. Iryna Gurevych

Trustworthy Data Ecosystems (TRUDATA)

Koordinatoren:
Prof. Carsten Binnig
Prof. Sebastian Faust
  • Cryptographic Primitives for Secure Decentralized Protocols
  • Distributed Ledger & Multiparty Computation
  • Encryption Meets Search
    Prof. Marc Fischlin
  • Federated Machine Learning
  • Hardware-assisted Data Protection
    Prof. Ahmad-Reza Sadeghi
  • Model-centric Deductive Verification of Smart Contracts
    Dr. Richard Bubel
    Prof. Reiner Hähnle
  • Probabilistic Data Structures in Adversarial Environments
  • Securing Refinements of Distributed Workflows
    Prof. Heiko Mantel
  • Trusted Multiparty Computation as a Service
    Prof. Sebastian Faust
  • Trusted Utilization of Personal Data
    Prof. Mira Mezini

User-centered Security and Privacy (UCSP)

Koordinatoren:
Prof. Max Mühlhäuser
Prof. Andreas Heinemann
  • Comprehensive Probabilistic QoSec-Assessment (ComPAss)
    Prof. Max Mühlhäuser
  • Data Economy and Privacy—An International and Intercultural Perspective
  • Easy-to-use Processes and Tools for User-Centric Co-Development of PETs
  • Economics of Cybersecurity (EcoSec)
  • Fingerprinting Detection and Remediation in Mobile Apps​
    Dr. Jens Heider
  • Formal QoSec for Comparison and Composition (FoCC)
  • PETs for Smart Cities in Security Situations
  • PETs in Disease-Management Programs to Reduce Health Care Costs
  • Practical Private Set Intersection for Data Protection
  • Privacy Risks and Safety in Machine Learning (PRisMa)
  • Quantitative and Probabilistic QoSec in Complex HW/SW-Systems (QPSys)
  • Systematic privacy for large, real-life data processing systems
    Dr. Annika Selzer
  • Technical Support for the Implementation of Requirements in Applications in Accordance with GDPR (TECHIRA)
  • User-Centered Technology Design for Cyber Situational Awareness
    Prof. Christian Reuter
  • User-Centered Technology Design for Cyber Situational Awareness
    Prof. Christian Reuter
  • Visualization-based Technologies as Enablers for Privacy Sovereignty Online (PriVis)
    Prof. Jörn Kohlhammer
  • Visualization of Critical Aspects for Data Analysis and Privacy