Publikationen

Publikationen

Cyber­security risk assessment in OT systems using attack graphs
Unger, Simon; Arzoglou, Ektor; Heinrich, Markus; Scheuermann, Dirk; Katzenbeisser, Stefan
[Journal Article]


Fast Rerouting Against Dynamic Failures: 2-Resilience via Ear-Decomposition and Planarity
Dai, Wenkai; Foerster, Klaus-Tycho Tycho; Schmid, Stefan
International Conference on Principles of Distributed Systems 2025
[Conference Paper]


Identifying Microcontroller Architecture Through Static Analysis of Firmware Binaries
Malaschonok, David
Workshop on Security and Privacy in Standardized IoT 2026
[Conference Paper]


IT and more: Kennzeichnungspflicht für KI-generierte Inhalte
Wache, Magdalena; Steinebach, Martin; Berchtold, Waldemar
[Journal Article]


Sicherheitsrisiken beim Client-Side-Scanning
Steinebach, Martin
[Journal Article]


Grammar as a behavioral biometric: using cognitively motivated grammar models for authorship verification
Nini, Andrea; Halvani, Oren; Graner, Lukas; Titze, Sophie; Gherardi, Valerio; Ishihara, Shunichi
[Journal Article]


Im Cybersicherheits- und Datenschutzgeflecht: Besser konsolidieren für mehr Innovation
Selzer, Annika; Kreutzer, Michael; Stummer, Sarah


Statistical Feature-Based Detection of Adversarial Noise and Patch Attacks in Image and Deepfake Analysis
Bunzel, Niklas; Frick, Raphael; Graner, Lukas; Göller, Nicolas; Steinebach, Martin
[Book Article]


Secure Medical Digital Twins: A Use-Case Driven Approach
Ahmad, Salmah; Bartelt, Bianca; Enzmann, Matthias; Kohlhammer, Jörn; Wesarg, Stefan; Wolf, Ruben
International Workshop on Digital Twin for Healthcare 2025
[Conference Paper]


Distributed Construction of Demand-Aware Datacenter Networks
Figiel, Aleksander; Melnyk, Darya; Milentijevic, Tijana; Schmid, Stefan
39th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2025
[Conference Paper]


Fraunhofer SIT at GenAI Detection Task 1: Adapter Fusion for AI-generated Text Detection
Schäfer, Karla; Steinebach, Martin
1st Workshop on GenAI Content Detection, GenAIDetect 2025
[Conference Paper]


Security Assessment of Mobile Banking Apps in West African Economic and Monetary Union
Diallo, Alioune; War, Aicha; Diouf, Moustapha Awwalou; Samhi, Jordan; Arzt, Steven; Bissyandé, Tégawendé François; Klein, Jacques
2nd Cyber­security for Development, C4D 2025
[Conference Paper]


Learning to Identify Conflicts in RPKI
Shulman, Haya; Zhao, Shujie
20th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2025
[Conference Paper]


Enhancing Transparency and Trust in Remote Attestation for Secure IT and OT Systems
Eckel, Michael
[Thesis]


Secure Management of Connected Vehicles using Trusted Computing-enabled Central Security Provider
Plappert, Christian
[Thesis]


Recht und Technik - Datenschutz im Diskurs Vorwort zu den Workshopbeiträgen
Grimm, Rüdiger; Hornung, Gerrit; Sorge, Christoph; Döhmann genannt Spiecker, Indra
Gesellschaft für Informatik (Jahrestagung) 2025
[Conference Paper]


Automatisierung offensiver Cybersicherheitsmaßnahmen
Esser, Julia; Plötz, Caroline
Gesellschaft für Informatik (Jahrestagung) 2025
[Conference Paper]


Characterizing Hosting and Security Practices for Public-Facing LDAP Servers
Cesar, Gustavo Luvizotto; Öndarö, Gurur; Kaspereit, Jonas; Ising, Fabian; Schinzel, Sebastian; Jonker, Mattijs; Holz, Ralph G.
International Conference on Network and Service Management 2025
[Conference Paper]


Terminator: Enabling Efficient Fuzzing of Closed-Source GUI Programs by Automatic Coverage-Guided Termination
Zabel, Jonas; Kolvenbach, Philip; Arzt, Steven
International Conference on Automated Software Engineering 2025
[Conference Paper]


Photonic Side-Channel Analyzer: Enabling Security-Aware Physical Design Methodology
Wang, Meizhi; Chen, Yi-Ru; Nibhanupudi, S.S. Teja; Amini, Elham; Saavedra, Antonio; Wang, Yinan; Wasserman, Daniel; Seifert, Jean-Pierre; Kulkarni, Jaydeep P.
International Symposium on Physical Design 2025
[Conference Paper]


Disinformation Analysis on Telegram: A Metadata-Centered, Privacy-Aware Dataset
Choi, Jeong-Eun; Schäfer, Karla; Yannikos, York; Steinebach, Martin
International Conference on Big Data 2025
[Conference Paper]


Towards Interpretable Suicide Risk Prediction: A Hybrid Approach with Feature Extraction and Sequential Binary Classification
Choi, Jeong-Eun; Fan, Shiying
International Conference on Big Data 2025
[Conference Paper]


Exploring the Relationship Between Network Similarity and Transferability of Adversarial Attacks
Klause, Gerrit; Bunzel, Niklas
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]


Können KI-Chatbots zum Datenschutz schulen?
Forina, Alina; Stummer, Sarah
[Study]


LENI: Lightweight and Efficient Network-Optimized Remote Attestation for IoT Devices
Eckel, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]


Who Appraises the Appraiser? Decentralized Attestation with Partial Appraisal and Aggregated Results
Eckel, Michael; Gkoktsis, George; Horn, Markus
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]


Towards Stateless Post-Quantum Remote Attestation for IoT Using TPM and DICE
Eckel, Michael; Gorbracht, Janik; Gkoktsis, George; Kaupat, Tobias
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]


Meldung von Sicherheitsvorfällen
Hardt, Mark Joshua; Stummer, Sarah
[Journal Article]


De-Anonymisierungsstrategien: Empirische Analyse und normative Implikationen
Stummer, Sarah; Hähle, Phillip
Gesellschaft für Informatik (Jahrestagung) 2025
[Conference Paper]


Weiterbildung zur Cybersicherheit
Schneider, Markus; Heftrig, Elias; Dukanovic, Sinisa; Dexheimer, Thomas
[Journal Article]