Publications
The following is a list of peer reviewed papers written by members of our research group, ordered by date descending.
- 2024-11: Blue Team Fundamentals: Roles and Tools in a Security Operations Center
- 2024-11: Fast Charging Communication and Cybersecurity: A Technology Review
- 2024-07: An Analysis of Security Concerns in Transitioning Battery Management Systems from First to Second Life
- 2024-02: Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 23242)
- 2024: Cybersecurity as a Service
- 2023-06: Security architecture for automotive communication networks with CAN FD
- 2023: Binding the Battery to the Pass: An Approach to Trustworthy Product Life Cycle Data by Using Certificates Based on PUFs
- 2023: SELFY Presentation - CyberMatch Conference
- 2023: SELFY Presentation - CyberMatch Conference …
- 2023: SELFY Presentation - CyberMatch Conference …
- 2023: Security architecture for automotive communication networks with CAN FD
- 2023: From SOC to VSOC
- 2023: Binding the Battery to the Pass: An Approach to Trustworthy Product Life Cycle Data by Using Certificates Based on PUFs
- 2022: Digital Forensics Investigation of the Tesla Autopilot File System
- 2022: Implementation of a Software Based Glitching Detection Mechanism
- 2022: Digital Forensics Investigation of the Tesla Autopilot File System
- 2022: Inclusive Security by Design
- 2022: Design and implementation of automated bus protocol learning algorithms
- 2021-11: Identification of Automotive Digital Forensics Stakeholders
- 2021-06: berwachung in modernen Fahrzeugen
- 2021-05: berwachung in modernen Fahrzeugen
- 2021-04: A generalized approach to automotive forensics
- 2021: A generalized approach to automotive forensics
- 2021: ADAM An Adversary-Driven Attack Modelling Framework for Model-Based Security Testing
- 2021: Presentation of the Programme of the 6th GI/ACM Standardization Workshop on Industrial Automation and Control Systems the 6th IACS WS'21 September 28, 2021 Virtual
- 2021: SECURWARE 2021
- 2021: Structured methodology and survey to evaluate data completeness in automotive digital forensics
- 2021: berwachung in modernen Fahrzeugen
- 2021: Identification of automotive digital forensics stakeholders
- 2020-11: A Concept of an Attack Model for a Model-Based Security Testing Framework Introducing a Holistic Perspective of Cyberattacks in Software Engineering
- 2020: A Concept of an Attack Model for a Model-Based Security Testing Framework
- 2020: Computer Science in Cars Symposium
- 2020: Cybersicherheit fr mobile und intelligente Komponenten
- 2020: Entwurf und Implementierung eines Sicherheitsmonitors fr Heimnetzwerke
- 2020: Konzeptionierung von Security Design Anti-Pattern und deren Suche im Software Design am Beispiel von Sequenzdiagrammen
- 2020: Methodik zur Angriffsmodellierung fr Security-Tests
- 2020: SECURWARE 2020
- 2020: Taxonomie von Angriffen als Basis fr eine Angriffsbibliothek
- 2020: The 5th GI/ACM Workshop 2020 Scope and Draft Programme on Standardization of Secure and Safe Smart Manufacturing Systems with respect to IEC 62443 IACS
- 2020: Untersuchung einer Implementierung der Ladekommunikation gem der ISO-15118 mittels Fuzz-Tests
- 2019: 4th gi/acm workshop on standardization of i4.0 automation and control systems
- 2019: ACM Computer Science in Cars Symposium
- 2019: ACM Computer Science in Cars Symposium
- 2019: Analysis of digital forensics capabilities on state-of-the-art vehicles
- 2019: Design, Implementierung und Evaluierung eines automotive Intrusion Detection Systems
- 2019: Konzeption einer grafischen Beschreibunssprache fr IT Security Policies anhand ausgewhlter Beispiele
- 2019: Konzeption und prototypische Implementierung einer automatisierten Testfallgenerierung aus Anforderungsspezifikationen mittels Natural Language Processing
- 2019: Konzeptionierung eines Briefmarkensystems fr E-Mails zur Bepreisung der Aufmerksamkeit des Empfngers
- 2019: Licht an im Darknet
- 2019: Maschinelles Lernen zur Steigerung der Effizienz von Fuzzing in der IT-Sicherheit
- 2019: Model-based Security and Safety Assurance for Automotive Safety Systems …
- 2019: Side Channel Attacks on Disk Encryption
- 2018: Defence in Depth fr Fahrzeuge
- 2018: Einsatzmglichkeiten einer Blockchain in der Automobilindustrie
- 2018: Konzeption eines halbautomatisierten Penetration-Testing Frameworks fr IoT-Gerte
- 2018: Security evaluation for the real-time operating system VxWorks 7 for avionic systems
- 2017-09: A System to save the Internet from the Malicious Internet of Things at Home
- 2017: Einfhrung in das Datenschutzrecht, 6th Edition
- 2017: SECURWARE 2017
- 2016-07: An Empirical Survey on how Much Security and Privacy Customers Want in Instant Messengers
- 2016-03: Hybrid Soluations for Data Dissemination in Vehicular Networks
- 2016: Aktuelle Umsetzung von SMTP over TLS - Ein Realittscheck …
- 2016: Enabling digital transformation using secure decisions as a service
- 2016: Hybrid solutions for data dissemination in vehicular networks
- 2016: Innovations in enterprise information systems management and engineering: 4th international conference, ERP Future 2015 - research munich, Germany, November 16-17, 2015 revised papers
- 2016: On Context-Aware Communication Mode Selection in Hybrid Vehicular Networks
- 2016: Poster: Security design patterns with good usability
- 2016: Preface
- 2016: Privacy Dashboard for Smart Citizens in Smart Cities …
- 2016: Realistic Attacker Models for Smart Cities …
- 2016: SECURWARE 2016
- 2016: Secure Scrum and OpenSAMM for Secure Software Development
- 2016: Smart Home Security …
- 2015: Apate A Linux Kernel Module for High Interaction Honeypots
- 2015: B.Hive: A zero configuration forms honeypot for productive web applications
- 2015: Security fr das Internet der Dinge
- 2014-08: Practical limitations of technical privacy protection
- 2013: Fighting spam by breaking the economy of advertising by unsolicited emails
- 2013: SECURWARE 2013
- 2013: The all-seeing eye: A massive-multi-sensor zero-configuration intrusion detection system for web applications
- 2013: Towards Enhanced Usability of IT Security Mechanisms How to Design Usable IT Security Mechanisms Using the Example of Email Encryption
- 2012-11: User-Centric IT Security How to Design Usable Security Mechanisms
- 2011-05: ASIA: An Access Control, Session Invocation and Authorization Architecture for Home Energy Appliances in Smart Energy Grid Environments
- 2010-12: Security for the Smart Grid Enhancing IEC 62351 to Improve Security in Energy Automation Control
- 2010: Enhancing IEC 62351 to improve security for energy automation in smart grid environments
- 2010: Industrial sensor network security architecture
- 2010: Protecting Voice over IP communication using electronic identity cards
- 2010: Sicherheit fr industrielle Sensornetze,Security Design for Industrial Sensor Networks
- 2009: Design and evaluation of a security architecture for ad hoc networks
- 2009: Fighting insomnia: A secure wake-up scheme for wireless sensor networks
- 2008-09: From Academia to the Field: Wireless Sensor Networks for Industrial Use
- 2008: Sichere Dienste-Suche in Sensornetzen
- 2007: A generic, self-organizing, and distributed bootstrap service for peer-to-peer networks
- 2007: Applications of sensor networks
- 2007: Key exchange for service discovery in secure content addressable sensor networks
- 2005: SCAN: A secure service directory for service-centric wireless sensor networks
- 2005: Secure overlay for service centric wireless sensor networks
- 2005: Sichere Netzwerkkommunikation
- 2005: Sicherheitsmechanismen fr CAN-basierte Dienstlokalisierung in Sensornetzen …
- 2004-02: S-CAN: Sicheres Overlay fr Sensornetze
- 2004: A cluster-based security architecture for ad hoc networks
- 2004: A general architecture for wireless sensor networks: First steps
- 2004: Design of a secure distributed service directory for wireless sensornetworks
- 2004: Spam Protection by using Sender Address Verification Extension (SAVE) …
- 2003-07: Erste Erfahrungen mit der Karlsruher Sensornetz-Plattform
- 2002: Optimierung und Evaluation eines Sicherheitskonzepts fr mobile Ad-hoc-Netze
Posters, Talks and more
The following is a list of conference talks, posters and other research oriented contributions by members of our research group.
- 2024-11: Vehicle Security Operations Center for Cooperative, Connected and Automated Mobility
- 2024-05: Minimizing occupant loads in vehicle crashes through reinforcement learning-based restraint system design: assessing performance and transferability
- 2024-04: TRA2024 Poster - A Fail-Safe Decision Architecture for CCAM Applications
- 2024-04: SELFY - Self Assessment, Protection & Healing Tools for a Trustworthy and Resilient CCAM
- 2024: Unveiling Hidden Knowledge: On the Effectiveness in Automotive Digital Forensics
- 2023-11: From SOC to VSOC: Transferring Key Requirements for Efficient Vehicle Security Operations
- 2022-12: Authentic Batteries: A Concept for a Battery Pass Based on PUF-enabled Certificates
- 2022: Cybersecurity fr den zuknftigen Handel
- 2022: Security analysis of an Event Data Recorder system according to the HEAVENS model
- 2022: Software Based Glitching Detection
- 2021-05: Uberwachung in modernen Fahrzeugen
- 2021-03: A Generalized Approach to Automotive Forensics
- 2021: Structured methodology and survey to evaluate data completeness in automotive digital forensics
- 2020: Einfuhrung in das Datenschutzrecht
- 2019-11: Cybersicherheit fr mobile und intelligente Komponenten
- 2019-10: Model-based Security and Safety Assurance for Automotive Safety Systems
- 2019: Twitter Mining for Sentiment Analysis in Tourism Industry
- 2018-09: CAN Obfuscation by Randomization (CANORa) A technology to prevent large-scale malware attacks on driverless autonomous vehicles
- 2017-07: A Reference Model as Means for Security of Automotive Cyber Systems
- 2017-07: Reference Architecture for the Design of Secure Automotive Cyber Systems
- 2017-07: Security Analysis of IoT Platforms using an IoT Reference Architecture
- 2017-07: Self-Descriptive Device Messages for a Smart Home Security System
- 2017-07: Tell me your name and I will tell you your pseudonym
- 2017-07: Towards a High-Level Security Model for Decision Making in Autonomous Driving
- 2016-02: Aktuelle Umsetzung von SMTP over TLS Ein Realittscheck
- 2016: Innovations in Enterprise Information Systems Management and Engineering
- 2016: On Context-Aware Communication Mode Selection in Hybrid Vehicular Networks
- 2016: Privacy Dashboard for Smart Citizens in Smart Cities
- 2016: Secure Smart Home
- 2014-08: Practical limitations of technical privacy protection
- 2014: BREW: A Breakable Web Application for IT-Security Classroom Use
- 2013: Regulations and Standards Relevant for Security of the Smart Grid
- 2012: Secure Remote Access to Home Energy Appliances
- 2012: Smart Grid Security Standardization
- 2011: Cryptography and Secure Communications
- 2008-01: Sichere Nutzung und schnelle Anpassung von Sensornetzen
- 2008: Sichere Dienste-Suche in Sensornetzen
- 2007-06: Programming and Securing Service-oriented Wireless Sensor Networks
- 2005-10: Sicherheitsmechanismen fr CAN-basierte Dienstlokalisierung in Sensornetzen
- 2005-05: Secure Service Lookup in Service Centric Sensor Networks