Institute for Cyber Security & Privacy

The Institute for Cyber Security & Privacy (ICSP) at Hochschule Bonn-Rhein-Sieg (H-BRS) bundles research, teaching and transfer on digital security and privacy in cyberspace.

Aims and objectives

ICSP researches, communicates and transfers approaches, technologies and solutions to promote security and privacy in the new digital reality. In doing so, ICSP takes a multi-faceted, technically and organisationally holistic and interdisciplinary multi-perspective view of the field. The institute's goal is to help shape national, European and international research in the long term, as well as to impart the available know-how in the training of highly-qualified Bachelor's and Master's graduates and to transfer it to industry and administration via cooperations and spin-offs.

Research and application fields

Cyber Security & Cyber Privacy are both cross-sectional disciplines that are already of immense importance for the economy, administration and society in a ubiquitously digitalised and interconnected reality of life - especially against the backdrop of constantly increasing threats and criminal acts from the network. The ICSP bundles the activities that are vital for the prevention, detection and response to security incidents from a technical and organisational perspective in research, development and teaching.

Main research fields

  • Security and privacy protection of autonomous, mobile and distributed systems

(e.g. Cloud, IoT, Smart Home, Industry 4.0, RFID/NFC, mobile networks, health systems, payment systems, robotics, self-driving systems, automobiles)

  • Applications of cryptographic processes

(e.g. cryptographic protocols and applications, cryptocurrencies, blockchain technology, identity, privacy, anonymity, and PETs) 

  • Hardware-related implementation security

(e.g. hardware security, firmware security, microarchitecture security, cryptographic implementation, side channel analysis, error analysis, covert information channels, embedded software, smart card security)

  • IT security conception and evaluation of IT products and IT-systems

(e.g. Common Criteria, FIPS-140, special aspect: consumer protection in digitalisation, data literacy)

  • IT security management

(e.g. organisation & processes, governance & standards, audits and controlling, IT security management in SMEs, ISO 27000, VdS 10000)

  • Secure and data protection-friendly development of Machine Learning (ML)
  • Software and system vulnerability analysis

(e.g. security analyses, penetration tests) 

  • Malware analysis and intrusion detection

(e.g. malware analysis, indicators of compromise, threat intelligence)

  • Usable Security & Privacy

Publications

Institut für Cyber Security & Privacy (ICSP)

2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003

2021

Stephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono: Privacy Considerations for Risk-Based Authentication Systems.
BibTeX | RIS

Salman Omar Sohail, Alex Mitrevski, Nico Hochgeschwender, Paul G. Plöger: Property-Based Testing in Simulation for Verifying Robot Action Execution in Tabletop Manipulation.
BibTeX | RIS

Peter Leo Gorski, Sebastian Möller, Stephan Wiefling, Luigi Lo Iacono: "I just looked for the solution!" - On Integrating Security-Relevant Information in Non-Security API Documentation to Support Secure Coding Practices.
PDF Download (postprint version) doi:10.1109/TSE.2021.3094171 urn:nbn:de:hbz:1044-opus-56314 BibTeX | RIS

Santosh Thoduka, Nico Hochgeschwender: Benchmarking Robots by Inducing Failures in Competition Scenarios.
doi:10.1007/978-3-030-77820-0_20 BibTeX | RIS

Andre Büttner, Hoai Viet Nguyen, Nils Gruschka, Luigi Lo Iacono: Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems.
PDF Download (postprint version) doi:10.1007/978-3-030-78120-0_22 urn:nbn:de:hbz:1044-opus-55491 BibTeX | RIS

Paul Höller, Alexander Krumeich, Luigi Lo Iacono: XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany.
PDF Download (postprint version) doi:10.1007/978-3-030-78120-0_1 urn:nbn:de:hbz:1044-opus-55487 BibTeX | RIS

Jan Tolsdorf, Michael Fischer, Luigi Lo Iacono: A Case Study on the Implementation of the Right of Access in Privacy Dashboards.
doi:10.1007/978-3-030-76663-4_2 BibTeX | RIS

Christian Reuter, Konstantin Aal, Frank Beham, Alexander Boden, Florian Brauner, Frank Fiedrich, Frank Fuchs-Kittowski, Stefan Geisler, Klaus Gennen, Dominik Herrmann, Marc-André Kaufhold, Michael Klafft, Myriam Lipprandt, Luigi Lo Iacono, Thomas Ludwig, Stephan Lukosch, Tilo Mentler, Simon Nestler, Volkmar Pipek, Jens Pottebaum, Sven Quadflieg, Gebhard Rusch, Stefan Sackmann, Stefan Stieglitz, Christian Sturm, Melanie Volkamer, Volker Wulf: Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
doi:10.1007/978-3-658-32795-8_31 BibTeX | RIS

Luigi Lo Iacono, Matthew Smith, Peter Leo Gorski: Werkzeuge für Usable (Cyber-)Security.
doi:10.1007/978-3-658-32795-8_6 BibTeX | RIS

Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono: Verify It's You: How Users Perceive Risk-based Authentication.
PDF Download (postprint version) doi:10.1109/MSEC.2021.3077954 urn:nbn:de:hbz:1044-opus-54912 BibTeX | RIS

Johannes Kunke, Stephan Wiefling, Markus Ullmann, Luigi Lo Iacono: Evaluation of Account Recovery Strategies with FIDO2-based Passwordless Authentication.
PDF Download (CC BY-SA 4.0) URL urn:nbn:de:hbz:1044-opus-54904 BibTeX | RIS

Samuel Parra, Sven Schneider, Nico Hochgeschwender: Specifying QoS Requirements and Capabilities for Component-Based Robot Software.
URL doi:10.1109/RoSE52553.2021.00012 BibTeX | RIS

Jan Tolsdorf, Florian Dehling, Delphine Reinhardt, Luigi Lo Iacono: Exploring mental models of the right to informational self-determination of office workers in Germany.
PDF Download (CC BY-NC-ND) doi:10.2478/popets-2021-0035 urn:nbn:de:hbz:1044-opus-53837 BibTeX | RIS

Till Schlüter, Kerstin Lemke-Rust: Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers.
doi:10.1007/978-3-030-68487-7_10 BibTeX | RIS

Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono: What's in Score for Website Users: A Data-driven Long-term Study on Risk-based Authentication Characteristics.
PDF Download (pre-proceedings version) URL arXiv urn:nbn:de:hbz:1044-opus-53053 BibTeX | RIS

Luigi Lo Iacono, Hartmut Schmitt: Informationelle Selbstbestimmung am Arbeitsplatz.
doi:10.1007/s11623-020-1379-9 BibTeX | RIS

Jan Tolsdorf, Florian Dehling, Denis Feth: Benutzerfreundlicher Datenschutz in Cloud-basierten Office-Paketen.
doi:10.1007/s11623-020-1386-x BibTeX | RIS

Svenja Polst, Jan Tolsdorf, Florian Dehling, Denis Feth: Verarbeitung von Beschäftigtendaten: Sichtweisen und Wünsche von Beschäftigten.
doi:10.1007/s11623-020-1383-0 BibTeX | RIS

2020

Jan Tolsdorf, Florian Dehling, Luigi Lo Iacono: Take Back Control! The Use of Mental Models to Develop Privacy Dashboards.
URL BibTeX | RIS

Jan Tolsdorf, Florian Dehling: In Our Employer We Trust: Mental Models of Office Workers’ Privacy Perceptions.
doi:10.1007/978-3-030-54455-3_9 BibTeX | RIS

Jan Tolsdorf, Christian K. Bosse, Aljoscha Dietrich, Denis Feth, Hartmut Schmitt: Privatheit am Arbeitsplatz: Transparenz und Selbstbestimmung bei Arbeit 4.0.
doi:10.1007/s11623-020-1247-7 BibTeX | RIS

Peter Leo Gorski, Yasemin Acar, Luigi Lo Iacono, Sascha Fahl: Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs.
doi:10.1145/3313831.3376142 BibTeX | RIS

Hoai Viet Nguyen, Luigi Lo Iacono: CREHMA: Cache-aware REST-ful HTTP Message Authentication.
doi:10.1145/3374664.3375750 BibTeX | RIS

Christian K. Bosse, Aljoscha Dietrich, Patricia Kelbert, Hagen Küchler, Hartmut Schmitt, Jan Tolsdorf, Andreas Weßner: Beschäftigtendatenschutz: Rechtliche Anforderungen und Technische Lösungskonzepte.
BibTeX | RIS

Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono: More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication.
PDF Download (accepted version) doi:10.1145/3427228.3427243 URL arXiv urn:nbn:de:hbz:1044-opus-50707 BibTeX | RIS

Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann: 6. Usable Security und Privacy Workshop.
doi:10.18420/muc2020-ws119 BibTeX | RIS

Swaroop Bhandary K, Nico Hochgeschwender, Paul Plöger, Frank Kirchner, Matias Valdenegro-Toro: Evaluating Uncertainty Estimation Methods on 3D Semantic Segmentation of Point Clouds.
arXiv BibTeX | RIS

Stephan Wiefling, Tanvi Patil, Markus Dürmuth, Luigi Lo Iacono: Evaluation of Risk-based Re-Authentication Methods.
PDF Download (postprint version) urn:nbn:de:hbz:1044-opus-49521 URL doi:10.1007/978-3-030-58201-2_19 arXiv BibTeX | RIS

Stephan Wiefling: Usability, Sicherheit und Privatsphäre von risikobasierter Authentifizierung.
doi:10.18420/sicherheit2020_12 BibTeX | RIS

Luigi Lo Iacono, Stephan Wiefling, Michael Schneider: Programmieren trainieren: Mit über 130 Workouts in Java und Python.
doi:10.3139/9783446460577 BibTeX | RIS

Jan Tolsdorf, Luigi Lo Iacono: Vision: Shred If Insecure – Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email Interfaces.
doi:10.1109/EuroSPW51379.2020.00031 BibTeX | RIS

Carl-Daniel Hailfinger, Kerstin Lemke-Rust, Christof Paar: CCCiCC: A Cross-Core Cache-Independent Covert Channel on AMD Family 15h CPUs.
doi:10.1007/978-3-030-42068-0_10 BibTeX | RIS

Nico Hochgeschwender, Gary Cornelius, Holger Voos: Arguing Security of Autonomous Robots.
doi:10.1109/IROS40897.2019.8967670 BibTeX | RIS

2019

Peter L. Gorski, Emanuel von Zezschwitz, Luigi Lo Iacono, Matthew Smith: On providing systematized access to consolidated principles, guidelines and patterns for usable security research and development.
doi:10.1093/cybsec/tyz014 BibTeX | RIS

Florian Dehling, Tobias Mengel, Luigi Lo Iacono: Rotten Cellar: Security and Privacy of the Browser Cache Revisited.
doi:10.1007/978-3-030-35055-0_2 URL BibTeX | RIS

Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath: Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack.
doi:10.1145/3319535.3354215 BibTeX | RIS

Hans Christian Rudolph, Andreas Kunz, Luigi Lo Iacono, Hoai Viet Nguyen: Security Challenges of the 3GPP 5G Service Based Architecture.
doi:10.1109/MCOMSTD.2019.1800034 BibTeX | RIS

Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath: Mind the cache: large-scale explorative study of web caching.
doi:10.1145/3297280.3297526 BibTeX | RIS

Luigi Lo Iacono, Hoai Viet Nguyen, Peter Leo Gorski: On the Need for a General REST-Security Framework.
doi:10.3390/fi11030056 BibTeX | RIS

Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth: Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild.
doi:10.1007/978-3-030-22312-0_10 URL arXiv BibTeX | RIS

Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono: Even Turing Should Sometimes Not Be Able To Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services.
doi:10.1007/978-3-030-35055-0_12 URL BibTeX | RIS

Markus Ullmann, Thomas Strubbe, Christian Wieschebrink: Vernetzter Straßenverkehr: Herausforderungen für die IT-Sicherheit.
doi:10.1007/978-3-658-26945-6_17 BibTeX | RIS

Markus Ullmann, Thomas Strubbe, Christian Wieschebrink: Nachweismöglichkeiten der IT-Sicherheit.
doi:10.1007/978-3-658-26945-6_19 BibTeX | RIS

Kerstin Lemke-Rust, Peter Samarin: Exploring Embedded Software with Side Channels and Fault Analysis.
doi:10.1109/EWME.2018.8629479 BibTeX | RIS

Peter Samarin, Kerstin Lemke-Rust: Detection of Counterfeit ICs using Public Identification Sequences and Side-Channel Leakage.
doi:10.1109/TIFS.2018.2866333 BibTeX | RIS

2018

Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath: Systematic Analysis of Web Browser Caches.
doi:10.1145/3240431.3240443 BibTeX | RIS

Peter Leo Gorski: Usability von Security-APIs für massiv-skalierbare vernetzte Service-orientierte Systeme.
doi:10.18420/sicherheit2018_26 BibTeX | RIS

Luigi Lo Iacono, Matthew Smith: Werkzeuge für Usable (Cyber-)Security.
doi:10.1007/978-3-658-19523-6_6 BibTeX | RIS

Luigi Lo Iacono, Matthew Smith, Emanuel von Zezschwitz, Peter Leo Gorski, Peter Nehren: Consolidating Principles and Patterns for Human-centred Usable Security Research and Development.
doi:10.14722/eurousec.2018.23010 BibTeX | RIS

Silvia Santano Guillén, Luigi Lo Iacono, Christian Meder: Affective Robots: Evaluation of Automatic Emotion Recognition Approaches on a Humanoid Robot towards Emotionally Intelligent Machines.
URL BibTeX | RIS

Nils Gruschka, Luigi Lo Iacono, Jan Tolsdorf: Classification of Android App Permissions: Tell me What app you are and I Tell you What you are Allowed to do.
BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, Sascha Fahl: Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse.
URL BibTeX | RIS

Christian Reuter, Konstantin Aal, Frank Beham, Alexander Boden, Florian Brauner, Frank Fiedrich, Frank Fuchs-Kittowski, Stefan Geisler, Klaus Gennen, Dominik Herrmann, Marc-André Kaufhold, Michael Klafft, Myriam Lipprandt, Luigi Lo Iacono, Thomas Ludwig, Stephan Lukosch, Tilo Mentler, Simon Nestler, Volkmar Pipek, Jens Pottebaum, Gebhard Rusch, Stefan Sackmann, Stefan Stieglitz, Christian Sturm, Melanie Volkamer, Volker Wulf: Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
doi:10.1007/978-3-658-19523-6_30 BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Stephan Wiefling, Sebastian Möller: Warn if Secure or How to Deal with Security by Default in Software Development?.
URL BibTeX | RIS

Luigi Lo Iacono, Stephan Wiefling, Michael Schneider: Programmieren trainieren: Mit über 120 Workouts in Java und Python.
doi:10.3139/9783446455030 BibTeX | RIS

Kerstin Lemke-Rust, Peter Samarin: Detektion von Plagiaten eingebetteter Software mittels Seitenkanalanalysen (DePlagEmSoft): Schlussbericht, Berichtszeitraum: 1. Dezember 2013-31. Mai 2018, Projektstart: 1. Dezember 2013, Laufzeit: 4 Jahre, 6 Monate.
doi:10.2314/KXP:1667395300 BibTeX | RIS

Sandro Berndt, Thomas Strubbe, Nicolas Thenee, Markus Ullmann, Christian Wieschebrink: Sichere Vehicle-to-X Kommunikation in Europa.
BibTeX | RIS

Peter Samarin, Kerstin Lemke-Rust: Detecting Similar Code Segments Through Side Channel Leakage in Microcontrollers.
doi:10.1007/978-3-319-78556-1_9 BibTeX | RIS

2017

Holger Harms, Collin Rogowski, Luigi Lo Iacono: Guidelines for adopting frontend architectures and patterns in microservices-based systems.
doi:10.1145/3106237.3117775 BibTeX | RIS

Hoai Viet Nguyen, Jan Tolsdorf, Luigi Lo Iacono: On the Security Expressiveness of REST-Based API Definition Languages.
doi:10.1007/978-3-319-64483-7_14 BibTeX | RIS

Luigi Lo Iacono, Nils Gruschka, Peter Nehren: Mobile Personal Identity Provider Based on OpenID Connect.
doi:10.1007/978-3-319-64483-7_2 BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Hartmut Schmitt, Peter Nehren, Hoai Viet Nguyen: Usable Security by Design: Unterstützung für kleine und mittlere Softwarehersteller in frühen Phasen der Produktentwicklung.
URL BibTeX | RIS

Hoai Viet Nguyen, Luigi Lo Iacono: Sicherheit für REST-basierte Systeme: Zur Notwendigkeit eines generischen Sicherheitsframeworks für REST.
doi:10.1007/s11623-017-0736-9 BibTeX | RIS

Hartmut Schmitt, Peter Leo Gorski, Luigi Lo Iacono: Usable Security – Benutzerfreundliche Sicherheitsfunktionen für Software und interaktive Produkte.
URL BibTeX | RIS

Peter Nehren, Hartmut Schmitt, Luigi Lo Iacono: Usable Security – Werkzeuge für Entwickler.
URL BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono: Computer-Sicherheitswarnungen – Benutzerzentrierte Entwurfsansätze der Usable Security-Forschung.
URL BibTeX | RIS

Hartmut Schmitt, Peter Nehren, Luigi Lo Iacono, Peter Leo Gorski: Usable Security und Privacy by Design.
URL BibTeX | RIS

Luigi Lo Iacono, Peter Leo Gorski, Josephine Grosse, Nils Gruschka: Signalling over-privileged mobile applications using passive security indicators.
doi:10.1016/j.jisa.2016.11.006 BibTeX | RIS

Luigi Lo Iacono, Peter Leo Gorski: I Do and I Understand. Not Yet True for Security APIs. So Sad.
doi:10.14722/eurousec.2017.23015 BibTeX | RIS

Stephan Wiefling, Luigi Lo Iacono, Frederik Sandbrink: Anwendung der Blockchain außerhalb von Geldwährungen.
doi:10.1007/s11623-017-0816-x URL BibTeX | RIS

Torsten Jandt, Padmaja Kulkarni, José C. Mayoral, Deebul Nair, Boris Ndimubanzi Senga, Santosh Thoduka, Iman Awaad, Nico Hochgeschwender, Sven Schneider, Gerhard K. Kraetzschmar: b-it-bots RoboCup@Work Team Description Paper.
URL BibTeX | RIS

Sandro Berndt, Lutz Rittershaus, Carsten Kühnei, Thomas Strubbe, Nicolas Thenee, Markus Ullmann, Hans-Peter Wagner, Christian Wieschebrink: Sichere Vehicle-2-X-Kommunikation in Europa.
BibTeX | RIS

Maik Riestock, Frank Engelhardt, Sebastian Zug, Nico Hochgeschwender: User study on remotely controlled UAVs with focus on interfaces and data link quality.
doi:10.1109/IROS.2017.8206179 BibTeX | RIS

Nico Hochgeschwender: Model-Based Specification, Deployment and Adaptation of Robot Perception Systems.
BibTeX | RIS

Gary Cornelius, Patrice Caire, Nico Hochgeschwender, Miguel A. Olivares-Mendez, Paulo Esteves-Verissimo, Marcus Völp, Holger Voos: A Perspective of Security for Mobile Service Robots.
doi:10.1007/978-3-319-70833-1_8 BibTeX | RIS

Rainer Bischoff, Tim Friedrich, Gerhard K. Kraetzschmar, Sven Schneider, Nico Hochgeschwender: RoCKIn@Work: Industrial Robot Challenge.
PDF Download doi:10.5772/intechopen.70014 urn:nbn:de:hbz:1044-opus-33084 BibTeX | RIS

Markus Ullmann, Thomas Strubbe, Christian Wieschebrink: Misuse Capabilities of the V2V Communication to Harm the Privacy of Vehicles and Drivers.
URL BibTeX | RIS

Peter Samarin, Kerstin Lemke-Rust: Detection of counterfeit ICs using public identification sequences.
doi:10.1109/HST.2017.7951827 BibTeX | RIS

Ulrik Pagh Schultz, Mirko Bordignon, Kasper Stoy, Arne Nordmann, Nico Hochgeschwender, Sebastian Wrede: DSLs in Robotics: A Case Study in Programming Self-reconfigurable Robots.
doi:10.1007/978-3-319-60074-1_5 BibTeX | RIS

Davide Brugali, Nico Hochgeschwender: Managing the Functional Variability of Robotic Perception Systems.
doi:10.1109/IRC.2017.20 BibTeX | RIS

Michael Kiometzis, Markus Ullmann: Fahrdaten für alle? Car-2-Car Kommunikation und die Folgen.
doi:10.1007/s11623-017-0763-6 BibTeX | RIS

Maik Riestock, Frank Engelhardt, Sebastian Zug, Nico Hochgeschwender: Exploring Gridmap-based Interfaces for the Remote Control of UAVs under Bandwidth Limitations.
doi:10.1145/3029798.3038350 BibTeX | RIS

Kerstin Lemke-Rust, Michael Tunstall (Hg.): Smart Card Research and Advanced Applications: 15th International Conference, CARDIS 2016, Cannes, France, November 7–9, 2016, Revised Selected Papers.
doi:10.1007/978-3-319-54669-8 BibTeX | RIS

Loic Gammaitoni, Nico Hochgeschwender: RPSL meets lightning: A model-based approach to design space exploration of robot perception systems.
doi:10.1109/SIMPAR.2016.7862378 BibTeX | RIS

Nico Hochgeschwender, Sven Schneider, Holger Voos, Herman Bruyninckx, Gerhard K. Kraetzschmar: Graph-based software knowledge: Storage and semantic querying of domain models for run-time adaptation.
doi:10.1109/SIMPAR.2016.7862379 BibTeX | RIS

Markus Ullmann, Thomas Strubbe, Christian Wieschebrink: Poster: V2V communication — Keeping you under non-disputable surveillance.
doi:10.1109/VNC.2016.7835975 BibTeX | RIS

Sebastian Zug, Tim Niemueller, Nico Hochgeschwender, Kai Seidensticker, Martin Seidel, Tim Friedrich, Tobias Neumann, Ulrich Karras, Gerhard Kraetzschmar, Alexander Ferrein: An Integration Challenge to Bridge the Gap among Industry-inspired RoboCup Leagues.
doi:10.1007/978-3-319-68792-6_13 BibTeX | RIS

2016

Hoai Viet Nguyen, Luigi Lo Iacono: RESTful IoT Authentication Protocols.
doi:10.1016/B978-0-12-804629-6.00010-9 BibTeX | RIS

Luigi Lo Iacono, Hoai Viet Nguyen, Hartmut Schmitt: Usable Security – Results from a Field Study.
doi:10.1515/icom-2016-0026 BibTeX | RIS

Aline Jaritz, Luigi Lo Iacono: Untersuchung des Datenverkehrs aktueller Smart-TVs.
doi:10.1007/s11623-016-0648-0 BibTeX | RIS

Marc Skutnik, Luigi Lo Iacono, Christian Neuhaus: Methods of Data Processing and Communication for a Web-based Wind Flow Visualization.
doi:10.5220/0005846800320041 BibTeX | RIS

Luigi Lo Iacono, Silvia Santano Guillén: Adaptive Push-based Media Streaming in the Web.
doi:10.5220/0005813501210129 URL BibTeX | RIS

Hoai Viet Nguyen, Luigi Lo Iacono: REST-ful CoAP Message Authentication.
doi:10.1109/SIOT.2015.8 BibTeX | RIS

Hartmut Schmitt, Peter Nehren: Usable Security and Privacy by Design - Teil 2: Anwendungsfälle und Musterlösungen für Unternehmenssoftware.
URL BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono: Towards the Usability Evaluation of Security APIs.
URL BibTeX | RIS

Markus Ullmann, Christian Wieschebrink, Thomas Strubbe, Dennis Kuegler: Secure Vehicle-to-Infrastructure Communication: Secure Roadside Stations, Key Management, and Crypto Agility.
URL BibTeX | RIS

Markus Ullmann, Thomas Strubbe, Christian Wieschebrink: Technical Limitations, and Privacy Shortcomings of the Vehicle-to-Vehicle Communication.
URL BibTeX | RIS

Markus Ullmann, Khalil El-Khatib (Hg.): VEHICULAR 2016: The Fifth International Conference on Advances in Vehicular Systems, Technologies and Applications. November 13-17, 2016, Barcelona, Spain.
URL BibTeX | RIS

Matthias Neu, Ulrike Korte, Markus Ullmann: Improvement of Fuzzy Vault for Multiple Fingerprints with Angles.
doi:10.1109/BIOSIG.2016.7736926 BibTeX | RIS

Jacek Samotyja, Kerstin Lemke-Rust: Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor.
doi:10.1145/2996366.2996371 BibTeX | RIS

Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust: Fault-Channel Watermarks.
doi:10.1007/978-3-319-45931-8_13 BibTeX | RIS

Arne Nordmann, Nico Hochgeschwender, Dennis Wigand, Sebastian Wrede: A Survey on Domain-Specific Modeling and Languages in Robotics.
PDF Download (CC BY 3.0) doi:10.6092/JOSER_2016_07_01_p75 urn:nbn:de:hbz:1044-opus-26746 BibTeX | RIS

Shehzad Ahmed, Torsten Jandt, Padmaja Kulkarni, Oscar Lima, Arka Mallick, Alexander Moriarty, Deebul Nair, Santosh Thoduka, Iman Awaad, Rhama Dwiputra, Frederik Hegger, Nico Hochgeschwender, Jose Sanchez, Sven Schneider, Gerhard K. Kraetzschmar: b-it-bots RoboCup@Work Team Description Paper.
URL BibTeX | RIS

Kerstin Lemke-Rust: Sicherheit der Verbraucher in vernetzten Fahrzeugen.
PDF Download (CC BY-SA 3.0) doi:10.15501/978-3-86336-912-5_4 BibTeX | RIS

Nico Hochgeschwender, Holger Voos, Gerhard K. Kraetzschmar: Towards Persistent Storage and Retrieval of Domain Models using Graph Database Technology.
arXiv BibTeX | RIS

Jose Sanchez, Sven Schneider, Nico Hochgeschwender, Gerhard Kraetzschmar, Paul G. Plöger: Context-Based Adaptation of In-Hand Slip Detection for Service Robots.
doi:10.1016/j.ifacol.2016.07.765 BibTeX | RIS

Peter Samarin, Kerstin Lemke-Rust, Christof Paar: IP core protection using voltage-controlled side-channel receivers.
doi:10.1109/HST.2016.7495585 BibTeX | RIS

2015

Luigi Lo Iacono: Partial Data Protection via Structure-Preserving Document Partitioning.
doi:10.1109/Trustcom.2015.450 BibTeX | RIS

Wolfgang Börger, Luigi Lo Iacono: User Perception and Response to Computer Security Warnings.
doi:10.1515/9783110443905-087 BibTeX | RIS

Hoai Viet Nguyen: WebSocket - WS^2 2.0.
URL BibTeX | RIS

Luigi Lo Iacono, Hoai Viet Nguyen: Towards Conformance Testing of REST-based Web Services.
doi:10.5220/0005412202170227 BibTeX | RIS

Luigi Lo Iacono, Hoai Viet Nguyen: Authentication Scheme for REST.
doi:10.1007/978-3-319-19210-9_8 BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Hoai Viet Nguyen, Daniel Behnam Torkian: Web of Services Security: Mehr als die Sicherheit von Webanwendungen.
doi:10.1007/s11623-015-0420-x BibTeX | RIS

Luigi Lo Iacono, Hoai Viet Nguyen, Tobias Hirsch, Maurice Baiers, Sebastian Möller: UI-Dressing to Detect Phishing.
doi:10.1109/HPCC.2014.126 BibTeX | RIS

Luigi Lo Iacono: Signalschutz im Zeitalter von TV-Ökosystemen: Sicherheits- und Datenschutzaspekte von Google TV.
doi:10.1007/s11623-015-0371-2 BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Hoai Viet Nguyen: WebSockets: Moderne HTML5-Echtzeitanwendungen entwickeln.
doi:10.3139/9783446444386 URL BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Hartmut Schmitt: Usable Security und Privacy by Design - Teil 1: Benutzerzentrierte Entwicklung von Sicherheitsfunktionen.
URL BibTeX | RIS

Christoph Pörschmann, Stephan Wiefling: Dynamische Binauralsynthese auf Basis gemessener einkanaliger Raumimpulsantworten.
BibTeX | RIS

Christoph Pörschmann, Stephan Wiefling: Perceptual Aspects of Dynamic Binaural Synthesis based on measured Omnidirectional Room Impulse Responses.
BibTeX | RIS

Markus Ullmann, Ralph Breithaupt: Hands-on Smart Card User Interface Research, Development, and Testing.
URL BibTeX | RIS

Markus Ullmann, Christian Wieschebrink, Dennis Kügler: Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems.
URL BibTeX | RIS

Jacek Samotyja, Kerstin Lemke-Rust, Markus Ullmann: SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node.
URL BibTeX | RIS

Peter Schartner, Kerstin Lemke-Rust, Markus Ullmann (Hg.): D-A-CH security 2015: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven: Arbeitskonferenz D-A-CH Security in St. Augustin bei Bonn, 08.-09. September 2015 ergänzt durch die Workshops der GI Fachgruppe SECMGT und der Allianz für Cyber-Sicherheit.
BibTeX | RIS

Luca Gherardi, Nico Hochgeschwender: RRA: Models and tools for robotics run-time adaptation.
doi:10.1109/IROS.2015.7353608 BibTeX | RIS

Luca Gherardi, Nico Hochgeschwender: Poster: Model-based Run-time Variability Resolution for Robotic Applications.
doi:10.1109/ICSE.2015.269 BibTeX | RIS

Sebastian Blumenthal, Nico Hochgeschwender, Erwin Prassler, Holger Voos, Herman Bruyninckx: An Approach for a Distributed World Model with QoS-based Perception Algorithm Adaptation.
doi:10.1109/IROS.2015.7353612 BibTeX | RIS

Sven Schneider, Frederik Hegger, Nico Hochgeschwender, Rhama Dwiputra, Alexander Moriarty, Jakob Berghofer, Gerhard K. Kraetzschmar: Design and development of a benchmarking testbed for the Factory of the Future.
doi:10.1109/ETFA.2015.7301423 BibTeX | RIS

Nico Hochgeschwender, Miguel A. Olivares-Mendez, Holger Voos, Gerhard K. Kraetzschmar: Context-based selection and execution of robot perception graphs.
doi:10.1109/ETFA.2015.7301631 BibTeX | RIS

Francesco Amigoni, Emanuele Bastianelli, Jakob Berghofer, Andrea Bonarini, Giulio Fontana, Nico Hochgeschwender, Luca Iocchi, Gerhard Kraetzschmar, Pedro Lima, Matteo Matteucci, Pedro Miraldo, Daniele Nardi, Viola Schiaffonati: Competitions for Benchmarking: Task and Functionality Scoring Complete Performance Assessment.
doi:10.1109/MRA.2015.2448871 BibTeX | RIS

Ariano-Tim Donda, Peter Samarin, Jacek Samotyja, Kerstin Lemke-Rust, Christof Paar: Remote IP Protection Using Timing Channels.
doi:10.1007/978-3-319-15943-0_14 BibTeX | RIS

Gerhard K. Kraetzschmar, Nico Hochgeschwender, Walter Nowak, Frederik Hegger, Sven Schneider, Rhama Dwiputra, Jakob Berghofer, Rainer Bischoff: RoboCup@Work: Competing for the Factory of the Future.
doi:10.1007/978-3-319-18615-3_14 BibTeX | RIS

2014

Luigi Lo Iacono, Silvia Santano Guillén: Efficient and Adaptive Web-native Live Video Streaming.
URL BibTeX | RIS

Peter Leo Gorski, Christian Naldony, Markus Roskosch, Benjamin Horvat, Daniel Behnam Torkian, Hoai Viet Nguyen, Luigi Lo Iacono: SOA und REST-Services: Ist REST reif genug, um SOA-Umgebungen zu verwirklichen?.
URL BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Hoai Viet Nguyen, Daniel Behnam Torkian: Service Security Revisited.
doi:10.1109/SCC.2014.68 BibTeX | RIS

Luigi Lo Iacono, Silvia Santano Guillén: Web-native Video Live Streaming.
doi:10.13140/2.1.1729.4400 BibTeX | RIS

Luigi Lo Iacono, Daniel Torkian: A System-Oriented Approach to Full-Text Search on Encrypted Cloud Storage.
doi:10.1109/CSC.2013.12 BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Hoai Viet Nguyen, Daniel Behnam Torkian: SOA-Readiness of REST.
doi:10.1007/978-3-662-44879-3_6 BibTeX | RIS

Markus Ullmann, Ralph Breithaupt: Scuid^Sim: A Platform for Smart Card User Interface Research, Development and Testing.
URL BibTeX | RIS

Nico Hochgeschwender, Roland Philippsen: From the Guest Editors of the Special Issue on Best Practice in Robotic Software Development.
PDF Download (CC BY 3.0) doi:10.6092/JOSER_2014_05_01_p1 urn:nbn:de:hbz:1044-opus-26570 BibTeX | RIS

Luca Gherardi, Nico Hochgeschwender, Christian Schlegel, Ulrik Pagh Schultz, Serge Stinckwich (Hg.): Proceedings of the Fifth International Workshop on Domain-Specific Languages and Models for Robotic Systems (DSLRob 2014).
arXiv BibTeX | RIS

Arne Nordmann, Nico Hochgeschwender, Sebastian Wrede: A Survey on Domain-Specific Languages in Robotics.
doi:10.1007/978-3-319-11900-7_17 BibTeX | RIS

Nico Hochgeschwender, Sven Schneider, Holger Voos, Gerhard K. Kraetzschmar: Towards a Robot Perception Specification Language.
arXiv URL BibTeX | RIS

Rhama Dwiputra, Jakob Berghofer, Aamir Ahmad, Iman Awaad, Francesco Amigoni, Rainer Bischoff, Andrea Bonarini, Giulio Fontana, Frederik Hegger, Nico Hochgeschwender, Luca Iocchi, Gerhard Kraetzschmar, Pedro Lima, Matteo Matteucci, Daniele Nardi, Viola Schiaffonati, Sven Schneider: The RoCKIn@Work Challenge.
URL BibTeX | RIS

Nico Hochgeschwender, Luca Gherardi, Azamat Shakhirmardanov, Gerhard K. Kraetzschmar, Davide Brugali, Herman Bruyninckx: A model-based approach to software deployment in robotics.
doi:10.1109/IROS.2013.6696915 BibTeX | RIS

Sven Schneider, Nico Hochgeschwender, Gerhard K. Kraetzschmar: Declarative specification of task-based grasping with constraint validation.
doi:10.1109/IROS.2014.6942669 BibTeX | RIS

Sven Schneider, Nico Hochgeschwender, Gerhard K. Kraetzschmar: Structured Design and Development of Domain-Specific Languages in Robotics.
doi:10.1007/978-3-319-11900-7_20 BibTeX | RIS

Nico Hochgeschwender, Sven Schneider, Holger Voos, Gerhard K. Kraetzschmar: Declarative Specification of Robot Perception Architectures.
doi:10.1007/978-3-319-11900-7_25 BibTeX | RIS

2013

Timo Bartkewitz, Kerstin Lemke-Rust: Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines.
doi:10.1007/978-3-642-37288-9_18 BibTeX | RIS

Christoph Sorge, Luigi Lo Iacono, Nils Gruschka: Sicherheit in Kommunikationsnetzen.
doi:10.1524/9783486720174 BibTeX | RIS

Nils Gruschka, Luigi Lo Iacono, Christoph Sorge: Analysis of the current state in website certificate validation.
doi:10.1002/sec.799 BibTeX | RIS

Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Ninja Marnau: Security and Privacy-Enhancing Multicloud Architectures.
doi:10.1109/TDSC.2013.6 BibTeX | RIS

J. Vandorpe, J. Vliegen, R. Smeets, N. Mentens, M. Drutarovsky, M. Varchola, K. Lemke-Rust, P. Plöger, P. Samarin, D. Koch, Y. Hafting, J. Tørresen: Remote FPGA design through eDiViDe - European Digital Virtual Design Lab.
doi:10.1109/FPL.2013.6645621 BibTeX | RIS

Frederik Hegger, Nico Hochgeschwender, Gerhard K. Kraetzschmar, Paul G. Ploeger: People Detection in 3d Point Clouds Using Local Surface Normals.
doi:10.1007/978-3-642-39250-4_15 BibTeX | RIS

Timo Bartkewitz, Kerstin Lemke-Rust: Excellence in security evaluation testing : EXSET: Schlussbericht Hochschule Bonn-Rhein-Sieg, Berichtszeitraum: 1. Juli 2010 - 31. März 2013.
doi:10.2314/GBV:791502910 BibTeX | RIS

Herman Bruyninckx, Markus Klotzbücher, Nico Hochgeschwender, Gerhard Kraetzschmar, Luca Gherardi, Davide Brugali: The BRICS component model: a model-based development paradigm for complex robotics software systems.
doi:10.1145/2480362.2480693 BibTeX | RIS

2012

Christian A. Mueller, Nico Hochgeschwender, Paul G. Ploeger: Towards Robust Object Categorization for Mobile Robots with Combination of Classifiers.
doi:10.1007/978-3-642-32060-6_12 BibTeX | RIS

Thomas Breuer, Geovanny R. Giorgana Macedo, Ronny Hartanto, Nico Hochgeschwender, Dirk Holz, Frederik Hegger, Zha Jin, Christian Müller, Jan Paulus, Michael Reckhaus, Jose Antonio Alvarez Ruiz, Paul G. Plöger, Gerhard K. Kraetzschmar: Johnny: An Autonomous Service Robot for Domestic Environments.
doi:10.1007/s10846-011-9608-y BibTeX | RIS

2011

Azamat Shakhimardanov, Nico Hochgeschwender, Michael Reckhaus, Gerhard K. Kraetzschmar: Analysis of software connectors in robotics.
doi:10.1109/IROS.2011.6095183 BibTeX | RIS

Timo Bartkewitz, Kerstin Lemke-Rust: A High-Performance Implementation of Differential Power Analysis on Graphics Cards.
doi:10.1007/978-3-642-27257-8_16 BibTeX | RIS

2010

Heiko Knospe, Kerstin Lemke-Rust: Towards Secure and Privacy-Enhanced RFID Systems.
doi:10.1002/9780470665251.ch16 BibTeX | RIS

Michael Reckhaus, Nico Hochgeschwender, Paul G. Plöger, Gerhard K. Kraetzschmar: A Platform-independent Programming Environment for Robot Control.
arXiv BibTeX | RIS

Veselina Hensel, Kerstin Lemke-Rust: On an Integration of an Information Security Management System into an Enterprise Architecture.
doi:10.1109/DEXA.2010.75 BibTeX | RIS

Azamat Shakhimardanov, Nico Hochgeschwender, Gerhard K. Kraetzschmar: Component models in robotics software.
doi:10.1145/2377576.2377592 BibTeX | RIS

2009

Michael Vahl, Stefan Böhmer, Thomas Oestreich: Probability Based Risk Analysis for a VoIP System.
doi:10.1109/AICT.2009.79 BibTeX | RIS

Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust: Differential Cluster Analysis.
doi:10.1007/978-3-642-04138-9_9 BibTeX | RIS

2008

Gordon Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust, Christof Paar: Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers.
doi:10.1109/SIES.2008.4577681 BibTeX | RIS

Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust: Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip.
doi:10.1007/978-3-540-85886-7_24 BibTeX | RIS

2007

Yifei Liu, Timo Kasper, Kerstin Lemke-Rust, Christof Paar: E-Passport: Cracking Basic Access Control Keys.
doi:10.1007/978-3-540-76843-2_30 BibTeX | RIS

Kerstin Lemke-Rust, Christof Paar: Gaussian Mixture Models for Higher-Order Side Channel Analysis.
doi:10.1007/978-3-540-74735-2_2 BibTeX | RIS

Kerstin Lemke-Rust, Christof Paar: Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods.
doi:10.1007/978-3-540-74835-9_30 BibTeX | RIS

Kerstin Lemke-Rust: Models and algorithms for physical cryptanalysis.
BibTeX | RIS

Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi: E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
doi:10.1007/978-3-540-71093-6_30 BibTeX | RIS

2006

Kerstin Lemke-Rust, Christof Paar: An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices.
doi:10.1007/11889700_13 BibTeX | RIS

Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi: Physical Security Bounds Against Tampering.
doi:10.1007/11767480_17 BibTeX | RIS

Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar: Templates vs. Stochastic Methods.
doi:10.1007/11894063_2 BibTeX | RIS

2005

Werner Schindler, Kerstin Lemke, Christof Paar: A Stochastic Model for Differential Side Channel Cryptanalysis.
doi:10.1007/11545262_3 BibTeX | RIS

Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble: An Open Approach for Designing Secure Electronic Immobilizers.
doi:10.1007/978-3-540-31979-5_20 BibTeX | RIS

Kerstin Lemke, Christof Paar: Physical Attacks.
doi:10.1007/0-387-23483-7_300 BibTeX | RIS

2004

Kerstin Lemke, Kai Schramm, Christof Paar: DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction.
doi:10.1007/978-3-540-28632-5_15 BibTeX | RIS

2003

Bert den Boer, Kerstin Lemke, Guntram Wicke: A DPA Attack against the Modular Reduction within a CRT Implementation of RSA.
doi:10.1007/3-540-36400-5_18 BibTeX | RIS