Research

Research

Research

Our research focus lies on the development and analysis of IT security technologies in combination with the functional security of and the user interaction with the to-be-protected systems. As application areas, we look specifically at the Internet of Things as well as safety-critical systems. Especially in the area of the Internet of Things, we are also dealing with the important topic of data security and with 'privacy-enhancing technologies'.

Current publications

We list the publications of the last three years below. A complete list, including BibTex format, can be found on the Publications page.

2025

  • A. Bassit, F. Hahn, R. Veldhuis, and A. Peter, "Practical Biometric Search under Encryption: Meeting the NIST Runtime Requirement without Loss of Accuracy" IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM). 2025.
  • J. Starink, M. Huisman, A. Peter, and A. Continella, "Behavior Nets: Context-Aware Behavior Modeling for Code Injection-Based Windows Malware" ACM Transactions on Privacy and Security (TOPS), vol. 28, iss. 3. 2025.
  • A. Bassit, F. Hahn, Z. Rezgui, H. O. Shahreza, R. Veldhuis, and A. Peter, "Template recovery attack on encrypted face recognition systems with unprotected decision using synthetic faces" Frontiers in Imaging. 2025.
  • K. Hobbensiefken, B. Balk, A. Peter, and P. Staudt, "An Organizational Field Experiment on Phishing and Cybersecurity Risk Homeostasis Theory" in Proc. of the 31st Americas Conference on Information Systems (AMCIS 2025), 2025.
  • M. Damie, F. Hahn, A. Peter, and J. Ramon, "Eliminating Exponential Key Growth in PRG-Based Distributed Point Functions" in Proc. of the 20th International Workshop on Data Privacy Management (DPM 2025), 2025.
  • M. Damie, J. Leger, F. Hahn, and A. Peter, "Revisiting the Attacker's Knowledge in Inference Attacks Against Searchable Symmetric Encryption" in Proc. of the 23rd Internationl Conference on Applied Cryptography and Network Security (ACNS 2025), 2025.
  • F. Mazzone, A. Al Badawi, Y. Polyakov, M. Everts, F. Hahn, and A. Peter, "Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning" in Proc. of the 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy (DBSec 2025), 2025.
  • F. Mazzone, M. Everts, F. Hahn, and A. Peter, "Efficient Ranking, Order Statistics, and Sorting under CKKS" in Proc. of the 34th USENIX Security Symposium (USENIX Security 2025), 2025.
  • M. Buechel, T. Paladini, S. Longari, M. Carminati, S. Zanero, H. Binyamini, G. Engelberg, D. Klein, G. Guizzardi, M. Caselli, A. Continella, M. van Steen, A. Peter, and T. van Ede, "SoK: Automated TTP Extraction from CTI Reports – Are We There Yet?" in Proc. of the 34th USENIX Security Symposium (USENIX Security 2025), 2025.
  • A. El Khairi, A. Peter, and A. Continella, "Procatch: Detecting Execution-based Anomalies in Single-Instance Microservices" in Proc. of the 13th Conference on Communications and Network Security (CNS 2025), 2025.
  • A. El Khairi, A. Peter, and A. Continella, "ConLock: Reducing Runtime Attack Surface in Containerized Microservices" in Proc. of the 4th International Workshop on System Security Assurance (SecAssure 2025), 2025.
  • P. C. Arnold, P. Jakubeit, and A. Peter, "WiPhi: Using Location-Specific WiFi Signals for Password Hardening and Improvement" EURASIP Journal on Information Security. 2025.
  • M. Damie, F. Hahn, A. Peter, and J. Ramon, "DDH-based schemes for multi-party Function Secret Sharing" in Proc. of the 30th Nordic Conference on Secure IT Systems (NordSec 2025), 2025.
  • C. Gupta, A. Peter, and A. Continella, "R+R: IoT Device Identification Under Realistic Conditions" in Proc. of the 41st Annual Computer Security Applications Conference (ACSAC 2025), 2025.

2024

  • J. van Nielen, A. Peter, und A. Continella, "frameD: Toward Automated Identification of Embedded Frameworks in Firmware Images" in Proc. of the 10th International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS 2024), 2024.
  • Z. Kucsvan, M. Caselli, A. Peter, und A. Continella, "Inferring Recovery Steps from Cyber Threat Intelligence Reports" in Proc. of the 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2024), 2024.
  • P. Jakubeit, A. Peter, und M. van Steen, "SPAWN: Seamless Proximity-based Authentication by Utilizing the Existent WiFi Environment" in Proc. of the 14th International Conference on Information Security Theory and Practice (WISTP 2024), 2024.
  • A. El Khairi, M. Caselli, A. Peter, A. Continella, „ReplicaWatcher: Training-less Anomaly Detection in Containerized Microservices” in Proc. of the 31th Annual Network and Distributed System Security Symposium (NDSS 2024), ACM, 2024.
  • P. Jakubeit, A. Peter, M. van Steen, „RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable within a Designated Area”. In Proc. of the 10th International Conference on Information Systems Security and Privacy (ICISSP 2024), SciTePress, 2024.

2023

  • A. Bassit, F. Hahn, R. Veldhuis, A. Peter, „Improved Multiplication-Free Biometric Recognition Under Encryption” in IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM), IEEE, 2023. (» PDF)
  • V. Stanciu, M. van Steen, C. Dobre, A. Peter, „Privacy-friendly statistical counting for pedestrian dynamics” in Computer Communications, vol. 211, pp. 178-192, Elsevier, 2023. (» PDF)
  • J. Starink, M. Huisman, A. Peter, A. Continella, „Understanding and Measuring Inter-Process Code Injection in Windows Malware” in Proc. of the 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2023), Springer, 2023, to appear.
  • A. Bassit, F. Hahn, Z. Rezgui, U. Kelly, R. Veldhuis, A. Peter, „Template Recovery Attack on Homomorphically Encrypted Biometric Recognition Systems with Unprotected Threshold Comparison” in Proc. of the 2023 International Joint Conference on Biometrics (IJCB 2023), IEEE, 2023, to appear.
  • P. Jakubeit, A. Peter, M. van Steen, „LocKey: Location-based Key Extraction from the WiFi Environment in the User’s Vicinity”  in Proc. of the 18th International Conference on Information Security Practice and Experience (ISPEC 2023), Springer, 2023. (» PDF)
  • C. Sabater, F. Hahn, A. Peter, J. Ramon, „Private Sampling with Identifiable Cheaters” in Proceedings on Privacy Enhancing Technologies (PoPETs), 2023. (» PDF)
  • P. Jakubeit, A. Peter, M. van Steen, "The Measurable Environment as Nonintrusive Authentication Factor on the Example of WiFi Beacon Frames" in Proc. of the 5th International Workshop on Emerging Technologies for Authorization and Authentication (ETAA 2022), Springer, 2023. (» PDF)
(Changed: 12 Feb 2026)  Kurz-URL:Shortlink: https://uol.de/p87732en
Zum Seitananfang scrollen Scroll to the top of the page