Forschung

Kontakt

Universität Oldenburg
Fakultät II – Department für Informatik
Abteilung Safety-Security-Interaction
26111 Oldenburg

Sekretariat

Ingrid Ahlhorn

+49 (0) 441 - 798 2426

I 11 0-014

Industriestrasse 11, 26121 Oldenburg

Forschung

Forschung

Unser Forschungsfokus liegt auf der Entwicklung und der Analyse von IT-Sicherheitstechnologien im Zusammenspiel mit der funktionalen Sicherheit von sowie der Benutzerinteraktion mit den zu schützenden Systemen. Als Anwendungsbereiche schauen wir uns speziell das Internet der Dinge sowie sicherheitskritische Systeme an. Insbesondere im Bereich des Internets der Dinge kommt das komplexe Thema der Datensicherheit und der 'Privacy-Enhancing Technologies' hinzu.

Aktuelle Publikationen

Im Folgenden werden die Publikationen der letzten drei Jahre aufgelistet. Eine vollständige Liste, inklusive BibTex-Format, ist auf der Seite Publikationen zu finden.

2025

  • A. Bassit, F. Hahn, R. Veldhuis, und A. Peter, "Practical Biometric Search under Encryption: Meeting the NIST Runtime Requirement without Loss of Accuracy" IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM). 2025.
  • J. Starink, M. Huisman, A. Peter, und A. Continella, "Behavior Nets: Context-Aware Behavior Modeling for Code Injection-Based Windows Malware" ACM Transactions on Privacy and Security (TOPS), vol. 28, iss. 3. 2025.
  • A. Bassit, F. Hahn, Z. Rezgui, H. O. Shahreza, R. Veldhuis, und A. Peter, "Template recovery attack on encrypted face recognition systems with unprotected decision using synthetic faces" Frontiers in Imaging. 2025.
  • K. Hobbensiefken, B. Balk, A. Peter, und P. Staudt, "An Organizational Field Experiment on Phishing and Cybersecurity Risk Homeostasis Theory" in Proc. of the 31st Americas Conference on Information Systems (AMCIS 2025), 2025.
  • M. Damie, F. Hahn, A. Peter, und J. Ramon, "Eliminating Exponential Key Growth in PRG-Based Distributed Point Functions" in Proc. of the 20th International Workshop on Data Privacy Management (DPM 2025), 2025.
  • M. Damie, J. Leger, F. Hahn, und A. Peter, "Revisiting the Attacker's Knowledge in Inference Attacks Against Searchable Symmetric Encryption" in Proc. of the 23rd Internationl Conference on Applied Cryptography and Network Security (ACNS 2025), 2025.
  • F. Mazzone, A. Al Badawi, Y. Polyakov, M. Everts, F. Hahn, und A. Peter, "Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning" in Proc. of the 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy (DBSec 2025), 2025.
  • F. Mazzone, M. Everts, F. Hahn, und A. Peter, "Efficient Ranking, Order Statistics, and Sorting under CKKS" in Proc. of the 34th USENIX Security Symposium (USENIX Security 2025), 2025.
  • M. Buechel, T. Paladini, S. Longari, M. Carminati, S. Zanero, H. Binyamini, G. Engelberg, D. Klein, G. Guizzardi, M. Caselli, A. Continella, M. van Steen, A. Peter, und T. van Ede, "SoK: Automated TTP Extraction from CTI Reports – Are We There Yet?" in Proc. of the 34th USENIX Security Symposium (USENIX Security 2025), 2025.
  • A. El Khairi, A. Peter, und A. Continella, "Procatch: Detecting Execution-based Anomalies in Single-Instance Microservices" in Proc. of the 13th Conference on Communications and Network Security (CNS 2025), 2025.
  • A. El Khairi, A. Peter, und A. Continella, "ConLock: Reducing Runtime Attack Surface in Containerized Microservices" in Proc. of the 4th International Workshop on System Security Assurance (SecAssure 2025), 2025.
  • P. C. Arnold, P. Jakubeit, und A. Peter, "WiPhi: Using Location-Specific WiFi Signals for Password Hardening and Improvement" EURASIP Journal on Information Security. 2025.
  • M. Damie, F. Hahn, A. Peter, und J. Ramon, "DDH-based schemes for multi-party Function Secret Sharing" in Proc. of the 30th Nordic Conference on Secure IT Systems (NordSec 2025), 2025.
  • C. Gupta, A. Peter, und A. Continella, "R+R: IoT Device Identification Under Realistic Conditions" in Proc. of the 41st Annual Computer Security Applications Conference (ACSAC 2025), 2025.

2024

  • J. van Nielen, A. Peter, und A. Continella, "frameD: Toward Automated Identification of Embedded Frameworks in Firmware Images" in Proc. of the 10th International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS 2024), 2024.
  • Z. Kucsvan, M. Caselli, A. Peter, und A. Continella, "Inferring Recovery Steps from Cyber Threat Intelligence Reports" in Proc. of the 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2024), 2024.
  • P. Jakubeit, A. Peter, und M. van Steen, "SPAWN: Seamless Proximity-based Authentication by Utilizing the Existent WiFi Environment" in Proc. of the 14th International Conference on Information Security Theory and Practice (WISTP 2024), 2024.
  • A. El Khairi, M. Caselli, A. Peter, A. Continella, „ReplicaWatcher: Training-less Anomaly Detection in Containerized Microservices” in Proc. of the 31th Annual Network and Distributed System Security Symposium (NDSS 2024), ACM, 2024.
  • P. Jakubeit, A. Peter, M. van Steen, „RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable within a Designated Area”. In Proc. of the 10th International Conference on Information Systems Security and Privacy (ICISSP 2024), SciTePress, 2024.

2023

  • A. Bassit, F. Hahn, R. Veldhuis, A. Peter, „Improved Multiplication-Free Biometric Recognition Under Encryption” in IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM), IEEE, 2023. (» PDF)
  • V. Stanciu, M. van Steen, C. Dobre, A. Peter, „Privacy-friendly statistical counting for pedestrian dynamics” in Computer Communications, vol. 211, pp. 178-192, Elsevier, 2023. (» PDF)
  • J. Starink, M. Huisman, A. Peter, A. Continella, „Understanding and Measuring Inter-Process Code Injection in Windows Malware” in Proc. of the 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2023), Springer, 2023, to appear.
  • A. Bassit, F. Hahn, Z. Rezgui, U. Kelly, R. Veldhuis, A. Peter, „Template Recovery Attack on Homomorphically Encrypted Biometric Recognition Systems with Unprotected Threshold Comparison” in Proc. of the 2023 International Joint Conference on Biometrics (IJCB 2023), IEEE, 2023, to appear.
  • P. Jakubeit, A. Peter, M. van Steen, „LocKey: Location-based Key Extraction from the WiFi Environment in the User’s Vicinity”  in Proc. of the 18th International Conference on Information Security Practice and Experience (ISPEC 2023), Springer, 2023. (» PDF)
  • C. Sabater, F. Hahn, A. Peter, J. Ramon, „Private Sampling with Identifiable Cheaters” in Proceedings on Privacy Enhancing Technologies (PoPETs), 2023. (» PDF)
  • P. Jakubeit, A. Peter, M. van Steen, "The Measurable Environment as Nonintrusive Authentication Factor on the Example of WiFi Beacon Frames" in Proc. of the 5th International Workshop on Emerging Technologies for Authorization and Authentication (ETAA 2022), Springer, 2023. (» PDF)
(Stand: 12.02.2026)  Kurz-URL:Shortlink: https://uol.de/p87732
Zum Seitananfang scrollen Scroll to the top of the page