<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>News | UCS</title><link>/post/</link><atom:link href="/post/index.xml" rel="self" type="application/rss+xml"/><description>News</description><generator>Hugo Blox Builder (https://hugoblox.com)</generator><language>en-us</language><lastBuildDate>Tue, 21 Apr 2026 00:00:00 +0000</lastBuildDate><image><url>/media/logo_hu12465375348167678909.png</url><title>News</title><link>/post/</link></image><item><title>EICC 2026 at Darmstadt University of Applied Sciences</title><link>/post/2026-04-22-eicc-20226/</link><pubDate>Tue, 21 Apr 2026 00:00:00 +0000</pubDate><guid>/post/2026-04-22-eicc-20226/</guid><description>&lt;p>From 17 to 18 June, we will be hosting EICC 2026 at Darmstadt University of Applied Sciences. The final program is now available. &lt;a href="https://www.fvv.um.si/eicc2026/" target="_blank" rel="noopener">Details&lt;/a>&lt;/p></description></item><item><title>ATHENE Usable Security and Privacy Lab</title><link>/post/2025-09-26-usp-lab-launch/</link><pubDate>Thu, 25 Sep 2025 00:00:00 +0000</pubDate><guid>/post/2025-09-26-usp-lab-launch/</guid><description>&lt;h2 id="participation-welcome-launch-of-the-athene-usable-security-and-privacy-lab-at-h_da">Participation welcome: Launch of the ‘ATHENE Usable Security and Privacy Lab’ at h_da&lt;/h2>
&lt;p>At the beginning of October, the ‘ATHENE Usable Security and Privacy Lab’ (USP Lab) began its work at h_da. The lab is run by the User-Centered Security working group and supported by the National Research Center for Applied Cybersecurity ATHENE. Researchers and students at h_da can use the lab for projects and studies on the usability of security and privacy related technologies. The focus lies on questions of how security and privacy technologies can be designed to support users in making informed decisions and effectively protect their personal data. This includes, for example, the comprehensible presentation of privacy policies or transparent cookie banners that openly explain which data are processed and in what form when using an application. Research into user behaviour is also of great interest, for example regarding trust in AI tools and the information users may reveal.&lt;/p>
&lt;p>The USP Lab has comprehensive technical resources and offers methodological support to investigate such issues, for example through usability tests on PCs or mobile devices, user interviews, surveys, eye tracking and more. The laboratory is located in building D19, room 02.12, and can also be used for teaching purposes. Researchers who are not members of ATHENE can request to use the USP Lab at any time. The laboratory website also provides detailed explanations and instructions. If required, the team will be happy to assist you with individual methodological consultation. In addition, the website provides all the necessary information on booking the laboratory and the available equipment. If you have any questions, please contact us (&lt;a href="mailto:usp-lab@h-da.de">usp-lab@h-da.de&lt;/a>).&lt;/p></description></item><item><title>Two papers accepted at ISC 2025</title><link>/post/2025-09-09-paper-isc/</link><pubDate>Wed, 03 Sep 2025 00:00:00 +0000</pubDate><guid>/post/2025-09-09-paper-isc/</guid><description>&lt;p>Two papers from our working group have been accepted at &lt;a href="https://isc25.skku.edu/accepted-papers/" target="_blank" rel="noopener">ISC 2025&lt;/a>.&lt;/p>
&lt;p>Our first paper &amp;ldquo;Simulation-based Software Leakage Evaluation for the RISC-V Platform&amp;rdquo; by Nicolai Schmitt, Jannik Zeitschner (Ruhr Universität Bochum) and Andreas Heinemann extends a tool (PROLEAD_SW) for the RISC-V platform in order to detect leakage.&lt;/p>
&lt;p>Our second paper &amp;ldquo;A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection?&amp;rdquo; by Johanna Henrich, Nicolai Schmitt, Nouri Alnahawi and Andreas Heinemann investigates the TLS handshake performance when using PQC schemes.&lt;/p></description></item><item><title>PIONEER project presents current investigations and publications</title><link>/post/2025-08-07-iv2025-poster/</link><pubDate>Mon, 25 Aug 2025 00:00:00 +0000</pubDate><guid>/post/2025-08-07-iv2025-poster/</guid><description>&lt;p>The ATHENE research project PIONEER was featured at the 29th International Conference Information Visualisation held on August 07, 2025 in Darmstadt.
The conference brought together leading experts from academia and research institutions to discuss the latest developments in information visualisation, machine learning, and data science.&lt;/p>
&lt;p>During the event, Sara Hahn presented the latest research investigations and publications on PIONEER’s innovative Digital Privacy Companion.
In her talk, Sara Hahn provided a comprehensive overview of the project’s theoretical foundations and research methodology, while also showcasing current investigations, findings, and recent publications.&lt;/p>
&lt;p>The PIONEER project is part of ATHENE’s mission to advance cybersecurity and privacy research with practical solutions that can be transferred into real-world applications. &lt;/p>
&lt;p>
&lt;figure id="figure-sara-hahn-presenting-the-poster-on-day-2-of-the-iv2025-conference-image-169-iv2025">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Impressions 1" srcset="
/post/2025-08-07-iv2025-poster/iv2025-vortrag_hu5094054220572214178.webp 400w,
/post/2025-08-07-iv2025-poster/iv2025-vortrag_hu14161170330207345930.webp 760w,
/post/2025-08-07-iv2025-poster/iv2025-vortrag_hu16404996694804680953.webp 1200w"
src="/post/2025-08-07-iv2025-poster/iv2025-vortrag_hu5094054220572214178.webp"
width="570"
height="760"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Sara Hahn presenting the poster on Day 2 of the IV2025 Conference. Image © IV2025
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>Wir begrüßen Fabian im Team</title><link>/post/2025-04-1-new-member-fabian/</link><pubDate>Tue, 01 Apr 2025 00:00:00 +0000</pubDate><guid>/post/2025-04-1-new-member-fabian/</guid><description>&lt;p>Wir freuen uns, dass Fabian Seidl zum 01.04. unsere Gruppe verstärkt. Fabian hat einen Master in
Computer Science und wird im Projekt SATURN gemeinsam mit Johanna Fragestellungen rund um PQC und QKDN untersuchen.&lt;/p>
&lt;p>Willkommen, Fabian.&lt;/p></description></item><item><title>Nationale Konferenz IT-Sicherheitsforschung 2025</title><link>/post/2025-03-17-bmbf-konf-berlin/</link><pubDate>Sun, 16 Mar 2025 00:00:00 +0000</pubDate><guid>/post/2025-03-17-bmbf-konf-berlin/</guid><description>&lt;p>UCS will present the results of the DemoQuanDT research project in a poster session at the &lt;a href="https://www.forschung-it-sicherheit-kommunikationssysteme.de/service/termine/nationale-konferenz-it-sicherheitsforschung-2025" target="_blank" rel="noopener">&amp;ldquo;National Conference IT Security Research 2025 - IT Security and Democracy&amp;rdquo;&lt;/a> in Berlin, which is being hosted by the German Federal Ministry of Education and Research (BMBF).&lt;/p>
&lt;p>The presentation will be based on a poster entitled &amp;ldquo;Confidential and authenticated key forwarding in QKD networks,&amp;rdquo; which has been accepted for the poster pitch on March 18, 2025. The central inquiry concerns the extent to which security and performance can be assured for key forwarding in extensive, interconnected QKD networks. The technology is poised to facilitate secure transmission of messages, that is, confidentiality and authentication. In contradistinction to the asymmetric cryptographic approaches currently employed, the security of the QKD system is expected to withstand the threat posed by quantum computers.&lt;/p>
&lt;p>The poster was authored by Johanna Henrich. Her research focuses on key establishment in QKD networks and the potential for integrating QKD and PQC to ensure quantum-safe and high-performance communication. The research is conducted in close collaboration with the &lt;a href="https://danet.h-da.io/" target="_blank" rel="noopener">danet research group&lt;/a> led by Prof. Dr Martin Stiemerling.&lt;/p>
&lt;p>
&lt;figure id="figure-image-169-national-conference-it-security-research-2025httpswwwforschung-it-sicherheit-kommunikationssystemedeserviceterminenationale-konferenz-it-sicherheitsforschung-2025">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="National Conference IT Security Research 2025" srcset="
/post/2025-03-17-bmbf-konf-berlin/bmbf-konf-2025_hu13903682880246765859.webp 400w,
/post/2025-03-17-bmbf-konf-berlin/bmbf-konf-2025_hu2897823824235519899.webp 760w,
/post/2025-03-17-bmbf-konf-berlin/bmbf-konf-2025_hu11718390987991694070.webp 1200w"
src="/post/2025-03-17-bmbf-konf-berlin/bmbf-konf-2025_hu13903682880246765859.webp"
width="760"
height="397"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: &lt;a href="https://www.forschung-it-sicherheit-kommunikationssysteme.de/service/termine/nationale-konferenz-it-sicherheitsforschung-2025" target="_blank" rel="noopener">National Conference IT Security Research 2025&lt;/a>
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>PIONEER project presents current results</title><link>/post/2024-11-19-conference-ffm/</link><pubDate>Thu, 21 Nov 2024 00:00:00 +0000</pubDate><guid>/post/2024-11-19-conference-ffm/</guid><description>&lt;p>UCS recently participated in the ATHENE-Conference on Cognitive Security, held on November 19, 2024, at the historic Jügelhaus in Frankfurt am Main. The event gathered experts from academia, media, and politics to address the pressing challenges posed by cognitive attacks in the digital age. In addition to interesting talks and an insightful panel discussion, several projects were presented in the demo sessions.&lt;/p>
&lt;p>Sara Hahn had the opportunity to present the ATHENE project PIONEER’s mobile prototype during the demo sessions with her project colleagues from the TU Darmstadt. The conference guests could explore the prototype’s features, such as lessons and quizzes about privacy, or compare applications regarding their privacy friendliness.&lt;/p>
&lt;p>Within our project PIONEER, we strive to empower users in their digital sovereignty by providing them with the necessary knowledge and motivating them to acquire and apply competencies in their everyday digital lives.&lt;/p>
&lt;p>
&lt;figure id="figure-the-pioneer-team-image-169-catharina-frank">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Impressions 1" srcset="
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-1_hu8642171385057479289.webp 400w,
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-1_hu1111056830116826190.webp 760w,
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-1_hu7028380283064851052.webp 1200w"
src="/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-1_hu8642171385057479289.webp"
width="760"
height="507"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
The PIONEER Team. Image © Catharina Frank
&lt;/figcaption>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure id="figure-conference-impressions-image-169-catharina-frank">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Impressions 2" srcset="
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-2_hu9225478459891510529.webp 400w,
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-2_hu8227128744662219430.webp 760w,
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-2_hu10417369759856008191.webp 1200w"
src="/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-2_hu9225478459891510529.webp"
width="760"
height="507"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Conference Impressions. Image © Catharina Frank
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>IETF Meeting 121 in Dublin</title><link>/post/2024-11-01-ietf-meeting-121-dublin/</link><pubDate>Thu, 24 Oct 2024 00:00:00 +0000</pubDate><guid>/post/2024-11-01-ietf-meeting-121-dublin/</guid><description>&lt;p>UCS took part in the &lt;a href="https://www.ietf.org/meeting/121/" target="_blank" rel="noopener">121st meeting of the Internet Engineering Task Force (IETF) in Dublin&lt;/a> from 2.-8. November 2024. The IETF develops standards and best practices for the Internet and thus has a significant influence on its design.&lt;/p>
&lt;p>Among other things, Johanna Henrich led a project group together with the &lt;a href="https://danet.h-da.io/" target="_blank" rel="noopener">&lt;em>danet&lt;/em>&lt;/a> research group of Prof. Dr. Martin Stiemerling. The project was part of the &lt;a href="https://www.ietf.org/meeting/hackathons/121-hackathon/" target="_blank" rel="noopener">Hackathon&lt;/a>, which took place from 2.-3. November. The aim was to find out how the interfaces in Quantum Key Distribution Networks (QKDN) can be designed and how quantum-resistant protection of their communication can be achieved. Read more in our &lt;a href="https://datatracker.ietf.org/meeting/121/materials/slides-121-hackathon-sessd-protocols-for-quantum-key-distribution-networks-qkdn-00" target="_blank" rel="noopener">final presentation&lt;/a>.&lt;/p>
&lt;p>In addition, Johanna Henrich participated in various IETF and IRTF working group sessions throughout the week to answer questions such as how post-quantum cryptography (PQC) and QKD, individually and in hybrid form, can be integrated into the existing Internet infrastructure.&lt;/p>
&lt;p>
&lt;figure id="figure-image-169-johanna-henrich">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="H_da@IETF121" srcset="
/post/2024-11-01-ietf-meeting-121-dublin/dublin1_hu750836535530113213.webp 400w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin1_hu16660504106634181873.webp 760w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin1_hu4076067445614435600.webp 1200w"
src="/post/2024-11-01-ietf-meeting-121-dublin/dublin1_hu750836535530113213.webp"
width="760"
height="683"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: Johanna Henrich
&lt;/figcaption>&lt;/figure>
&lt;figure id="figure-image-169-johanna-henrich">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Dublin Convention Center" srcset="
/post/2024-11-01-ietf-meeting-121-dublin/dublin2_hu2475273792349512832.webp 400w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin2_hu17787974089270791007.webp 760w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin2_hu5725797291102983458.webp 1200w"
src="/post/2024-11-01-ietf-meeting-121-dublin/dublin2_hu2475273792349512832.webp"
width="760"
height="570"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: Johanna Henrich
&lt;/figcaption>&lt;/figure>
&lt;figure id="figure-image-169-johanna-henrich">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Hackaton@IETF121" srcset="
/post/2024-11-01-ietf-meeting-121-dublin/dublin3_hu18262922610363661176.webp 400w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin3_hu15313571835690591437.webp 760w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin3_hu14090310200751563479.webp 1200w"
src="/post/2024-11-01-ietf-meeting-121-dublin/dublin3_hu18262922610363661176.webp"
width="678"
height="760"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: Johanna Henrich
&lt;/figcaption>&lt;/figure>
&lt;figure id="figure-image-169-johanna-henrich">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Dublin impressions" srcset="
/post/2024-11-01-ietf-meeting-121-dublin/dublin4_hu11480959661179178800.webp 400w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin4_hu2861291465665790847.webp 760w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin4_hu14462442235763723863.webp 1200w"
src="/post/2024-11-01-ietf-meeting-121-dublin/dublin4_hu11480959661179178800.webp"
width="760"
height="518"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: Johanna Henrich
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>Rump Session at ECOC 2024</title><link>/post/2024-09-22-ecoc-rump-session/</link><pubDate>Thu, 24 Oct 2024 00:00:00 +0000</pubDate><guid>/post/2024-09-22-ecoc-rump-session/</guid><description>&lt;p>On 24 September 2024, Johanna Henrich accepted an invitation to take part in a rump session at the &lt;a href="https://www.ecoc2024.org/" target="_blank" rel="noopener">European Conference on Optical Communication (ECOC) 2024&lt;/a>. The session dealt with the pros and cons of post-quantum cryptography and quantum key distribution, and the extent to which they can be used in combination to reliably protect us from future attacks by quantum computers.&lt;/p>
&lt;p>ECOC is Europe&amp;rsquo;s leading conference on optical communications with representatives from science and research. It consists of a broad exhibition and a parallel conference and took place this year from 22 to 26 September in Frankfurt am Main.&lt;/p>
&lt;p>
&lt;figure id="figure-image-169-ecoc-2024-impressionshttpswwwecoc2024orgabout-ecocimpressions">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="ECOC Opening" srcset="
/post/2024-09-22-ecoc-rump-session/ECOC-23Sep2024_hu13230516318362971037.webp 400w,
/post/2024-09-22-ecoc-rump-session/ECOC-23Sep2024_hu17032873120562107944.webp 760w,
/post/2024-09-22-ecoc-rump-session/ECOC-23Sep2024_hu2388086254709085923.webp 1200w"
src="/post/2024-09-22-ecoc-rump-session/ECOC-23Sep2024_hu13230516318362971037.webp"
width="760"
height="507"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: &lt;a href="https://www.ecoc2024.org/about-ecoc/impressions/" target="_blank" rel="noopener">ECOC 2024 IMPRESSIONS&lt;/a>
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>Wir begrüßen Sara im Team</title><link>/post/2024-new-member-sara/</link><pubDate>Wed, 16 Oct 2024 00:00:00 +0000</pubDate><guid>/post/2024-new-member-sara/</guid><description>&lt;p>Wir freuen uns, dass Sara Hahn zum 1.10. unsere Gruppe verstärkt. Sara hat einen Master in
Psychologie und wird sich im Projekt PIONEER mit psychologischen Bedürfnisse der Nutzer im
Kontext von Privatsphäre und Vertrauen im Internet befassen.&lt;/p>
&lt;p>Willkommen, Sara.&lt;/p></description></item><item><title>Unser Beitrag auf dem Usable Security and Privacy Workshop (MuC 2024)</title><link>/post/2024-08-paper-muc-usp/</link><pubDate>Wed, 28 Aug 2024 00:00:00 +0000</pubDate><guid>/post/2024-08-paper-muc-usp/</guid><description>&lt;p>Unser Beitrag &amp;ldquo;Pass auf! - Child-Oriented Cyber Safety &amp;amp; Security Educational Content&amp;rdquo; von Karen Bopp, Andreas Heinemann und
Karen Renaud wird am 3. September auf dem 10. Usable Security und Privacy Workshop am KIT in Karlsruhe im Rahmen der Konferenz &amp;ldquo;Mensch und Computer 2024&amp;rdquo; vorgestellt.&lt;/p>
&lt;p>Diese Arbeit basiert auf den Ergebnissen der Masterarbeit von Karen Bopp.&lt;/p></description></item><item><title>2 Jobs for Student Assistants</title><link>/post/2024-07-30-offering-hiwi/</link><pubDate>Tue, 30 Jul 2024 04:12:53 +0000</pubDate><guid>/post/2024-07-30-offering-hiwi/</guid><description>&lt;p>Wir bieten zwei Stellen für studentische Hilfskräfte. Obwohl beide Tätigkeiten einen Bezug zu IT-Sicherheit und unserem Forschungsfeld &lt;em>Quantum Key Distribution Networks&lt;/em> haben, unterscheiden sich die Aufgaben stark. Wenn Du Dinge gut Ordnen und Strukturieren kannst und ein kleines Organisationstalent bist, kannst du gerne versuchen, für Ordnung in unseren Literaturdschungel zu sorgen. Wenn du eher Typ Programmierer und Tüftler bist, darfst Du dich an unseren Prototypen wagen.&lt;/p>
&lt;p>Unten findest Du die Links zu unseren Angeboten. Melde Dich bei Interesse gerne per Mail bei &lt;a href="https://ucs.h-da.io/author/johanna-henrich/" target="_blank" rel="noopener">Johanna Henrich&lt;/a>.&lt;/p>
&lt;p>Wir freuen uns auf Dich.&lt;/p>
&lt;ol>
&lt;li>
&lt;p>&lt;a href="https://ucs.h-da.io/offerings/2024-07-hiwi-sok-qkdn//" target="_blank" rel="noopener">Systematization of Knowledge (SoK): Architecture and Communication Patterns in QKD Networks&lt;/a>&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;a href="https://ucs.h-da.io/offerings/2024-07-hiwo-qkdn-prototype//" target="_blank" rel="noopener">Prototype development and benchmarking for secure key forwarding in QKDN&lt;/a>&lt;/p>
&lt;/li>
&lt;/ol>
&lt;p>&lt;em>English:&lt;/em>&lt;/p>
&lt;p>&lt;em>We offer two positions for student assistants. Although both jobs are related to IT security and our research area Quantum Key Distribution Networks, the tasks are quite different. If you are good at organizing and structuring things and have a talent for keeping things tidy, you are welcome to try to keep our literature jungle in order. If you are more of a programmer and tinkerer, you can try your hand at our prototype.&lt;/em>&lt;/p>
&lt;p>&lt;em>Below you will find the links to our offers. If you are interested, please send an email to &lt;a href="https://ucs.h-da.io/author/johanna-henrich/" target="_blank" rel="noopener">Johanna Henrich&lt;/a>.&lt;/em>&lt;/p>
&lt;p>&lt;em>We are looking forward to hearing from you.&lt;/em>&lt;/p>
&lt;ol>
&lt;li>
&lt;p>&lt;em>&lt;a href="https://ucs.h-da.io/offerings/2024-07-hiwi-sok-qkdn//" target="_blank" rel="noopener">Systematization of Knowledge (SoK): Architecture and Communication Patterns in QKD Networks&lt;/a>&lt;/em>&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;em>&lt;a href="https://ucs.h-da.io/offerings/2024-07-hiwo-qkdn-prototype//" target="_blank" rel="noopener">Prototype Development and Benchmarking for Secure Key Forwarding in QKDN&lt;/a>&lt;/em>&lt;/p>
&lt;/li>
&lt;/ol></description></item><item><title>2 neue Themen für Abschlussarbeiten online (DE)</title><link>/post/2024-01-23-db-systel/</link><pubDate>Tue, 23 Jan 2024 04:12:53 +0000</pubDate><guid>/post/2024-01-23-db-systel/</guid><description>&lt;p>In Kooperation mit der DB Systel bieten wir die folgenden zwei Abschlussarbeiten an&lt;/p>
&lt;ol>
&lt;li>
&lt;p>&lt;a href="https://ucs.h-da.io/offerings/2024-01-thesis-threat-modelling-dbsystel/" target="_blank" rel="noopener">Einbettung von automatisiertem Threat Modelling ins Risikomanagement&lt;/a>&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;a href="https://ucs.h-da.io/offerings/2024-01-thesis-pentest-report-dbsystel/" target="_blank" rel="noopener">Nutzerzentrierte Qualitätssteigerung im Berichtswesen von Penetrationtests&lt;/a>&lt;/p>
&lt;/li>
&lt;/ol></description></item><item><title>Paper accepted at ISC 2023</title><link>/post/paper-isc-2023/</link><pubDate>Wed, 11 Oct 2023 00:00:00 +0000</pubDate><guid>/post/paper-isc-2023/</guid><description>&lt;p>Our paper &amp;ldquo;Performance Impact of PQC KEMs on TLS 1.3 under Varying Network
Characteristics&amp;rdquo; by Johanna Henrich, Andreas Heinemann, Alexander Wiesmaier and Nicolai Schmidt will be presented at the &lt;a href="https://isc23.cs.rug.nl/docs/home/" target="_blank" rel="noopener">26th Information Security Conference (ISC)&lt;/a> (ISC - 2023) on November 15/16/17th 2023, Groningen, Netherlands.&lt;/p>
&lt;p>This work is based on the results of Johanna Henrichs&amp;rsquo;s Master&amp;rsquo;s thesis.&lt;/p></description></item><item><title>9. Usable Security and Privacy Workshop</title><link>/post/2023-08-29-muc-workshop/</link><pubDate>Tue, 29 Aug 2023 00:00:00 +0000</pubDate><guid>/post/2023-08-29-muc-workshop/</guid><description>&lt;p>On Sept. 03, 2023, the &lt;a href="https://das.h-brs.de/workshops/usp-muc-2023/" target="_blank" rel="noopener">9th Usable Security and Privacy Workshop&lt;/a> will take place as part of the &lt;a href="https://muc2023.mensch-und-computer.de" target="_blank" rel="noopener">Mensch und Computer 23&lt;/a> in Rapperswil (SG). &lt;a href="https://ucs.h-da.io/author/andreas-heinemann/" target="_blank" rel="noopener">Andreas Heinemann&lt;/a> is one of the co-organisers of this workshop.&lt;/p></description></item><item><title>Workshop on crypto-agility and migration</title><link>/post/2023-08-01-workshop_on_crypto-agility_and_migration/</link><pubDate>Tue, 01 Aug 2023 00:00:00 +0000</pubDate><guid>/post/2023-08-01-workshop_on_crypto-agility_and_migration/</guid><description>&lt;p>We will host a workshop on crypto-agility and migration on September 19, 2023. &lt;a href="https://camm.h-da.io/workshop/" target="_blank" rel="noopener">Details&lt;/a>&lt;/p></description></item><item><title>UCS@1st Research Day / FBI</title><link>/post/2023-07-12-research-day-computer-science/</link><pubDate>Wed, 12 Jul 2023 00:00:00 +0000</pubDate><guid>/post/2023-07-12-research-day-computer-science/</guid><description>&lt;p>&lt;a href="https://impact.h-da.de/en/research-day-computer-science" target="_blank" rel="noopener">An article about the research day can be found here&lt;/a>&lt;/p></description></item><item><title>Best Poster Award at EICC 2023</title><link>/post/2023-06-poster-eicc/</link><pubDate>Thu, 15 Jun 2023 00:00:00 +0000</pubDate><guid>/post/2023-06-poster-eicc/</guid><description>&lt;p>Our poster contribution to the EICC2023 titled &amp;ldquo;Crytpo-agile Design and Testbed for QKD-Networks&amp;rdquo; by Johanna Henrich, Andreas Heinemann, Martin Stiemerling &amp;amp; Fabian Seidl was honored with the best poster award.&lt;/p>
&lt;p>
&lt;figure id="figure-group-photo">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Group photo" srcset="
/post/2023-06-poster-eicc/group_hu3733658338992802588.webp 400w,
/post/2023-06-poster-eicc/group_hu6515095651612886417.webp 760w,
/post/2023-06-poster-eicc/group_hu10510738062189006190.webp 1200w"
src="/post/2023-06-poster-eicc/group_hu3733658338992802588.webp"
width="729"
height="591"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Group photo
&lt;/figcaption>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure id="figure-johanna">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Johanna" srcset="
/post/2023-06-poster-eicc/johanna_hu7272527927102725640.webp 400w,
/post/2023-06-poster-eicc/johanna_hu10170461419800617504.webp 760w,
/post/2023-06-poster-eicc/johanna_hu12843555640151551165.webp 1200w"
src="/post/2023-06-poster-eicc/johanna_hu7272527927102725640.webp"
width="518"
height="760"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Johanna
&lt;/figcaption>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure id="figure-clapclap">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt=":clap::clap:" srcset="
/post/2023-06-poster-eicc/award_hu10868795050609259948.webp 400w,
/post/2023-06-poster-eicc/award_hu16040973108183256703.webp 760w,
/post/2023-06-poster-eicc/award_hu16008767723376865621.webp 1200w"
src="/post/2023-06-poster-eicc/award_hu10868795050609259948.webp"
width="760"
height="519"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
&amp;#x1f44f;&amp;#x1f44f;
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>Article in Steinbeis Transfer Magazine</title><link>/post/2023-01-24/</link><pubDate>Tue, 24 Jan 2023 00:00:00 +0000</pubDate><guid>/post/2023-01-24/</guid><description>&lt;h1 id="title">Title&lt;/h1>
&lt;p>Good Usability Delivers Tighter Security&lt;/p>
&lt;h1 id="abstract">Abstract&lt;/h1>
&lt;p>The modern world of work would be almost inconceivable without the support of IT systems. Connected systems and IT solutions also continue to make inroads into our private lives. Consider, for example, intelligent heating controls (smart home systems), which have gained in importance in the current energy crisis. This trend is being accelerated by more and more people coming into direct contact with IT solutions. Among other areas, Professor Dr. Andreas Heinemann (Darmstadt University of Applied Sciences/InCUPS, his Steinbeis Transfer Center for Internet Communication, Usability, Privacy, and Security) specializes in IT security and usability. This involves investigating how to mitigate cyber risk.&lt;/p></description></item><item><title>Paper accepted at FPS - 2022</title><link>/post/paper-fps-2022/</link><pubDate>Wed, 23 Nov 2022 00:00:00 +0000</pubDate><guid>/post/paper-fps-2022/</guid><description>&lt;p>Our paper &amp;ldquo;Towards a maturity model for crypto-agility assessment&amp;rdquo; by Julian Hohm, Andreas Heinemann and Alexander Wiesmaier will be presented at the &lt;a href="https://www.fps-2022.com" target="_blank" rel="noopener">15th International Symposium on Foundations &amp;amp; Practice of Security&lt;/a> (FPS - 2022) on December 12/13/14th 2022, Ottawa, Canada.&lt;/p>
&lt;p>This work is based on the results of Julian Hohm&amp;rsquo;s Master&amp;rsquo;s thesis. Check out more details on &lt;a href="https://camm.h-da.io" target="_blank" rel="noopener">CAMM&lt;/a>.&lt;/p></description></item><item><title>2. Platz beim CAST-Förderpreis IT-Sicherheit 2022 (DE)</title><link>/post/2022-10-cast-johanna/</link><pubDate>Tue, 11 Oct 2022 00:00:00 +0000</pubDate><guid>/post/2022-10-cast-johanna/</guid><description>&lt;p>Am 10. Oktober fand die Finalrundes des CAST-Förderpreises IT-Sicherheit 2022 im Rahmen des Cybersicherheitsgipfel Hessen in Wiesbaden statt. Johanna Henrich belegte mit Ihrer Arbeit &amp;ldquo;Performanz Evaluation von PQC in TLS 1.3 unter variierenden Netzwerkcharakteristiken&amp;rdquo; den 2. Platz in der Kategorie &amp;ldquo;Beste Masterarbeiten&amp;rdquo;. Herzlichen Glückwunsch.&lt;/p>
&lt;p>&lt;a href="https://cast-forum.de/presse/cast.html" target="_blank" rel="noopener">Zur Meldung des CAST e.V.&lt;/a>&lt;/p></description></item><item><title>Studentische Hilfskraft im Bereich PQC-Migration gesucht (DE)</title><link>/post/2022-09-offering-pqc/</link><pubDate>Sun, 25 Sep 2022 04:12:53 +0000</pubDate><guid>/post/2022-09-offering-pqc/</guid><description>&lt;p>&lt;a href="https://ucs.h-da.io/offerings/student-assistant-pqc-2022/" target="_blank" rel="noopener">Weitere Details&lt;/a>.&lt;/p></description></item><item><title>UCS ist mit Projekt ELITE auf der Hannover Messe (DE)</title><link>/post/elite-hannover-messe-2022/</link><pubDate>Thu, 26 May 2022 06:20:43 +0000</pubDate><guid>/post/elite-hannover-messe-2022/</guid><description>&lt;p>Hier geht es zum &lt;a href="https://www.tisim.de/elite-it-bedrohungen-auf-der-hannover-messe-2022-selbst-erleben/" target="_blank" rel="noopener">Blockbeitrag&lt;/a> bei der &lt;a href="https://www.tisim.de" target="_blank" rel="noopener">Transferstelle IT-Sicherheit im Mittelstand&lt;/a>.&lt;/p></description></item><item><title>David Konczewski verteidigt erfolgreich seine Masterarbeit (DE)</title><link>/post/thesis-konczewski-2022/</link><pubDate>Wed, 25 May 2022 03:49:13 +0000</pubDate><guid>/post/thesis-konczewski-2022/</guid><description>&lt;p>Im Rahmen des Abschlusskolloquiums hat Herr David Konczewski erfolgreich die Ergebnisse seiner Masterarbeit mit dem Titel
&lt;em>&amp;ldquo;Privatsphären-/ und Benutzbarkeits-fördernde Softwareentwicklungsprozesse für kleine und mittelständische Unternehmen&amp;rdquo;&lt;/em> vorgestellt und verteidigt. Herzlichen Glückwunsch.&lt;/p>
&lt;h2 id="zusammenfassung--abstract">Zusammenfassung / Abstract&lt;/h2>
&lt;p>Kleine und mittelständische Unternehmen (KMU) sind auf die Untersuchungen von Methoden und Entwicklungsprozessen für die Softwareentwicklung angewiesen, um mit ihren verfügbaren Ressourcen für ihre Endbenutzer zufriedenstellende Anwendungen zu entwickeln. Dafür sind Methoden zur Integration von Sicherheit, Privatsphäre und Benutzbarkeit zentraler Bestandteil. Wie die Arbeit von &lt;a href="https://dl.acm.org/doi/10.1145/3465481.3470022" target="_blank" rel="noopener">Bender et al.&lt;/a> durch eine Untersuchung der Publikationen zeigt, liegen aktuell keine Softwareentwicklungsprozesse vor, die sowohl für KMU geeignet sind als auch die Integration der drei Kriterien - Sicherheit, Privatsphäre sowie Benutzbarkeit - fördern. Diese Masterarbeit möchte diesem Umstand durch den Vorschlag eines privatsphären- und benutzbarkeitsfördernden Softwareentwicklungsprozess für KMU entgegenwirken.&lt;/p>
&lt;p>Zu diesem Zweck werden ausgehend von der Arbeit von &lt;a href="https://dl.acm.org/doi/10.1145/3465481.3470022" target="_blank" rel="noopener">Bender et al.&lt;/a> die Ansätze aus der Literatur betrachtet, um so geeignete Prozesse und Methoden für die Integration der drei Kriterien in einen Softwareentwicklungsprozess zu identifizieren. Zur Ermittlung der tatsächlich eingesetzten Methoden, Prozesse sowie möglicher Anforderungen an einen Softwareent- wicklungsprozess aus Sicht von KMU werden Softwareentwickler aus eben diesen in Form von Interviews befragt. Die Erkenntnisse aus der Literaturrecherche sowie der Interviews mit den Entwicklern der KMU werden im Anschluss zusammengeführt.&lt;/p>
&lt;p>Die Interviews zeigen, dass KMU zwar nur in Ausnahmefällen besondere Anforderungen an einen Softwareentwicklungsprozess stellen, jedoch einer großen Diversitiät von Projekten begegnen. Diese lassen die sinnvolle Formulierung eines allgemeingültigen Softwareentwicklungsprozesses mit konkreten Methoden und Techniken nicht zu, da die Wahl der geeigneten Methoden in starker Abhängigkeit von den Projekten und deren konkreten Kontext zu treffen ist.&lt;/p>
&lt;p>Damit die KMU in der Lage sind, geeignete Methoden in ihren Softwareentwicklungsprozess zu integrieren, werden im Ergebnis dieser Masterarbeit 14 Grundsätze formuliert. Diese Grundsätze können von den Unternehmen als Leitlinie für die Integration von Sicherheit, Privatsphäre und Benutzbarkeit genutzt werden. Dabei werden die Grundsätze aus den Methoden und Empfehlungen der Literatur sowie den von den KMU eingesetzten Methoden extrapoliert. Die Grundsätze werden in das kombinierte Prozessmodell eingeordnet, welches sich aus der Beschreibung der Softwareentwicklungsprozesse durch die Interview-Teilnehmer ergibt.&lt;/p></description></item><item><title>Paper accepted at EICC 2022</title><link>/post/paper-eicc-2022/</link><pubDate>Thu, 05 May 2022 00:00:00 +0000</pubDate><guid>/post/paper-eicc-2022/</guid><description>&lt;p>Our paper &amp;ldquo;cryptolib: comparing and selecting cryptography libraries&amp;rdquo; by Jan Wohlwender, Rolf Huesmann, Andreas Heinemann and Alexander Wiesmaier will be presented at the &lt;a href="https://www.fvv.um.si/eicc2022/" target="_blank" rel="noopener">European Interdisciplinary Cybersecurity Conference 2022&lt;/a> (EICC 2022) on June 15/16.&lt;/p>
&lt;p>This work is based on the results of Jan Wohlwender&amp;rsquo;s Master&amp;rsquo;s thesis. Jan completed his Master&amp;rsquo;s programme at the Department of Computer Science with a focus on IT security.&lt;/p></description></item><item><title>8. Usable Security und Privacy Workshop (DE)</title><link>/post/muc-workshop-2022/</link><pubDate>Sat, 30 Apr 2022 00:00:00 +0000</pubDate><guid>/post/muc-workshop-2022/</guid><description>&lt;p>Am 04. Sept. 2022 findet der &lt;a href="https://das.h-brs.de/workshops/usp-muc-2022/" target="_blank" rel="noopener">8. Usable Security und Privacy Workshop&lt;/a> im Rahmen der &lt;a href="https://muc2022.mensch-und-computer.de" target="_blank" rel="noopener">Mensch und Computer 22&lt;/a> in Darmstadt statt. &lt;a href="https://ucs.h-da.io/author/andreas-heinemann/" target="_blank" rel="noopener">Andreas Heinemann&lt;/a> ist einer der Co-Organisatoren dieses Workshops.&lt;/p></description></item><item><title>First Workshop of the EUT+ European Telecommunications and Networks Institute</title><link>/post/talk-eutplus-2022/</link><pubDate>Wed, 16 Mar 2022 00:00:00 +0000</pubDate><guid>/post/talk-eutplus-2022/</guid><description>&lt;p>On 15.03.2022 UCS took part in the first Workshop of the EUT+ European Telecommunications and Networks Institute.
The aim of this workshop was to offer an opportunity to all EUT+ partners to present their research activities related to Technologies and Services for Telecommunications.&lt;/p>
&lt;p>We contributed our research activities on PQC and network issues, especially the results of &lt;a href="/author/johanna-henrich/">Johanna&lt;/a>&amp;rsquo;s &lt;a href="/theses/2022-henrich/">master thesis&lt;/a>.&lt;/p></description></item><item><title>CAMM presentation at it-sa 365 on March 15, 2022</title><link>/post/talk-itsa-2022/</link><pubDate>Fri, 11 Feb 2022 00:00:00 +0000</pubDate><guid>/post/talk-itsa-2022/</guid><description>&lt;h3 id="title">Title&lt;/h3>
&lt;p>Towards a maturity model for crypto-agility assessment&lt;/p>
&lt;h3 id="abstract">Abstract&lt;/h3>
&lt;p>The Crypto-Agility Maturity Model (CAMM for short), a maturity model for determining the crypto-agility of a particular software or IT landscape, is presented. CAMM consists of five levels, and for each level a set of requirements have been formulated based on existing crypto-agility literature that apply at that level. With the help of CAMM, organizations should be able to better prepare for potential threats that need to be addressed in a timely manner as vulnerabilities in cryptographic processes become known. The requirement for crypto-agility is motivated by the potential threat posed by powerful quantum computers.&lt;/p>
&lt;h3 id="date-and-format">Date and Format&lt;/h3>
&lt;ul>
&lt;li>15.03.2022, 13:45h&lt;/li>
&lt;li>Online. Details at &lt;a href="https://www.itsa365.de/en/action-area/2022/it-security-talks-maerz/stream-i/ein-reifegradmodell-fuer-krypto-agilitaet-athene" target="_blank" rel="noopener">it-sa 365&lt;/a>&lt;/li>
&lt;/ul></description></item></channel></rss>