Our Publications

2025

Title Event Authors
Device Identity Bootstrapping in Constrained Environments: A BLE-based BRSKI Extension

EDCC 2025: 20th European Dependable Computing Conference Julian Krieger
Tobias Hilbig
Thomas Schreck
Machines Have Identities Too! Extending NIST’s SP 800-63 for Device Identity

Download
DOI: 10.1007/978-3-031-76371-7_3
STM 2024: Security and Trust Management Tobias Hilbig
Erwin Kupris
Thomas Schreck

2024

Title Event Authors
A-WAYF: Automated Where Are You From in Multilateral Federations

Download
URN: nbn:de:0074-3863-4
2nd International Workshop on Trends in Digital Identity (TDI 2024) Erwin Kupris
Tobias Hilbig
David Pierre Sugar
Thomas Schreck
Poster: FedCM for Research and Education

Download
DOI: 10.5281/zenodo.12648766
9th IEEE European Symposium on Security and Privacy Erwin Kupris
Tobias Hilbig
Thomas Schreck
The "Big Beast to Tackle": Practices in Quality Assurance for Cyber Threat Intelligence

DOI: 10.1145/3678890.3678903
27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024) Thomas Geras
Thomas Schreck
Do You Play It by the Books? A Study on Incident Response Playbooks and Influencing Factors

DOI: 10.1109/SP54263.2024.00060
2024 IEEE Symposium on Security and Privacy (SP) Daniel Schlette
Philip Empl
Marco Caselli
Thomas Schreck
Günther Pernul

2023

Title Event Authors
Sharing Communities: The Good, the Bad, and the Ugly

DOI: 10.1145/3576915.3623144
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security Thomas Geras
Thomas Schreck
Protect the Gate – Not Only Once: Continuous Access Evaluation in Practice

Download
DOI: 10.1109/CSNet59123.2023.10339788
2023 7th Cyber Security in Networking Conference (CSNet) Tobias Hilbig
Vitali Serzantov
Thomas Schreck
‘State of the Union’: Evaluating Open Source Zero Trust Components

Download
DOI: 10.1007/978-3-031-47198-8_3
STM 2023: Security and Trust Management Tobias Hilbig
Thomas Schreck
Tobias Limmer
security.txt Revisited: Analysis of Prevalence and Conformity in 2022

Download
DOI: 10.1145/3609234
Digital Threats: Research and Practice Tobias Hilbig
Thomas Geras
Erwin Kupris
Thomas Schreck
Moderne PKI-Architektur an einer Hochschule

ISBN: 978-3-7568-8139-0
30. DFN-Konferenz „Sicherheit in vernetzten Systemen“ Thomas Schreck
Florian Ritterhoff
Enterprise Cyber Threat Modeling and Simulation of Loss Events for Cyber Risk Quantification

DOI: 10.1145/3605763.3625244
CCSW '23: Proceedings of the 2023 on Cloud Computing Security Workshop Christian Ellerhold
Johann Schnagl
Thomas Schreck

2022

Title Event Authors
Understanding the Usage of IT-Security Games in the Industry and Its Mapping to Job Profiles

Download
DOI: 10.4230/oasics.icpec.2022.3
OASIcs Tilman Dewes
Tiago Espinha Gasiba
Thomas Schreck