Our Publications
2026
| Title | Event | Authors |
|---|---|---|
| The Passkey Promise: A Comparative Usability Study of MFA Methods |
47th IEEE Symposium on Security and Privacy |
Erwin Kupris Thomas Schreck |
| Always Authenticated, Never Exposed: Continuous Authentication via Zero-Knowledge Proofs DOI: 10.1007/978-3-032-06155-3_2 |
21st International Workshop on Security and Trust Management (STM 2025) |
Dennis Hamm Erwin Kupris Thomas Schreck |
2025
| Title | Event | Authors |
|---|---|---|
| Unlocking the Future of (edu)MFA: Integrating Passkeys for Research and Education |
32. DFN-Konferenz Sicherheit in vernetzten Systemen |
Erwin Kupris Florian Ritterhoff Steffen Hofmann Thomas Schreck |
| Identity Threats and Where to Find Them: Mapping ITDR and MITRE ATT&CK |
1st International Workshop on Security and Risk in Identity Management (SeRIM 2025) |
Vitali Serzantov Erwin Kupris Thomas Schreck |
| Device Identity Bootstrapping in Constrained Environments: A BLE-Based BRSKI Extension Download DOI: 10.1109/EDCC66201.2025.00024 |
EDCC 2025: 20th European Dependable Computing Conference |
Julian Krieger Tobias Hilbig Thomas Schreck |
| Identifying key attacks on an IEEE 9-Bus System by leveraging the MITRE ATT&CK ICS Matrix DOI: 10.1145/3679240.3734647 |
16th ACM International Conference on Futureand Sustainable Energy Systems (E-ENERGY ’25) |
Marius Biebel Zhao Song Thomas Schreck Christoph Hackl |
| Leveraging LLMs for Memory Forensics: A Comparative Analysis of Malware Detection DOI: 10.1145/3748263 |
Digital Threats: Research and Practice |
Jan-Hendrik Lang Thomas Schreck |
2024
| Title | Event | Authors |
|---|---|---|
| A-WAYF: Automated Where Are You From in Multilateral Federations Download URN: nbn:de:0074-3863-4 |
2nd International Workshop on Trends in Digital Identity (TDI 2024) |
Erwin Kupris Tobias Hilbig David Pierre Sugar Thomas Schreck |
| Poster: FedCM for Research and Education Download DOI: 10.5281/zenodo.12648766 |
9th IEEE European Symposium on Security and Privacy |
Erwin Kupris Tobias Hilbig Thomas Schreck |
| The "Big Beast to Tackle": Practices in Quality Assurance for Cyber Threat Intelligence DOI: 10.1145/3678890.3678903 |
27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024) |
Thomas Geras Thomas Schreck |
| Machines Have Identities Too! Extending NIST’s SP 800-63 for Device Identity Download DOI: 10.1007/978-3-031-76371-7_3 |
20th International Workshop on Security and Trust Management (STM 2024) |
Tobias Hilbig Erwin Kupris Thomas Schreck |
| Do You Play It by the Books? A Study on Incident Response Playbooks and Influencing Factors DOI: 10.1109/SP54263.2024.00060 |
2024 IEEE Symposium on Security and Privacy (SP) |
Daniel Schlette Philip Empl Marco Caselli Thomas Schreck Günther Pernul |
2023
| Title | Event | Authors |
|---|---|---|
| Sharing Communities: The Good, the Bad, and the Ugly DOI: 10.1145/3576915.3623144 |
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security |
Thomas Geras Thomas Schreck |
| Protect the Gate – Not Only Once: Continuous Access Evaluation in Practice Download DOI: 10.1109/CSNet59123.2023.10339788 |
2023 7th Cyber Security in Networking Conference (CSNet) |
Tobias Hilbig Vitali Serzantov Thomas Schreck |
| ‘State of the Union’: Evaluating Open Source Zero Trust Components Download DOI: 10.1007/978-3-031-47198-8_3 |
STM 2023: Security and Trust Management |
Tobias Hilbig Thomas Schreck Tobias Limmer |
| security.txt Revisited: Analysis of Prevalence and Conformity in 2022 Download DOI: 10.1145/3609234 |
Digital Threats: Research and Practice |
Tobias Hilbig Thomas Geras Erwin Kupris Thomas Schreck |
| Moderne PKI-Architektur an einer Hochschule ISBN: 978-3-7568-8139-0 |
30. DFN-Konferenz „Sicherheit in vernetzten Systemen“ |
Thomas Schreck Florian Ritterhoff |
| Enterprise Cyber Threat Modeling and Simulation of Loss Events for Cyber Risk Quantification DOI: 10.1145/3605763.3625244 |
CCSW '23: Proceedings of the 2023 on Cloud Computing Security Workshop |
Christian Ellerhold Johann Schnagl Thomas Schreck |
2022
| Title | Event | Authors |
|---|---|---|
| Understanding the Usage of IT-Security Games in the Industry and Its Mapping to Job Profiles Download DOI: 10.4230/oasics.icpec.2022.3 |
OASIcs |
Tilman Dewes Tiago Gasiba Thomas Schreck |