Logo of the University of Passau

Publications

2025

Checking the Impact of Security Standardization - A Case Study on Bluetooth LE Pairing of Internet-of-Things Devices

H. C. Pöhls and L. Steffens, "Checking the Impact of Security Standardization - A Case Study on Bluetooth LE Pairing of Internet-of-Things Devices" in ICT Systems Security and Privacy Protection - 40th IFIP SEC Conference , Lili Nemec Zlatolas and Kai Rannenberg and Tatjana Welzer and Joaquin Garcia-Alfaro, Eds. Springer, 2025. pp. 49-63.

DOI: https://doi.org/10.1007/978-3-031-92886-4_4

ISBN: 978-3-031-92885-7

File: https://henrich.poehls.com/papers/2025_Poehls-Steffens_BLE-Pairing-Security-CaseStudy_IFIPSEC.pdf

IoTCat: A Multidimensional Approach to Categorize IoT Devices in order to Identify a Delegate for Cybersecurity Functions

E. Geloczi, N. Mexis, B. Holler, H. C. P\"ohls and S. Katzenbeisser, "IoTCat: A Multidimensional Approach to Categorize IoT Devices in order to Identify a Delegate for Cybersecurity Functions" in Proceedings of the Workshop AIoTS at the Applied Cryptography and Network Security (ACNS) , Springer, 2025.

File: https://henrich.poehls.com/papers/2025_GelocziMexisHollePoehlsKatzenbeisser_Categorize-IoT-Devices_AIoTS-ACNS.pdf

Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT - An In-Depth STRIDE and LINDDUN Analysis of Smart Homes

H. C. Pöhls, F. Kügler, E. Geloczi and F. Klement, "Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT - An In-Depth STRIDE and LINDDUN Analysis of Smart Homes" , Future Internet , vol. 1, no. 1, pp. 77-138, 2025. MDPI.

DOI: https://doi.org/10.3390/fi17020077

File: https://www.mdpi.com/1999-5903/17/2/77/pdf

The Complexity of Cyber Security in Private and Professional Everyday Life -- An Ethnographic-Informatic Collaborative Approach

H. C. Pöhls, D. Eckhardt, N. Feist, S. Pfeiffer, D. Herrmann and S. Katzenbeisser, "The Complexity of Cyber Security in Private and Professional Everyday Life -- An Ethnographic-Informatic Collaborative Approach" in Proceedings of the 27th International Conference on Human-Computer Interaction (HCII 2025) , Moallem, A., Eds. Springer, 2025. pp. 105-124.

DOI: https://doi.org/10.1007/978-3-031-92833-8_7

ISBN: 978-3-031-92832-1

File: https://henrich.poehls.com/papers/2025_Poehls-et-al_CyberSecurity-in-Everyday-Life_HCIint.pdf

2024

Machine Learning Techniques for Python Source Code Vulnerability Detection

T. Farasat and J. Posegga, "Machine Learning Techniques for Python Source Code Vulnerability Detection" , 2024. https://arxiv.org/abs/2404.09537 .

MQfilTTr: Strengthening Smart Home Privacy through MQTT Traffic Manipulation.

H. C. Pöhls, S. Gebauer, F. Scharnböck, K. Spielvogel and J. Posegga, "MQfilTTr: Strengthening Smart Home Privacy through MQTT Traffic Manipulation." in In Proc. of the 14th International Conference on Information Security Theory and Practice (WISTP 2024) , Springer, 2024.

Weblink: https://link.springer.com/book/9783031603907

Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme

D. Eckhardt, F. Freiling, D. Herrmann, S. Katzenbeisser and H. C. Pöhls, "Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme" in Sicherheit 2024 , Gesellschaft für Informatik e.V., 2024, pp. 107-118.

Weblink: https://doi.org/10.18420/sicherheit2024_007

Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar Environments

E. Geloczi, H. C. Pöhls, F. Klement, J. Posegga and S. Katzenbeisser, "Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar Environments" in Proceedings of the 23rd Workshop on Privacy in the Electronic Society (WPES '24) , 2024.

DOI: https://doi.org/10.1145/3689943.3695040

File: https://henrich.poehls.com/papers/2024_GelozciPoehlsKlementPoseggaKatzenbeisser_Unveiling_the_Shadows_WPES.pdf

Viz4NetSec: Visualizing Dynamic Network Security Configurations of Everyday Interconnected Objects in Home Networks.

N. Rakotondravony, H. C. Pöhls, J. Pfeifer and L. Harrison, "Viz4NetSec: Visualizing Dynamic Network Security Configurations of Everyday Interconnected Objects in Home Networks." in 26th International Conference on Human-Computer Interaction (HCII 2024) , Springer, 2024.

Weblink: https://www.springer.com/series/16277/books

2023

A Self-forming Community Approach for Intrusion Detection in Heterogeneous Networks

P. Eichhammer and H. P. Reiser, "A Self-forming Community Approach for Intrusion Detection in Heterogeneous Networks" in Nordic Conference on Secure IT Systems , 2023.

Weblink: https://api.semanticscholar.org/CorpusID:265213844

A Survey on Anonymous Communication Systems with a Focus on Dining Cryptographers Networks

M. Shirali, T. Tefke and R. C. Staudemeyer, "A Survey on Anonymous Communication Systems with a Focus on Dining Cryptographers Networks" , EEE Access, 11 , vol. 18631-18659, 2023. https://doi.org/10.1109/ACCESS.2023.3242870 .

Ein Werkzeug für eine gemeinsame KI-Terminologie

G. Runze, M. Haimerl, M. Hauer, T. Holoyad, O. Obert, H. C. Pöhls, R. Tagiew and J. Ziehn, Ein Werkzeug für eine gemeinsame KI-Terminologie. .... SIGS DATACOM GmbH, 05 2023.

Weblink: https://www.imbus.de/downloads?no_cache=1&tx_abdownloads_pi1%5Baction%5D=getviewclickeddownload&tx_abdownloads_pi1%5Bcatids%5D=107&tx_abdownloads_pi1%5Buid%5D=1061&cHash=4a3aa33d9023463a56894cb2104e3f4a

Machine Learning-based BGP Traffic Prediction

T. Farasat, M. A. Rathore, A. Khan, J. Kim and J. Posegga, "Machine Learning-based BGP Traffic Prediction" in 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) , 2023. pp. 1925-1934.

Weblink: 10.1109/TrustCom60117.2023.00262

Poster: SmartX BGP BVT: A First Real-Time BGP Blackholing Visibility Tool

T. Farasat, M. A. Rathore, Z. Asim, A. Khan, J. Kim and J. Posegga, "Poster: SmartX BGP BVT: A First Real-Time BGP Blackholing Visibility Tool" , Association for Computing Machinery, 2023. pp. 710–711.

Weblink: https://doi.org/10.1145/3618257.3624992

Security and Trust Management

Ruben Rios, Joachim Posegga, Eds., Security and Trust Management : Lecture Notes in Computer Science, September 28, 2023, The Hague, The Netherlands. Springer Cham, 2023.

Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme

D. Eckhardt, F. Freiling, D. Herrmann, S. Katzenbeisser and H. C. Pöhls, "Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme" , Fakultät für Informatik und Mathematik, Universität Passau, 2023.

Weblink: https://doi.org/10.15475/sidial.2023

Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems

H. C. Pöhls, "Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems" , 09 2023. Springer, https://henrich.poehls.com/papers/2023_poehls_abstract-ai-architecture_STM.pdf .

Utilizing Similarity for Improved Intrusion Detection: Autonomous Community Formation for Practical Heterogeneity Management

P. Eichhammer and H. P. Reiser, "Utilizing Similarity for Improved Intrusion Detection: Autonomous Community Formation for Practical Heterogeneity Management" , IEEE 28th Pacific Rim International Symposium on Dependable Computing (PRDC) , pp. 247-249, 2023. https://api.semanticscholar.org/CorpusID:266486246 .

2022

Achieving privacy and authenticity through advanced digital signature mechanisms

S. Krenn and J. Traoré, "Achieving privacy and authenticity through advanced digital signature mechanisms" in ISO SC 27 Journal Vol. 1 (3) , ISO/IEC, 2022, pp. 20-27.

Weblink: https://committee.iso.org/files/live/sites/jtc1sc27/files/resources/ISO-IECJTC1-SC27_N22216_SC27_Journal_Vol_1_Issue_3.pdf

Change your Car's Filters: Efficient Concurrent and Multi-Stage Firewall for OBD-II Network Traffic

F. Klement and S. Katzenbeisser, "Change your Car's Filters: Efficient Concurrent and Multi-Stage Firewall for OBD-II Network Traffic" , pp. 19-25, Nov. 2022. IEEE, https://ieeexplore.ieee.org/document/9966902 .

Deutsche Normungsroadmap Künstliche Intelligenz (Ausgabe 2)

R. Adler et al., Deutsche Normungsroadmap Künstliche Intelligenz (Ausgabe 2). .... 2nd DIN / DKE, 2022.

Man-in-the-OBD: A modular, protocol agnostic firewall for automotive dongles to enhance privacy and security

F. Klement and S. Katzenbeisser, "Man-in-the-OBD: A modular, protocol agnostic firewall for automotive dongles to enhance privacy and security" , pp. 143-164, 2022. Springer, https://doi.org/10.1007/978-3-031-21311-3_7 .

The view on systems monitoring and its requirements from future Cloud-to-Thing applications and infrastructures

S. Volpert, P. Eichhammer, F. Held, T. Huffert, H. P. Reiser and J. Domaschka, "The view on systems monitoring and its requirements from future Cloud-to-Thing applications and infrastructures" , Future Generation Computer Systems , vol. 141, pp. 243-257, 2022. https://api.semanticscholar.org/CorpusID:253874712 .

2021

A Survey on Resilience in the IoT

C. Berger, P. Eichhammer, H. P. Reiser, J. Domaschka, F. J. Hauck and G. Habiger, "A Survey on Resilience in the IoT" , ACM Computing Surveys (CSUR) , vol. 54, pp. 1-39, 2021. https://api.semanticscholar.org/CorpusID:237577309 .

TLS Beyond the Broker: Enforcing Fine-grained Security and Trust in Publish/Subscribe Environments for IoT

K. Spielvogel, H. C. Pöhls and J. Posegga, "TLS Beyond the Broker: Enforcing Fine-grained Security and Trust in Publish/Subscribe Environments for IoT" in Proc. of 17th International Workshop on Security and Trust Management (STM2021) , Springer, 092021. pp. 145-162.

Weblink: https://link.springer.com/chapter/10.1007/978-3-030-91859-0_8

Towards GDPR-compliant data processing in modern SIEM systems

F. Menges, T. Latzo, M. Vielberth, S. Soboloa, A. Puchta, H. P. Reiser and G. Pernul, "Towards GDPR-compliant data processing in modern SIEM systems" , Computers & Security , vol. 103, 04 2021. Elsevier, https://doi.org/10.1016/j.cose.2020.102165 .

File: http://henrich.poehls.com/papers/2020_Menges-et-al_Computers-and-Security_Journal_GDPR_Compliant_Data_Processing_in_Modern_SIEM_Systems.pdf

2020

Computational Resource Abuse in Web Applications

J. D. Parra Rodriguez, "Computational Resource Abuse in Web Applications", 01 2020.

File: https://opus4.kobv.de/opus4-uni-passau/files/770/diss-parra-rodriguez.pdf

Dynamic Consent: Physical switches and feedback to adjust consent to IoT data collection

H. C. Pöhls and N. Tiana Lilie Rakotondravony, "Dynamic Consent: Physical switches and feedback to adjust consent to IoT data collection" in Proceedings of the 2nd International Conference on HCI for Cybersecurity, Privacy and Trust (HCI-CPT 2020) held in conjunsction with the 22nd International Conference on Human Computer Interaction (HCII 2020) , Springer, 072020.

File: https://henrich.poehls.com/papers/2020_PoehlsRakotondravony_HCII2020_DynamicConsent-Physical-%20switches-and-feedback-to-adjust-consent.pdf

Fully Invisible Protean Signatures Schemes

S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Fully Invisible Protean Signatures Schemes" , IET Information Security , vol. 14, pp. 266-285, 05 2020. IET, https://doi.org/10.1049/iet-ifs.2019.0141 .

File: http://henrich.poehls.com/papers/2019_KrennPoehlsSamleinSlamanig_FullyInvisibleProteanSignatures_IET-IFS-2019-0141.pdf

Pattern-driven Security, Privacy, Dependability and Interoperability in IoT

N. Petroulakis, K. Fysarakis, H. C. Pöhls, V. Kulkarni, G. Spanoudakis, A. Bröring, M. Papoutsakis, M. Michalodimitrakis and S. Ioannidis, "Pattern-driven Security, Privacy, Dependability and Interoperability in IoT" in Security Risk Management for the Internet of Things: Technologies and Techniques for IoT Security, Privacy and Data Protection , now publishers inc., 2020, pp. 121-142.

File: http://henrich.poehls.com/papers/2020_Pattern-driven-Security-Privacy-Dependability-and-Interoperability-in-IoT_978-1-68083-683-7_ch7.pdf

Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications

F. Klement, H. C. Pöhls and K. Spielvogel, "Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications" in Global Internet of Things Summit (GIoTS) , 072020.

File: http://henrich.poehls.com/papers/2020_KlementPoehlsSpielvogel_GIOTS20_Privacy-preserving-local-monitoring-and-evaluation-of-IoT-network-traffic.pdf

2019

A Generic Lightweight and Scalable Access Control Framework for IoT Gateways

J. D. Parra Rodriguez, "A Generic Lightweight and Scalable Access Control Framework for IoT Gateways" in Information Security Theory and Practice , Springer, 2019. pp. 207-222.

What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net

R. C. Staudemeyer, H. C. Pöhls and M. Wójcik, "What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net" , Journal of Reliable Intelligent Environments (JRIE) , vol. 5, no. 1, pp. 41-64, 04 2019. https://doi.org/10.1007/s40860-019-00075-0 .

File: http://henrich.poehls.com/papers/2019_StaudemeyerPoehlsWojcik_BoostIOTPrivacy_JRIE.pdf

2018

A Cybersecurity Architecture for the L-band Digital Aeronautical Communications System (LDACS)

N. Mäurer and A. Bilzhause, "A Cybersecurity Architecture for the L-band Digital Aeronautical Communications System (LDACS)" in 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC) , 2018. pp. 1-10.

DOI: 10.1109/DASC.2018.8569878

C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality

L. Sell, H. C. Pöhls and T. Lorünser, "C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality" in Proceedings of the 10th International Conference on Cloud Computing Technology and Science (CLOUDCOM 2018) , IEEE, 2018.

File: http://henrich.poehls.com/papers/2018_SellPoehlsLoruenser_CostOfSecretSharedCloudStorage_IEEE-CloudCom.pdf

Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications

S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications" in Progress in Cryptology (AFRICACRYPT 2018) , Springer, 2018. pp. 11--32.

DOI: https://doi.org/10.1007/978-3-319-89339-6_2

ISBN: 978-3-319-89339-6

File: http://henrich.poehls.com/papers/2018_KrennPoehlsSamelinSlamanig_TrapdoorChamHash_AFRICACRYPT2018_full.pdf

CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle

T. Lorünser, H. C. Pöhls, L. Sell and T. Länger, "CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle" in Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018) , New York, NY, USA: ACM, 2018. pp. 4:1--4:9.

DOI: https://doi.org/10.1145/3230833.3233765

ISBN: 978-1-4503-6448-5

File: http://henrich.poehls.com/papers/2018_LoruenserPoehlsSellLaenger_CrypSDLC_ARES2018_preprint.pdf

CSP \& Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long?

J. D. Parra Rodriguez and J. Posegga, "CSP \& Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long?" in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy , New York, NY, USA: ACM, 2018. pp. 170--172.

DOI: 10.1145/3176258.3176951

ISBN: 978-1-4503-5632-9

File: http://doi.acm.org/10.1145/3176258.3176951

Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures

H. C. Pöhls, "Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures", University of Passau, 2018.

File: https://opus4.kobv.de/opus4-uni-passau/files/582/Poehls_Thesis_Final.pdf

Local Storage on Steroids: Abusing Web Browsers for Hidden Content Storage and Distribution

J. D. Parra Rodriguez and J. Posegga, "Local Storage on Steroids: Abusing Web Browsers for Hidden Content Storage and Distribution" in Proc. of 14th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM) , 2018.

File: https://web.sec.uni-passau.de/papers/preprint-securecomm2018.pdf

Paving the way for an it security architecture for LDACS: A datalink security threat and risk analysis

N. Mäurer and A. Bilzhause, "Paving the way for an it security architecture for LDACS: A datalink security threat and risk analysis" in 2018 Integrated Communications, Navigation, Surveillance Conference (ICNS) , 2018. pp. 1A2-1-1A2-11.

DOI: 10.1109/ICNSURV.2018.8384828

Protean Signature Schemes

S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Protean Signature Schemes" in Proc. of the 17th conference on Cryptology and Network Security (CANS 2018) , Springer, 2018. pp. 256--276.

DOI: https://doi.org/10.1007/978-3-030-00434-7_13

File: http://henrich.poehls.com/papers/2018_KrennPoehlsSamelinSlamanig_SanitizableAndDeleteableSignature_CANS-full.pdf

RAPID: Resource and API-Based Detection Against In-Browser Miners

J. D. Parra Rodriguez and J. Posegga, "RAPID: Resource and API-Based Detection Against In-Browser Miners" in ACSAC 2018: Proceedings of the 34th Annual Computer Security Applications Conference , New York, NY, USA: ACM, 2018.

DOI: https://doi.org/10.1145/3274694.3274735

ISBN: 978-1-4503-6569-7/18/12

File: https://web.sec.uni-passau.de/papers/acsac2018-parra.pdf

Short Paper: Offloading Execution from Edge to Cloud: a Dynamic Node-RED Based Approach

R. Soza, C. Kiraly and J. D. Parra Rodriguez, "Short Paper: Offloading Execution from Edge to Cloud: a Dynamic Node-RED Based Approach" in {IEEE} 10th International Conference on Cloud Computing Technology and Science, CloudCom 2018, Cyprus, December 10-13, 2018 , 2018.

File: https://web.sec.uni-passau.de/papers/cloudcomm18-soza-preprint.pdf

The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication

R. C. Staudemeyer, H. C. Pöhls and M. Wójcik, "The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication" in {Proc. of The 7th workshop on IoT-SoS: Internet of Things Smart Objects and Services (WOWMOM SOS-IOT 2018)} , IEEE, 2018.

File: http://henrich.poehls.com/papers/2018_Staudemeyer-Poehls-Wojcik_road2privacy_preprint.pdf

When Your Browser Becomes the Paper Boy

J. D. Parra Rodriguez, E. Brehm and J. Posegga, "When Your Browser Becomes the Paper Boy" in ICT Systems Security and Privacy Protection , Janczewski, Lech Jan and Kutylowski, Miroslaw, Eds. Cham: Springer International Publishing, 2018. pp. 94--107.

ISBN: 978-3-319-99828-2

File: https://web.sec.uni-passau.de/papers/parra-ifisec-preprint18.pdf

2017

Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures

J. Camenisch, D. Derler, S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures" in Proc. of 20th IACR International Conference on Practice and Theory in Public-Key Cryptography (PKC 2017) , IACR, 2017. pp. 152--182.

DOI: https://eprint.iacr.org/2017/011

File: http://henrich.poehls.com/papers/2017_CDKPSS_chamhash_with_ephemeral_trapdoors_PKC-eprint.pdf

Datalink security in the L-band digital aeronautical communications system (LDACS) for air traffic management

A. Bilzhause, B. Belgacem, M. Mostafa and T. Gräupl, "Datalink security in the L-band digital aeronautical communications system (LDACS) for air traffic management" , IEEE Aerospace and Electronic Systems Magazine , vol. 32, no. 11, pp. 22-33, 2017.

DOI: 10.1109/MAES.2017.160282

Designing, Developing, and Facilitating Smart Cities: Urban Design to IoT Solutions

Designing, Developing, and Facilitating Smart Cities: Urban Design to IoT Solutions. .... 1st Springer International Publishing, 2017.

DOI: http://link.springer.com/book/10.1007/978-3-319-44924-1

File: http://link.springer.com/content/pdf/bfm%3A978-3-319-44924-1%2F1.pdf

Einsetzbare Kryptografie für die Cloud

H. C. Pöhls and T. Länger, "Einsetzbare Kryptografie für die Cloud" , Zeitschrift für Datenrecht und Informationssicherheit (digma) , vol. 17, no. 1, pp. 78--81, 2017. Schulthess Juristische Medien.

I agree that a connection to the Vimeo server will be established when the video is played and that personal data (e.g. your IP address) will be transmitted.
I agree that a connection to the YouTube server will be established when the video is played and that personal data (e.g. your IP address) will be transmitted.
Show video