Karlsruher Institut für Technologie

Mitigation strategies for confidentiality violations in software architecture using ranked feature importance

A quality attribute like confidentiality is critical to trustworthy software but unfortunately, very challenging to ensure. This is because modern software systems are complex and interconnected. Architecture-based confidentiality analysis enables …

1. Karlsruher Mobilitätsdatensymposium

Mobilitätsdaten nutzen – Potenziale, Perspektiven, Partnerschaften Die Mobilität der Zukunft ist datenbasiert – doch wie können Mobilitätsdaten heute schon sinnvoll genutzt werden? Welche innovativen Anwendungen sind möglich, wenn unterschiedliche Akteure gemeinsam an einem Strang ziehen?

Differential Privacy to the Rescue? On Obfuscating Tolls in Privacy-Preserving ETC Systems

Electronic toll collection (ETC) systems are becoming increasingly popular, but are inherently privacy-sensitive as they deal with users’ location data. While prior research has proposed privacy-preserving ETC (PPETC) systems, which hide the …

LeDiFlow: Learned Distribution-guided Flow Matching to Accelerate Image Generation

Enhancing the efficiency of high-quality image generation using Diffusion Models (DMs) is a significant challenge due to the iterative nature of the process. Flow Matching (FM) is emerging as a powerful generative modeling paradigm based on a …

An Architecture-Based Approach to Mitigate Confidentiality Violations Using Machine Learning

Today’s software systems have become increasingly connected and complex, requiring comprehensive analysis to ensure quality properties like confidentiality. Architecture-based confidentiality analysis enables the early identification of …

Girls’Day | Vom Beauty-Filter bis zum Deep-Fake – Erforsche die Welt der Künstlichen Intelligenz!

Bist du neugierig auf die faszinierende Welt der Künstlichen Intelligenz (KI)? Möchtest du herausfinden, was KI ist, wo du ihr bereits begegnest und wie sie unsere Zukunft gestaltet? Dann laden wir dich herzlich ein, deinen Girls‘Day mit dem TRIANGEL und FZI Forschungszentrum Informatik zu verbringen!

SM-SIM: A Simulator for Analyzing Selfish Mining Attacks in Blockchain Systems

Selfish mining attacks threaten the tamper-resistance of blockchain systems with consensus mechanisms based on proof-of-work and probabilistic finality. Optimizing blockchain system configurations can mitigate these attacks. This, however, requires …

Ergebnisbroschüre

Alle Ergebnisse im Überblick

TRIANGEL Wisssenstransfer

Wissenschaft erlebbar machen

A Formal Treatment of Homomorphic Encryption Based Outsourced Computation in the Universal Composability Framework

The adoption of Homomorphic Encryption (HE) and Secure Function Evaluation (SFE) applications in the real world remains limited, even nearly 50 years after the introduction of HE. This is particularly unfortunate given the strong privacy and …