Karlsruher Institut für Technologie

Ergebnisbroschüre

Alle Ergebnisse im Überblick

Mitigation strategies for confidentiality violations in software architecture using ranked feature importance

A quality attribute like confidentiality is critical to trustworthy software but unfortunately, very challenging to ensure. This is because modern software systems are complex and interconnected. Architecture-based confidentiality analysis enables …

1. Karlsruher Mobilitätsdatensymposium

Mobilitätsdaten nutzen – Potenziale, Perspektiven, Partnerschaften Die Mobilität der Zukunft ist datenbasiert – doch wie können Mobilitätsdaten heute schon sinnvoll genutzt werden? Welche innovativen Anwendungen sind möglich, wenn unterschiedliche Akteure gemeinsam an einem Strang ziehen?

Integrating Security-Enriched Data Flow Diagrams Into Architecture-Based Confidentiality Analysis

The increasing complexity of modern software systems presents developers with significant challenges regarding the confidentiality of sensitive data. To this end, data flow diagrams serve as an effective tool for identifying potential confidentiality …

Digitale Mobilität mit vertraulicher Datennutzung

Nutzendendaten beim Ticketkauf schützen

Differential Privacy to the Rescue? On Obfuscating Tolls in Privacy-Preserving ETC Systems

Electronic toll collection (ETC) systems are becoming increasingly popular, but are inherently privacy-sensitive as they deal with users’ location data. While prior research has proposed privacy-preserving ETC (PPETC) systems, which hide the …

LeDiFlow: Learned Distribution-guided Flow Matching to Accelerate Image Generation

Enhancing the efficiency of high-quality image generation using Diffusion Models (DMs) is a significant challenge due to the iterative nature of the process. Flow Matching (FM) is emerging as a powerful generative modeling paradigm based on a …

An Architecture-Based Approach to Mitigate Confidentiality Violations Using Machine Learning

Today’s software systems have become increasingly connected and complex, requiring comprehensive analysis to ensure quality properties like confidentiality. Architecture-based confidentiality analysis enables the early identification of …

Girls’Day | Vom Beauty-Filter bis zum Deep-Fake – Erforsche die Welt der Künstlichen Intelligenz!

Bist du neugierig auf die faszinierende Welt der Künstlichen Intelligenz (KI)? Möchtest du herausfinden, was KI ist, wo du ihr bereits begegnest und wie sie unsere Zukunft gestaltet? Dann laden wir dich herzlich ein, deinen Girls‘Day mit dem TRIANGEL und FZI Forschungszentrum Informatik zu verbringen!

SM-SIM: A Simulator for Analyzing Selfish Mining Attacks in Blockchain Systems

Selfish mining attacks threaten the tamper-resistance of blockchain systems with consensus mechanisms based on proof-of-work and probabilistic finality. Optimizing blockchain system configurations can mitigate these attacks. This, however, requires …

TRIANGEL Wisssenstransfer

Wissenschaft erlebbar machen

A Formal Treatment of Homomorphic Encryption Based Outsourced Computation in the Universal Composability Framework

The adoption of Homomorphic Encryption (HE) and Secure Function Evaluation (SFE) applications in the real world remains limited, even nearly 50 years after the introduction of HE. This is particularly unfortunate given the strong privacy and …

Analyzing Cyclic Data Flow Diagrams Regarding Information Security

Data flow diagrams are commonly used in system design to represent data processing and exchange. They are valuable in security analysis due to their applicability in assessing information security-related properties like confidentiality. However, …

Towards a Data Flow Diagram-Centric Confidentiality Analysis in Palladio

The Palladio approach enables software architects to create architectural models of their systems for early cost, performance, and maintainability analysis. Using a data flow-based confidentiality analysis, it is also possible to detect …

ARC3N: A Collaborative Uncertainty Catalog to Address the Awareness Problem of Model-Based Confidentiality Analysis

Identifying confidentiality violations is challenging as modern software-intensive systems exchange and store large amounts of data, and system deployment and context vary. Although modelbased analyses can identify such violations already at design …