The CISPA Building

The vast growth in the complexity of modern applications and the multitude of available software technologies have created the need for engineering techniques that not only improve security, but also scale to the complexity of modern IT infrastructures. The abundance of information publicly available, the increasing reliance on third-party software components, the proliferation of apps and other software often produced by inexperienced programmers, the lack of security considerations in many industrial programming frameworks and languages, and the difficulty of updating existing installations, have all contributed to a general uncertainty and loss of control about an individual's privacy and the security of the deployed software systems. An engineering process that copes with this uncertainty cannot rely on traditional principles of systematic software development alone, but must, by necessity, incorporate empirical methods and emphasize usability. This research area aims to devise an engineering process that significantly improves the security and privacy of today's real-world software, that keep pace with the continuing growth in complexity for future IT systems, and that is conveniently usable even by layman users and developers. It moreover provides empirical methods and tools for dealing with unstructured, heterogeneous datasets at scale. In the last years, this research area in particular focused on the development of methods and tools for the dynamic analysis and testing of software; techniques for ensuring the security of web applications and services; as well as usable and effective solutions for application development and maintenance.


Most Recent Publications

Title Date Authors Meta
Detecting Information Flow by Mutating Input data  2018  2018   Björn Mathis, Vitalii Avdiienko, Ezekiel O. Soremekun, Marcel Böhme, Andreas Zeller,  Software Engineering (SE) 2018
Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications  2018  2018   Ben Stock, Giancarlo Pellegrino, Frank Li, Michael Backes, Christian Rossow,  Proceedings of the 25th Annual Symposium on Network and Distributed System Security (NDSS '18).
JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript  2018  2018   Aurore Fass, Robert Krawczyk, Michael Backes, Ben Stock,  Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '18)
Practical Test Dependency Detection  2018  2018   Alessio Gambi, Jonathan Bell, Andreas Zeller,  Proceedings of the 2018 IEEE Conference on Software Testing, Validation and Verification
The Case for Automatic Database Administration using Deep Reinforcement Learning  2018  2018   Ankur Sharma, Felix Martin Schuhknecht, Jens Dittrich,