Prof. Dr. Martin Henze

team/martin-henze.jpg
Prof. Dr. Martin Henze

henze@spice.rwth-aachen.de

+49 241 80-21459

136

RWTH Aachen University
SPICe
Im Süsterfeld 9
52072 Aachen, GERMANY

I am a tenure-track assistant professor at the Department of Computer Science at RWTH Aachen University where I head the Security and Privacy in Industrial Cooperation (SPICe) group. My research focuses on all technical security and privacy aspects of industrial networks and industrial data sharing, especially concerning the energy and production sectors. In addition to my appointment at RWTH Aachen University, I co-lead the Secure Production & Energy Networks research group within the Cyber ​​Analysis & Defense (CA&D) department at the Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE in Bonn, Germany.

I studied computer science at RWTH Aachen University, where I obtained a Diploma degree (equiv. M.Sc.) and a PhD (Dr. rer. nat., with distinction). Before starting my PhD, I spent some wonderful time as a research intern at the Interdisciplinary Centre for Security, Reliability and Trust (SnT) at the University of Luxembourg. My academic achievements were awarded with the Nachwuchsförderpreis Verbraucherforschung NRW, the Borchers-Plakette, and the ICT Young Researcher Award.

Teaching

I regularly teach the following courses for computer science students at RWTH Aachen University:

  • Lecture: Industrial Network Security (Master)
  • Seminar: Industrial Network Security (Bachelor)
  • Seminar: Advanced Industrial Network Security (Master)
  • Seminar: 5G/6G Security (Bachelor)
  • Seminar: IoT Security (Bachelor)
  • Lab: Industrial Intrusion Detection (Master)

See our teaching page for more details and a precise schedule. There, you will also find further information on obtaining thesis topics and scheduling oral exams.

Academic Service

Member of Technical Program Committees (selection)

  • ACM CCS (2024)
  • ACM WiSec (2021, 2022, 2023, 2024, 2025)
  • IEEE S&P (2025)
  • NDSS (2024, 2025)
  • PETS (2024)
  • RAID (2023, 2024)
  • USENIX Security (2025)

Reviewer for Conferences (selection)

  • ACM ASIA CCS (2022)
  • ACM CHI (2021)
  • PETS (2018, 2021, 2022)

Reviewer for Journals (selection)

  • ACM Computing Surveys (2020)
  • Ad Hoc Networks (2020)
  • Computer Communications (2019)
  • Computers & Security (2020)
  • IEEE Transactions on Industrial Informatics (2020)
  • IEEE Transactions on Parallel and Distributed Systems (2017)
  • International Journal of Information Security (2020)
  • Journal of Network and Computer Applications (2022)

Publications

See also Google Scholar and DBLP.

2025

  1. FGCS
    Secure Integration of 5G in Industrial Networks: State of the Art, Challenges and Opportunities
    Future Generation Computer Systems, May 2025
  2. IJCIP
    Simulation of Multi-Stage Attack and Defense Mechanisms in Smart Grids
    Ömer Sen, Bozhidar Ivanov, Christian Kloos, Christoph Zöll, Philipp Lutat, Martin Henze, Andreas Ulbig, and Michael Andres
    International Journal of Critical Infrastructure Protection, Mar 2025

2024

  1. CSNet Poster
    Adaptive Optimization of TLS Overhead for Wireless Communication in Critical Infrastructure
    Jörn Bodenhausen, Laurenz Grote, Michael Rademacher, and Martin Henze
    In Proceedings of the 2024 8th Cyber Security in Networking Conference (CSNet) - Poster Session, Dec 2024
  2. CSET
    Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection Datasets
    Philipp Bönninghausen, Rafael Uetz, and Martin Henze
    In Proceedings of the 17th Cyber Security Experimentation and Test Workshop (CSET), Aug 2024
  3. USENIX Sec
    You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks
    Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, and Martin Henze
    In Proceedings of the 33rd USENIX Security Symposium (USENIX Sec), Aug 2024
  4. ASIA CCS
    Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication
    Eric Wagner, David Heye, Martin Serror, Ike Kunze, Klaus Wehrle, and Martin Henze
    In Proceedings of the 19th ACM ASIA Conference on Computer and Communications Security (ASIA CCS), Jul 2024
  5. NOMS
    Unconsidered Installations: Discovering IoT Deployments in the IPv6 Internet
    Markus Dahlmanns, Felix Heidenreich, Johannes Lohmöller, Jan Pennekamp, Klaus Wehrle, and Martin Henze
    In Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS), May 2024
  6. ACNS Poster
    Towards Secure 5G Infrastructures for Production Systems
    Martin Henze, Maximilian Ortmann, Thomas Vogt, Osman Ugus, Kai Hermann, Svenja Nohr, Zeren Lu, Sotiris Michaelides, Angela Massonet, and Robert H. Schmitt
    In Proceedings of the 22nd Conference on Applied Cryptography and Network Security (ACNS) – Poster Session, Mar 2024
  7. Illicit Blockchain Content: Its Different Shapes, Consequences, and Remedies
    Roman Matzutt, Martin Henze, Dirk Müllmann, and Klaus Wehrle
    In Blockchains – A Handbook on Fundamentals, Platforms and Applications, Mar 2024
  8. ACNS
    When and How to Aggregate Message Authentication Codes on Lossy Channels?
    Eric Wagner, Martin Serror, Klaus Wehrle, and Martin Henze
    In Proceedings of the 22nd Conference on Applied Cryptography and Network Security (ACNS), Mar 2024

2023

  1. MobiQuitous
    Securing Wireless Communication in Critical Infrastructure: Challenges and Opportunities
    Jörn Bodenhausen, Christian Sorgatz, Thomas Vogt, Kolja Grafflage, Sebastian Rötzel, Michael Rademacher, and Martin Henze
    In Proceedings of the 20th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), Nov 2023
  2. JSys
    SoK: Evaluations in Industrial Intrusion Detection Research
    Olav Lamberts, Konrad Wolsing, Eric Wagner, Jan Pennekamp, Jan Bauer, Klaus Wehrle, and Martin Henze
    Journal of Systems Research, Oct 2023
  3. LCN
    Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols
    Eric Wagner, Nils Rothaug, Konrad Wolsing, Lennart Bader, Klaus Wehrle, and Martin Henze
    In Proceedings of the 48th IEEE Conference on Local Computer Networks (LCN), Oct 2023
  4. ISGT-Europe
    Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids
    Ömer Sen, Simon Glomb, Martin Henze, and Andreas Ulbig
    In Proceedings of the 2023 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), Oct 2023
  5. SEST
    Investigation of Multi-stage Attack and Defense Simulation for Data Synthesis
    Ömer Sen, Bozhidar Ivanov, Martin Henze, and Andreas Ulbig
    In Proceedings of the 6th International Conference on Smart Energy Systems and Technologies (SEST), Sep 2023
  6. ESORICS
    One IDS is not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection
    Konrad Wolsing, Dominik Kus, Eric Wagner, Jan Pennekamp, Klaus Wehrle, and Martin Henze
    In Proceedings of the 28th European Symposium on Research in Computer Security (ESORICS), Sep 2023
  7. CyberICPS
    METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks
    Lennart Bader, Eric Wagner, Martin Henze, and Martin Serror
    In Proceedings of the 8th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS), Sep 2023
  8. EuroS&P
    Comprehensively Analyzing the Impact of Cyberattacks on Power Grids
    Lennart Bader, Martin Serror, Olav Lamberts, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, and Martin Henze
    In Proceedings of the 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), Jul 2023
  9. CIRED
    A Cyber-Physical Digital Twin Approach to Replicating Realistic Multi-Stage Cyberattacks on Smart Grids
    Ömer Sen, Nathalie Bleser, Martin Henze, and Andreas Ulbig
    In Proceedings of the 2023 International Conference on Electricity Distribution (CIRED), Jun 2023
  10. PowerTech
    An Approach To Abstract Multi-Stage Cyberattack Data Generation For ML-based IDS In Smart Grids
    Ömer Sen, Philipp Malskorn, Simon Glomb, Immanuel Hacker, Martin Henze, and Andreas Ulbig
    In Proceedings of 2023 IEEE Belgrade PowerTech, Jun 2023
  11. CAiSE
    Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking
    Jan Pennekamp, Johannes Lohmöller, Eduard Vlad, Joscha Loos, Niklas Rodemann, Patrick Sapel, Ina Berenice Fink, Seth Schmitz, Christian Hopmann, Matthias Jarke, Günther Schuh, Klaus Wehrle, and Martin Henze
    In Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE), Jun 2023
  12. Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead
    Jan Pennekamp, Anastasiia Belova, Thomas Bergs, Matthias Bodenbenner, Andreas Bührig-Polaczek, Markus Dahlmanns, Ike Kunze, Moritz Kröger, Sandra Geisler, Martin Henze, Daniel Lütticke, Benjamin Montavon, Philipp Niemietz, Lucia Ortjohann, Maximilian Rudack, Robert H. Schmitt, Uwe Vroomen, Klaus Wehrle, and Michael Zeng
    In Internet of Production: Fundamentals, Applications and Proceedings, Feb 2023

2022

  1. CUMUL & Co: High-Impact Artifacts for Website Fingerprinting Research
    Jan Pennekamp, Martin Henze, Andreas Zinnen, Fabian Lanze, Klaus Wehrle, and Andriy Panchenko
    Dec 2022
  2. ACSAC Poster
    Poster: Ensemble Learning for Industrial Intrusion Detection
    Dominik Kus, Konrad Wolsing, Jan Pennekamp, Eric Wagner, Martin Henze, and Klaus Wehrle
    Dec 2022
  3. SEGAN
    On Using Contextual Correlation to Detect Multi-stage Cyber Attacks in Smart Grids
    Ömer Sen, Dennis van der Velde, Katharina A. Wehrmeister, Immanuel Hacker, Martin Henze, and Michael Andres
    Sustainable Energy, Grids and Networks, Dec 2022
  4. CCS Poster
    Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring
    Martin Serror, Lennart Bader, Martin Henze, Arne Schwarze, and Kai Nürnberger
    In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS) – Poster Session, Nov 2022
  5. RAID
    IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
    Konrad Wolsing, Eric Wagner, Antoine Saillard, and Martin Henze
    In Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Oct 2022
  6. TCC
    Complying with Data Handling Requirements in Cloud Storage Systems
    Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, and Klaus Wehrle
    IEEE Transactions on Cloud Computing, Sep 2022
  7. LCN
    Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset
    Konrad Wolsing, Antoine Saillard, Jan Bauer, Eric Wagner, Christian van Sloun, Ina Berenice Fink, Mari Schmidt, Klaus Wehrle, and Martin Henze
    In Proceedings of the 47th IEEE Conference on Local Computer Networks (LCN), Sep 2022
  8. ESORICS
    Can Industrial Intrusion Detection Be SIMPLE?
    Konrad Wolsing, Lea Thiemt, Christian van Sloun, Eric Wagner, Klaus Wehrle, and Martin Henze
    In Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS), Sep 2022
  9. On Specification-based Cyber-Attack Detection in Smart Grids
    Ömer Sen, Dennis van der Velde, Maik Lühman, Florian Sprünken, Immanuel Hacker, Andreas Ulbig, Michael Andres, and Martin Henze
    In Proceedings of the 11th DACH+ Conference on Energy Informatics, Sep 2022
  10. CSET
    PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
    Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner, Martin Henze, and Martin Serror
    In Proceedings of the 15th Workshop on Cyber Security Experimentation and Test (CSET), Aug 2022
  11. ASIA CCS
    Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things
    Markus Dahlmanns, Johannes Lohmöller, Jan Pennekamp, Jörn Bodenhausen, Klaus Wehrle, and Martin Henze
    In Proceedings of the 17th ACM ASIA Conference on Computer and Communications Security (ASIA CCS), May 2022
  12. CPSS
    A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection
    Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, and Martin Henze
    In Proceedings of the 8th ACM Cyber-Physical System Security Workshop (CPSS), May 2022
  13. WiSec
    Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes
    Eric Wagner, Jan Bauer, and Martin Henze
    In Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May 2022
  14. WiSec
    BP-MAC: Fast Authentication for Short Messages
    Eric Wagner, Martin Serror, Klaus Wehrle, and Martin Henze
    In Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May 2022
  15. ICBC
    Scalable and Privacy-Focused Company-Centric Supply Chain Management
    Eric Wagner, Roman Matzutt, Jan Pennekamp, Lennart Bader, Irakli Bajelidze, Klaus Wehrle, and Martin Henze
    In Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), May 2022

2021

  1. ACSAC
    Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments
    Rafael Uetz, Christian Hemminghaus, Louis Hackländer, Philipp Schlipper, and Martin Henze
    In Proceedings of the 37th Annual Computer Security Applications Conference (ACSAC), Dec 2021
  2. ISGT-Europe
    Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment
    Ömer Sen, Dennis van der Velde, Philipp Linnartz, Immanuel Hacker, Martin Henze, Michael Andres, and Andreas Ulbig
    In Proceedings of 2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), Oct 2021
  3. Sensors
    Cybersecurity in Power Grids: Challenges and Opportunities
    Tim Krause, Raphael Ernst, Benedikt Klaer, Immanuel Hacker, and Martin Henze
    Sensors, Sep 2021
  4. VTC
    Path Loss in Urban LoRa Networks: A Large-Scale Measurement Study
    Michael Rademacher, Hendrik Linka, Thorsten Horstmann, and Martin Henze
    In Proceedings of the 2021 IEEE 94th Vehicular Technology Conference (VTC), Sep 2021
  5. CIRED
    An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment
    Ömer Sen, Dennis van der Velde, Sebastian N. Peters, and Martin Henze
    In Proceedings of the 26th International Conference on Electricity Distribution (CIRED), Sep 2021
  6. SEST
    Towards an Approach to Contextual Detection of Multi-Stage Cyber Attacks in Smart Grids
    Ömer Sen, Dennis van der Velde, Katharina A. Wehrmeister, Immanuel Hacker, Martin Henze, and Michael Andres
    In Proceedings of the 4th International Conference on Smart Energy Systems and Technologies (SEST), Sep 2021
  7. TNSM
    CoinPrune: Shrinking Bitcoin’s Blockchain Retrospectively
    Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, and Klaus Wehrle
    IEEE Transactions on Network and Service Management, Sep 2021
  8. TII
    Challenges and Opportunities in Securing the Industrial Internet of Things
    Martin Serror, Sacha Hack, Martin Henze, Marko Schuba, and Klaus Wehrle
    IEEE Transactions on Industrial Informatics, May 2021
  9. SaT-CPS
    Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems
    Markus Dahlmanns, Jan Pennekamp, Ina Berenice Fink, Bernd Schoolmann, Klaus Wehrle, and Martin Henze
    In Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS), Apr 2021

2020

  1. WAHC
    Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking
    Jan Pennekamp, Patrick Sapel, Ina Berenice Fink, Simon Wagner, Sebastian Reuter, Christian Hopmann, Klaus Wehrle, and Martin Henze
    In Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC), Dec 2020
  2. LASER
    Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use
    Jan Pennekamp, Erik Buchholz, Markus Dahlmanns, Ike Kunze, Stefan Braun, Eric Wagner, Matthias Brockmann, Klaus Wehrle, and Martin Henze
    In Proceedings of the 2020 ACSAC Workshop on Learning from Authoritative Security Experiment Results (LASER), Dec 2020
  3. CCS Poster
    Poster: Cybersecurity Research and Training for Power Distribution Grids – A Blueprint
    Martin Henze, Lennart Bader, Julian Filter, Olav Lamberts, Simon Ofner, and Dennis van der Velde
    In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS) - Poster Session, Nov 2020
  4. CCS Poster
    Poster: Facilitating Protocol-independent Industrial Intrusion Detection Systems
    Konrad Wolsing, Eric Wagner, and Martin Henze
    In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS) - Poster Session, Nov 2020
  5. IMC
    Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments
    Markus Dahlmanns, Johannes Lohmöller, Ina Berenice Fink, Jan Pennekamp, Klaus Wehrle, and Martin Henze
    In Proceedings of the Internet Measurement Conference (IMC), Oct 2020
  6. SEST
    Graph-based Model of Smart Grid Architectures
    Benedikt Klaer, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Michael Andres, and Martin Henze
    In Proceedings of the 3rd International Conference on Smart Energy Systems and Technologies (SEST), Sep 2020
  7. ENERGYCon
    Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures
    Dennis van der Velde, Martin Henze, Philipp Kathmann, Erik Wassermann, Michael Andres, Detert Bracht, Raphael Ernst, George Hallak, Benedikt Klaer, Philipp Linnartz, Benjamin Meyer, Simon Ofner, Tobias Pletzer, and Richard Sethmann
    In Proceedings of the 6th IEEE International Energy Conference (ENERGYCon), Sep 2020
  8. SPC
    The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation
    In Proceedings of the 6th International Workshop on Security and Privacy in the Cloud (SPC), Jul 2020
  9. BIoTCPS
    Private Multi-Hop Accountability for Supply Chains
    Jan Pennekamp, Lennart Bader, Roman Matzutt, Philipp Niemietz, Daniel Trauth, Martin Henze, Thomas Bergs, and Klaus Wehrle
    In Proceedings of the Workshop on Blockchain for IoT and Cyber-Physical Systems (BIoTCPS), Jun 2020
  10. NETWORKING
    How to Securely Prune Bitcoin’s Blockchain
    Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, and Klaus Wehrle
    In Proceedings of the 19th IFIP Networking Conference (NETWORKING), Jun 2020
  11. ITSec
    Assessing the Security of OPC UA Deployments
    Linus Roepert, Markus Dahlmanns, Ina Berenice Fink, Jan Pennekamp, and Martin Henze
    In Proceedings of the ITG Workshop on IT Security (ITSec), Apr 2020

2019

  1. CPS-SPC
    Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective
    Jan Pennekamp, Martin Henze, Simo Schmidt, Philipp Niemietz, Marcel Fey, Daniel Trauth, Thomas Bergs, Christian Brecher, and Klaus Wehrle
    In Proceedings of the 5th ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC), Nov 2019
  2. ICNP
    Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
    Jens Hiller, Jan Pennekamp, Markus Dahlmanns, Martin Henze, Andriy Panchenko, and Klaus Wehrle
    In Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP), Oct 2019
  3. ICNP Poster
    Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing
    Jan Pennekamp, Jens Hiller, Sebastian Reuter, Wladimir De la Cadena, Asya Mitseva, Martin Henze, Thomas Engel, Klaus Wehrle, and Andriy Panchenko
    In Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP) - Poster Session, Oct 2019
  4. LCN Symposium
    The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads
    Jens Hiller, Martin Henze, Torsten Zimmermann, Oliver Hohlfeld, and Klaus Wehrle
    In Proceedings of the IEEE LCN Symposium on Emerging Topics in Networking, Oct 2019
  5. CyberSafety
    Hi Doppelgänger: Towards Detecting Manipulation in News Comments
    Jan Pennekamp, Martin Henze, Oliver Hohlfeld, and Andriy Panchenko
    In Companion Proceedings of the 2019 World Wide Web Conference, Fourth Workshop on Computational Methods in Online Misbehavior (CyberSafety), May 2019
  6. ICPS
    Towards an Infrastructure Enabling the Internet of Production
    Jan Pennekamp, René Glebke, Martin Henze, Tobias Meisen, Christoph Quix, Rihan Hai, Lars Gleim, Philipp Niemietz, Maximilian Rudack, Simon Knape, Alexander Epple, Daniel Trauth, Uwe Vroomen, Thomas Bergs, Christian Brecher, Andreas Bührig-Polaczek, Matthias Jarke, and Klaus Wehrle
    In Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS), May 2019
  7. HICSS
    A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems
    René Glebke, Martin Henze, Klaus Wehrle, Philipp Niemietz, Daniel Trauth, Patrick Mattfeld, and Thomas Bergs
    In Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS), Jan 2019

2018

  1. PhD Thesis
    Accounting for Privacy in the Cloud Computing Landscape
    Dec 2018
  2. LCN
    Secure Low Latency Communication for Constrained Industrial IoT Scenarios
    Jens Hiller, Martin Henze, Martin Serror, Eric Wagner, Jan Niklas Richter, and Klaus Wehrle
    In Proceedings of the 43rd IEEE Conference on Local Computer Networks (LCN), Oct 2018
  3. IoT-SECFOR
    Towards In-Network Security for Smart Homes
    Martin Serror, Martin Henze, Sacha Hack, Marko Schuba, and Klaus Wehrle
    In Proceedings of the 2nd International Workshop on Security and Forensics of IoT (IoT-SECFOR), Aug 2018
  4. BTA
    Thwarting Unwanted Blockchain Content Insertion
    Roman Matzutt, Martin Henze, Jan Henrik Ziegeldorf, Jens Hiller, and Klaus Wehrle
    In Proceedings of the 2018 IEEE Workshop on Blockchain Technologies and Applications (BTA), Apr 2018
  5. FGCS
    Secure and Anonymous Decentralized Bitcoin Mixing
    Jan Henrik Ziegeldorf, Roman Matzutt, Martin Henze, Fred Grossmann, and Klaus Wehrle
    Future Generation Computer Systems, Mar 2018
  6. FC
    A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
    Roman Matzutt, Jens Hiller, Martin Henze, Jan Henrik Ziegeldorf, Dirk Müllmann, Oliver Hohlfeld, and Klaus Wehrle
    In Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Feb 2018

2017

  1. PMC
    A Survey on the Evolution of Privacy Enforcement on Smartphones and the Road Ahead
    Jan Pennekamp, Martin Henze, and Klaus Wehrle
    Pervasive and Mobile Computing, Dec 2017
  2. Network Security and Privacy for Cyber-Physical Systems
    Martin Henze, Jens Hiller, René Hummen, Roman Matzutt, Klaus Wehrle, and Jan Henrik Ziegeldorf
    In Security and Privacy in Cyber-Physical Systems: Foundations, Principles, and Applications, Nov 2017
  3. MobiQuitous
    CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps
    Martin Henze, Jan Pennekamp, David Hellmanns, Erik Mühmer, Jan Henrik Ziegeldorf, Arthur Drichel, and Klaus Wehrle
    In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), Nov 2017
  4. MobiQuitous Poster
    Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps
    Martin Henze, Ritsuma Inaba, Ina Berenice Fink, and Jan Henrik Ziegeldorf
    In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous) - Poster Session, Nov 2017
  5. WPES
    Analysis of Fingerprinting Techniques for Tor Hidden Services
    Andriy Panchenko, Asya Mitseva, Martin Henze, Fabian Lanze, Klaus Wehrle, and Thomas Engel
    In Proceedings of the 16th Workshop on Privacy in the Electronic Society (WPES), Oct 2017
  6. TrustCom
    Distributed Configuration, Authorization and Management in the Cloud-based Internet of Things
    Martin Henze, Benedikt Wolters, Roman Matzutt, Torsten Zimmermann, and Klaus Wehrle
    In Proceedings of the 2017 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug 2017
  7. BLOOM: BLoom filter based oblivious outsourced matchings
    Jan Henrik Ziegeldorf, Jan Pennekamp, David Hellmanns, Felix Schwinger, Ike Kunze, Martin Henze, Jens Hiller, Roman Matzutt, and Klaus Wehrle
    BMC Medical Genomics, Jul 2017
  8. TMA
    Veiled in Clouds? Assessing the Prevalence of Cloud Computing in the Email Landscape
    Martin Henze, Mary Peyton Sanford, and Oliver Hohlfeld
    In Proceedings of the 2017 Network Traffic Measurement and Analysis Conference (TMA), Jun 2017
  9. IC2E
    Practical Data Compliance for Cloud Storage
    Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, and Klaus Wehrle
    In Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E), Apr 2017
  10. CODASPY
    Privacy-Preserving HMM Forward Computation
    Jan Henrik Ziegeldorf, Jan Metzke, Jan Rüth, Martin Henze, and Klaus Wehrle
    In Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY), Mar 2017
  11. WONS
    TraceMixer: Privacy-Preserving Crowd-Sensing sans Trusted Third Party
    Jan Henrik Ziegeldorf, Martin Henze, Jens Bavendiek, and Klaus Wehrle
    In Proceedings of the 2017 Wireless On-demand Network Systems and Services Conference (WONS), Feb 2017

2016

  1. CloudCom
    Towards Transparent Information on Individual Cloud Service Usage
    Martin Henze, Daniel Kerpen, Jens Hiller, Michael Eggert, David Hellmanns, Erik Mühmer, Oussama Renuli, Henning Maier, Christian Stüble, Roger Häußling, and Klaus Wehrle
    In Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Dec 2016
  2. CCS Poster
    POSTER: I Don’t Want That Content! On the Risks of Exploiting Bitcoin’s Blockchain as a Content Store
    Roman Matzutt, Oliver Hohlfeld, Martin Henze, Robin Rawiel, Jan Henrik Ziegeldorf, and Klaus Wehrle
    In Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS) - Poster Session, Oct 2016
  3. CCS Poster
    POSTER: Fingerprinting Tor Hidden Services
    Asya Mitseva, Andriy Panchenko, Fabian Lanze, Martin Henze, Klaus Wehrle, and Thomas Engel
    In Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS) - Poster Session, Oct 2016
  4. WPES
    CPPL: Compact Privacy Policy Language
    Martin Henze, Jens Hiller, Sascha Schmerling, Jan Henrik Ziegeldorf, and Klaus Wehrle
    In Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), Oct 2016
  5. Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds
    Martin Henze, Jens Hiller, Oliver Hohlfeld, and Klaus Wehrle
    In Proceedings of the 2016 IEEE International Conference on Cloud Engineering (IC2E) Workshops, Apr 2016
  6. FGCS
    A Comprehensive Approach to Privacy in the Cloud-based Internet of Things
    Martin Henze, Lars Hermerschmidt, Daniel Kerpen, Roger Häußling, Bernhard Rumpe, and Klaus Wehrle
    Future Generation Computer Systems, Mar 2016
  7. NDSS
    Website Fingerprinting at Internet Scale
    Andriy Panchenko, Fabian Lanze, Andreas Zinnen, Martin Henze, Jan Pennekamp, Klaus Wehrle, and Thomas Engel
    In Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS), Feb 2016

2015

  1. CANS
    Bandwidth-optimized Secure Two-Party Computation of Minima
    Jan Henrik Ziegeldorf, Jens Hiller, Martin Henze, Hanno Wirtz, and Klaus Wehrle
    In Proceedings of the 14th International Conference on Cryptology and Network Security (CANS), Dec 2015
  2. DPM
    Comparison-based Privacy: Nudging Privacy in Social Media
    Jan Henrik Ziegeldorf, Martin Henze, René Hummen, and Klaus Wehrle
    In Proceedings of the 10th International Workshop on Data Privacy Management (DPM), Sep 2015
  3. SPW
    Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks
    Jan Henrik Ziegeldorf, Jan Metzke, Martin Henze, and Klaus Wehrle
    In Proceedings of the 2015 IEEE Security and Privacy Workshops, May 2015
  4. CODASPY
    CoinParty: Secure Multi-Party Mixing of Bitcoins
    Jan Henrik Ziegeldorf, Fred Grossmann, Martin Henze, Nicolas Inden, and Klaus Wehrle
    In Proceedings of the Fifth ACM Conference on Data and Application Security and Privacy (CODASPY), Mar 2015

2014

  1. A Trust Point-based Security Architecture for Sensor Data in the Cloud
    Martin Henze, René Hummen, Roman Matzutt, and Klaus Wehrle
    In Trusted Cloud Computing, Dec 2014
  2. SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators
    Michael Eggert, Roger Häußling, Martin Henze, Lars Hermerschmidt, René Hummen, Daniel Kerpen, Antonio Navarro Pérez, Bernhard Rumpe, Dirk Thißen, and Klaus Wehrle
    In Trusted Cloud Computing, Dec 2014
  3. AASNET
    SCSlib: Transparently Accessing Protected Sensor Data in the Cloud
    Martin Henze, Sebastian Bereda, René Hummen, and Klaus Wehrle
    In Proceedings of the 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET), Sep 2014
  4. FiCloud
    User-driven Privacy Enforcement for Cloud-based Services in the Internet of Things
    Martin Henze, Lars Hermerschmidt, Daniel Kerpen, Roger Häußling, Bernhard Rumpe, and Klaus Wehrle
    In Proceedings of the 2014 International Conference on Future Internet of Things and Cloud (FiCloud), Aug 2014
  5. WiSec Poster
    POSTER: Privacy-preserving Indoor Localization
    Jan Henrik Ziegeldorf, Nicolai Viol, Martin Henze, and Klaus Wehrle
    In Proceedings of the 7th ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec) - Poster Session, Jul 2014
  6. ISCC
    Piccett: Protocol-Independent Classification of Corrupted Error-Tolerant Traffic
    Florian Schmidt, Martin Henze, and Klaus Wehrle
    In Proceedings of the 18th IEEE Symposium on Computers and Communications (ISCC), Jun 2014
  7. COMSNETS
    Graph-based Redundancy Removal Approach for Multiple Cross-Layer Interactions
    Ismet Aktas, Martin Henze, Muhammad Hamad Alizai, Kevin Möllering, and Klaus Wehrle
    In Proceedings of the 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS), Jan 2014

2013

  1. IJGHPC
    Maintaining User Control While Storing and Processing Sensor Data in the Cloud
    Martin Henze, René Hummen, Roman Matzutt, Daniel Catrein, and Klaus Wehrle
    International Journal of Grid and High Performance Computing, Dec 2013
  2. CloudCom Poster
    Towards Data Handling Requirements-aware Cloud Computing
    Martin Henze, Marcel Großfengels, Maik Koprowski, and Klaus Wehrle
    In Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) - Poster Session, Dec 2013
  3. Slimfit - A HIP DEX Compression Layer for the IP-based Internet of Things
    René Hummen, Jens Hiller, Martin Henze, and Klaus Wehrle
    In Proceedings of the 1st International Workshop on Internet of Things Communications and Technologies, Oct 2013
  4. SPW
    The Cloud Needs Cross-Layer Data Handling Annotations
    Martin Henze, Rene Hummen, and Klaus Wehrle
    In Proceedings of the 2013 IEEE Security and Privacy Workshops, May 2013
  5. WiSec
    6LoWPAN Fragmentation Attacks and Mitigation Mechanisms
    René Hummen, Jens Hiller, Hanno Wirtz, Martin Henze, Hossein Shafagh, and Klaus Wehrle
    In Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Apr 2013

2012

  1. CloudCom
    A Cloud Design for User-controlled Storage and Processing of Sensor Data
    René Hummen, Martin Henze, Daniel Catrein, and Klaus Wehrle
    In Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), Dec 2012