Selected Publications#
2024#
“Using Static Code Analysis for GDPR Compliance Checks” Computer Security. ESORICS 2024 International Workshops, Pages 153-169, Springer, M. Binder, Andreas and Kunz, Immanuel Keywords: Privacy, Privacy Enhancing Technologies, Static Code Analysis
“UPCARE: User Privacy-preserving Cancer Research Platform” Proceedings of the 21st International Conference on Security and Cryptography, Pages 52-63, Scitepress, Bramm, Georg and Önen, Melek and Schanzenbach, Martin and Komarov, Ilya and Morgner, Frank and Tiebel, Christian and Cadavid, Juan Keywords: Privacy, Privacy Enhancing Technologies, Software Architecture
“Evolution of secure development lifecycles and maturity models in the context of hosted solutions” Journal of Software: Evolution and Process, Wiley Online Library, Felix Lange and Immanuel Kunz Keywords: Privacy, Software Architecture
“GRAIN: Truly Privacy-friendly and Self-sovereign Trust Establishment with GNS and TRAIN”, Open Identity Summit 2024, Pages 85-92, Gesellschaft für Informatik e.V., Martin Schanzenbach, Sebastian Nadler and Isaac Henderson Johnson Jeyakumar Keywords: Privacy, Privacy Enhancing Technologies, Domain Name System, GNU Name System
2023#
“Privacy as an Architectural Quality: A Definition and an Architectural View”, 2023 IEEE European Symposium on Security and Privacy Workshops, Pages 125-132, IEEE, Immanuel Kunz and Shuqian Xu Keywords: Privacy, Software Architecture
“Privacy Property Graph: Towards Automated Privacy Threat Modeling via Static Graph-based Analysis”, Proceedings on Privacy Enhancing Technologies, Pages 171-187, PETSymposium, Immanuel Kunz, Konrad Weiss, Angelika Schneider and Christian Banse Keywords: Privacy Enhancing Technologies, Static Code Analysis
“Robust and secure trust establishment is an open problem in the domain of self-sovereign identities (SSI). The TRAIN [KR21] concept proposes to leverage the security guarantees and trust anchor of the DNS to publish and resolve pointers to trust lists from DNS. While the DNS is a corner stone of the Internet, its continued use is primarily a consequence of inertia due to its crucial function as the address discovery system for existing Internet services. Research and development in the area of SSI is—for the most part—green field. The choice of DNS as a core building block appears fainthearted given its open security issues. Recently, the IETF paved the way to experiment with alternative name systems in real world deployments by reserving the special-use top-level domain “. alt” in the domain name space [KH23]. This allows us to use alternative name systems such as the GNU Name System (GNS)[SGF23a] without intruding into the domain name space reserved for DNS. In this paper, we show how we can use the GNS as a drop-in replacement for DNS in TRAIN. We show how TRAIN-over-GNS (GRAIN) can deliver security and privacy improvements the security concept of TRAIN-over DNS and show that it is practically feasible with limited modifications of existing software stacks.” Link, Martin Schanzenbach, Sebastian Nadler, Isaac Henderson Johnson Jeyakumar: Keywords: Name Systems, Domain Name System, GNU Name System, Key blinding
“This document provides the GNU Name System (GNS) technical specification. GNS is a decentralized and censorship-resistant domain name resolution protocol that provides a privacy-enhancing alternative to the Domain Name System (DNS) protocols.”, RFC 9498, Martin Schanzenbach, Christian Grothoff, Bernd Fix:
Keywords: Name Systems, Domain Name System, GNU Name System, Key blinding
2022#
“Zero-Knowledge Age Restriction for GNU Taler”, Proceedings of 27rd European Symposium on Research in Computer Security (ESORICS), Springer, Lecture Notes in Computer Science, Taler.net, Özgür Kesim, Christian Grothoff, Florian Dold and Martin Schanzenbach
Keywords: Zero-Knowledge, GNU Taler
“Application-Oriented Selection of Privacy Enhancing Technologies”, Annual Privacy Forum, Springer, Pages 75-87, Arxiv Link, Immanuel Kunz and Andreas Binder Keywords: Privacy Enhancing Technologies
“Who comes after us? The correct mindset for designing a Central Bank Digital Currency”, SUERF Policy Note 279, SUERF homepage, Antoine d’Aligny, Emmanuel Benoist, Florian Dold, Christian Grothoff, Özgur Kesim and Martin Schanzenbach Keywords: Self-sovereign identity Payments
“Central Bank Accounts are Dangerous and Unnecessary” https://taler.net/papers/accounts-dangerous-2022.pdf, Antoine d’Aligny, Emmanuel Benoist, Florian Dold, Christian Grothoff, Özgur Kesim and Martin Schanzenbach Keywords: Self-sovereign identity Payments
2021#
“CardioTEXTIL: Wearable for Monitoring and End-to-End Secure Distribution of ECGs.” In IEEE 17th International Conference on Wearable and Implantable Body Sensor Networks (BSN). https://www.cit.fraunhofer.de/content/dam/aisec/CCIT/paper/Fraunhofer%20CCIT_MEDISEC.pdf, Georg Bramm, Matthias Hiller, Christian Hofmann, Stefan Hristozov, Maximilian Oppelt, Norman Pfeiffer, Martin Striegel, Matthias Struck, Dominik Weber Keywords: Cryptography Attribute-based encryption
“Decentralized Identities for Self-Sovereign End-Users (DISSENS).” In Open Identity Summit 2021, Martin Schanzenbach, Hansjürg Wenger, Christian Grothoff Keywords: Cryptography Zero-knowledge proofs Self-sovereign identity Payments
“Cloud Property Graph: Connecting Cloud Security Assessments with Static Code Analysis” In 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), 13–19. Los Alamitos, CA, USA: IEEE Computer Society. https://doi.org/10.1109/CLOUD53861.2021.00014, Christian Banse, Immanuel Kunz, Angelika Schneider, Konrad Weiss Keywords: Privacy Engineering
2020#
“cipherPath: Efficient Traversals over Homomorphically Encrypted Paths.” In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications - Volume 3: SECRYPT, 271–78. INSTICC; SciTePress. https://doi.org/10.5220/0009777802710278, Georg Bramm, Julian Schütte Keywords: Cryptography Homomorphic encryption
“Towards Self-Sovereign, Decentralized Personal Data Sharing and Identity Management.” Dissertation, Martin Schanzenbach Keywords: Self-sovereign identity
“Privacy Smells: Detecting Privacy Problems in Cloud Architectures.” In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), https://doi.org/10.1109/TrustCom50675.2020.00178, Immanuel Kunz, Angelika Schneider, Christian Banse Keywords: Privacy Engineering
“Selecting Privacy Enhancing Technologies for IoT-Based Services. In International Conference on Security and Privacy in Communication Systems, Immanuel Kunz, Christian Banse, and Philipp Stephanow Keywords: Privacy Engineering
“Towards Tracking Data Flows in Cloud Architectures.” In 2020 IEEE 13th International Conference on Cloud Computing (CLOUD), Kunz, Immanuel, Valentina Casola, Angelika Schneider, Christian Banse, and Julian Schütte Keywords: Privacy Engineering
“An Edge Framework for the Application of Privacy Enhancing Technologies in IoT Communications.” In ICC 2020-2020 IEEE International Conference on Communications (ICC), Immanuel Kunz, Philipp Stephanow, and Christian Banse Keywords: Privacy Engineering
2019 and older#
“ZKlaims: Privacy-Preserving Attribute-Based Credentials Using Non-Interactive Zero-Knowledge Techniques.” In Proceedings of the 16th International Conference on Security and Cryptography (SECRYPT 2019), Part of ICETE, Martin Schanzenbach, Thomas Kilian, Julian Schütte, Christian Banse Keywords: Cryptography Zero-knowledge proofs Self-sovereign identity
“BDABE-Blockchain-Based Distributed Attribute Based Encryption.” In ICETE, Georg Bramm, Mark Gall, Julian Schütte Keywords: Cryptography Attribute-based encryption
“Practical Decentralized Attribute-Based Delegation Using Secure Name Systems.” In 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), https://doi.org/10.1109/TrustCom/BigDataSE.2018.00046, Martin Schanzenbach, Christian Banse, Julian Schütte Keywords: Self-sovereign identity
“reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption.” In 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), https://doi.org/10.1109/TrustCom/BigDataSE.2018.00134, Martin Schanzenbach, Georg Bramm, Julian Schütte Keywords: Cryptography Attribute-based encryption Self-sovereign identity
“K-word Proximity Search on Encrypted Data.” In Proceedings of the International Conference on Advanced Information Network and Applications (AINA), Mark Gall, Gerd Brost Keywords: Cryptography