![]() Florian Jacob, a member of our research group, was a guest on the latest episode of the Matrix Salon podcast, where he talked about his research on the security and resilience of the Matrix network and his life as a Ph.D. student. |
![]() The ROBUST Workshop on Byzantine Fault Tolerance und State Machine Replication takes place with us at KIT in Karlsruhe this year. This workshop aims to bring together leading minds in our field to explore and discuss current and preliminary work with open questions in substantial depth. The event on March 17 and 18, 2025 is planned from lunch to lunch so that there is time to arrive and depart on the same days. The Call for Contributions as well as additional information is found on: ROBUST 2025 |
2025-03-17: ROBUST2025 Workshop Wir veranstalten 2025-03-17 und 2025-03-18 den ROBUST 2025 workshop. |
![]() At this year's Bitcoin Research Day, Hannes Hartenstein and Matthias Grundmann gave a talk titled "From Monitoring Bitcoin to Verifying Lightning: Modeling Aspects of the Bitcoin Universe". In particular, they presented our research on monitoring the P2P network of Bitcoin and on verification of the Lightning Network's protocol and discussed it with the participants. |
![]() The results of the BMWK-supported project SofDCar (Software-Defined Car) were presented to the public today at a technical expo in the Arena2036 in Stuttgart. Oliver Stengele was there and presented the project contributions of the research group to interested visitors. Within SofDCar, we examined the use of decentralized systems like Ethereum and the InterPlanetary File System to make the cooperation of parties along software supply chains more traceable and secure. |
![]() While there are already various proposals for peer-to-peer communication for the decentralized messaging middleware Matrix, these proposals require that the receiver and the originator are simultaneously online. We introduce relay-enhanced P2P Matrix (ReP2P Matrix) in order to improve message delivery between peers that are online at different times. We present our new publication on this topic, ReP2P Matrix: Decentralized Relays to Improve Reliability and Performance of Peer-to-Peer Matrix, on the first Decentralization of the Internet Workshop of this year's ACM CoNEXT. The publication is available as open access under CC-BY. |
![]() To support us in our daily lives, future humanoid assistant robots need both a certain degree of autonomy to learn and explore, but must also adhere to certain constraints. Constrained planning is a problem especially for otherwise promising approaches based on neural networks - while symbolic approaches are very good at adhering to constraints, but have trouble with complex, new environments. New developments in the area of neuro-symbolic AI would revolutionize constrained task planning. On this year's Symposium on Access Control Models and Technologies, we have presented our BlueSky publication “How to Raise a Robot - A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots” on that topic. The publication is freely available as open access under CC-BY. |
![]() We presented our new publication “Logical Clocks and Monotonicity for Byzantine-Tolerant Replicated Data Types” at this year's Workshop on Principles and Practice of Consistency for Distributed Data. In the paper, we decompose Matrix and other autonomous decentralized systems into their order-theoretic foundations. We show that the decomposition allows to analyze Byzantine fault tolerance on the basis of the order-theoretic property of monotonicity. The article is freely available as open access under CC-BY |
![]() At the Bitcoin Research Day in Fall 2024 in New York, Prof. Dr. Hannes Hartenstein and Matthias Grundmann will give a talk about our research. The talk is titled "From Monitoring Bitcoin to Verifying Lightning: Modeling Aspects of the Bitcoin Universe". Find more information at brd.chaincode.com. |
![]() For our SACMAT poster, there is now a follow-up extended version on arXiv under the subtitle “A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots”. We report on new experiments with the unification of robot task planning and access control via Large Language Models, and show how different levels of neuro-symbolic integration can further strengthen this unification. |
At the 37th International Symposium on Distributed Computing (DISC'23), October 9-13, 2023, in L'Aquila, Italy, we presented our work Let It TEE. We showed that the consensus algorithm DAG-Rider can be transformed using Trusted Execution Environments, such as Intel SGX, such that up to 49% of protocol participants can be malicious while progress can still be made. |
![]() During the 28th ACM Symposium on Access Control Models and Technologies at the Fondazione Bruno Kessler in Trento, Italy, we have presented our poster „How to Raise a Robot - Beyond Access Control Constraints in Assistive Humanoid Robots”. In the poster, we discuss how humanoid assistive robots can be granted both the necessary level of autonomy for their versatile learning and action capabilities, and how the robots can still learn to respect various constraints such as access control and beyond. In addition to the poster and poster abstract, the publication also includes the presentation video. |
![]() Today, our staff member Oliver Stengele successfully defended his dissertation. For his work titled "Decentralizing Software Identity Management", Oliver researched approaches that enable developers to sovereignly establish and manage unique identities for software. Additionally, he implemented a digital time capsule on the Ethereum blockchain and employed it as part of an independent review process. We congratulate our colleague! |
We present our new publication “On Extend-Only Directed Posets and Derived Byzantine-Tolerant Replicated Data Types” at this year's Workshop on Principles and Practice of Consistency for Distributed Data. In the paper, we show a new formalization of the decentralized Matrix system using directed partially-ordered sets, which allow a more extensive model than previous approaches based on directed acyclic graphs. The Extended Version on Arxiv is freely available already. |
![]() The research group presented itself at "Meet the Chairs" as part of the Master O-Phase, organized by the Fachschaft Mathematik/Informatik, with a Poster, our Bitcoin Monitoring, and candy. We are grateful for the good organization and the stimulating conversations and look forward to next time. |
![]() For various application-oriented research activities in the areas of automotive software management, assistive humanoid robotics, and mobility-as-a-service systems, the Decentralized Systems and Network Services research group has several openings for PhD students/research assistants interested in research that combines theory and practice. Research activities focus on the design and analysis of decentralized methods for identity and access management, payments, and secure and privacy-friendly data exchange. Her/his work is part of a larger research project and offers the opportunity for a PhD. For more information and how to contact us, please visit the Human Resources Services page. |
![]() The research group Decentralized Systems and Network Services is looking for a new research associate with a focus on the design and investigation of identity and access management methods as well as secure and privacy-compliant communication and data storage. Special attention is given to specification, implementation and evaluation of methods for networked and decentralized systems, in particular the Internet of Things, and associated middleware components. Her/his work is part of a larger research project and offers the opportunity for a PhD. For more information and how to contact us, please visit the Human Resources page. |
![]() In the not too distant future, assistive humanoid robots will provide versatile assistance for coping with everyday life. In their interactions with humans, not only safety, but also security and privacy issues need to be considered. We therefore argue that it is time to bring task planning and execution as a well-established field of robotics with access and usage control in the field of security and privacy closer together. As part of the JuBot Project, we do research on those issues together with the H2T research group. Our first paper with the title BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots published on SACMAT'22 is now freely available as Open Acces. |
![]() Payment Channels enable scalable payments on blockchains but require that users are regularly online to defend their channels against fraud. This task can be outsourced to third parties, so called watchtowers. At the DINPS'22 workshop, we presented an idea to decentralize watchtowers so that users do not need to trust specific employed watchtowers but a user can be defended by any watchtower. |
![]() Mobility-as-a-Service is in the focus of public and private actors as a development step of public transport. We have investigated which disadvantages arise in such a system due to central providers and how these disadvantages can be compensated by decentralization. We presented our current findings as well as open issues for ongoing and future research at the "14. Wissenschaftsforum Mobilität" in Duisburg in June 2022. |
![]() The research group Decentralized Systems and Network Services is looking for a new academic staff member with a research focus on the design and investigation of identity and access management methods as well as secure and privacy-compliant communication and data storage. Special attention is given to specification, implementation, and evaluation of methods for networked and distributed systems, in particular the Internet of Things, and associated middleware components. Her work is part of a larger research project. Further information and contact details can be found on the Human Resources page. |
![]() The number of peers in the P2P network of Bitcoin is difficult to measure. Together with two students we developed a method to estimate the number of active peers in the network - including reachable and unreachable peers. At the Financial Cryptography and Data Security 2022 we published results of applying this method to data collected through our Bitcoin Monitoring. |
![]() We presented a short paper about insights into the Bitcoin P2P network at the IEEE International Conference on Blockchain and Cryptocurrency in May 2022. We show for example that the current connection capacity of a majority of the peers is fully used. Matthias Grundmann also presented a poster in which we show how security properties of payment channel protocols can be verified. |
![]() The "6th International Workshop on Cryptocurrencies and Blockchain Technology (CBT 2022)" will be held again in conjunction with the "European Symposium on Research in Computer Security (ESORICS)" in September. Hannes Hartenstein is a member of the program committee. The Call for Papers can be found here. |
![]() At the 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA 2021) in November, Oliver Stengele presented the paper "ETHTID: Deployable Threshold Information Disclosure on Ethereum", which is now available in IEEE Xplore. The paper is the result of a cooperation with the Cryptography and Security Group of Prof. Müller-Quade and was available as a preprint since June. In this work, we show that independently generated statements can be published to a blockchain in a temporally coordinated way through a decentralized mechanism. |
![]() The research group Decentralized Systems and Network Services contributes to the research project Software-Defined Car (SofDCar). For more information on the project see the corresponding press release. |
![]() At the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, Oliver Stengele (Research Group DSN) and Sebastian Friebe (Research Group Telematics) presented a Case Study on coupling Smart Contract applications which resulted from a cooperation within KASTEL. |
![]() At the TLA+ Conference 2021, Matthias Grundmann presented a specification of payment channels in TLA+ and how this specification can be used to specify security properties for payment channels and verify them. |
![]() The research group Decentralized Systems and Network Services in cooperation with the KASTEL Mobility Lab is looking for three student assistants to build up a team for server administration, software development and experiment execution. Further information can be found here. |
![]() The research group Decentralized Systems and Network Services is looking for a new academic staff member with the research focus "Information Security in Decentralized Systems for Networked Mobility". The possibility of pursuing a doctoral degree is given. Further information and contact details can be found on the Human Resources page. |
![]() In the coming summer term, we once again offer our Hot Topics seminar with mixed topics around decentralized systems (registration via Wiwi-Portal). We are also involved with the "Internet and Society" seminar (registration via Wiwi-Portal). Both seminars allow presentation and seminar paper in English. |
![]() In the upcoming semester, we offer a new course: The Research Focus Class, that combines a seminar with a lecture. In the summer term 2021 we will address aspects of the highly relevant and up-to-date area of Blockchain and Payment Channel Networks. In the lecture as the first part of the course, we will teach basics in this area and in the second part of the course, the seminar, students will work on advanced topics. Register here. The concept of our course is inspired by the same-titled series of COMSYS at the RWTH Aachen. |
![]() In the Open Access journal IEEE Access, our article Analysis of the Matrix Event Graph Replicated Data Type was published. With the aim of application in decentralized publish-subscribe systems, in the paper, we extract and analyze the Matrix Event Graph(MEG) from the Matrix middleware, which is primarily used there to depict the causal history of chat messages. We show that the MEG is a so-called Conflict-Free Replicated Data Type, and thereby provides Strong Eventual Consistency. In addition, we show that the MEG, via its reduced notion of consistency when compared to traditional Distributed Ledger Technologies, can cope with environments where the majority of the participants exhibit byzantine faults. We close the article with an analysis of the scalability in form of the number of parallel causal chains in the MEG, for which we can expect an almost optimal evolution according to our results. |
![]() We present a demonstration titled Practical Trade-Offs in Integrity Protection for Binaries via Ethereum at this year's ACM/IFIP Middleware (Video). We show the practicability of our concept and how revocations of software binaries can be communicated to users in a timely manner. We also briefly touch on trade-offs that arise in a practical deployment. |
At Virtual Zeek Week 2020, we presented the Emojifier and the current state of our work on the Packet Analyzer Framework for Zeek. The framework enables the flexible addition of protocols at lower network layers and thus opens up new possibilities for monitoring networked systems, for example in the context of critical infrastructures. |
Auf der Virtual Zeek Week 2020 präsentierten wir den Emojifier sowie den aktuellen Stand unserer Arbeiten am Packet Analyzer Framework für Zeek. Das Framework ermöglicht die flexible Ergänzung von Protokollen unterer Netzwerkschichten und eröffnet so neue Möglichkeiten für das Monitoring vernetzter Systeme, zum Beispiel im Kontext kritischer Infrastrukturen. |
![]() We present our publication Fundamental Properties of the Layer Below a Payment Channel Network (Abstract-Video) at the 4th International Workshop on Cryptocurrencies and Blockchain Technology (CBT 2020). We show which properties are required for the first layer below a payment channel network and that a first layer cannot only be implemented by a blockchain. |
![]() Die Nachklausur wird am 27.07. um 8:00 Uhr im Tulla-Hörsaal (Geb 11.40) stattfinden. Die Anmeldung im CAS ist ab jetzt bis zum 20.07., 23:59 Uhr möglich. Eine Online-Abmeldung ist bis zum 26.07. um 23:59 Uhr möglich. Für die Klausur sind keine Hilfsmittel (außer einem Wörterbuch) zugelassen. Sollten Sie ein Wörterbuch verwenden wollen, muss dieses beim Einlass von der Aufsicht überprüft werden. Weitere Informationen zur Koordinierung des Einlasses und zur Beachtung des Infektionsschutzes werden rechtzeitig vor der Klausur an die Teilnehmer/-innen übermittelt. |
![]() Die Nachklausur wird am 27.07. um 8:00 Uhr im Tulla-Hörsaal (Geb 11.40) stattfinden. Die Anmeldung im CAS ist ab jetzt bis zum 20.07., 23:59 Uhr möglich. Eine Abmeldung ist bis zum 26.07. um 23:59 Uhr möglich. Für die Klausur sind keine Hilfsmittel (außer einem Wörterbuch) zugelassen. Sollten Sie ein Wörterbuch verwenden wollen, muss dieses beim Einlass von der Aufsicht überprüft werden. Weitere Informationen zur Koordinierung des Einlasses und zur Beachtung des Infektionsschutzes werden rechtzeitig vor der Klausur an die Teilnehmer/-innen übermittelt. |
![]() On September, 17th and 18th the 4th International Workshop on Cryptocurrencies and Blockchain Technology" (CBT 2020) will take place, co-located with ESORICS 2020. Prof. Hartenstein will serve on the program commitee of the workshop. We encourage submissions related to cryptocurrencies and blockchain technology (see call for papers). |
2020/06/11: Matrix Decomposition: Analysis of an Access Control Approach on Transaction-based DAGs without Finality vorgestellt auf der SACMAT 2020 At the 25th ACM Symposium on Access Control Models and Technologies, we presented our paper Matrix Decomposition: Analysis of an Access Control Approach on Transaction-based DAGs without Finality. In this paper, we decompose, abstract and analyze the access control approach of the Matrix middleware for decentralized applications, and show that Matrix can be seen as a Distributed Ledger Technology without strict Consensus. This has interesting consequences when compared to traditional access control approaches, which we discuss as well. The talk was recorded, and will be publishde by SACMAT at a later date. The publication was also the topic of this blog post on Matrix.org, which covers the Matrix.org view on our findings. |
Matrix Decomposition: Analysis of an Access Control Approach on Transaction-based DAGs without Finality presented at SACMAT At the 25th ACM Symposium on Access Control Models and Technologies, we presented our paper Matrix Decomposition: Analysis of an Access Control Approach on Transaction-based DAGs without Finality. In this paper, we decompose, abstract and analyze the access control approach of the Matrix middleware for decentralized applications, and show that Matrix can be seen as a Distributed Ledger Technology without strict Consensus. This has interesting consequences when compared to traditional access control approaches, which we discuss as well. The talk was recorded, and will be publishde by SACMAT at a later date. The publication was also the topic of this blog post on Matrix.org, which covers the Matrix.org view on our findings. |
![]() The Zeek package contest honors extensions for the well-known network monitoring tool Zeek. In the Zeek Package Contest 2019, two extensions developed in the research group were recognized. The Emojifier won the category for Zeek 3.0 compatible extensions and the Intel-Limiter was awarded the second place in the main competition. |
![]() The information on online teaching due to the COVID 19 pandemic can now be found on our page Teaching. |
![]() Prof. Hannes Hartenstein will give a presentation at Hochschule Karlsruhe on the 24th of March 2020 at 5:30 PM with the title "Geglückte Verkettung von Zuständen: Blockchains Verstehen" (in German). In this lecture, the basic elements of blockchains will be explained in a generally understandable way and insights into the communication behavior in the Bitcoin network will be presented. Then, existing challenges and approaches to solutions, especially with regard to security and scalability, as well as the automatic execution of contracts on blockchains ("Smart Contracts") are considered. The lecture concludes with a socio-technical view on questions of power in blockchain-based systems. Further Informations at VDE Mittelbaden. |
![]() On the basis of the teaching evaluation of KIT carried out every semester, the KIT Faculty of Informatics awarded our "Praktikum Access Control Systems" as best lab for the summer semester 2019. Many thanks to the students for this evaluation result! |
![]() Due to a collision with "Maschinelles Lernen 1", the written exam in "Angewandte Themen für das Informatik-Lehramt" is now on 13 March 2020 at 11:30PM, Bldg. 50.34, Room -101. |
![]() At the 20th International Middleware Conference at UC Davis, California, we presented our poster A Glimpse of the Matrix: Scalability issues of a new message-oriented data synchronization middleware on 2019-12-11. We describe measurements of the public federation of the [matrix] network and discuss scalability issues of the current message routing mechanism. Additional details can be found in the Extended Tech Report. More images by @middleware2019 on twitter. |
![]() At the 3rd International Workshop on Cryptocurrencies and Blockchain Technology (CBT'19) on 26th and 27th Septembre, 2019, co-located with ESORICS 2019 we presented our work "TEE-Based Distributed Watchtowers for Fraud Protection in the Lightning Network". We propose TEE Guard, a distributed watchtower solution for the Lightning Network that utilises Trusted Execution Environments. |
![]() Out conference submission "Access Control for Binary Integrity Protection using Ethereum" has been published in the respective proceedings. Furthermore, our contribution received the "Best Paper Runner Up" award. |
![]() The SICK-Wissenschaftspreis for the best thesis 2017 was awarded to Matthias Grundmann for his master thesis titled "Analysis and Evaluation of Analysis Methods for Topology Inference in the Bitcoin Peer-to-Peer Network" at the annual Tag der Informatik. In this thesis he discussed possibilities for dertermining the topology of the Bitcoin peer-to-peer network and introduced two new methods to accomplish this. |
![]() On the IEEE International Conference on Blockchain and Cryptocurrency from 14-17 May 2019 in Seoul, South Korea we presented our publication "Banklaves: Concept for a Trustworthy Decentralized Payment Service for Bitcoin", which explores a new way to implement a second layer architecture for cryptocurrencies using Trusted Execution Environments. |
![]() On the IEEE International Conference on Blockchain and Cryptocurrency from 14-17 May 2019 in Seoul, South Korea we presented our publication "Banklaves: Concept for a Trustworthy Decentralized Payment Service for Bitcoin", which explores a new way to implement a second layer architecture for cryptocurrencies using Trusted Execution Environments. |
![]() In the paper "Access Control for Binary Integrity Protection using Ethereum", we present a concept for representing and managing software on a public Blockchain, like Ethereum, for the purpose of integrity protection and revocation thereof. The work will be presented during the ACM Symposium on Access Control Models and Technologies (SACMAT) at the beginning of June in Toronto and will be available via KITOpen later. |
![]() Registration to the ACS Practical Course as well as the Seminar "Hot Topics in Decentralized Systems" will open on the 1st of April at 2:00pm via the Wiwi-Portal. Further information can be found on the pages of the respective course. Edit: Registration for the Seminar was moved to Friday, 5th of April at 10:00am. |
![]() On February 14th and 15th, 2019, the 3rd ForDigital Blockchain Workshop will take place at KIT. Researchers and practitioners in the field of Blockchains are invited to discuss challenges and opportunities of blockchain technologies and to talk about work currently being done. |
![]() Ben Parson, Developer Advocate for Matrix.org, mentioned the DSN Traveller, which was developed in the group as part of the master's thesis of Florian Jacob, in his favourite Matrix projects 2018. |
![]() In the paper "Towards Application of Cuckoo Filters in Network Security Monitoring" we study the feasibility of applying the recently proposed cuckoo filters to improve space efficiency for set membership testing in Network Security Monitoring, focusing on the example of Threat Intelligence matching. The work was presented in November 2018 on the 14th International Conference on Network and Service Management (CNSM). |
![]() On November 30th Till Neudecker successfully defended his dissertation. Congratulations! |
![]() The research group Information & Market Engineering headed by Prof. Weinhardt offers a cross-faculty thesis titled Dezentrales Handeln in Energiemärkten - Was kann die Blockchain [in German] starting January 2019, which will be co-supervised by us. The announcemend is aimed primarily at Master computer science students, but Bachelor students are also welcome to apply. |
![]() We contributed two articles to the latest KASTEL-Newsletter (in German). In the column "Insights into our Research" (p. 19) we give, as the name implies, a generally comprehensible overview of one of our latest publications, and in the news section (p. 22) we report on the recent Bro Workshop Europe. |
![]() On 18th and 19th of September our group hosted the first European Bro Workshop in cooperation with the International Computer Science Institute (ICSI). Bro is an open source network monitoring software project. |
![]() Our workshop submission Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryption has been published in the Lecture Notes in Computer Science. |
![]() Our survey Network Layer Aspects of Permissionless Blockchains has been published by the IEEE Journal "Communications Surveys & Tutorials". |
Neue Veröffentlichung: Network Layer Aspects of Permissionless Blockchains |
![]() You cannot longer register for the exam. The exam will be held on August 1st, 2018 at 10:30am in "Redtenbacher-Hörsaal". More information can be found on the lecture's homepage. |
![]() Our group hosts the first European Bro Workshop in September of this year. Bro is an open source network monitoring software project. Read more. |
![]() We're happy to announce that in the context of the "Tag der Informatik 2018" the master thesis of Matthias Grundmann has been awarded with the prize for the best application-related master thesis. The prize was sponsored by Robert Bosch GmbH. |
On April 19th and 20th, 2018 the PET-CON 2018.1 took place in Berlin. The workshop was organized by the special interest group Privacy Enhancing Technologies of the Gesellschaft für Informatik. From the DSN group our staff members Marc Leinweber and Matthias Grundmann participated in the workshop. |
2018/04/26: Start of the ACS-Lab The ACS-Lab starts today (2018/04/26). The Lab takes place at 2pm in SCC's F-Pool. |
2018/04/23: CBT 2018 Am 6. und 7. September findet in Barcelona im Anschluss an die ESORICS 2018 der Internationale Workshop Cryptocurrencies and Blockchain Technologies unter Mitwirkung von Prof. Hartenstein statt. |
2018/04/10: SoK Seminar The first meeting of the SoK seminar takes place on April 23rd, 2018 at 2pm in room 314 of building 20.21 (SCC). |
2018/04/06: Information regarding second IT-Security Management exam The second exam for IT-Security Management takes place on Wednesday, 2018/08/01, at 10:30 AM in the Redtenbacher-Lecture Hall. Further details concerning (de-)registration will follow in time. |
2018/04/04: New homepage online! The homepage of the research group has been reworked and is now online in its new form. |
