Alireza Aghabagherloo, Roozbeh Sarenche, Maryam Zarezadeh, Bart Preneel, Stefan Köpsell, Priv-PFL: A Privacy-Preserving and Efficient Personalized Federated Learning Approach, The Deep Learning Security and Privacy Workshop (DLSP 2025), 2025
Methodologies for Trustworthiness

The empirical determination of system properties, for example by testing software, is very limited in its informative value. Trustworthiness must already be considered in the system specification and in the system design process. This requires new methods that can be used to incorporate the desired level of trustworthiness into the system specification. These methods must be implementable using procedures that can be automated and executed by machines.
The work on these methods aims to design systems that are trustworthy from the outset ("by design") in the long term. To achieve this, BI relies on formal methods, which involve rigorous mathematical considerations and proofs, rather than empirical procedures such as measurements or tests.
As a general principle, the BI pursues a holistic approach that spans multiple phases of the lifecycle of these systems - from standardization, design and implementation through to deployment and runtime.
As a general principle, BI pursues a holistic approach that covers several phases of the life cycle of these systems - from standardization, design and implementation to deployment and runtime. Our current focus is on methods for the design and implementation of trustworthy systems. Specifically, these are methods for the formal and automatable specification of systems, programming languages and compilers that implement these specifications, and methods for the formal verification of the results generated by the compiler. These topics are dealt with by the groups Trustworthy Data Processing, Verified System Design Automation and Trustworthy Computing.
Publications
Prajnamaya Dass, µ-Trust: Trustworthy and Transparent Service Composition for Microservice-Based IoT Systems, IEEE Systems Journal, 2025
Padmanava Sen, Prajnamaya Dass, Stefan Köpsell, Gerhard Fettweis, RF Hardware Reconfigurability for Privacy-Preserving Integrated Sensing and Communication, 5th IEEE International Symposium on Joint Communications & Sensing (JC&S), 2025
Yevhen Zolotavkin, Yurii Baryshev, Jannik Mähn, Vitalii Lukichov, Stefan Köpsell, Optimal obfuscation of awareness messages: Improving users’ unlinkability in Intelligent Transport Systems, Computer Networks, 2025
Kenneth-Raphael Keil, Ricardo Bochnia, Ivan Gudymenko, Stefan Köpsell, Jürgen Anke, Gaining Back the Control Over Identity Attributes: Access Management Systems Based on Self-Sovereign Identity, Open Identity Summit 2024, 2024
Prajnamaya Dass, Marcel Daniel Sven Kevin Gräfenstein, Stefan Köpsell, Navigating Privacy Challenges in Mission Critical Communication: Insights for 6G Networks, 29th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2024
Prajnamaya Dass, Sonika Ujjwal, Jiri Novotny, Yevhen Zolotavkin, Zakaria Laaroussi, Stefan Köpsell, Addressing Privacy Concerns in Joint Communication and Sensing for 6G Networks: Challenges and Prospects, 12th Annual Privacy Forum (APF), 2024
Sebastian Ertel, Max Kurze, Michael Raitza, On the Potential of Coq as the Platform of Choice for Hardware Design, Coq Workshop, 2024
Muhammad Umar, et. al., A Low-Cost 60 GHz Modular Front-end Design for Channel Sounding, IEEE Transactions on Components, Packaging and Manufacturing Technology, 2024
Ghazal Bagheri, Ali Khandan Boroujeni, Stefan Köpsell, Machine Learning-Based Vector Quantization for Secret Key Generation in Physical Layer Security, Global Information Infrastructure and Networking Symposium (GIIS'24), 2024
Ali Khandan Boroujeni, Ghazal Bagheri, Stefan Köpsell, Enhancing Frequency Hopping Security in ISAC Systems: A Physical Layer Security Approach, 4th IEEE International Symposium on Joint Communications & Sensing (JC&S 2024), 2024
Stefano Tomasin, Hongliang Zhang, Arsenia Chorti, Vincent Poor, Challenge-Response Physical Layer Authentication Over Partially Controllable Channels, IEEE Communications Magazine, 2022 , Download PDF
Miroslav Mitev, André Barreto, Minh Thuy Pham, Maximilian Matthé, Gerhard Fettweis, Filterbank Secret Key Generation Rates in Multipath Channels, IEEE Global Communications Conference (Globecom) 2022, 2022 , Download PDF
Miroslav Mitev, Arsenia Chorti, Mahdi Shakiba-Herfeh, Martin Reed, Sajjad Baghaee, A Physical Layer, Zero-round-trip-time, Multi-factor Authentication Protocol, IEEE Access, 2022
Miroslav Mitev, André Barreto, Minh Thuy Pham, Gerhard Fettweis, Secret Key Generation Rates over Frequency Selective Channels, IEEE Vehicular Technology Conference (VTC-Spring), 2022 , Download PDF
Arsenia Chorti, André Barreto, Stefan Köpsell, Marco Zoli, Marwa Chafii, Philippe Sehier, Gerhard Fettweis, Vincent Poor, Context-Aware Security for 6G Wireless: The Role of Physical Layer Security, IEEE Communications Standards Magazine, 2022
Minh Thuy Pham, André Barreto, Miroslav Mitev, Maximilian Matthé, Gerhard Fettweis, Secure Communications in Line-of-Sight Scenarios by Rotation-based Secret Key Generation, IEEE International Conference on Communications (ICC), 2022 , Download PDF
Simone del Prete, Franco Fuschini, Marina Barbirolli, Marco Zoli, André Barreto, A Study on Physical Layer Security Through Ray Tracing Simulations, European Conference on Antennas and Propagation (EUCAP), 2022
Alessandro Santorsola, Marco Zoli, André Barreto, Vincenzo Petruzzelli, Giovanna Calò, Effect of Radio Channel and Antennas on Physical-Layer-Security Key Exchange, IEEE Access, 2021 , Download PDF
Miroslav Mitev, Arsenia Chorti, Elena Belmega, Vincent Poor, Protecting physical layer secret key generation from active attacks, MDPI Entropy, 2021
Marco Zoli, Miroslav Mitev, André Barreto, Gerhard Fettweis, Estimation of the Secret Key Rate in Wideband Wireless Physical-Layer-Security, International Symposium on Wireless Communication Systems (ISWCS), 2021 , Download PDF
Marco Zoli, André Barreto, Gerhard Fettweis, Investigating the eavesdropper attack in physical layer security wireless key generation: a simulation case study, IEEE Vehicular Technology Conference (VTC-Spring), 2021
Stephan Escher, Markus Sontowski, Stefan Köpsell, How well can your car be tracked: Analysis of the European C-ITS pseudonym scheme, Proceedings VTC2021-Spring, 2021
Saumya Dwivedi, Marco Zoli, André Barreto, Padmanava Sen, Gerhard Fettweis, Secure Joint Communications and Sensing using Chirp Modulation, 6G Wireless Summit (6G SUMMIT), 2020 , Download PDF
Tim Lackorzynski, Gregor Garten, Jan Sönke Huster, Stefan Köpsell, Hermann Härtig, Enabling and Optimizing MACsec for Industrial Environments, Proc. 16th IEEE International Conference on Factory Communication Systems (WFCS), 2020
Marco Zoli, André Barreto, Stefan Köpsell, Padmanava Sen, Gerhard Fettweis, Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation, EURASIP Journal on Wireless Communications and Networking, 2020 , Download PDF