CISPA is currently in the founding process to join the German Helmholtz Association as a new member. It is consequently undergoing significant organizational changes, which are not yet reflected on this webpage.

For further information on the above mentioned founding process, please refer to the official press release by the State Chancellery of Saarland.

Recent News on the Transformation Process


The location of the first construction phase has been agreed upon. For further information, please refer to the official press release .

Trustworthy information processing


The trustworthy information processing research area target the development of rigorous algorithmic and system approaches to enable a trustworthy and accountable processing of data. Examples include accurate, privacy-friendly data acquisition; secure computation of privacy-sensitive information; rigorous cryptographic operations to ensure a trustworthy behaviour in malicious environments; and developing technical means for holding people accountable in case of misbehavior.


A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange

FairTest: Discovering Unwarranted Associations in Data-Driven Applications

SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks

A promising semantics for relaxed-memory concurrency

Security Analysis of Cache Replacement Policies

Training Fair Classifiers

Uncovering the Spatiotemporal Patterns of Collective Social Activity

Distilling Information Reliability and Source Trustworthiness from Digital Traces

Fairness Beyond Disparate Treatment & Disparate Impact: Learning Classification without Disparate Mistreatment

A privacy-preserving reputation system with user rewards

State Space Search Nogood Learning: Online Refinement of Critical-Path Dead-End Detectors in Planning

A Domain Based Approach to Social Relation Recognition

Qapla: Policy compliance for database-backed systems

Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training

Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective

Predicting the Category and Attributes of Visual Search Targets Using Deep Gaze Pooling

Two Message Oblivious Evaluation of Cryptographic Functionalities

T3: Comprehensive policy compliance in data retrieval systems

RamCrypt: Kernel-based Address Space Encryption for User-mode Processes

Anonymisierung, Pseudonymisierung und Transparenz für Big Data. Technische Herausforderungen und Regelung in der Datenschutz-Grundverordnung

How to Make ASLR Win the Clone Wars: Runtime Re-Randomization

Attributbasierte Verschlüsselung für die Justiz

Ersetzendes Scannen - Kernelement im Gesamtkonzept einer elektronischen Aktenführung?

Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys

Estimating Diffusion Networks: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm

Smart Mobility für das Saarland: Identifikation von Chancen und Handlungsempfehlungen für eine digital vernetzte Mobilität

Confidentiality and Authenticity for Distributed Version Control Systems — A Mercurial Extension

Goal Probability Analysis in Probabilistic Planning: Exploring and Enhancing the State of the Art

Practical Undoability Checking via Contingent Planning

Partial Delete Relaxation, Unchained: On Intractable Red-Black Planning and Its Applications

Loss Functions for Top-k Error: Analysis and Insights

On the Wisdom of Experts vs. Crowds: Discovering Trustworthy Topical News in Microblogs

Distinguishing between Topical and Non-Topical Information Diffusion Mechanisms in Social Media

Message Impartiality in Social Media Discussions

Dissemination Biases of Social Media Channels: On the Topical Coverage of Socially Shared News

Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data

On the Efficiency of the Information Networks in Social Media

Strengthening Weak Identities Through Inter-Domain Trust Transfer

Runtime Verification for HyperLTL

Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information