Research and Publications

Automotive Security

IT security in vehicles is currently undergoing rapid change: new communication interfaces, technologies, and constantly evolving regulatory frameworks are influencing security in the automotive environment. This project investigates how novel requirements — such as real-time communication and post-quantum cryptography — can be meaningfully integrated. To this end, protocol analyses, security tests, and risk modeling are used. The project aims to generate relevant research results that will serve as a foundation for a doctoral dissertation.
The project is funded by Star Engineering GmbH.

Project website: Click here


End Device Security Proxy (ESP)

The project End Device Security Proxy (Endgeräte Security Proxy, ESP), funded by the Federal Ministry for Economic Affairs and Climate Action (BMWK), pursues the goal of retrofitting older industrial and IoT devices (so-called legacy devices) with modern security features. For this purpose, an End Device Security Proxy (ESP) is being developed, which is placed in front of the actual legacy device and takes over all security functions. A management component acts as an administration server that manages numerous ESPs, securely forwards data traffic, and coordinates software updates as well as system visualization.

Project website: Click here


Smart Factory Grids (SFG)

Smart Factory Grids is a research program funded by the German Research Foundation (DFG) at Esslingen University of Applied Sciences. It aims to achieve a visionary, dynamically distributed production environment within autonomous, adaptive, and resilient systems. One focus is on network security and real-time communication to enable highly flexible processes and short setup times in networked manufacturing systems. The program also analyzes complex dependency relationships in industrial environments to ensure the reliability and performance of distributed production structures. As an interdisciplinary research network, it provides innovative momentum for the Baden-Württemberg industrial region and for the future development of global manufacturing.

Project website: Click here


FH-Personal

Esslingen University of Applied Sciences is participating in the BMBF project “Qualification and Development of Professorial Staff at Esslingen University of Applied Sciences for Pioneering Topics,” which is part of the federal–state funding program “FH-Personal.” As part of this project, subject-specific clusters were formed in which professors, doctoral candidates, and postdocs work together with companies and universities on future-oriented topics. One of these focus areas is IT security, in which Prof. Dr. Heer, in close cooperation with Prof. Dr. Menth (University of Tübingen), conducts research to develop innovative solutions for the secure operation of modern, networked systems.

Project website: Click here

University of Tübingen (Prof. Dr. Michael Menth)

In close collaboration with the University of Tübingen under the direction of Prof. Dr. Michael Menth, we conduct research on network security and real-time networking. The main focus is on joint doctoral projects aimed at developing innovative solutions for highly secure and low-latency communication.

Website Chair of Communication Networks: Click here


Star Corporation

Together with Star Corporation, we are investigating the integration of post-quantum cryptography (PQC) in the automotive sector. The goal is to identify and test future-proof security mechanisms in order to effectively protect vehicles against emerging threats.

Website: Click here


Belden Inc. / Hirschmann Automation and Control GmbH

Together with Hirschmann Automation and Control, a Belden company, we are researching security concepts for industrial networks and real-time communication. The focus is on securing Industrial Ethernet and ensuring strict performance requirements in order to meet the growing demands of Industry 4.0.

Website: Click here

2026
  • N. Lohmiller, L. Köder, B. Buck, P. Schmieder, M. Menth, and T. Heer: “Post-Quantum (In)Security of Current Wi-Fi Networks,” in Sicherheit, Hamburg, Germany, Mar. 2026.
  • L. Popperl, S. Müller, T. Klippel, L. Bechtel, and T. Heer: “REFLECT: The REsilient Factory for Learning sEcurity in Control Traffic,” in Konferenz für Angewandte Automatisierungstechnik in Lehre und Entwicklung an Hochschulen (AALE), Rosenheim, Germany, Feb. 2026.
2025
  • L. Bechtel, M. Schramm, M. Menth and T. Heer, "Time-Limited Software Firewall Based on DPDK Supporting TSN and DetNet Traffic," in IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Porto, Portugal, Sep. 2025, doi: 10.1109/ETFA65518.2025.11205609. PDF
  • S. Kaniewski, L. Bechtel, P. Kneisel, M. Menth and T. Heer, "Security Gateway for Automated Micro-Segmentation and VPN Encryption in Industrial Legacy Systems," in IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Porto, Portugal, Sep. 2025, doi: 10.1109/ETFA65518.2025.11205588. PDF
  • S. Müller, L. Popperl, L. Bechtel, and T. Heer, “Generating Resilient Network Models with GeNESIS,“ in Workshop on Resilient Networks and Systems (ReNeSys), Illmenau, Germany, Sep. 2025.
  • L. Bechtel, S. Müller, M. Menth, and T. Heer, “Transforming the Network into a Filter: Distributed Firewall Rules for Time-Critical Traffic,“ in IEEE International Conference on Factory Communication Systems (WFCS), Rostock, Germany, Jun. 2025, doi: 10.1109/WFCS63373.2025.11077639. PDF
  • M. Schramm, L. Bechtel, F. Hoss, M. Menth, and T. Heer, “IoTWall: An Efficient Host-Based Firewall for Resource-Constrained IoT Devices,” in IEEE International Conference on Factory Communication Systems (WFCS), Rostock, Germany, Jun. 2025, doi: 10.1109/WFCS63373.2025.11077655. PDF
  • L. Bechtel, J. Ruppert, R. Hummen, and T. Heer, “Network Automation with Flow-Based Programming: A Case Study with Node-RED,” in Computation and Communication for Smart Systems Symposium (C2S3), Esslingen, Germany, Apr. 2025, doi: 10.1007/978-3-032-10569-1_9.
  • B. Buck, and T. Heer, “Unmasking SSH Attackers: A Study on Brute-Force Attempts and Cryptographic Usage,” in Computation and Communication for Smart Systems Symposium (C2S3), Esslingen, Germany, Apr. 2025, doi: 10.1007/978-3-032-10569-1_8.
  • N. Lohmiller, H. Weise, and T. Heer, “Security Analysis of Hardware Electric Vehicle Charging Infrastructure,” in Computation and Communication for Smart Systems Symposium (C2S3), Esslingen, Germany, Apr. 2025, doi: 10.1007/978-3-032-10569-1_2.
  • S. Müller, L. Popperl, L. Bechtel, and T. Heer, “How to Tame GeNESIS: A Tutorial for Utilizing GeNESIS to Simulate Realistic Industrial Evaluation Scenarios,“ in Computation and Communication for Smart Systems Symposium (C2S3), Esslingen, Germany, Apr. 2025, doi: 10.1007/978-3-032-10569-1_4.
  • M. Schramm, N. Lohmiller, S. Kaniewski, and T. Heer, “I Still Know Who You Scanned Last Summer: An Update on the Landscape of Internet Scanners,” in Computation and Communication for Smart Systems Symposium (C2S3), Esslingen, Germany, Apr. 2025, doi: 10.1007/978-3-032-10569-1_5.
  • L. Bechtel, M. Schramm, L. Popperl, and T. Heer, “Scalable Cybersecurity Training: Integrating Virtual and Physical Security Teaching Environments,” in KuVS Workshop on Network Softwarization (KuVS NetSoft), Tübingen, Germany, Apr. 2025, doi: 10.15496/publikation-105114. PDF
  • L. Bechtel, S. Müller, L. Popperl, and T. Heer, “Challenges for the Security, Robustness, and Performance of Industrial Networks in Modular and Flexible Automation Environments,“ in Collaborative Research Advancing Engineering Solutions for Real-World Challenges 2, Esslingen, Germany, Mar. 2025, doi: 10.1007/978-3-031-79093-5_8.
  • N. Lohmiller, S. Kaniewski, M. Menth, and T. Heer, “A Survey of Post-Quantum Cryptography Migration in Vehicles,” IEEE Access, Jan. 2025, doi: 10.1109/ACCESS.2025.3528562.
2024
  • S. Kaniewski, D. Holstein, F. Schmidt, and T. Heer, “Vulnerability Handling of AI-Generated Code – Existing Solutions and Open Challenges,” in Conference on Artificial Intelligence x Science, Engineering, and Technology (AIxSET), Laguna Hills, California, USA, Oct. 2024, doi: 10.1109/AIxSET62544.2024.00026. PDF
  • L. Bechtel, S. Müller, M. Menth, and T. Heer, “GeNESIS: Generator for Network Evaluation Scenarios of Industrial Systems,” in IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Padova, Italy, Sep. 2024, doi: 10.1109/ETFA61755.2024.10710752. PDF
  • S. Kaniewski, L. Bechtel, M. Menth, and T. Heer, “Monitoring IP-ID Behavior for Spoofed IPv4 Traffic Detection,” in IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Padova, Italy, Sep. 2024, doi: 10.1109/ETFA61755.2024.10710708. PDF
  • L. Osswald, S. Lindner, L. Bechtel, T. Heer, and M. Menth, “Secure Resource Allocation Protocol (SecRAP) for Time-Sensitive Networking,” in IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Padova, Italy, Sep. 2024, doi: 10.1109/ETFA61755.2024.10711053. PDF
  • J. Mayer, M. Schramm, L. Bechtel, N. Lohmiller, S. Kaniewski, M. Menth, and T. Heer, “I Know Who You Scanned Last Summer: Mapping the Landscape of Internet-Wide Scanners,” in IFIP Networking, Thessaloniki, Greece, Jun. 2024, doi: 10.23919/IFIPNetworking62109.2024.10619808. PDF
2022
  • L. Wüsteney, D. Hellmanns, M. Schramm, L. Osswald, R. Hummen, M. Menth, and T. Heer, “Analyzing and modeling the latency and jitter behavior of mixed industrial TSN and DetNet networks,” in International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Roma, Italy, Dec. 2022, doi: 10.1145/3555050.3569138. PDF
  • R. Müller, J. Ruppert, K. Will, L. Wüsteney, and T. Heer, “Analyzing the Software Patch Discipline Across Different Industries and Countries,” 球探比分网 und Datensicherheit — DuD, vol. 46, no. 5, May 2022, doi: 10.1007/s11623-022-1602-y.
  • R. Müller, J. Ruppert, K. Will, L. Wüsteney, and T. Heer, “Analyzing the Software Patch Discipline Across Different Industries and Countries,” in Sicherheit, Karlsruhe, Germany, Apr. 2022, doi: 10.18420/sicherheit2022_10.
2021
  • L. Osswald, S. Lindner, L. Wüsteney, and M. Menth, “RAP Extensions for the Hybrid Configuration Model,” in IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Västerås, Sweden, Sep. 2021, doi: 10.1109/ETFA45728.2021.9613246. PDF
  • L. Wusteney, M. Menth, R. Hummen, and T. Heer, “Impact of Packet Filtering on Time-Sensitive Networking Traffic,” in IEEE International Conference on Factory Communication Systems (WFCS), Linz, Austria, Jun. 2021, doi: 10.1109/WFCS46889.2021.9483611. PDF
2025
  • E. Belgiovine, B. Buck, N. Lohmiller, and T. Heer, "Warum Fileless Malware klassische Abwehrmechanismen aushebelt" in Security Insider, Germany, Oct. 2025. Online
2024
  • D. Holstein, N. Lohmiller, L. Bechtel, and T. Heer, "KI und das Durchführen von Phishing und Social-Engineering," in Computer & Automation, Germany, Sep. 2024. Online
  • D. Holstein, N. Lohmiller, L. Bechtel, and T. Heer, "KI und die Generierung von Malware," in Computer & Automation, Germany, Aug. 2024. Online
  • D. Holstein, N. Lohmiller, L. Bechtel, and T. Heer, "ChatGPT und die Code-Analyse," in Computer & Automation, Germany, Jul. 2024. Online
apply

Interested? Find out more! about our degree programmes