Dr.-Ing. Peter Amthor

Foto Peter Amthor

Curriculum Vitae:  pdf

Contact:

Phone:+49 (0) 3677 69 4163
Room:Zusebau 3029
eMail:peter.amthor[at]tu-ilmenau.de
 PGP public key
(66F6 C884 6F47 C94E 0B1C 2DF2 7B0B 0E90 0032 964E)
ORCID:
Matrix:@amthor:matrix.org
Mastodon:  @amthor@discuss.systems

Research

My research interests are in the application of formal methods for design, analysis, specification, and implementation of secure IT systems. This includes:

  • secure software applications
  • operating systems access control
  • privacy protection mechanisms
  • threat countermeasures

My research focus is on integrating such methods into a software engineering process that explicitly focuses mission-critical non-functional requirements such as security, safety and reliability. For this reason I am always interested in collaborating with related research areas.

Academic Services

  • Journal Reviewer for IEEE Access, Elsevier Computers & Security (active)
  • PC Member:
    • SECRYPT 2021–present
    • ARES (CyberTIM Workshop) 2020–2021
    • ICSOFT 2019–2020
    • EuroSys Shadow PC 2013
  • Assistant reviewer at D·A·CH Security 2011–2018, WI 2021
  • Publication Chair and Local Arrangements at NetSys 2025

Teaching

examING project logo

Projects:

As a subproject of examING, I am involved in the AutoPING project which aims at testing, integrating and evaluation competence-oriented and digitally supported teaching based on the autograding platform CodeOcean.

Awards:

  • 2023: TU Ilmenau Teaching Award (Lehrpreis der TU Ilmenau)
  • 2020: Special Award for Excellent Teaching at the Dept. of Computer Science and Automation (Lehrpreis der Fakultät IA für besonderes Engagement in der Lehre)
  • 2017: Best Elective Lecture Award at the Dept. of Computer Science and Automation (Lehrpreis der Fakultät IA für beste Wahlpflichtvorlesung) for Advanced Operating Systems

Regular Courses

Summer Terms:

  • Systems Security (200033)
  • Security Engineering (200035)
  • Seminars (Research Seminar/Hauptseminar/Proseminar, cf. your study program)

Winter Terms:

  • Betriebssysteme (200030)
    Lecture held by Prof. Koldehofe.
  • Advanced Operating Systems (200031)
    Awarded department's Best Elective Lecture in winter 2017/18.
  • Seminars (Research Seminar/Hauptseminar/Proseminar, cf. your study program)

Anytime:

  • RCSE Research Project (200741) and Group Studies
  • Bachelor and Master Thesis (see also here)

Publications

Find a detailed list here on Zotero.

2025

B. Koldehofe (ed.), F. Klingler (ed.), Ch. Sommer (ed.), K. A. Hummel (ed.), and P. Amthor (ed.), “Proceedings of the International Conference on Networked Systems 2025 (NetSys 2025): Technische Universität Ilmenau, 1 – 4 September 2025,” Aug. 2025, doi: 10.22032/DBT.66316.

S. Husung et al., “Future skills in engineering education: digitalization of skills-based learning and examination,” Oct. 2025, doi: 10.22032/DBT.67584.

M. L. Delouee, V. Degeler, P. Amthor, M. C. Schut, and B. Koldehofe, “Pattern-Level Privacy Protection in Event-Based Systems,” SN COMPUT. SCI., vol. 6, no. 8, p. 1014, Dec. 2025, doi: 10.1007/s42979-025-04574-1.

2024

R. Walther, C. Weinhold, P. Amthor, and M. Roitzsch, “Multi-Stakeholder Policy Enforcement for Distributed Systems,” in Proceedings of the 10th International Workshop on Container Technologies and Container Clouds, Hong Kong Hong Kong: ACM, Dec. 2024, pp. 7–12. doi: 10.1145/3702637.3702958.

M. Lotfian Delouee, V. Degeler, P. Amthor, and B. Koldehofe, “APP-CEP: Adaptive Pattern-level Privacy Protection in Complex Event Processing Systems,” in Proceedings of the 10th International Conference on Information Systems Security and Privacy, in ICISSP ’24. Rome, Italy: SCITEPRESS, 2024, pp. 486–497. doi: 10.5220/0012358700003648.

P. Amthor and R. Gorges, “A Composition Algebra for Decentralized Enforcement of Access Control Policies with an Application to Vehicular Networks:,” in Proceedings of the 21st International Conference on Security and Cryptography, Dijon, France: SCITEPRESS - Science and Technology Publications, 2024, pp. 78–90. doi: 10.5220/0012758900003767.

2023

M. Schlegel and P. Amthor, “Putting the Pieces Together: Model-Based Engineering Workflows for Attribute-Based Access Control Policies,” in E-Business and Telecommunications, vol. 1795, P. Samarati, M. van Sinderen, S. D. C. di Vimercati, and F. Wijnhoven, Eds., in Communications in Computer and Information Science (CCIS), vol. 1795. , Cham: Springer Nature Switzerland, 2023, pp. 249–280. doi: 10.1007/978-3-031-36840-0_12.

P. Amthor, U. Döring, D. Fischer, J. Genath, and G. Kreuzberger, “Erfahrungen bei der Integration des Autograding-Systems CodeOcean in die universitäre Programmierausbildung,” in Proceedings of the Sixth Workshop “Automatische Bewertung von Programmieraufgaben” (ABP 2023), Munich, October 12–13, 2023, Gesellschaft für Informatik e.V., 2023. doi: 10.18420/abp2023-9.

P. Amthor, “Language-Support for Correct and Reliable Enforcement of Access Control Policies,” presented at the Operating Systems SIG (FGBS) fall meeting of the German Computer Science Society (GI), Bamberg, Germany, Sept. 28, 2023. [Online]. Available: https://betriebssysteme.org/aktivitaeten/treffen/2023-bamberg.html

2021

M. Schlegel and P. Amthor, “The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis,” in Proceedings of the 18th International Conference on Security and Cryptography, S. D. C. di Vimercati and P. Samarati, Eds., in SECRYPT 2021. SciTePress, 2021, pp. 234–246. doi: 10.5220/0010556202340246.

2020

M. Schlegel and P. Amthor, “Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control Policies,” in Proceedings of the 17th International Conference on Security and Cryptography, P. Samarati, S. D. C. di Vimercati, M. S. Obaidat, and J. Ben-Othman, Eds., in SECRYPT 2020. SciTePress, 2020, pp. 431–442. doi: 10.5220/0009834304310442.

P. Amthor and M. Schlegel, “Towards Language Support for Model-based Security Policy Engineering,” in Proceedings of the 17th International Conference on Security and Cryptography, P. Samarati, S. D. C. di Vimercati, M. S. Obaidat, and J. Ben-Othman, Eds., in SECRYPT 2020. SciTePress, 2020, pp. 513–521. doi: 10.5220/0009893205130521.

2019

F. Wiemuth, P. Amthor, and W. E. Kühnhauser, “Static Termination Analysis for Event-driven Distributed Algorithms,” in Proceedings of the 13th ACM International Conference on Distributed and Event-based Systems, in DEBS ’19. New York, NY, USA: ACM, 2019, pp. 151–162. doi: 10.1145/3328905.3329500.

P. Amthor and M. Rabe, “Command Dependencies in Heuristic Safety Analysis of Access Control Models,” in Foundations and Practice of Security, in FPS 2019, vol. 12056. Cham: Springer International Publishing, 2019, pp. 207–224. doi: 10.1007/978-3-030-45371-8_13.

P. Amthor, D. Fischer, W. E. Kühnhauser, and D. Stelzer, “Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems,” in Proceedings of the 14th International Conference on Availability, Reliability and Security, in ARES ’19. New York, NY, USA: ACM, 2019, p. 86:1-86:10. doi: 10.1145/3339252.3340509.

P. Amthor, Aspect-oriented Security Engineering: A Model-based Approach. Göttingen, Germany: Cuvillier Verlag, 2019. [Online]. Available: https://cuvillier.de/de/shop/publications/7996-aspect-oriented-security-engineering

2018

P. Amthor, “Modellierung und formale Analyse von Betriebssystem-Sicherheitspolitiken,” presented at the Operating Systems SIG (FGBS) fall meeting of the German Computer Science Society (GI), Coburg, Germany, Oct. 2018. [Online]. Available: https://betriebssysteme.org/aktivitaeten/treffen/2018-coburg/index.html

P. Amthor, “An Aspect-oriented Approach to Model-based Security Engineering,” PhD Thesis, Technische Universität Ilmenau, Ilmenau, Germany, 2018.

2017

P. Amthor, “Efficient Heuristic Safety Analysis of Core-based Security Policies,” in Proceedings of the 14th International Conference on Security and Cryptography, in SECRYPT 2017. 2017, pp. 384–392. doi: 10.5220/0006477103840392.

2016

P. Amthor and W. E. Kühnhauser, “Privacy in sozialen Netzwerken: Eine Informationsflussanalyse,” in D· A· CH Security 2016, P. Horster and P. Schartner, Eds., Klagenfurt, AT: syssec Verlag, 2016, pp. 224–240.

2015

P. Amthor, “The Entity Labeling Pattern for Modeling Operating Systems Access Control,” in E-Business and Telecommunications: 12th International Joint Conference, ICETE 2015, Colmar, France, July 20–22, 2015, Revised Selected Papers, vol. 585, S. M. Obaidat and P. Lorenz, Eds., in Communications in Computer and Information Science (CCIS), vol. 585. , Cham: Springer International Publishing, 2016, pp. 270–292. doi: 10.1007/978-3-319-30222-5_13.

P. Amthor and W. E. Kühnhauser, “Security Policy Synthesis in Mobile Systems,” in Proceedings of the IEEE SERVICES 2015 Visionary Track: Security and Privacy Engineering Theme, in SPE ’15. Washington, DC, USA: IEEE Computer Society, 2015, pp. 189–197. doi: 10.1109/SERVICES.2015.36.

P. Amthor, “A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux,” in Proceedings of the 12th International Conference on Security and Cryptography, in SECRYPT 2015. 2015, pp. 88–99. doi: 10.5220/0005551000880099.

2014

P. Amthor, W. E. Kühnhauser, and A. Pölck, “WorSE: A Workbench for Model-based Security Engineering,” Elsevier Computers & Security, vol. 42, no. 0, pp. 40–55, 2014, doi: http://dx.doi.org/10.1016/j.cose.2014.01.002.

2013

P. Amthor, W. E. Kühnhauser, and A. Pölck, “Heuristic Safety Analysis of Access Control Models,” in Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, in SACMAT ’13. New York, NY, USA: ACM, 2013, pp. 137–148. doi: 10.1145/2462410.2462413.

P. Amthor and W. E. Kühnhauser, “Leichtgewichtige Sicherheitsdomänen für spontane Kooperationen,” in D· A· CH Security 2013, P. Horster and P. Schartner, Eds., Klagenfurt, AT: syssec Verlag, 2013, pp. 260–274.

2011

P. Amthor, W. E. Kühnhauser, and A. Pölck, “Model-based Safety Analysis of SELinux Security Policies,” in Proceedings of 5th International Conference on Network and System Security, P. Samarati, S. Foresti, J. Hu, and G. Livraga, Eds., in NSS ’11. IEEE, 2011, pp. 208–215. doi: 10.1109/ICNSS.2011.6060002.

2009

P. Amthor, A. Fischer, and W. E. Kühnhauser, “Analyse von Zugriffssteuerungssystemen,” in D· A· CH Security 2009, P. Horster and P. Schartner, Eds., Klagenfurt, AT: syssec Verlag, 2009, pp. 49–61.