
Univ.-Prof. Dr. Koldehofe, Boris
Fachgebietsleiter
Technische Universität Ilmenau |
Department of Computer Science and Automation |
Distributed and Operating Systems Group |
|
Visiting address: | Mail address: |
Helmholtzplatz 5 | P.O. Box 10 05 65 |
98693 Ilmenau | 98684 Ilmenau |

Curriculum Vitae: pdf
Contact:
| Phone: | +49 (0) 3677 69 4163 |
| Room: | Zusebau 3029 |
| eMail: | peter.amthor[at]tu-ilmenau.de |
| PGP public key (66F6 C884 6F47 C94E 0B1C 2DF2 7B0B 0E90 0032 964E) | |
| ORCID: | |
| Matrix: | @amthor:matrix.org |
| Mastodon: | @amthor@discuss.systems |
My research interests are in the application of formal methods for design, analysis, specification, and implementation of secure IT systems. This includes:
My research focus is on integrating such methods into a software engineering process that explicitly focuses mission-critical non-functional requirements such as security, safety and reliability. For this reason I am always interested in collaborating with related research areas.
Projects:
As a subproject of examING, I am involved in the AutoPING project which aims at testing, integrating and evaluation competence-oriented and digitally supported teaching based on the autograding platform CodeOcean.
Awards:
Summer Terms:
Winter Terms:
Anytime:
Find a detailed list here on Zotero.
B. Koldehofe (ed.), F. Klingler (ed.), Ch. Sommer (ed.), K. A. Hummel (ed.), and P. Amthor (ed.), “Proceedings of the International Conference on Networked Systems 2025 (NetSys 2025): Technische Universität Ilmenau, 1 – 4 September 2025,” Aug. 2025, doi: 10.22032/DBT.66316.
S. Husung et al., “Future skills in engineering education: digitalization of skills-based learning and examination,” Oct. 2025, doi: 10.22032/DBT.67584.
M. L. Delouee, V. Degeler, P. Amthor, M. C. Schut, and B. Koldehofe, “Pattern-Level Privacy Protection in Event-Based Systems,” SN COMPUT. SCI., vol. 6, no. 8, p. 1014, Dec. 2025, doi: 10.1007/s42979-025-04574-1.
R. Walther, C. Weinhold, P. Amthor, and M. Roitzsch, “Multi-Stakeholder Policy Enforcement for Distributed Systems,” in Proceedings of the 10th International Workshop on Container Technologies and Container Clouds, Hong Kong Hong Kong: ACM, Dec. 2024, pp. 7–12. doi: 10.1145/3702637.3702958.
M. Lotfian Delouee, V. Degeler, P. Amthor, and B. Koldehofe, “APP-CEP: Adaptive Pattern-level Privacy Protection in Complex Event Processing Systems,” in Proceedings of the 10th International Conference on Information Systems Security and Privacy, in ICISSP ’24. Rome, Italy: SCITEPRESS, 2024, pp. 486–497. doi: 10.5220/0012358700003648.
P. Amthor and R. Gorges, “A Composition Algebra for Decentralized Enforcement of Access Control Policies with an Application to Vehicular Networks:,” in Proceedings of the 21st International Conference on Security and Cryptography, Dijon, France: SCITEPRESS - Science and Technology Publications, 2024, pp. 78–90. doi: 10.5220/0012758900003767.
M. Schlegel and P. Amthor, “Putting the Pieces Together: Model-Based Engineering Workflows for Attribute-Based Access Control Policies,” in E-Business and Telecommunications, vol. 1795, P. Samarati, M. van Sinderen, S. D. C. di Vimercati, and F. Wijnhoven, Eds., in Communications in Computer and Information Science (CCIS), vol. 1795. , Cham: Springer Nature Switzerland, 2023, pp. 249–280. doi: 10.1007/978-3-031-36840-0_12.
P. Amthor, U. Döring, D. Fischer, J. Genath, and G. Kreuzberger, “Erfahrungen bei der Integration des Autograding-Systems CodeOcean in die universitäre Programmierausbildung,” in Proceedings of the Sixth Workshop “Automatische Bewertung von Programmieraufgaben” (ABP 2023), Munich, October 12–13, 2023, Gesellschaft für Informatik e.V., 2023. doi: 10.18420/abp2023-9.
P. Amthor, “Language-Support for Correct and Reliable Enforcement of Access Control Policies,” presented at the Operating Systems SIG (FGBS) fall meeting of the German Computer Science Society (GI), Bamberg, Germany, Sept. 28, 2023. [Online]. Available: https://betriebssysteme.org/aktivitaeten/treffen/2023-bamberg.html
M. Schlegel and P. Amthor, “The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis,” in Proceedings of the 18th International Conference on Security and Cryptography, S. D. C. di Vimercati and P. Samarati, Eds., in SECRYPT 2021. SciTePress, 2021, pp. 234–246. doi: 10.5220/0010556202340246.
M. Schlegel and P. Amthor, “Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control Policies,” in Proceedings of the 17th International Conference on Security and Cryptography, P. Samarati, S. D. C. di Vimercati, M. S. Obaidat, and J. Ben-Othman, Eds., in SECRYPT 2020. SciTePress, 2020, pp. 431–442. doi: 10.5220/0009834304310442.
P. Amthor and M. Schlegel, “Towards Language Support for Model-based Security Policy Engineering,” in Proceedings of the 17th International Conference on Security and Cryptography, P. Samarati, S. D. C. di Vimercati, M. S. Obaidat, and J. Ben-Othman, Eds., in SECRYPT 2020. SciTePress, 2020, pp. 513–521. doi: 10.5220/0009893205130521.
F. Wiemuth, P. Amthor, and W. E. Kühnhauser, “Static Termination Analysis for Event-driven Distributed Algorithms,” in Proceedings of the 13th ACM International Conference on Distributed and Event-based Systems, in DEBS ’19. New York, NY, USA: ACM, 2019, pp. 151–162. doi: 10.1145/3328905.3329500.
P. Amthor and M. Rabe, “Command Dependencies in Heuristic Safety Analysis of Access Control Models,” in Foundations and Practice of Security, in FPS 2019, vol. 12056. Cham: Springer International Publishing, 2019, pp. 207–224. doi: 10.1007/978-3-030-45371-8_13.
P. Amthor, D. Fischer, W. E. Kühnhauser, and D. Stelzer, “Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems,” in Proceedings of the 14th International Conference on Availability, Reliability and Security, in ARES ’19. New York, NY, USA: ACM, 2019, p. 86:1-86:10. doi: 10.1145/3339252.3340509.
P. Amthor, Aspect-oriented Security Engineering: A Model-based Approach. Göttingen, Germany: Cuvillier Verlag, 2019. [Online]. Available: https://cuvillier.de/de/shop/publications/7996-aspect-oriented-security-engineering
P. Amthor, “Modellierung und formale Analyse von Betriebssystem-Sicherheitspolitiken,” presented at the Operating Systems SIG (FGBS) fall meeting of the German Computer Science Society (GI), Coburg, Germany, Oct. 2018. [Online]. Available: https://betriebssysteme.org/aktivitaeten/treffen/2018-coburg/index.html
P. Amthor, “An Aspect-oriented Approach to Model-based Security Engineering,” PhD Thesis, Technische Universität Ilmenau, Ilmenau, Germany, 2018.
P. Amthor, “Efficient Heuristic Safety Analysis of Core-based Security Policies,” in Proceedings of the 14th International Conference on Security and Cryptography, in SECRYPT 2017. 2017, pp. 384–392. doi: 10.5220/0006477103840392.
P. Amthor and W. E. Kühnhauser, “Privacy in sozialen Netzwerken: Eine Informationsflussanalyse,” in D· A· CH Security 2016, P. Horster and P. Schartner, Eds., Klagenfurt, AT: syssec Verlag, 2016, pp. 224–240.
P. Amthor, “The Entity Labeling Pattern for Modeling Operating Systems Access Control,” in E-Business and Telecommunications: 12th International Joint Conference, ICETE 2015, Colmar, France, July 20–22, 2015, Revised Selected Papers, vol. 585, S. M. Obaidat and P. Lorenz, Eds., in Communications in Computer and Information Science (CCIS), vol. 585. , Cham: Springer International Publishing, 2016, pp. 270–292. doi: 10.1007/978-3-319-30222-5_13.
P. Amthor and W. E. Kühnhauser, “Security Policy Synthesis in Mobile Systems,” in Proceedings of the IEEE SERVICES 2015 Visionary Track: Security and Privacy Engineering Theme, in SPE ’15. Washington, DC, USA: IEEE Computer Society, 2015, pp. 189–197. doi: 10.1109/SERVICES.2015.36.
P. Amthor, “A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux,” in Proceedings of the 12th International Conference on Security and Cryptography, in SECRYPT 2015. 2015, pp. 88–99. doi: 10.5220/0005551000880099.
P. Amthor, W. E. Kühnhauser, and A. Pölck, “WorSE: A Workbench for Model-based Security Engineering,” Elsevier Computers & Security, vol. 42, no. 0, pp. 40–55, 2014, doi: http://dx.doi.org/10.1016/j.cose.2014.01.002.
P. Amthor, W. E. Kühnhauser, and A. Pölck, “Heuristic Safety Analysis of Access Control Models,” in Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, in SACMAT ’13. New York, NY, USA: ACM, 2013, pp. 137–148. doi: 10.1145/2462410.2462413.
P. Amthor and W. E. Kühnhauser, “Leichtgewichtige Sicherheitsdomänen für spontane Kooperationen,” in D· A· CH Security 2013, P. Horster and P. Schartner, Eds., Klagenfurt, AT: syssec Verlag, 2013, pp. 260–274.
P. Amthor, W. E. Kühnhauser, and A. Pölck, “Model-based Safety Analysis of SELinux Security Policies,” in Proceedings of 5th International Conference on Network and System Security, P. Samarati, S. Foresti, J. Hu, and G. Livraga, Eds., in NSS ’11. IEEE, 2011, pp. 208–215. doi: 10.1109/ICNSS.2011.6060002.
P. Amthor, A. Fischer, and W. E. Kühnhauser, “Analyse von Zugriffssteuerungssystemen,” in D· A· CH Security 2009, P. Horster and P. Schartner, Eds., Klagenfurt, AT: syssec Verlag, 2009, pp. 49–61.