Univ.-Prof. Dr. Rainer Böhme
Professor

E-mailrainer.boehme@uibk.ac.at
Phone+43 512 507-53202
Phone (PA)+43 512 507-53494
Fax+43 512 507-53018
AddressTechnikerstraße 21A, 6020 Innsbruck, Austria
OfficeICT 3N02
Univ.-Prof. Dr. Rainer Böhme

News

  • I am honored to co-host Advances in Financial Technologies (AFT) 2024 at the Austrian National Bank (OeNB) in the center of Vienna this September. After MIT and Princeton, this leading conference is back in Europe and for the first time co-located with the Economics of Payments XIII conference, where central bankers and economists meet to discuss research on payment, clearing and settlement systems. Read the AFT’24 Call for Papers and Workshop Proposals and submit your best work. Submissions are due on May 15th (abstracts) and May 22nd (papers).
  • I have spent part of my sabbatical in the 2023 summer term at MIT’s Digital Currency Initiative, working on CBDC privacy.
  • I was appointed BIS Research Fellow to help exploring the technical design space for Central Bank Digital Currency (CBDC). Our proposal for a CBDC pyramid to guide technology policy decisions has appeared in the BIS Quartely Review. A follow-up working paper calls for a technology that upgrades money without disrupting the monetary system. The most recent essay maps out the privacy landscape for CBDC.
  • The German banking supervisor BaFin has commissioned us to study how the disaggregation of value chains in payments may effect IT security. A summary of our results has appeared in their online magazine (in German only).
  • I spoke at the Actuarial Research Conference. My recorded statement on cyber risk related to virtual assets is here.
  • Can humans distinguish between images of real faces and those generated by latest generation GANs? Find out in our paper co-authored with neuroscientists and signal processing experts.

Research Interests

  • Digital forensics
  • Virtual currencies and cryptographic financial instruments
  • Privacy-enhancing technologies (PET)
  • Economic and behavioral aspects of information security and privacy
  • Cybercrime research
  • Steganography and steganalysis

Positions

since 03/2015 Professor for Security and Privacy, Department of Computer Science, University of Innsbruck, Austria
2023 Visiting Professor, Media Lab, Massachusetts Institute of Technology, USA
2010 – 2015 Assistant Professor, Department of Information Systems, University of Münster, Germany
2009 – 2010 Postdoctoral Fellow, Networking and Security Group, International Computer Science Institute, Berkeley, California, USA
2007 – 2009 Research Assistant, Chair of Privacy and Data Security (Prof. Dr. Andreas Pfitzmann), Technische Universität Dresden, Germany
2005 – 2007 Research Analyst, Directorate General Economics, European Central Bank, Frankfurt am Main, Germany

Education

2008 Ph.D. (Dr.-Ing.) in Computer Science, Technische Universität Dresden, Germany
1998 – 2003 M.A. in Communications, Economics and Computer Science, Technische Universität Dresden, Germany
1999 – 2000 Communication publique et politique, Erasmus exchange, Université Paris XII, France

Publications

This list is broadly structured by topic. See Google Scholar for crawler-based bibliometrics and DBLP for a chronological order of my computer science papers.

Most Recent

  • Auer, R., Böhme, R., Clark, J., and Demirag, D. Mapping the Privacy Landscape for Central Bank Digital Currencies. Communications of the ACM, 66, 3 (2023), 46–53. [Publisher]
  • Abramova, S. and Böhme, R. Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case. In USENIX Security Symposium. USENIX Association, 2023, pp. 715–732. [Publisher] [Preprint] [Video]
  • Woods, D.W., Böhme, R., Wolff, J., and Schwarcz, D. Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys. In USENIX Security Symposium. USENIX Association, 2023, pp. 2259–2273. [Publisher] [Preprint] [Video]
  • Schlögl, A., Hofer, N., and Böhme, R. Causes and Effects of Unanticipated Numerical Deviations in Neural Network Inference Frameworks. In Conference on Neural Information Processing Systems (NeurIPS). New Orleans, LA, 2023. [PDF] [Publisher] [Video]
  • Pesch, P.J. and Böhme, R. Artpocalypse now? Generative KI und die Vervielfältigung von Trainingsbildern [Generative AI and the reproduction of training images]. Gewerblicher Rechtsschutz und Urheberrecht (GRUR), (2023), 997–1007.
  • Pesch, P.J. and Böhme, R. ChatGPT & Co. unter der DSGVO – Verarbeitung personenbezogener Daten und Datenrichtigkeit bei großen Sprachmodellen [ChatGPT & Co under GDPR: Processing and correctness of personal data in large language models]. Multimedia und Recht (MMR), 26, 12 (2023), 913–923.
  • Makridis, C.A., Fröwis, M.A., Sridhar, K., and Böhme, R. The Rise of Decentralized Cryptocurrency Exchanges: Evaluating the Role of Airdrops and Governance Tokens. Journal of Corporate Finance, 79, 102358 (April 2023). [Publisher]
  • Arce, D., Woods, D.W., and Böhme, R. Economics of Incident Response Panels in Cyber Insurance. Computers & Security, 140, (May 2024). [Publisher]

Digital Currency and Cryptographic Financial Instruments

  • Abramova, S., Böhme, R., Elsinger, H., Stix, H., and Summer, M. What Can CBDC Designers Learn from Asking Potential Users? In Symposium on Usable Privacy and Security (SOUPS). Anaheim, CA, USA, 2023, pp. 151–170. [Publisher] [Video]
  • Saggese, P., Belmonte, A., Dimitri, N., Facchini, A., and Böhme, R. Arbitrageurs in the Bitcoin Ecosystem: Evidence from User-level Trading Patterns in the Mt. Gox Exchange Platform. Journal of Economic Behavior & Organization, 213, 9 (2023), 251–270. [Publisher]
  • Fröwis, M. and Böhme, R. Detecting Privileged Parties on Ethereum. In A. Essex et al., ed., Financial Cryptography and Data Security. FC 2023 International Workshops. Lecture Notes in Computer Science 13953, Springer, Cham, 2023, pp. 470–488. [Publisher] [Preprint]
  • Abramova, S., Böhme, R., Elsinger, H., Stix, H., and Summer, M. What Can CBDC Designers Learn from Asking Potential Users? Results from a Survey of Austrian Residents. Working Papers of the Oesterreichische Nationalbank, (July 2022), No 241. [Publisher]
  • Keller, P. and Böhme, R. Parallel Proof-of-Work with Concrete Bounds. In Conference on Advances in Financial Technologies (AFT). ACM, Cambridge, MA, 2022. [Publisher] [Preprint]
  • Fröwis, M. and Böhme, R. Not All Code are Create2 Equal. In A. Matsuo et al., ed., Financial Cryptography and Data Security. FC 2022 International Workshops. Lecture Notes in Computer Science 13412, Springer, Cham, 2023, pp. 516–538. [Publisher] [Preprint] [Video]
  • Bissias, G., Böhme, R., Thibodeau, D., and Levine, B.N. Pricing Security in Proof-of-Work Systems. In Workshop on the Economics of Information Security (WEIS). 2022. [Publisher]
  • Abramova, S., Voskobojnikov, A., Beznosov, K., and Böhme, R. Bits Under the Mattress: Understanding Different Risk Perceptions and Security Behaviors of Crypto-Asset Users. In Conference on Human Factors in Computing Systems (ACM CHI). (virtual) Yokohama, Japan, 2021. [PDF] [Video]
  • Auer, R. and Böhme, R. Central Bank Digital Currency: The Quest for Minimally Invasive Technology. BIS Working Papers, (June 2021), No 948. [Publisher]
  • Abramova, S. and Böhme, R. Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency Market Prices. In APWG eCrime Researchers Summit (ECRIME). 2021. [PDF] [Publisher]
  • Keller, P., Florian, M., and Böhme, R. Collaborative Deanonymization. In Workshop on Coordination of Decentralized Finance (CoDecFin). 2021. [Publisher] [Preprint] [Video]
  • Voskobojnikov, A., Abramova, S., Beznosov, K., and Böhme, R. Non-Adoption of Crypto-Assets: Exploring the Role of Trust, Self-Efficacy, and Risk. In Proceedings of the Twenty-Ninth European Conference on Information Systems (ECIS). (virtual) Marrakesh, Morocco, 2021. [PDF]
  • Böhme, R., Eckey, L., Moore, T., Narula, N., Ruffing, T., and Zohar, A. Responsible Vulnerability Disclosure in Cryptocurrencies. Communications of the ACM, 63, 10 (2020), 62–71. [Publisher] [Video]
  • Auer, R. and Böhme, R. The Technology of Retail Central Bank Digital Currency. BIS Quartely Review, (March 2020), 85–100. [Publisher] [Video]
  • Fröwis, M. and Böhme, R. The Operational Cost of Ethereum Airdrops. In C. Pérez-Solà, G. Navarro-Arribas, A. Biryukov and Garcı́a-Alfaro Joaquı́n, eds., Data Privacy Management, Cryptocurrencies and Blockchain Technology (ESORICS 2019 Workshops). Lecture Notes in Computer Science 11737, Springer, 2019, pp. 255–270. [PDF]
  • Ford, B. and Böhme, R. Rationality is Self-Defeating in Permissionless Systems. 2019. Position paper prepared for the Security Protocols Workshop. [Preprint]
  • Keller, P. and Böhme, R. HotPoW: Finality from Proof-of-Work Quorums. 2019. [Preprint]
  • Fröwis, M., Fuchs, A., and Böhme, R. Detecting Token Systems on Ethereum. In I. Goldberg and T. Moore, eds., Financial Cryptography and Data Security. Lecture Notes in Computer Science 11598, Springer, 2019, pp. 93–112. [PDF]
  • Saggese, P. and Böhme, R. Identifying the Arbitrageurs on Mt. Gox: First Insights from the Leaked Dataset. In Workshop on the Economics of Information Security (WEIS). Harvard University, Cambridge, MA, 2019. [Preprint]
  • Fröwis, M. and Böhme, R. In Code We Trust? Measuring the Control Flow Immutability of All Smart Contracts Deployed on Ethereum. In J. Garcia-Alfaro, G. Navarro-Arribas, H. Hartenstein and Herrera-Joancomartı́ Jordi, eds., Data Privacy Management, Cryptocurrencies and Blockchain Technology, ESORICS 2017 International Workshops. Lecture Notes in Computer Science 10436, Springer, Cham, 2017, pp. 357–372. [PDF]
  • Böhme, R., Grzywotz, J., Pesch, P., Rückert, C., and Safferling, C. Prävention von Straftaten mit Bitcoins und Alt-Coins: Handlungsempfehlung zur Regulierung virtueller Kryptowährungen. [Bitcoin and Alt-Coin Crime Prevention: A Recommendation for the Regulation of Virtual Cryptocurrencies]. The German BITCRIME project, 2017. [Publisher]
  • Möser, M. and Böhme, R. The Price of Anonymity: Empirical Evidence from a Market for Bitcoin Anonymization. Journal of Cybersecurity, 3, 2 (2017), 127–135. [Publisher]
  • Möser, M. and Böhme, R. Anonymous Alone? Measuring Bitcoin’s Second-Generation Anonymization Techniques. In IEEE Security & Privacy on the Blockchain (IEEE S&B). Paris, France, 2017, pp. 32–41. [PDF]
  • Abramova, S., Schöttle, P., and Böhme, R. Mixing Coins of Different Quality: A Game-Theoretic Approach. In M. Brenner at al., ed., 4th Workshop on Bitcoin and Blockchain Research, in assocation with Financial Cryptography and Data Security. Lecture Notes in Computer Science 10323, Springer, Cham, 2017, pp. 280–297. [PDF]
  • Abramova, S. and Böhme, R. Perceived Benefit and Risk as Multidimensional Determinants of Bitcoin Use: A Quantitative Exploratory Study. In Proceedings of the Thirty Seventh International Conference on Information Systems (ICIS). Dublin, Ireland, 2016. [PDF]
  • Böhme, R., Christin, N., Edelman, B., and Moore, T. Bitcoin: Economics, Technology, and Governance. Journal of Economic Perspectives, 29, 2 (2015), 213–238. [Publisher]
  • Möser, M. and Böhme, R. Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees. In M. Brenner, N. Christin, B. Johnson and K. Rohloff, eds., Financial Cryptography and Data Security, 2nd Workshop on BITCOIN Research. Lecture Notes in Computer Science 8976, Springer, Berlin Heidelberg, 2015, pp. 19–33. [PDF] [Publisher]
  • Möser, M., Böhme, R., and Breuker, D. Towards Risk Scoring of Bitcoin Transactions. In R. Böhme, M. Brenner, T. Moore and M. Smith, eds., Financial Cryptography and Data Security, 1st Workshop on BITCOIN Research. Lecture Notes in Computer Science 8438, Springer, Berlin Heidelberg, 2014, pp. 16–32. [PDF] [Publisher]
  • Böhme, R. Internet Protocol Adoption: Learning from Bitcoin. 2013. IAB Workshop on Internet Technology Adoption and Transition (ITAT), Cambridge. [PDF]
  • Möser, M., Böhme, R., and Breuker, D. An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem. In APWG eCrime Researchers Summit (ECRIME). San Francisco, CA, 2013, pp. 1–14. [PDF] [Publisher]
  • Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H.P., and Böhme, R. Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency. In Workshop on the Economics of Information Security (WEIS). Berlin, Germany, 2012.

In German

  • Auer, R. and Böhme, R. Digitales Zentralbankgeld: Auf der Suche nach einer minimalinvasiven Technologie. In J. Beermann, ed., 20 Jahre Euro. Zur Zukunft unseres Geldes. Siedler, München, 2022, pp. 437–464.
  • Böhme, R. and Pesch, P. Technische Grundlagen und datenschutzrechtliche Fragen der Blockchain-Technologie. Datenschutz und Datensicherheit, 41, 8 (2017), 473–481. [PDF]
  • Pesch, P. and Böhme, R. Datenschutz trotz öffentlicher Blockchain? Chancen und Risiken bei der Verfolgung und Prävention Bitcoin-bezogener Straftaten. Datenschutz und Datensicherheit, 41, 2 (2017), 93–98.

  • My lecture slides on blockchain systems are available here.

Economics of Information Security

  • Woods, D.W. and Böhme, R. The Commodification of Consent. Computers & Security, 115, (April 2022). [Publisher]
  • Woods, D.W. and Böhme, R. Incident Response as a Lawyers’ Service. IEEE Security & Privacy, 20, 2 (2022), 68–74. [Publisher] [Preprint]
  • Woods, D.W. and Böhme, R. SoK: Quantifying Cyber Risk. In IEEE Symposium on Security and Privacy. 2021, pp. 909–926. [Publisher] [Preprint] [Video]
  • Anderson, R., Böhme, R., Clayton, R., and Collier, B. Silicon Den: Cybercrime is Entrepreneurship. In Workshop on the Economics of Information Security (WEIS). 2021. [Publisher]
  • Woods, D.W. and Böhme, R. How Cyber Insurance Shapes Incident Response: A Mixed Methods Study. In Workshop on the Economics of Information Security (WEIS). 2021. [PDF]
  • Böhme, R., Laube, S., and Riek, M. A Fundamental Approach to Cyber Risk Analysis. Variance, 12, 2 (2019), 161–185. [PDF] [Publisher]
  • Anderson, R., Barton, C., Böhme, R., et al. Measuring the Changing Cost of Cybercrime. In Workshop on the Economics of Information Security (WEIS). Harvard University, Cambridge, MA, 2019. [PDF]
  • Riek, M. and Böhme, R. The Costs of Consumer-Facing Cybercrime: An Empirical Exploration of Measurement Issues and Estimates. Journal of Cybersecurity, 4, 1 (2018). [Publisher]
  • Tajalizadehkhoob, S., Böhme, R., Ganan, C., Korczyński, M., and van Eeten, M. Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse. ACM Transactions on Internet Technology, 18, 4 (November 2018), 49:1–49:25. [Publisher]
  • Laube, S. and Böhme, R. Strategic Aspects of Cyber Risk Information Sharing. ACM Computing Surveys (CSUR), 50, 5 (November 2017), 77:1–77:36. [Publisher]
  • Riek, M., Abramova, S., and Böhme, R. Analyzing Persistent Impact of Cybercrime on the Societal Level: Evidence for Individual Security Behavior. In Proceedings of the Thirty Eigths International Conference on Information Systems (ICIS). Seoul, Korea, 2017. [PDF]
  • Tajalizadehkhoob, S., van Goethem, T., Korczyński, M., et al. Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. In ACM Conference on Computer and Communication Security (ACM CCS). ACM, Dallas, Texas, 2017. [Publisher]
  • Laube, S. and Böhme, R. The Economics of Mandatory Security Breach Reporting to Authorities. Journal of Cybersecurity, 2, 1 (2016), 29–41. [Publisher]
  • Riek, M., Böhme, R., and Moore, T. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance. IEEE Transactions on Dependable and Secure Computing, 13, 2 (2016), 261–273. [Publisher]
  • Heitzenrather, C., Böhme, R., and Simpson, A.C. The Days Before Zero Day: Investment Models for Secure Software Engineering. In Workshop on the Economics of Information Security (WEIS). University of California at Berkeley, 2016. [Publisher]
  • Riek, M., Böhme, R., Ciere, M., Ganan, C., and van Eeten, M. Estimating the Costs of Consumer-facing Cybercrime: A Tailored Instrument and Representative Data for Six EU Countries. In Workshop on the Economics of Information Security (WEIS). University of California at Berkeley, 2016. [Publisher]
  • Laube, S. and Böhme, R. Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls. In ACM Conference on Computer and Communication Security (ACM CCS), 2nd Workshop on Information Sharing and Collaborative Security. ACM, Denver, Colorado, 2015, pp. 31–42. [PDF]
  • Laube, S. and Böhme, R. The Economics of Mandatory Security Breach Reporting to Authorities. In Workshop on the Economics of Information Security (WEIS). Delft University of Technology, 2015.
  • Laszka, A., Johnson, B., Schöttle, P., Grossklags, J., and Böhme, R. Secure Team Composition to Thwart Insider Threats and Cyberespionage. ACM Transactions on Internet Technology, 14, 2–3 (2014), 19:1–22. [Publisher]
  • Riek, M., Böhme, R., and Moore, T. Understanding the Influence of Cybercrime Risk on the E-Service Adoption of European Internet Users. In Workshop on the Economics of Information Security (WEIS). The Pennsylvania State University, State College, Pennsylvania, 2014.
  • Anderson, R., Barton, C., Böhme, R., et al. Measuring the Cost of Cybercrime. In R. Böhme, ed., The Economics of Information Security and Privacy. Springer, Berlin, Germany, 2013, pp. 265–300.
  • Böhme, R. and Grossklags, J. Trading Agent Kills Market Information – Evidence from Online Social Lending. In Y. Chen and N. Immorlica, eds., Web and Internet Economics. Lecture Notes in Computer Science 8289, Springer, Berlin Heidelberg, 2013, pp. 68–81. [PDF]
  • Laszka, A., Johnson, B., Schöttle, P., and Böhme, R. Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats. In J. Crampton, S. Jajodia and K. Mayes, eds., Computer Security (ESORICS). Lecture Notes in Computer Science 8134, Springer, Berlin Heidelberg, 2013, pp. 273–290.
  • Böhme, R. Security Audits Revisited. In A. Keromytis, ed., Financial Cryptography and Data Security. Lecture Notes in Computer Science 7397, Springer, Berlin Heidelberg, 2012, pp. 129–147.
  • Böhme, R. and Moore, T. How Do Consumers React to Cybercrime? In APWG eCrime Researchers Summit (ECRIME). Puerto Rico, 2012, pp. 1–12. [PDF]
  • Johnson, B., Böhme, R., and Grossklags, J. Security Games with Market Insurance. In J.S. Baras, J. Katz and E. Altmann, eds., Decision and Game Theory for Security. Lecture Notes in Computer Science 7037, Springer, Berlin Heidelberg, 2011, pp. 117–130.
  • Böhme, R. and Félegyházi, M. Security Investment with Penetration Testing. IEEE COMSOC E-Letter, 6, 5 (2011), 6–8.
  • Böhme, R. and Grossklags, J. The Security Cost of Cheap User Interaction. In New Security Paradigms Workshop (NSPW’11). ACM, New York, 2011, pp. 67–82. [Publisher]
  • Böhme, R. and Grossklags, J. Vanishing Signals: Trading Agent Kills Market Information. In NetEcon (ACM Electronic Commerce Workshop). San Jose, CA, 2011.
  • Böhme, R. and Schwartz, G. Modeling Cyber-Insurance: Towards a Unifying Framework. In Workshop on the Economics of Information Security (WEIS). Harvard University, Cambridge, MA, 2010. [PDF]
  • Böhme, R. and Félegyházi, M. Optimal Information Security Investment with Penetration Testing. In T. Alpcan, L. Buttyán and J.S. Baras, eds., Decision and Game Theory for Security. Lecture Notes in Computer Science 6442, Springer, Berlin Heidelberg, 2010, pp. 21–37.
  • Böhme, R. Security Metrics and Security Investment Models. In I. Echizen, N. Kunihiro and R. Sasaki, eds., Advances in Information and Computer Security. Lecture Notes in Computer Science 6434, Springer, Berlin Heidelberg, 2010, pp. 10–24. [PDF] [Publisher]
  • Böhme, R. and Moore, T. The Iterated Weakest Link. IEEE Security & Privacy, 8, 1 (2010), 53–55.
  • Böhme, R. Towards Insurable Network Architectures. it - Information Technology, 52, 5 (2010), 290–293.
  • Böhme, R. and Moore, T. The Iterated Weakest Link: A Model of Adaptive Security Investment. In Workshop on the Economics of Information Security (WEIS). University College London, UK, 2009.
  • Anderson, R., Böhme, R., Clayton, R., and Moore, T. Security Economics and European Policy. In M.E. Johnson, ed., Managing Information Risk and the Economics of Security. Springer, New York, 2009, pp. 55–80.
  • Böhme, R. and Nowey, T. Economic Security Metrics. In I. Eusgeld, F.C. Freiling and R. Reussner, eds., Dependability Metrics. Lecture Notes in Computer Science 4909, Springer, Berlin Heidelberg, 2008, pp. 176–187.
  • Böhme, R. and Freiling, F.C. On Metrics and Measurements. In I. Eusgeld, F.C. Freiling and R. Reussner, eds., Dependability Metrics. Lecture Notes in Computer Science 4909, Springer, Berlin Heidelberg, 2008, pp. 7–13.
  • Böhme, R. and Reussner, R. Validation of Predictions with Measurements. In I. Eusgeld, F.C. Freiling and R. Reussner, eds., Dependability Metrics. Lecture Notes in Computer Science 4909, Springer, Berlin Heidelberg, 2008, pp. 14–18.
  • Anderson, R., Böhme, R., Clayton, R., and Moore, T. Security Economics and European Policy. In Workshop on the Economics of Information Security (WEIS). Tuck School of Business, Dartmouth College Hanover, NH, 2008.
  • Anderson, R., Böhme, R., Clayton, R., and Moore, T. Security Economics and the Internal Market. ENISA, Heraklion, Greece, 2008.
  • Böhme, R. A Comparison of Market Approaches to Software Vulnerability Disclosure. In G. Müller, ed., Emerging Trends in Information and Communication Security (ETRICS). Lecture Notes in Computer Science 3995, Springer, Berlin Heidelberg, 2006, pp. 298–311. [PDF]
  • Koble, S. and Böhme, R. Economics of Identity Management: A Supply-side Perspective. In G. Danezis and D. Martin, eds., Privacy Enhancing Technologies (PET 2005). Lecture Notes in Computer Science 3856, Springer, Berlin Heidelberg, 2006, pp. 259–272.
  • Böhme, R. and Kataria, G. Models and Measures for Correlation in Cyber-Insurance. In Workshop on the Economics of Information Security (WEIS). University of Cambridge, UK, 2006.
  • Böhme, R. and Kataria, G. On the Limits of Cyber-Insurance. In S. Fischer-Hübner, S. Furnell and C. Lambrinoudakis, eds., Trust, Privacy and Security in Digital Business (TrustBus/DEXA 2006). Lecture Notes in Computer Science 4083, Springer, Berlin Heidelberg, 2006, pp. 31–40.
  • Böhme, R. and Holz, T. The Effect of Stock Spam on Financial Markets. In Workshop on the Economics of Information Security (WEIS). University of Cambridge, UK, 2006.
  • Böhme, R. Vulnerability Markets – What is the Economic Value of a Zero-Day Exploit? In 22C3: Private Investigations. Chaos Computer Club, Berlin, Germany, 2005.
  • Böhme, R. Cyber-Insurance Revisited. In Workshop on the Economics of Information Security (WEIS). Harvard University, Cambridge, MA, 2005.

In German

  • Laube, S. and Böhme, R. Meldepflichten für IT-Sicherheitsvorfälle: Ein Prinzipal-Agent-Ansatz. In O. Thomas and F. Teuteberg, eds., Tagungsband Wirtschaftsinformatik. 2015, pp. 1146–1162.
  • Böhme, R. and Laube, S. Das IT-Sicherheitsgesetz. In J. Baetge and H.-J. Kirsch, eds., Mittelstand im Blick: Compliance und Risikomanagement. IDW, Düsseldorf, 2014, pp. 17–36.
  • Böhme, R. Wann sind IT-Security-Audits nützlich? In Tagungsband Wirtschaftsinformatik. 1, 2011, pp. 385–394.
  • Böhme, R. IT-Risiken im Schadenversicherungsmodell: Implikationen der Marktstruktur. In H. Federrath, ed., Sicherheit 2005 – Sicherheit, Schutz und Zuverlässigkeit. Lecture Notes in Informatics 62, Gesellschaft für Informatik, Bonn, 2005, pp. 27–40.

Privacy

  • Hils, M., Woods, D.W., and Böhme, R. Conflicting Privacy Preference Signals in the Wild. In Computers, Privacy and Data Protection. Brussels, 2022. [Preprint]
  • Hils, M., Woods, D.W., and Böhme, R. Privacy Preference Signals: Past, Present and Future. Proceedings on Privacy Enhancing Technologies, 4 (2021), 249–269. [Publisher] [Preprint] [Video]
  • Selzer, A., Woods, D.W., and Böhme, R. An Economic Analysis of Appropriateness under Article 32 GDPR. European Data Protection Law Review, 7, 3 (2021), 456–470. [Publisher]
  • Hils, M., Woods, D.W., and Böhme, R. Measuring the Emergence of Consent Management on the Web. In Internet Measurement Conference (IMC). ACM, 2020. [PDF] [Video]
  • Machuletz, D. and Böhme, R. Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR. Proceedings on Privacy Enhancing Technologies, 2 (2020), 481–498. [Publisher] [Video]
  • Woods, D.W. and Böhme, R. The Commodification of Consent. In Workshop on the Economics of Information Security (WEIS). Brussels, Belgium, 2020. [PDF] [Video]
  • Böhme, R. Response to Clarke: Empirical Research is Useful, also in the Age of Surveillance Risks. Journal of Information Technology, 34, 1 (2019), 93–95.
  • Machuletz, D., Laube, S., and Böhme, R. Webcam Covering as Planned Behavior. In Conference on Human Factors in Computing Systems (ACM CHI). Montreal, Canada, 2018. [PDF] [Video]
  • Arce, D.G. and Böhme, R. Pricing Anonymity. In S. Meiklejohn and K. Sako, eds., Financial Cryptography and Data Security. Lecture Notes in Computer Science 10957, Springer, 2018, pp. 349–368. [Publisher] [Preprint]
  • Möser, M. and Böhme, R. Join Me on a Market for Anonymity. In Workshop on the Economics of Information Security (WEIS). University of California at Berkeley, 2016. [Publisher]
  • Machuletz, D., Sendt, H., Laube, S., and Böhme, R. Users Protect Their Privacy If They Can: Determinants of Webcam Covering Behavior. In Proceedings of the 1st European Workshop on Usable Security (EuroUSEC). Internet Society, Darmstadt, Germany, 2016. [PDF]
  • Spiekermann, S., Acquisti, A., Böhme, R., and Hui, K.-L. The Challenges of Personal Data Markets and Privacy. Electronic Markets, 25, 2 (2015), 161–167. [Publisher]
  • Korff, S. and Böhme, R. Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation. In Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 2014, pp. 69–87. [Publisher]
  • Boehm, F. and Böhme, R. Improving Informed Consent for Consumers in E-Commerce – An Interdisciplinary Perspective. In Privacy Law Scholars Conference (PLSC). Washington, DC, 2014.
  • Böhme, R. and Pötzsch, S. Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data. In G. Danezis, ed., Financial Cryptography and Data Security. Lecture Notes in Computer Science 7035, Springer, Berlin Heidelberg, 2011, pp. 1–15. [PDF]
  • Böhme, R. and Pötzsch, S. Privacy in Online Social Lending. In AAAI Spring Symposium on Intelligent Privacy Management. AAAI Press, Palo Alto, 2010, pp. 23–28.
  • Böhme, R. and Köpsell, S. Trained to Accept? A Field Experiment on Consent Dialogs. In Conference on Human Factors in Computing Systems (ACM CHI). Atlanta, Georgia, 2010, pp. 2403–2406. [Publisher] [Video]
  • Berthold, S. and Böhme, R. Valuating Privacy with Option Pricing Theory. In T. Moore, D.J. Pym and C. Ioannidis, eds., Economics of Information Security and Privacy. Springer, New York, 2010, pp. 187–209. [Preprint]
  • Berthold, S., Böhme, R., and Köpsell, S. Data Retention and Anonymity Services: Introducing a New Class of Realistic Adversary Models. In V. Matyáš, S. Fischer-Hübner, D. Cvrček and P. Švenda, eds., The Future of Identity in the Information Society. Springer, New York, 2009, pp. 92–106.
  • Böhme, R. and Pfitzmann, A. Privacy-DRM: Data Protection by Copy Protection? 2009. Mimeo. [PDF]
  • Kellermann, B. and Böhme, R. Privacy-Enhanced Event Scheduling. In Conference on Information Privacy, Security, Risk and Trust (PASSAT ’09). 3, IEEE Computer Society, Los Alamitos, CA, USA, 2009, pp. 52–59.
  • Böhme, R. Conformity or Diversity: On the Social Implications of Transparency in Personal Data Processing. In M.E. Johnson, ed., Managing Information Risk and the Economics of Security. Springer, New York, 2009, pp. 291–312. [PDF]
  • Böhme, R. and Koble, S. On the Viability of Privacy-Enhancing Technologies in a Self-regulated Business-to-consumer Market: Will Privacy Remain a Luxury Good? In Workshop on the Economics of Information Security (WEIS). Carnegie Mellon University, Pittsburgh, PA, 2007. [PDF]
  • Böhme, R. and Koble, S. Pricing Strategies in Electronic Marketplaces with Privacy-Enhancing Technologies. Wirtschaftsinformatik, 49, 1 (2007), 16–25.
  • Böhme, R., Diaz, C., Danezis, G., Köpsell, S., and Pfitzmann, A. Mix Cascades versus Peer-to-Peer: Is One Concept Superior? In D. Martin and A. Serjantov, eds., Privacy Enhancing Technologies (PET 2004). Lecture Notes in Computer Science 3424, Springer, Berlin Heidelberg, 2005, pp. 243–255.

In German

  • Böhme, R. and Luhn, S. Die Privatsphäre des Verbrauchers – ein Luxusgut? In C. Bala and K. Müller, eds., Der gläserne Verbraucher – Wird Datenschutz zum Verbraucherschutz? Verbraucherzentrale NRW, Düsseldorf, 2014, pp. 42–56.
  • Schöttle, P. and Böhme, R. Die totale Transparenz. Facebook, Cookies, RFID etc. In M. Dabrowski, J. Wolf and K. Abmeier, eds., Ethische Herausforderungen im Web 2.0. Schöningh, Paderborn, 2014, pp. 11–31.
  • Böhme, R. and Pötzsch, S. Social Lending aus der Perspektive des Datenschutzes. In F.C. Freiling, ed., Sicherheit 2010 – Sicherheit, Schutz und Zuverlässigkeit. Lecture Notes in Informatics 170, Köllen, Bonn, 2010, pp. 317–328.
  • Böhme, R. and Pfitzmann, A. Digital Rights Management zum Schutz personenbezogener Daten? Datenschutz und Datensicherheit, 32, 5 (2008), 342–346.
  • Böhme, R. and Pfitzmann, A. Datenspuren beim Forschungskontakt: Wie die Vorratsdatenspeicherung empirische Sozialforschung verändern könnte. Forschung & Lehre, 14, 10 (2007), 610–611.

Digital Forensics

  • Böhme, R. and Kirchner, M. Media Forensics. In S. Katzenbeisser and F. Petitcolas, eds., Information Hiding. Artech House, 2016, pp. 231–259. [PDF]
  • Hofer, N. and Böhme, R. Progressive JPEGs in the Wild: Implications for Information Hiding and Forensics. In Proceedings of the 11th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC). ACM, Chicago, IL, 2023, pp. 47–58. [PDF] [Publisher] [Video]
  • Beneš, M., Hofer, N., and Böhme, R. Know Your Library: How the libjpeg Version Influences Compression and Decompression Results. In Proceedings of the 10th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC). ACM, 2022, pp. 19–25. [PDF] [Publisher]
  • Pasquini, C. and Böhme, R. Information-Theoretic Bounds for the Forensic Detection of Signal Downscaling. IEEE Transactions on Information Forensics and Security, 14, 7 (July 2019), 1928–1943.
  • Pasquini, C., Boato, G., and Böhme, R. Teaching Digital Signal Processing with a Challenge on Image Forensics. IEEE Signal Processing Magazine, 36, 2 (2019), 101–109. [Publisher]
  • Pasquini, C. and Böhme, R. Towards a Theory of JPEG Block Convergence. In IEEE International Conference on Image Processing (ICIP). Athens, Greece, 2018, pp. 550–554. [PDF] [Publisher]
  • Pasquini, C. and Böhme, R. Information-theoretic Bounds of Resampling Forensics: New Evidence for Traces Beyond Cyclostationarity. In Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC). ACM, New York, 2017, pp. 3–14. [PDF] [Publisher]
  • Pasquini, C., Schöttle, P., Böhme, R., Boato, G., and Pèrez-Gonzàlez, F. Forensics of High Quality and Nearly Identical JPEG Image Recompression. In ACM Information Hiding and Multimedia Security Workshop. Vigo, Galicia, Spain, 2016, pp. 11–21. [Publisher]
  • Abramova, S. and Böhme, R. Detecting Copy–Move Forgeries in Scanned Text Documents. In Proceedings of IS&T Electronic Imaging: Media Watermarking, Security, and Forensics 2016. San Francisco, CA, 2016. [PDF]
  • Carnein, M., Schöttle, P., and Böhme, R. Telltale Watermarks for Counting JPEG Compressions. In Proceedings of IS&T Electronic Imaging: Media Watermarking, Security, and Forensics 2016. San Francisco, CA, 2016. [PDF]
  • Carnein, M., Schöttle, P., and Böhme, R. Forensics of High-Quality JPEG Images with Color Subsampling. In IEEE International Workshop on Information Forensics and Security (IEEE WIFS). Rome, Italy, 2015. [PDF]
  • Lai, S.-Y. and Böhme, R. Block Convergence in Repeated Transform Coding: JPEG-100 Forensics, Carbon Dating, and Tamper Detection. In IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP). Vancouver, Canada, 2013, pp. 3028–3032. [PDF]
  • Böhme, R. and Kirchner, M. Counter-Forensics: Attacking Image Forensics. In H.T. Sencar and N.D. Memon, eds., Digital Image Forensics: There is More to a Picture Than Meets the Eye. Springer, New York, 2012, pp. 327–366. [PDF]
  • Lai, S.-Y. and Böhme, R. Countering Counter-Forensics: The Case of JPEG Compression. In T. Filler, T. Pevný, S. Craver and A. Ker, eds., Information Hiding (12th International Conference). Lecture Notes in Computer Science 6985, Springer, Berlin Heidelberg, 2011, pp. 285–298.
  • Gloe, T., Cebron, N., and Böhme, R. An ML Perspective on Feature-Based Forensic Camera Model Identification. In DAGM Workshop on Pattern Recognition for IT Security. Darmstadt, Germany, 2010.
  • Gloe, T. and Böhme, R. The Dresden Image Database for Benchmarking Digital Image Forensics. Journal of Digital Forensic Practice, 3, (2010), 150–159.
  • Böhme, R., Freiling, F.C., Gloe, T., and Kirchner, M. Multimedia Forensics Is Not Computer Forensics. In Z.J.M.H. Geradts, K. Franke and C.J. Veenman, eds., International Workshop on Computational Forensics (IWCF). Lecture Notes in Computer Science 5718, Springer, Berlin Heidelberg, 2009, pp. 90–103.
  • Kirchner, M. and Böhme, R. Synthesis of Color Filter Array Pattern in Digital Images. In E.J. Delp, J. Dittmann, N.D. Memon and P.W. Wong, eds., Proceedings of SPIE-IS&T Electronic Imaging: Media Forensics and Security XI. 7254, San Jose, CA, 2009, pp. 725421.
  • Kirchner, M. and Böhme, R. Hiding Traces of Resampling in Digital Images. IEEE Transactions on Information Forensics and Security, 3, 4 (2008), 582–592.
  • Gloe, T., Kirchner, M., Winkler, A., and Böhme, R. Can We Trust Digital Image Forensics? In ACM Multimedia. ACM, New York, NY, USA, 2007, pp. 78–86. [Publisher]
  • Kirchner, M. and Böhme, R. Tamper Hiding: Defeating Image Forensics. In T. Furon, F. Cayre, G. Doërr and P. Bas, eds., Information Hiding. Lecture Notes in Computer Science 4567, Springer, Berlin Heidelberg, 2007, pp. 326–341.
  • Böhme, R. and Westfeld, A. Feature-based Encoder Classification of Compressed Audio Streams. Multimedia Systems Journal, 11, 2 (2005), 108–120.

In German

  • Böhme, R., Freiling, F.C., Gloe, T., and Kirchner, M. Multimedia-Forensik als Teildisziplin der digitalen Forensik. In S. Fischer at al., ed., Informatik 2009 – Im Fokus das Leben. Lecture Notes in Informatics 154, Gesellschaft für Informatik, Bonn, 2009, pp. 1537–1551.

Machine Learning in Adversarial Environments

  • Lago, F., Pasquini, C., Böhme, R., Dumont, H., Goffaux, V., and Boato, G. More Real than Real: A Study on Human Visual Perception of Synthetic Faces. IEEE Signal Processing Magazine, 39, 1 (2022), 109–116. [Publisher] [Preprint]
  • Schlögl, A., Kupek, T., and Böhme, R. Forensicability of Deep Neural Network Inference Pipelines. In IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP). (virtual) Toronto, Canada, 2021, pp. 2515–2519. [Publisher] [Video]
  • Schlögl, A., Kupek, T., and Böhme, R. iNNformant: Boundary Samples as Telltale Watermarks. In Proceedings of the 9th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC). 2021, pp. 81–86. [PDF] [Publisher] [Video]
  • Schlögl, A. and Böhme, R. eNNclave: Offline Inference with Model Confidentiality. In 13th ACM Workshop on Artificial Intelligence and Security (AISec’20). 2020. [PDF] [Video]
  • Pasquini, C. and Böhme, R. Trembling Triggers: Exploring the Sensitivity of Backdoors in DNN-based Face Recognition. EURASIP Journal on Information Security, 12 (2020), 1–15. [Publisher]
  • Kupek, T., Pasquini, C., and Böhme, R. On the Difficulty of Hiding Keys in Neural Networks. In Proceedings of the 8th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC). ACM, 2020. [Publisher] [Video]
  • Schöttle, P., Schlögl, A., Pasquini, C., and Böhme, R. Detecting Adversarial Examples – A Lesson from Multimedia Security. In Proceedings of the 26th European Signal Processing Conference (EUSIPCO). EURASIP, Rome, Italy, 2018. [PDF]

Steganography and Steganalysis

  • Böhme, R. Advanced Statistical Steganalysis. Springer, Berlin Heidelberg, 2010.
  • Schöttle, P. and Böhme, R. Game Theory and Adaptive Steganography. IEEE Transactions on Information Forensics and Security, 11, 4 (2016), 760–773. [PDF] [Publisher]
  • Beneš, M., Lorch, B., and Böhme, R. JPEG Steganalysis Using Leaked Cover Thumbnails. In IEEE International Workshop on Information Forensics and Security (IEEE WIFS). Nürnberg, Germany, 2023. [PDF]
  • Beneš, M., Hofer, N., and Böhme, R. The Effect of the JPEG Implementation on the Cover–Source Mismatch Error in Image Steganalysis. In Proceedings of the 30th European Signal Processing Conference (EUSIPCO). EURASIP, Belgrade, Serbia, 2022, pp. 1057–1061. [PDF] [Publisher] [Video]
  • Köhler, O.M., Pasquini, C., and Böhme, R. On the Statistical Properties of Syndrome Trellis Coding. In C. Krätzer, Y.-Q. Shi, J. Dittmann and H.-J. Kim, eds., Digital Forensics and Watermarking, 16th International Workshop, IWDW 2017. Lecture Notes in Computer Science 10431, Springer, Cham, 2017, pp. 331–346.
  • Johnson, B., Schöttle, P., Laszka, A., Grossklags, J., and Böhme, R. Adaptive Steganography and Steganalysis with Fixed-Size Embedding. Transactions on Data Hiding and Multimedia Security, 10, (2015), 69–91. [Publisher]
  • Kirchner, M. and Böhme, R. “Steganalysis in Technicolor” – Boosting WS Detection of Stego Images from CFA-Interpolated Covers. In IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP). Florence, Italy, 2014, pp. 3982–3986. [PDF]
  • Carnein, M., Schöttle, P., and Böhme, R. Predictable Rain? Steganalysis of Public-Key Steganography using Wet Paper Codes. In ACM Information Hiding and Multimedia Security Workshop. Salzburg, Austria, 2014, pp. 97–108. [Publisher]
  • Ker, A., Bas, P., Böhme, R., et al. Moving Steganography and Steganalysis from the Laboratory into the Real World. In ACM Information Hiding and Multimedia Security Workshop. Montpellier, France, 2013, pp. 45–58. [Publisher]
  • Johnson, B., Schöttle, P., Laszka, A., Grossklags, J., and Böhme, R. Bitspotting: Detecting Optimal Adaptive Steganography. In Y.-Q. Shi, H.-J. Kim and F. Pérez-González, eds., Digital Forensics and Watermarking, 12th International Workshop, IWDW 2013. Lecture Notes in Computer Science 8389, Springer, Berlin Heidelberg, 2014, pp. 3–18.
  • Schöttle, P., Laszka, A., Johnson, B., Grossklags, J., and Böhme, R. A Game-Theoretic Analysis of Content-adaptive Steganography with Independent Embedding. In 21st European Signal Processing Conference (EUSIPCO). IEEE, Marrakech, Morocco, 2013, pp. 1–5.
  • Schöttle, P., Korff, S., and Böhme, R. Weighted Stego-Image Steganalysis for Naive Content-Adaptive Embedding. In IEEE International Workshop on Information Forensics and Security (IEEE WIFS). Tenerife, Spain, 2012, pp. 193–198.
  • Schöttle, P. and Böhme, R. A Game-Theoretic Approach to Content-Adaptive Steganography. In M. Kirchner and D. Ghosal, eds., Information Hiding (14th International Conference). Lecture Notes in Computer Science 7692, Springer, Berlin Heidelberg, 2012, pp. 125–141.
  • Johnson, B., Schöttle, P., and Böhme, R. Where to Hide the Bits? In J. Grossklags and J. Walrand, eds., Decision and Game Theory for Security. Lecture Notes in Computer Science 7638, Springer, Berlin Heidelberg, 2012, pp. 1–17.
  • Böhme, R. An Epistemological Approach to Steganography. In S. Katzenbeisser and A.-R. Sadeghi, eds., Information Hiding (11th International Conference). Lecture Notes in Computer Science 5806, Springer, Berlin Heidelberg, 2009, pp. 15–30.
  • Böhme, R. Improved Statistical Steganalysis using Models of Heterogeneous Cover Signals. 2008.
  • Ker, A. and Böhme, R. Revisiting Weighted Stego-Image Steganalysis. In E.J. Delp, P.W. Wong, J. Dittmann and N.D. Memon, eds., Proceedings of SPIE-IS&T Electronic Imaging: Security, Forensics, Steganography and Watermarking of Multimedia Contents X. 6819, San Jose, CA, 2008.
  • Böhme, R. Weighted Stego-Image Steganalysis for JPEG Covers. In K. Solanki, K. Sullivan and U. Madhow, eds., Information Hiding (10th International Workshop). Lecture Notes in Computer Science 5284, Springer, Berlin Heidelberg, 2008, pp. 178–194.
  • Böhme, R. and Keiler, C. On the security of ‘A Steganographic Scheme for Secure Communications Based on the Chaos and Euler Theorem.’ IEEE Transactions on Multimedia, 9, 6 (2007), 1325–1329.
  • Böhme, R. and Ker, A. A Two-Factor Error Model for Quantitative Steganalysis. In E.J. Delp and P.W. Wong, eds., Proceedings of SPIE-IS&T Electronic Imaging: Security, Steganography and Watermarking of Multimedia Contents VIII. 6072, San Jose, CA, 2006, pp. 59–74.
  • Böhme, R. Assessment of Steganalytic Methods Using Multiple Regression Models. In M. Barni, Herrera-Joancomartı́ Jordi, S. Katzenbeisser and F. Pérez-González, eds., Information Hiding (7th International Workshop). Lecture Notes in Computer Science 3727, Springer, Berlin Heidelberg, 2005, pp. 278–295.
  • Böhme, R. and Westfeld, A. Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics. In P. Samarati, P.Y.A. Ryan, D. Gollmann and R. Molva, eds., Computer Security (ESORICS). Lecture Notes in Computer Science 3193, Springer, Berlin Heidelberg, 2004, pp. 125–140.
  • Böhme, R. and Westfeld, A. Exploiting Preserved Statistics for Steganalysis. In J. Fridrich, ed., Information Hiding (6th International Workshop). Lecture Notes in Computer Science 3200, Springer, Berlin Heidelberg, 2004, pp. 82–96.
  • Böhme, R. and Westfeld, A. Statistical Characterisation of MP3 Encoders for Steganalysis. In ACM Multimedia and Security Workshop (MMSEC). ACM Press, New York, 2004, pp. 25–34. [Publisher]

In German

  • Köhler, O.M., Pasquini, C., and Böhme, R. Verbesserung der Syndrome-Trellis-Kodierung zur Erhöhung der Unvorhersagbarkeit von Einbettpositionen in steganographischen Systemen. In H. Langweg and M. Meier, eds., Sicherheit 2018 – Sicherheit, Schutz und Zuverlässigkeit. Lecture Notes in Informatics, Gesellschaft für Informatik, Bonn, 2018, pp. 83–94.

Miscellaneous

  • Hils, M. and Böhme, R. Watching the Weak Link into Your Home: An Inspection and Monitoring Toolkit for TR-069. In M. Conti and J. Zhou, eds., Applied Cryptography and Network Security. Lecture Notes in Computer Science 12147, Springer, Cham, 2020, pp. 233–253. [Preprint] [Video]
  • Pasquini, C., Schöttle, P., and Böhme, R. Decoy Password Vaults: At Least As Hard As Steganography? In Proceedings of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC). 2017, pp. 327–340. [PDF]
  • Yildiz, E. and Böhme, R. Effects of Information Security Risk Visualization on Managerial Decision Making. In Proceedings of the 2nd European Workshop on Usable Security (EuroUSEC). Internet Society, Paris, France, 2017. [PDF]
  • Böhme, R. Back to the Roots: Information Sharing Economics and What We Can Learn for Security (Keynote Abstract). In ACM Conference on Computer and Communication Security (ACM CCS), 3rd Workshop on Information Sharing and Collaborative Security. ACM, Vienna, Austria, 2016, pp. 1–2. [Publisher]
  • Spiekermann, S., Böhme, R., Acquisti, A., and Hui, K.-L. Personal Data Markets (Guest Editorial). Electronic Markets, 25, 2 (2015), 91–93. [Publisher]
  • Luhn, S., Bruns, I., and Böhme, R. Consumer Participation in Online Contracts – Exploring Cross-Out Clauses. In H. Federrath, S. Katzenbeisser, V. Lotz, M. Waidner and E. Weippl, eds., Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit. Lecture Notes in Informatics, Gesellschaft für Informatik, Bonn, 2014, pp. 255–270.
  • Böhme, R., Rath, M., Schneider, R., and Telang, R. Report on Software Liability. ENISA Working Group on Economics of IT Security (WG-EOS), 2011.
  • Böhme, R. Research Note on Progress Indicators in Online Surveys. 2010. [PDF]
  • Pötzsch, S. and Böhme, R. The Role of Soft Information in Trust Building: Evidence from Online Social Lending. In A. Acquisti, S.W. Smith and A.-R. Sadeghi, eds., International Conference on Trust and Trustworthy Computing (TRUST). Lecture Notes in Computer Science 6101, Springer, Berlin Heidelberg, 2010, pp. 381–395.
  • Böhme, R. and Kataria, G. A Closer Look at Attack Clustering. In Workshop on the Economics of Securing the Information Infrastructure (WESII). Washington, DC, 2006.

In German

  • Böhme, R., Pesch, P.J., and Fritz, V. Auswirkungen sich verändernder Wertschöpfungsketten im Finanzsektor auf die IT-Sicherheit. Auftragsstudie der deutschen Bundesanstalt für Finanzdienstleistungsaufsicht (BaFin), Universität Innsbruck, 2022. [Publisher]
  • Boehm, F., Böhme, R., and Andrees, M. Sachverständigengutachten zur Anhörung des 1. Untersuchungsausschusses des Deutschen Bundestages der 18. Wahlperiode (NSA-Untersuchungsausschuss). Beweisbeschluss SV-19a vom 15. Dezember 2016, Deutscher Bundestag, Berlin, 2017.
  • Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H.P., and Böhme, R. Geld stinkt, Bitcoin auch. Eine Ökobilanz der Bitcoin Block Chain. In U. Goltz et al., ed., Informatik 2012. Lecture Notes in Informatics 208, Gesellschaft für Informatik, Bonn, 2012, pp. 39–50.
  • Böhme, R. IT-Sicherheit: Umdenken nach Stuxnet? Wirtschaftsdienst, 90, 10 (2010), 642.
  • Kühne, M. and Böhme, R. Effekte von Informationsstand, Wissen und Einstellungsstärke von Befragten auf die Antwortstabilität in Online-Befragungen mit Selbstrekrutierung. ZUMA-Nachrichten, 59, (2006), 42–71.
  • Böhme, R. Fragebogeneffekte bei Online-Befragungen. 2003.

Edited Volumes

  • Böhme, R., ed. The Economics of Information Security and Privacy. Springer, Berlin Heidelberg, 2013.
  • Böhme, R. and Okamoto, T., eds. Financial Cryptography and Data Security – 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26–30, 2015, Revised Selected Papers. Lecture Notes in Computer Science 8438, Springer, Berlin Heidelberg, 2015.
  • Böhme, R., Brenner, M., Moore, T., and Smith, M., eds. Financial Cryptography and Data Security – FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8438, Springer, Berlin Heidelberg, 2014.
  • Böhme, R., Fong, P.W., and Safavi-Naini, R., eds. Information Hiding. 12th International Conference, IH 2010, Calgary, Canada, June 28–30, 2010. Revised Selected Papers. Lecture Notes in Computer Science 6387, Springer, Berlin Heidelberg, 2010.

Professional Activities

Secondary Appointments

since 03/2015 Principal Investigator, Department of Information Systems, University of Münster, Germany
since 2014 Lecturer for “Security Management”, Ruhr-Universität Bochum, Germany
since 2013 Co-founder of dence GmbH - Digital Evidence, Dresden, Germany

Scientific Community Service

2017 – 2021 Associate Editor, IEEE Transactions on Information Forensics and Security (T-IFS)
2016 – 2020 Member of the Editorial Board, Business and Information Systems Engineering (formerly Wirtschaftsinformatik)
2019 Program Co-Chair, IEEE International Workshop on Information Forensics and Security (WIFS)
2018 Conference Chair, 17th Workshop on the Economics of Information Security (WEIS)
2018 General Co-Chair, 6th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec)
2013 – 2018 Associate Editor, EURASIP Journal on Information Security
2013 – 2017 Associate Editor, Electronic Commerce Research
2013 – 2015 Area Editor Security & Privacy, Information Systems
2015 – 2016 Program Co-Chair, 24th & 25th New Security Paradigms Workshop (NSPW)
2015 Program Co-Chair, 19th International Conference on Financial Cryptography and Data Security
2014 General Chair, 8th International Conference on IT Security Incident Management & IT Forensics
2014 Organizer and Program Co-Chair, 1st Workshop on Bitcoin Research
2013 Track Co-Chair, 21st European Conference on Information Systems (ECIS)
2012 Program Chair, 11th Workshop on the Economics of Information Security (WEIS)
2010 Program Co-Chair, 12th Information Hiding Conference

Consulting

Occasionally, I accept consulting jobs iff

  • the job is compatible with my responsibilities as an Austrian university professor,
  • the contract partner is a reputable organization, and
  • the job is remunerated at market rates. (This is not to get rich, but to avoid unfair competition with our graduates’ startups and employers.)

I only sign NDAs which are specific enough to not constrain my research and teaching, contain a reasonable sunset provision, and do not prevent me from responsibly disclosing security vulnerabilities in widely used software.

GPG Public Key Fingerprint

1C1F E7E6 039B DA1B E630 1A15 99D0 738A 70DF 7A85

I may not be able to respond immediately to confidential communication whenever I work in untrusted environments. I do not assume any legal liability for documents signed with this key.

Projects