For a quick chat, feel free to drop by at my office spontaneously. If I'm not there or you prefer a longer meeting, please reach out via email first.

Lukas Pietzschmann

Lukas Pietzschmann received his Bachelor's degree in computer science from Aalen University in 2022, followed by his Master's degree from Ulm University in 2025. He is currently employed as a research assistant at the Institute of Distributed Systems.

Lukas is exploring potential privacy risks associated with public datasets. Currently, he's particularly interested in possible attack vectors and the potential for re-identification of individuals in datasets stemming from empirical research.

Besides that, he's also working on the BwNet2.0 project, which is concerned with the development of various parts of the Belwü network. His main focus is in the monitoring, collection, and provision of network data for the purpose of research and analysis.

Teaching

Labs

Seminars

Publications

2025

Schoffit, J., Pietzschmann, L., Prechtel, P., Eisermann, D., Wendzel, S., Kargl, F. and International Conference on Networked Systems (Ilmenau, 01.-04.09-2025) 2025. Enhancing client security in zero trust architectures: a device-agent policy enforcement point for compartmentalized network management. Proceedings of the International Conference on Networked Systems 2025 (NetSys 2025): Technische Universität Ilmenau, 1 – 4 September 2025. (Aug. 2025), 29–32.
Zero Trust Architectures have recently attracted a lot of interest in the network community. However, access control is often not extending into client devices. In this paper, we propose an extension of Zero Trust Policy Enforcement Points that integrates a device agent to expand the zero trust security model to client devices. We have developed a generalized framework that integrates with multiple compartmentalization technologies, ensuring the isolation of processes and enforcement of network policies while maintaining application and user authentication. This approach minimizes the attack surface of malicious processes, as our Zero Trust Device Agent manages compartment lifecycles based on their behaviour within the network and integrates into the global access control framework, thereby improving the overall security of zero trust architectures.

2024

Sihler, F., Pietzschmann, L., Straub, R., Tichy, M., Diera, A. and Dahou, A. 2024. On the Anatomy of Real-World R Code for Static Analysis. Proceedings of the 21st International Conference on Mining Software Repositories (Lisbon, Portugal, 2024), 619–630.
Context The R programming language has a huge and active community, especially in the area of statistical computing. Its interpreted nature allows for several interesting constructs, like the manipulation of functions at run-time, that hinder the static analysis of R programs. At the same time, there is a lack of existing research regarding how these features, or even the R language as a whole are used in practice. Objective In this paper, we conduct a large-scale, static analysis of more than 50 million lines of real-world R programs and packages to identify their characteristics and the features that are actually used. Moreover, we compare the similarities and differences between the scripts of R users and the implementations of package authors. We provide insights for static analysis tools like the lintr package as well as potential interpreter optimizations and uncover areas for future research. Method We analyze 4 230 R scripts submitted alongside publications and the sources of 19 450 CRAN packages for over 350 000 R files, collecting and summarizing quantitative information for features of interest. Results We find a high frequency of name-based indexing operations, assignments, and loops, but a low frequency for most of R's reflective functions. Furthermore, we find neither testing functions nor many calls to R's foreign function interface (FFI) in the publication submissions. Conclusion R scripts and package sources differ, for example, in their size, the way they include other packages, and their usage of R's reflective capabilities. We provide features that are used frequently and should be prioritized by static analysis tools, like operator assignments, function calls, and certain reflective functions like load.

Open Theses and Projects

Running Theses and Projects

F. Wenzl, „The Evolution of Privacy Dark Patterns,“ Masterarbeit, B. Erb and L. Pietzschmann (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2025 – Vergeben.
Motivated by the need to combat manipulative practices that trick users into sharing more personal data than intended, this thesis investigates the evolution of privacy dark patterns. As data collection becomes more central online, this study conducts a systematic literature review to categorize these patterns, identify countermeasures, and analyze how they have changed in response to legal regulations and shifting public awareness.
E. Dastan, „From data points to identities: Assessing privacy vulnerabilities in empirical research datasets,“ Bachelorarbeit, L. Pietzschmann (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2025 – Vergeben.
Publishing datasets is a common practice in empirical research. However, the risk of de-anonymization of individuals in these datasets is a significant concern, especially when the data is highly sensitive. This thesis aims to investigate the presence of privacy related vulnerabilities in a large collection of datasets. The thesis will focus on quantifying the extent of vulnerabilities and attempt to categorize them into distinct types.
L. Völk, „Evaluating de-anonymization attacks,“ Bachelorarbeit, B. Erb and L. Pietzschmann (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2025 – Vergeben.
This thesis investigates the effectiveness of various anonymization techniques against de-anonymization attacks. Recognizing the difficulty of evaluating these attacks with real-world data due to the lack of "ground truth", the work proposes using synthetically generated datasets where all information is known, allowing for objective measurement of attack success rates. The research will compare k-anonymity, l-diversity, and t-closeness against different attack models, including linkage attacks, to understand their robustness in practical data protection scenarios.