Background and activities

Leader of the Information Security Dicipline

Reseach areas:

  • Software security and security testing
  • Software vulnerability analysis
  • Model driven software development and model driven security
  • Access control, usage control and privacy protection
  • Security monitoring, policies, languages, models and enforcement

Scientific, academic and artistic work

Displaying a selection of activities. See all publications in the database







  • Schuckert, Felix; Katt, Basel; Langweg, Hanno. (2017) Source Code Patterns of SQL Injection Vulnerabilities. ARES'17. Proceedings of The 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy — August 29 - September 01, 2017.



  • Trojer, Thomas; Katt, Basel; Breu, Ruth; Schabetsberger, Thomas; Mair, Richard. (2014) Scenario-Based Templates Supporting Usable Privacy Policy Authoring. University of Amsterdam, Amsterdam Privacy Conference 2012 (APC 2012) ; 2014-06-18 - 2014-06-18.
  • Trojer, Thomas; Katt, Basel; Özata, Tülay; Breu, Ruth; Mangesius, Patrick; Schabetsberger, Thomas. (2014) Factors of Access Control Management in Electronic Healthcare: The Patients' Perspective. 2014 47th Hawaii International Conference on System Sciences ; 2014-01-06 - 2014-01-09.
  • Zech, Philipp; Katt, Basel. (2014) Security Test Generation by Answer Set Programming. In the 8th International Conference on Software Security and Reliability ; 2014-06-30 - 2014-07-02.


  • Gander, Matthias; Katt, Basel; Felderer, Michael; Breu, Ruth. (2013) Towards a Model- and Learning-Based Framework for Security Anomaly Detection. Formal Methods for Components and Objects.
  • Katt, Basel; Gander, Matthias; Breu, Ruth; Felderer, Michael. (2013) Enhancing Model Driven Security through Pattern Refinement Techniques. Formal Methods for Components and Objects.


  • Gander, Matthias; Felderer, Michael; Katt, Basel; Breu, Ruth. (2012) Monitoring Anomalies in IT-Landscapes Using Clustering Techniques and Complex Event Processing. Leveraging Applications of Formal Methods, Verification, and Validation.
  • Gander, Matthias; Katt, Basel; Felderer, Michael; Tolbaru, Adrian; Breu, Ruth; Moschitti, A.. (2012) Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning. Trustworthy Eternal Systemsvia Evolving Software, Data and Knowledge..
  • Trojer, Thomas; Katt, Basel; Breu, Ruth; Schabetsberger, Thomas; Mair, Richard. (2012) Managing Privacy and Effectiveness of Patient-Administered Authorization Policies. International Journal of Computational Models and Algorithms in Medicine (IJCMAM).
  • Trojer, Thomas; Katt, Basel; Schabetsberger, Thomas; Breu, Ruth; Mair, Richard. (2012) Considering privacy and effectiveness of authorization policies for shared electronic health records. IHI '12 Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium ; 2012-01-28 - 2012-01-30.
  • Trojer, Thomas; Katt, Basel; Schabetsberger, Thomas; Breu, Ruth; Mair, Richard. (2012) The Process of Policy Authoring of Patient-Controlled Privacy Preferences. Electronic Healthcare.


  • Katt, Basel; Trojer, Thomas; Breu, Ruth; Schabetsberger, Thomas; Wozak, Florian. (2010) cover Meeting EHR Security Requirements: SeAAS Approach. Seamless Care – Safe Care.
  • Rempel, Patrick; Katt, Basel; Breu, Ruth. (2010) Supporting Role Based Provisioning with Rules Using OWL and F-Logic. On the Move to Meaningful Internet Systems: OTM 2010. OTM 2010 ; 2010-10-25 - 2010-10-29.


  • Breu, Ruth; Lechner, Alexander; Willburger, Mathias; Katt, Basel. (2008) Workflow Testing. Leveraging Applications of Formal Methods (ISoLA 2008) ; 2008-10-13 - 2008-10-16.
  • Katt, Basel; Breu, Ruth; Hafner, Michael; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian. (2008) Privacy and Access Control for IHE-Based Systems. Electronic Healthcare. eHealth 2008 ; 2008-09-08 - 2008-09-09.
  • Katt, Basel; Hafner, Michael. (2008) Model-Driven Policy Framework for Usage Control-based Privacy. the second International workshop on Model-based Design Of Trustworthy Health Information Systems (MOTHIS) ; 2008-09-28 - 2008-10-03.
  • Katt, Basel; Zhang, Xinwen; Breu, Ruth; Felderer, Michael; Hafner, Michael; Seifert, Jean-Pierre. (2008) A general obligation model and continuity enhanced policy enforcement engine for usage control. SACMAT '08 Proceedings of the 13th ACM symposium on Access control models and technologies ; 2008-06-11 - 2008-06-13.