Steffen Wendzel

Orcid: 0000-0002-1913-5912

According to our database1, Steffen Wendzel authored at least 94 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT).
Proceedings of the Sicherheit, 2024

Look What's There! Utilizing the Internet's Existing Data for Censorship Circumvention with OPPRESSION.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

A Comprehensive Pattern-based Overview of Stegomalware.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Robust and Homomorphic Covert Channels in Streams of Numeric Data.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy.
IEEE Trans. Dependable Secur. Comput., 2023

Avoiding Research Tribal Wars Using Taxonomies.
Computer, 2023

Why people replace their aging smart devices: A push-pull-mooring perspective.
Comput. Secur., 2023

Power Consumption Analysis as a Detection Indicator for Cyberattacks on Smart Home Devices.
Proceedings of the Energy Informatics - Third Energy Informatics Academy Conference, 2023

2022
Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project History.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

Guest editorial: Information security methodology and replication studies.
it Inf. Technol., 2022

Security and Privacy Issues of Home Globalization.
IEEE Secur. Priv., 2022

Emerging topics in defending networked systems.
Future Gener. Comput. Syst., 2022

Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection.
Entropy, 2022

Did You See That? A Covert Channel Exploiting Recent Legitimate Traffic.
CoRR, 2022

Derivatives in Proton CT.
CoRR, 2022

Analysis of Reversible Network Covert Channels.
IEEE Access, 2022

Short Paper: Untersuchung des Gender-gaps bei Cybersecurity-Publikationen.
Proceedings of the Sicherheit, 2022

Steganography Hiding Patterns: A Brief Review.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

Towards Passive Identification of Aged Android Devices in the Home Network.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

SoK: A Survey Of Indirect Network-level Covert Channels.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels.
Comput. Secur., 2021

Reconnection-Based Covert Channels in Wireless Networks.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

Adaptive Warden Strategy for Countering Network Covert Storage Channels.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

Reset- and Reconnection-based Covert Channels in CoAP.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021

Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021

How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021

A Revised Taxonomy of Steganography Embedding Patterns.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Crème de la Crème: Lessons from Papers in Security Publications.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Risks and Opportunities for Information Hiding in DICOM Standard.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Not all areas are equal: analysis of citations in information security research.
Scientometrics, 2020

Information Security Methodology, Replication Studies and Information Security Education.
J. Univers. Comput. Sci., 2020

Anomaly Detection in ICS based on Data-history Analysis.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020

Covert Channels in One-Time Passwords Based on Hash Chains.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020

Design and performance evaluation of reversible network covert channels.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Covert storage caches using the NTP protocol.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Guest Editorial: Recent Advances in Cyber-Physical Security in Industrial Environments.
IEEE Trans. Ind. Informatics, 2019

Detection of Size Modulation Covert Channels Using Countermeasure Variation.
J. Univers. Comput. Sci., 2019

Recent Advancements in Digital Forensics, Part 2.
IEEE Secur. Priv., 2019

Countering adaptive network covert communication with dynamic wardens.
Future Gener. Comput. Syst., 2019

Covert Channels in the MQTT-Based Internet of Things.
IEEE Access, 2019

Protocol-independent Detection of "Messaging Ordering" Network Covert Channels.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Towards Reversible Storage Network Covert Channels.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Network information hiding: terminology, taxonomy, methodology and countermeasures
, 2019

2018
Emerging and Unconventional: New Attacks and Innovative Detection Techniques.
Secur. Commun. Networks, 2018

WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms.
J. Univers. Comput. Sci., 2018

The New Threats of Information Hiding: The Road Ahead.
IT Prof., 2018

Information hiding: Challenges for forensic experts.
Commun. ACM, 2018

Detection of Covert Channels in TCP Retransmissions.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

Get Me Cited, Scotty!: Analysis of Citations in Covert Channel/Steganography Research.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Steganography for Cyber-physicalSystems.
J. Cyber Secur. Mobil., 2017

Enhanced Ant Colony-Inspired ParallelAlgorithm to Improve Cryptographic PRNGs.
J. Cyber Secur. Mobil., 2017

Recent Advancements in Digital Forensics.
IEEE Secur. Priv., 2017

The Future of Digital Forensics: Challenges and the Road Ahead.
IEEE Secur. Priv., 2017

Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

2016
Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions.
Secur. Commun. Networks, 2016

On importance of steganographic cost for network steganography.
Secur. Commun. Networks, 2016

Covert channel-internal control protocols: attacks and defense.
Secur. Commun. Networks, 2016

Unified Description for Network Information Hiding Methods.
J. Univers. Comput. Sci., 2016

Security, Privacy and Reliability of Smart Buildings.
J. Univers. Comput. Sci., 2016

Why Johnny Can't Use Stego: a Human-oriented Perspective on the Application of Steganography.
CoRR, 2016

How to increase the security of smart buildings?
Commun. ACM, 2016

POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research.
J. Univers. Comput. Sci., 2015

"The Good, The Bad and The Ugly": Evaluation of Wi-Fi Steganography.
J. Commun., 2015

Pattern-Based Survey and Categorization of Network Covert Channel Techniques.
ACM Comput. Surv., 2015

Securing BACnet's Pitfalls.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Countermeasures for Covert Channel-Internal Control Protocols.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Hidden and under control - A survey and outlook on covert channel-internal control protocols.
Ann. des Télécommunications, 2014

Envisioning Smart Building Botnets.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats.
Proceedings of the ISSE 2014, 2014

2013
Novel approaches for network covert storage channels.
PhD thesis, 2013

Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
The Problem of Traffic Normalization Within a Covert Channel's Network Environment Learning Phase.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Detecting protocol switching covert channels.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Dynamic routing in covert channel overlays based on control protocols.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Covert and side channels in buildings and the prototype of a building-aware active warden.
Proceedings of IEEE International Conference on Communications, 2012

Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

Systematic Engineering of Control Protocols for Covert Channels.
Proceedings of the Communications and Multimedia Security, 2012

2011
A secure interoperable architecture for building-automation applications.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011

Low-Attention Forwarding for Mobile Network Covert Channels.
Proceedings of the Communications and Multimedia Security, 2011

2008
Protocol channels as a new design alternative of covert channels
CoRR, 2008


  Loading...