Prof. Dr. habil. Steffen Wendzel
Zentrum für Technologie und Transfer | ZTT, Hochschule Worms
- 06241/509-213
- 0000-0002-1913-5912
Dittmann, Jana; Krätzer, Christian; Kiltz, Stefan et al.
Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT)Steffen Wendzel et al. (Hrsg). GI Sicherheit 2024. Bonn. 2024 S. 265 - 268 (LNI P-345)
Zillien, Sebastian; Schmidbauer, Tobias; Kubek, Mario et al.
Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSIONProc. 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024). New York: ACM 2024 S. 1 - 16
Wendzel, Steffen; Wressnegger, Christian; Hartmann, Laura et al.
Sicherheit 2024: Beiträge der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)Bonn. 2024 306 S. (LNI P-345)
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech
Avoiding Research Tribal Wars Using TaxonomiesComputer. Bd. 56. H. 1. Institute of Electrical and Electronics Engineers (IEEE) 2023 S. 93 - 96 10008941
Schorr, Victoria; Kamenev, Nikolai; Bleistein, Thomas et al.
Power Consumption Analysis as a Detection Indicator for Cyberattacks on Smart Home DevicesEnergy Informatics. Bern: Springer 2023 S. 224 - 239
Mileva, Aleksandra; Wendzel, Steffen; Franqueira, Virginia
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference: Stavanger, NorwayEICC. New York: ACM 2023
Schilling, Alexander; Aehle, Max; Alme, Johan et al.
Uncertainty-aware spot rejection rate as quality metric for proton therapy using a digital tracking calorimeterPhysics in Medicine & Biology. Bd. 68. H. 19. IOP Publishing 2023 194001
Zillien, Sebastian; Wendzel, Steffen
Weaknesses of popular and recent covert channel detection methods and a remedyIEEE Transactions on Dependable and Secure Computing. Bd. 20. H. 6. Institute of Electrical and Electronics Engineers (IEEE) 2023 S. 5156 - 5157
Lenz, Julia; Bozakov, Zdravko; Wendzel, Steffen et al.
Why People Replace their Aging Smart Devices: A Push–Pull–Mooring PerspectiveComputers & Security. Bd. 130. Elsevier B.V. 2023 103258
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.
A Generic Taxonomy for Steganography MethodsNew York: Institute of Electrical and Electronics Engineers (IEEE) 2022 (TechRxiv)
Szary, Przemyslaw; Mazurczyk, Wojciech; Wendzel, Steffen et al.
Analysis of Reversible Network Covert ChannelsIEEE Access. Bd. 10. Institute of Electrical and Electronics Engineers (IEEE) 2022 S. 41226 - 41238
Hartmann, Laura; Wendzel, Steffen
Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project HistoryJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Bd. 13. H. 3. Innovative Information Science & Technology Research Group (ISYOU) 2022 S. 4 - 24
Schmidbauer, Tobias; Keller, Jörg; Wendzel, Steffen
Challenging Channels: Encrypted Covert Channels within Challenge-Response AuthenticationProceedings of the 17th International Conference on Availability, Reliability and Security. New York: ACM 2022 S. 1 - 10 50:1-10
Schmidbauer, Tobias; Wendzel, Steffen
Detection Of Computational Intensive Reversible Covert Channels Based On Packet RuntimeJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Bd. 13. H. 1. 2022 S. 137 - 166
Wendzel, Steffen; Schmidbauer, Tobias; Zillien, Sebastian et al.
Did You See That? A Covert Channel Exploiting Recent Legitimate TrafficCornell University: arXiv 2022 2212.11850
Wendzel, Steffen; Mazurczyk, Wojciech; Caviglione, Luca et al.
Emerging topics in defending networked systemsFuture Generation Computer Systems. Bd. 128. Elsevier B.V. 2022 S. 317 - 319
Wendzel, Steffen; Caviglione, Luca; Mileva, Aleksandra et al.
Guest editorial: Information security methodology and replication studiesit - Information Technology. Bd. 64. H. 1-2. Walter de Gruyter GmbH 2022 S. 1 - 3
Mileva, Aleksandra; Velinov, Aleksandar; Dimitrova, Vesna et al.
Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based DetectionEntropy. Bd. 24. H. 2. MDPI 2022 S. 1 - 23 176
Caviglione, Luca; Wendzel, Steffen; Vrhovec, Simon et al.
Security and Privacy Issues of Home GlobalizationIEEE Security & Privacy. Bd. 20. H. 1. Institute of Electrical and Electronics Engineers (IEEE) 2022 S. 10 - 11
Mayer, Nico; Wendzel, Steffen; Keller, Jörg
Short Paper: Untersuchung des Gender-gaps bei Cybersecurity-PublikationenWressnegger, Christian u. a. (Hrsg). Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) : 5.-8. April 2022 in Karlsruhe. Bonn: Gesellschaft für Informatik e. V. 2022 S. 173 - 182 (GI-Edition. Proceedings ; 323)
Schmidbauer, Tobias; Wendzel, Steffen
SoK: A Survey Of Indirect Network-level Covert ChannelsProceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (AsiaCCS). New York: ACM 2022 S. 546 - 560
Wendzel, Steffen; Caviglione, Luca; Fechner, Bernhard
Steganography Hiding Patterns: A Brief ReviewEICC 2022: Proccedings of the European Interdisciplinary Cybersecurity Conference. New York: ACM 2022 S. 107 - 108
Bub, Daniel; Hartmann, Laura; Bozakov, Zdravko et al.
Towards Passive Identification of Aged Android Devices in the Home NetworkEICC 2022: Proccedings of the European Interdisciplinary Cybersecurity Conference. Barcelona, Spain: ACM 2022 S. 17 - 20
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.
A Revised Taxonomy of Steganography Embedding PatternsARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 12
Chourib, Mehdi; Wendzel, Steffen; Mazurczyk, Wojciech
Adaptive Warden Strategy for Countering Network Covert Storage Channels2021 IEEE 46th Conference on Local Computer Networks (LCN). NY: IEEE 2021 S. 148 - 153
Mileva, Aleksandra; Velinov, Aleksandar; Hartmann, Laura et al.
Comprehensive analysis of MQTT 5.0 susceptibility to network covert channelsComputers & Security. Bd. 104. Elsevier BV 2021 S. 102207
Vrhovec, Simon; Caviglione, Luca; Wendzel, Steffen
Crème de la Crème: Lessons from Papers in Security PublicationsARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 9
Hartmann, Laura; Wendzel, Steffen
Detection of Anomalous Values within TIA Project Data History for Industrial Control SystemsProceedings of the European Interdisciplinary Cybersecurity Conference - Doctoral Symposium. New York: ACM 2021 S. 1 - 6
Hartmann, Laura; Wendzel, Steffen
How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world DataKulyk, Oksana u. a. (Hrsg). EICC: European Interdisciplinary Cybersecurity Conference. New York: ACM 2021 S. 83 - 84
Schmidbauer, Tobias; Wendzel, Steffen
Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert ChannelsARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 15
Pettersen, Helge Egil Seime; Aehle, Max; Alme, Johan et al.
Investigating particle track topology for range telescopes in particle radiography using convolutional neural networksActa Oncologica. Bd. 60. H. 11. Taylor & Francis 2021 S. 1413 - 1418
Wendzel, Steffen
IT-Sicherheit für TCP/IP- und IoT-Netzwerke2. Aufl. Wiesbaden: Springer Fachmedien Wiesbaden 2021
Caviglione, Luca; Wendzel, Steffen; Mileva, Aleksandra et al.
Multidisciplinary solutions to modern cybersecurity challengesJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Bd. 12. H. 4. 2021 S. 1 - 3
Zillien, Sebastian; Wendzel, Steffen
Reconnection-based Covert Channels in Wireless NetworksJøsang A. ; Futcher L. ; Hagen J. (Hrsg). ICT Systems Security and Privacy Protection : 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings. Cham: Springer International Publishing 2021 S. 118 - 133 (IFIP Advances in Information and Communication Technology, 1868-4238 ; 625)
Hartmann, Laura; Zillien, Sebastian; Wendzel, Steffen
Reset- and Reconnection-based Covert Channels in CoAPKulyk, Oksana u. a. (Hrsg). EICC: European Interdisciplinary Cybersecurity Conference. New York: ACM 2021 S. 66 - 71
Keller, Jörg; Wendzel, Steffen
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash ChainsApplied Sciences. Bd. 11. H. 2. Basel, Schweiz: MDPI 2021 S. 731 - 742
Mileva, Aleksandra; Caviglione, Luca; Velinov, Aleksander et al.
Risks and Opportunities for Information Hiding in DICOM StandardARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 8
Hartmann, Laura; Wendzel, Steffen
Anomaly Detection in ICS based on Data-history AnalysisProceedings of the European Interdisciplinary Cybersecurity Conference. New York City: ACM 2020 S. 1 - 2
Keller, Jörg; Wendzel, Steffen
Covert Channels in One-Time Passwords Based on Hash ChainsEICC 2020: Proceedings of the European Interdisciplinary Cybersecurity Conference. New York City: ACM 2020 S. 1 - 2
Schmidbauer, Tobias; Wendzel, Steffen
Covert storage caches using the NTP protocol.ARES. 2020 S. 67:1 - 67:10
Szary, Przemyslaw; Mazurczyk, Wojciech; Wendzel, Steffen et al.
Design and performance evaluation of reversible network covert channels.ARES. 2020 S. 68:1 - 68:8
Wendzel, Steffen
Network Information Hiding: Terminology, Taxonomy, Methodology and CountermeasuresHagen (FernUniversität in Hagen). 2020 244 S.
Wendzel, Steffen
Review of the book Future Automation: Changes to Lives and to Businesses by Carone, T. (World Scientific Publishing Co, Inc., 2018)ACM (Hrsg). ACM Computing Reviews. New York City: ACM 2020 Review Item CR147026
Wendzel, Steffen; Caviglione, Luca; Checco, Alessandro et al.
Special Issue Editorial: Information Security Methodology, Replication Studies and Information Security EducationJournal of Universal Computer Science (J.UCS). Bd. 26. H. 7. Klagenfurt. 2020 S. 762 - 763
Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen
Advanced Information Hiding Techniques for Modern BotnetsKambourakis, Georgios; Anagnostopoulos, Marios; Meng, Weizhi; Zhou, Peng (Hrsg). Botnets: Architectures, Countermeasures, and Challenges. 1. Aufl. Boca Raton, FL: Taylor & Francis Group / CRC Press 2019 S. 165 - 188 (CRC Series in Security, Privacy and Trust)
Mazurczyk, Wojciech; Wendzel, Steffen; Chourib, Mehdi et al.
Countering adaptive network covert communication with dynamic wardensFuture Generation Computer Systems. Bd. 94. Elsevier BV 2019 S. 712 - 725
Velinov, Aleksandar; Wendzel, Steffen; Mileva, Aleksandra et al.
Covert Channels in the MQTT-Based Internet of ThingsIEEE ACCESS. Bd. 7. IEEE 2019 S. 161899 - 161915
Wendzel, Steffen; Link, Florian; Eller, Daniela et al.
Detection of Size Modulation Covert Channels Using Countermeasure VariationJournal of Universal Computer Science (JUCS). Bd. 25. H. 11. Klagenfurt: Universität Graz 2019 S. 1396 - 1416
Wendzel, Steffen; Plötner, Johannes
Einstieg in Linux : Linux lernen, verstehen und einsetzen, inkl. Einführung in die Linux-Shell. Das Buch für alle Linux-Anfänger8., aktualisierte Auflage. Aufl. Bonn: Rheinwerk Computing 2019 410 S.
Schmidbauer, Tobias; Wendzel, Steffen; Mileva, Aleksandra et al.
Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-WalksProceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 10