I am a professor of information security and computer networks at Hochschule Worms, where I am also the scientific director of the Center for Technology and Transfer. In addition, I am a lecturer at the University of Hagen. Before my professorship, I was a PostDoc at Fraunhofer FKIE in Bonn, where I led a research team on smart building security. I received my Ph.D. (Dr. rer. nat.) and my Habilitation (Dr. habil.) from the Faculty of Mathematics and Computer Science at the University of Hagen in 2013 and 2020, respectively.
A list of my 170+ mostly academic publications can be found here. However, I also wrote non-academic books about the Linux operating system and contributed open source code/patches to the free software community. There is also a list of selected talks that I gave.
- CPS/IoT/smart building communications and security
- Application of machine learning/AI for anomaly detection in networks and networked CPS
- Network information hiding (network covert channels and network steganography)
- Security of communication protocols
- Terminology/taxonomy in information security
I am a member of several steering committees, initiatives, program and organizing committees (cf. details. I am (or was) lecturing and supervising at Bonn University, FernUniversität in Hagen and Hochschule Augsburg. A list of my projects, both funded and spare-time software projects, is also available.
In addition to information security, I am interested in university history, campus novels, and retro computing – in particular: operating system history and historic network protocols. I own a small collection of rather historic books on these retro computing topics. Sparetime: different kinds of sports.
Contact: steffen (at) wendzel (dot) de (PGP pub key: FD701BD1).
- Our new article Avoiding research tribal wars using taxonomies was just published in IEEE Computer Vol. 56(1).
- Our latest work’s pre-print on a new category of covert channels called history covert channels is now available arXiv: https://arxiv.org/abs/2212.11850.
- Last week, I was a visiting researcher at the Institute for Applied Mathematics and Information Technologies (IMATI), Genova, to work jointly with my long-time colleague Luca Caviglione.
We recently had a great kick-off for our KIASH project.
I gave a talk about writing a Linux book for twenty years at the Linux Presentation Day 2022/2 at Hochschule Worms. The talk was covering the history of our German Linux book. Its history dates back till 2002 (first edition appeared 2004).
I now operate a Mastodon profile (@firstname.lastname@example.org).
I am very pleased that our new BMBF-funded project EMPOWER received funding for five years (2023-2027). We will run a sub-project on cyber security, funded with around 2.4 Mio. EUR! The project is mostly having a regional focus (Rhine-Main-Neckar area in RLP and connected states). Under the umbrella of this project, we will build a cyber security innovation lab, a think tank, and run several sub-projects, also to empower regional SMEs. Let us know if you are interested in collaborating with us.
- Our new paper Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project History appeared in JoWUA.
- We reworked the website on hiding patterns: https://patterns.ztt.hs-worms.de.
- Our new special issue for the Journal of Universal Computer Science (J.UCS) targets Cybersecurity Risks from a Multidisciplinary Perspective (Call for Papers). Looking forward for your submissions!
- There is some news about our steganography taxonomy work and my keynote related to it (in German).
- Next week, I will give a keynote about hiding patterns in steganography at the CUING workshop (ARES conference, Vienna).
- Our PhD student Tobias Schmidbauer will present our paper Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication, also at the CUING workshop.
- Our new BMBF-funded project is about to start: KIASH will investigate privacy-preserving AI-based anomaly detection for smart homes. The project will be conducted from 2022 till 2025.
- During the last year, we revised the 2021-taxonomy for steganography methods and heavily extended the previous taxonomy. More information can be found on the steganography hiding patterns website and in the pre-print.
- I am honored to serve as the program co-chair of the European Interdisciplinary Cybersecurity Conference 2023 (EICC’23), 2023, Stavanger, Norway. I hope the conference can take place in person.
- I am honored to give the keynote at this year’s CUING workshop.
- Our paper Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication was accepted at the CUING workshop co-located with the ARES conference in Vienna and will be presented in August.
- Our AsiaCCS SoK paper on indirect network covert channels is now available for download.
- It looks like my group receives two new BMBF-funded security projects this summer. Stay tuned!
- New paper: Analysis of Reversible Network Covert Channels, IEEE ACCESS, in press.
- New paper: Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 13(1), 2022.
- I was interviewed by SWR Aktuell regarding cyberattacks on companies.
- We finished a new special issue:
- Two of our submissions have been accepted at EICC’22 / DETONATOR workshop at EICC’22.
- We uploaded the final version of our AsiaCCS’22 paper SoK: A Survey Of Indirect Network-level Covert Channels to ResearchGate: link. This is an open access paper and will be presented in early June.
Our paper Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime as been accepted at the Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) under the umbrella of an ARES’21 special issue.
Very grateful that our AsiaCCS paper ``SoK: I’d Rather Drop It From The Eaves’’: A Survey Of Indirect Network-level Covert Channels’’ got accepted!
I am happy to announce that we organize the 4th International Workshop on Information Security Methodology and Replication Studies (IWSMR), co-located with ARES 2022, Vienna, AT. Please consider submitting your papers to IWSMR’22.
Our new IEEE Security & Privacy special issue on Security and Privacy Issues of Home Globalization was published today: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9693419.
Our paper Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection has been published by Entropy, https://www.mdpi.com/1099-4300/24/2/176.
Our German paper Untersuchung des Gender-gaps bei Cybersecurity-Publikationen has been accepted as a short paper at GI SICHERHEIT 2022, Karlsruhe.
- Our new special issue at the Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) on Multidisciplinary Solutions to Modern Cybersecurity Challenges is now available.
- I am very glad that the 9th(!) edition of our German Linux book is now available, see here. In earlier editions, the book was called Einstieg in Linux, but the name was recently changed to Linux. Der Grundkurs (that is why it is now officially a 1st edition instead of a 9th edition) and the book is now more tailored for academic students (features more kernel-internal concepts etc.).
- Moreover, I am very glad that we have finished our special issue on Emerging topis in defending networked systems of the highly ranked journal Future Generation Computer Systems (FGCS). Our editorial is available here.
- 3 out of 3 papers that we submitted to EICC’21 have been accepted and will be presented online next month.
- After 4.5 years as deputy scientific director, I am now the scientific director of the Centre for Technology and Transfer (Zentrum für Technologie und Transfer) at the University of Applied Sciences in Worms.