Some of my fundamental papers


Overview:


 

Selected Ranked Publications

Wendzel S, Schmidbauer T, Zillien S, Keller J (2024a) DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data. IEEE Transactions on Dependable and Secure Computing (TDSC)./.: DOI: 10.1109/TDSC.2024.3410679. in press

Zillien S, Schmidbauer T, Kubek M, Keller J, Wendzel S (2024b) Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION. In: Proc. 19th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2024). ACM, pp 80–95, DOI: 10.1145/3634737.3637676. Acceptance rate: 21%

Zillien S, Wendzel S (2023a) Weaknesses of popular and recent covert channel detection methods and a remedy. IEEE Transactions on Dependable and Secure Computing (TDSC) 20/6:5156–5167, DOI: 10.1109/TDSC.2023.3241451

Lenz J, Bozakov Z, Wendzel S, Vrhovec S (2023b) Why People Replace their Aging Smart Devices: A Push–Pull–Mooring Perspective. Computers & Security (COSE) 130:103258, DOI: 10.1016/j.cose.2023.103258

Wendzel S, Caviglione L, Mazurczyk W (2023c) Avoiding research tribal wars using taxonomies. IEEE Computer 56/1:93–96. IEEE, DOI: 10.1109/MC.2022.3218175

Schmidbauer T, Wendzel S (2022) SoK: A Survey Of Indirect Network-level Covert Channels. In: Proc. 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2022). ACM, pp 546–560, DOI: 10.1145/3488932.3517418. Acceptance rate: 18.4%

Mileva A, Velinov A, Hartmann L, Wendzel S, Mazurczyk W (2021a) Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels. Computers & Security (COSE) 104:102207. Elsevier, DOI: 10.1016/j.cose.2021.102207

Zillien S, Wendzel S (2021b) Reconnection-Based Covert Channels in Wireless Networks. In: Jøsang A, Futcher L, Hagen J (eds) ICT Systems Security and Privacy Protection (IFIP SEC 2021). Springer International Publishing, Cham, pp 118–133, DOI: 10.1007/978-3-030-78120-0_8. Acceptance rate: 25%

Wendzel S, Lévy-Bencheton C, Caviglione L (2020) Not all Areas are Equal: Analysis of Citations in Information Security Research. Scientometrics 122/1:267–286. Springer, DOI: 10.1007/s11192-019-03279-6

Mazurczyk W, Wendzel S, Chourib M, Keller J (2019a) Countering adaptive network covert communication with dynamic wardens. Future Generation Computer Systems (FGCS) 94:712–725. Elsevier, DOI: 10.1016/j.future.2018.12.047

Wendzel S, Link F, Eller D, Mazurczyk W (2019b) Detection of Size Modulation Covert Channels Using Countermeasure Variation. Journal of Universal Computer Science (JUCS) 25/11:1396–1416, DOI: 10.3217/jucs-025-11-1396

Mazurczyk W, Wendzel S (2018a) Information Hiding – Challenges for Forensic Experts. Communications of the ACM (CACM) 61/1:86–94. ACM, DOI: 10.1145/3158416

Zillien S, Wendzel S (2018b) Detection of covert channels in TCP retransmissions. In: Proc. 23rd Nordic Conference on Secure IT Systems (NordSec 2018). Springer, pp 203–218, DOI: 10.1007/978-3-030-03638-6_13

Keidel R, Wendzel S, Zillien S, Conner ES, Haas G (2018c) WoDiCoF – A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms. Journal of Universal Computer Science (JUCS) 24/5:556–576, DOI: 10.3217/jucs-024-05-0556

Caviglione L, Wendzel S, Mazurczyk W (2017a) The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security & Privacy (S&P) 15/6:12–17. IEEE, DOI: 10.1109/MSP.2017.4251117

Lehner F, Mazurczyk W, Keller J, Wendzel S (2017b) Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach. In: Proc. 42th IEEE Conference on Local Computer Networks (LCN 2017). IEEE, pp 78–85, DOI: 10.1109/LCN.2017.32

Wendzel S (2016a) How to Increase the Security of Smart Buildings. Communications of the ACM (CACM) 59/5:47–49. ACM, DOI: 10.1145/2828636

Wendzel S, Mazurczyk W (2016b) Poster: An Educational Network Protocol for Covert Channel Analysis Using Patterns. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS 2016). ACM, New York, NY, USA, pp 1739–1741, DOI: 10.1145/2976749.2989037

Wendzel S, Mazurczyk W, Zander S (2016c) A Unified Description Method for Network Information Hiding Methods. Journal of Universal Computer Science (JUCS) 22/11:1456–1486, DOI: 10.3217/jucs-022-11-1456

Wendzel S, Zander S, Fechner B, Herdin C (2015a) Pattern-based survey and categorization of network covert channel techniques. ACM Computing Surveys (CSUR) 47/3:1–26. ACM New York, NY, USA, DOI: 10.1145/2684195

Kaur J, Tonejc J, Wendzel S, Meier M (2015b) Securing BACnet’s pitfalls. In: Proc. 30th IFIP TC-11 International Information Security and Privacy Conference (IFIP SEC 2015). Springer, pp 616–629, DOI: 10.1007/978-3-319-18467-8_41. Acceptance rate: 19.8%

Wendzel S, Palmer C (2015c) Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research. Journal of Universal Computer Science (JUCS) 21/12:1684–1705, DOI: 10.3217/jucs-021-12-1684

Wendzel S, Zander S (2012a) Detecting protocol switching covert channels. In: Proc. 37th Annual IEEE Conference on Local Computer Networks (LCN 2012). IEEE, pp 280–283, DOI: 10.1109/LCN.2012.6423628

Wendzel S, Keller J (2012b) Systematic engineering of control protocols for covert channels. In: IFIP International Conference on Communications and Multimedia Security (CMS 2012). Springer, pp 131–144, DOI: 10.1007/978-3-642-32805-3_11

Wendzel S, Keller J (2011) Low-attention forwarding for mobile network covert channels. In: Decker et. al. B de (ed) Proc. 12th Conference on Communications and Multimedia Security (CMS 2011). IFIP International Federation for Information Processing; Springer, pp 122–133, DOI: 10.1007/978-3-642-24712-5_10. Acceptance rate: 21.1%


 

Books

Wendzel S, Plötner J (2024) Linux. Der Grundkurs, 2nd edn. Rheinwerk Verlag, https://www.rheinwerk-verlag.de/linux_5931/

Wendzel S (2021a) IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung, 2nd edn. Springer, DOI: 10.1007/978-3-658-33423-9. 2021

Wendzel S, Plötner J (2021b) Linux. Der Grundkurs, 1st edn. Rheinwerk Verlag, https://www.rheinwerk-verlag.de/linux-der-grundkurs/

Wendzel S, Plötner J (2019) Einstieg in Linux, 8th edn. Rheinwerk Verlag, https://www.rheinwerk-verlag.de/einstieg-in-linux-linux-verstehen-und-einsetzen/

Wendzel S (2018) IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung, 1st edn. Springer, DOI: 10.1007/978-3-658-22603-9. This edition received more than 100k downloads at SpringerLink.

Mazurczyk W, Wendzel S, Zander S, Houmansadr A, Szczypiorski K (2016a) Information hiding in communication networks. Fundamentals, mechanisms, and applications. Wiley-IEEE, DOI: 10.1002/9781119081715. IEEE Series on Information and Communication Networks Security

Wendzel S, Ploetner J (2016b) Einstieg in Linux, 7th edn. Rheinwerk Verlag

Wendzel S, Ploetner J (2014) Einstieg in Linux, 6th edn. Galileo Press

Ploetner J, Wendzel S (2012a) Linux. Das umfassende Handbuch, 5th edn. Galileo Press, https://www.researchgate.net/publication/233765888_Linux_Das_umfassende_Handbuch

Wendzel S (2012b) Tunnel und verdeckte Kanäle im Netz, 1st edn. Vieweg+Teubner, DOI: 10.1007/978-3-8348-2143-0

Wendzel S, Ploetner J (2012c) Einstieg in Linux, 5th edn. Galileo Press

Ploetner J, Wendzel S (2011) Linux. Das umfassende Handbuch, 4th edn. Galileo Press

Wendzel S, Ploetner J (2010) Einstieg in Linux. Eine distributionsunabhängige Einführung, 4th edn. Galileo Press

Ploetner J, Wendzel S (2009) Linux. Das umfassende Handbuch, 3rd edn. Galileo Press

Wendzel S, Ploetner J (2008a) Einstieg in Linux. Eine distributionsunabhängige Einführung, 3rd edn. Galileo Press

Ploetner J, Wendzel S (2008b) Linux. Das umfassende Handbuch, 2nd edn. Galileo Press

Ploetner J, Wendzel S (2007) Praxisbuch Netzwerk-Sicherheit. VPN, WLAN, Intrusion Detection, Disaster Recovery, Kryptologie, für UNIX/Linux und Windows, 2nd edn. Galileo Press, http://www.researchgate.net/publication/233765886_Praxisbuch_Netzwerksicherheit

Wendzel S, Ploetner J (2006a) Einstieg in Linux. Eine distributionsunabhängige Einführung, 2nd edn. Galileo Press

Ploetner J, Wendzel S (2006b) Linux. Ein distributionsunabhängiges Handbuch, 1st edn. Galileo Press

Ploetner J, Wendzel S (2005) Praxisbuch Netzwerk-Sicherheit. VPN, WLAN, Intrusion Detection, Disaster Recovery, Kryptologie, für UNIX/Linux und Windows, 1st edn. Galileo Press

Wendzel S, Ploetner J (2004) Einstieg in Linux. Eine distributionsunabhängige Einführung, 1st edn. Galileo Press


 

Edited Journal Special Issues

Wendzel S, Mileva A, Franqueira VNL, Jaatun MG (2024) Editorial: Fighting cybersecurity risks from a multidisciplinary perspective. Journal of Universal Computer Science (JUCS) 30/9:1137–1139, DOI: 10.3897/jucs.131628

Caviglione L, Wendzel S, Vrhovec S, Mileva A (2022a) Security and Privacy Issues of Home Globalization. Security and Privacy (S&P) 20/1:10–11. IEEE, DOI: 10.1109/MSEC.2021.3127372

Wendzel S, Mazurczyk W, Caviglione L, Houmansadr A (2022b) Emerging topics in defending networked systems. Future Generation Computer Systems (FGCS) 128:317–319. Elsevier, DOI: 10.1016/j.future.2021.10.010

Wendzel S, Caviglione L, Mileva A, Lalande J-F, Mazurczyk W (2022c) Guest editorial: Information security methodology and replication studies. it – Information Technology (ITIT) 64/1-2:1–3. De Gruyter, Oldenbourg, DOI: 10.1515/itit-2022-0016

Caviglione L, Wendzel S, Mileva A, Vrhovec S (2021) Multidisciplinary solutions to modern cybersecurity challenges. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 12/3:1–3, DOI: 10.22667/JOWUA.2021.12.31.001

Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J-F, Mazurczyk W (2020) Information security methodology, replication studies and information security education. Journal of Universal Computer Science (JUCS) 26/7:762–763, DOI: 10.3897/jucs.2020.041

Lv Z, Mazurczyk W, Wendzel S, Song H (2019a) Recent advances in cyber-physical security in industrial environments. IEEE Transactions on Industrial Informatics (TII) 15/12:6468–6471. IEEE, DOI: 10.1109/TII.2019.2945971

Mazurczyk W, Caviglione L, Wendzel S (2019b) Recent advancements in digital forensics, part 2. IEEE Security and Privacy (S&P) 17/1:7–8. IEEE, DOI: 10.1109/MSEC.2019.2896857

Caviglione L, Mazurczyk W, Wendzel S, Zander S (2018) Emerging and unconventional: New attacks and innovative detection techniques. Security and Communication Networks (SCN) 2018:1–7. Wiley-Hindawi, DOI: 10.1155/2018/9672523

Mazurczyk W, Caviglione L, Wendzel S (2017) Recent advancements in digital forensics – part 1. IEEE Security and Privacy (S&P) 15/6:10–11. IEEE, DOI: 10.1109/MSP.2017.4251106

Wendzel S, Keller J (2016) Special Issue on Security, Privacy and Reliability of Smart Buildings. Journal of Universal Computer Science (JUCS) 22/9:1201–1202, DOI: 10.3217/jucs-022-09


 

Edited Conference and Workshop Proceedings

Wendzel S, Wressnegger C, Hartmann L, Freiling F, Armknecht F, Reinfelder L (eds) (2024) Sicherheit 2024 – Beiträge der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Gesellschaft für Informatik e.V. (GI), https://dl.gi.de/handle/20.500.12116/43948. LNI Vol. 345

Mileva A, Franqueira V, Wendzel S (eds) (2023) Proceedings of the European Interdisciplinary Cybersecurity Conference 2023 (EICC 2023). ACM, DOI: 10.1145/3590777

Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J-F, Mazurczyk W (eds) (2022) Proceedings of the Third International Workshop on Information Security Methodology and Replication Studies (IWSMR 2022). ACM,. Part of ARES’22 Proceedings

Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J-F, Mazurczyk W (eds) (2021) Proceedings of the Third International Workshop on Information Security Methodology and Replication Studies (IWSMR 2021). ACM,. Part of ARES’21 Proceedings

Caviglione L, Mileva A, Wendzel S (eds) (2020a) Proceedings of the European Interdisciplinary Cybersecurity Conference 2020 (EICC 2020). ACM, DOI: 10.1145/3424954

Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J-F, Mazurczyk W (eds) (2020b) Proceedings of the Second International Workshop on Information Security Methodology and Replication Studies (IWSMR 2020). ACM,. Part of ARES’20 Proceedings

Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J-F, Mazurczyk W (eds) (2019) Proceedings of the First International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). ACM, Rennes, France,. Part of ARES’19 Proceedings

Meier M, Reinhardt D, Wendzel S (eds) (2016) Sicherheit 2016 – Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Gesellschaft für Informatik e.V. (GI), https://dl.gi.de/handle/20.500.12116/877. 978-3-88579-650-3, LNI Vol. 256

Pohl C, Schinzel S, Wendzel S (eds) (2013) Proceedings of the Eight GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING 2013). Gesellschaft für Informatik e.V. (GI), https://fg-sidar.gi.de/fileadmin/FG/SIDAR/Reports/SIDAR-Report-SR-2013-01.pdf


 

Book Chapters

Caviglione L, Mazurczyk W, Wendzel S (2019) Advanced information hiding techniques for modern botnets. In: Kambourakis G, others (eds) Botnets: Architectures, countermeasures, and challenges. Taylor & Francis, pp 165–188, DOI: 10.1201/9780429329913-4

Wendzel S, Olschewski D (2018) Internet of Things und Smart Contracts: Risiken bei der Digitalisierung von Unternehmen. Springer, DOI: 10.1007/978-3-658-22773-9_16

Wendzel S, Tonejc J, Kaur J, Kobekova A (2017) Cyber security of smart buildings. In: Song H, Fink G, Jeschke S (eds) Security and privacy in cyber-physical systems: Foundations and applications. Wiley-IEEE Press, pp 327–352, DOI: 10.1002/9781119226079.ch16

Wendzel S, Keller J (2012) Einführung in die Forschungsthematik der verdeckten Kanäle. In: Informationstechnologie und Sicherheitspolitik – Wird der dritte Weltkrieg im Internet ausgetragen? BoD


 

Journal Articles

Wendzel S, Schmidbauer T, Zillien S, Keller J (2024) DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data. IEEE Transactions on Dependable and Secure Computing (TDSC)./.: DOI: 10.1109/TDSC.2024.3410679. in press

Lenz J, Bozakov Z, Wendzel S, Vrhovec S Why People Replace their Aging Smart Devices: A Push–Pull–Mooring Perspective. Computers & Security (COSE) 130:103258, DOI: 10.1016/j.cose.2023.103258

Zillien S, Wendzel S (2023a) Weaknesses of popular and recent covert channel detection methods and a remedy. IEEE Transactions on Dependable and Secure Computing (TDSC) 20/6:5156–5167, DOI: 10.1109/TDSC.2023.3241451

Wendzel S, Caviglione L, Mazurczyk W (2023b) Avoiding research tribal wars using taxonomies. IEEE Computer 56/1:93–96. IEEE, DOI: 10.1109/MC.2022.3218175

Aehle M, Alme J, Barnaföldi GG, Blühdorn J, Bodova T, Borshchov V, Brink A van den, Eikeland VN, Feofilov G, Garth C, Gauger NR, Grøttvik OS, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Kusch L, Leonhardt V, Mehendale S, Mulawade RN, Odland OH, O’Neill G, Papp G, Peitzmann T, Pettersen HES, Piersimoni P, Pochampalli R, Protsenko M, Rauch M, Rehman AU, Richter M, Roehrich D, Sagebaum M, Santana J, Schilling A, Seco J, Songmoolnak A, Sudár Á, Tambave G, Tymchuk I, Ullaland K, Varga-Kőfaragó M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Zillien S (2023c) Exploration of differentiability in a proton computed tomography simulation framework. Physics in Medicine and Biology 68/24, DOI: 10.1088/1361-6560/ad0bdd

Schilling A, Aehle M, Alme J, Barnaföldi GG, Bodova T, Borshchov V, Brink A van den, Eikeland VN, Feofilov G, Garth C, Gauger NR, Grøttvik OS, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Leonhardt V, Mehendale S, Mulawade RN, Odland OH, O’Neill G, Papp G, Peitzmann T, Pettersen HES, Piersimoni P, Protsenko M, Rauch M, Rehman AU, Richter M, Roehrich D, Santana J, Seco J, Songmoolnak A, Sudár Á, Tambave G, Tymchuk I, Ullaland K, Varga-Kőfaragó M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Zillien S (2023d) Uncertainty-aware spot rejection rate as quality metric for proton therapy using a digital tracking calorimeter. Physics in Medicine and Biology 68:194001, DOI: 10.1088/1361-6560/acf5c2

Aehle M, Alme J, Barnaföldi G, Borshchov V, Brink A van den, Chaar M, Eikeland V, Gregory F, Garth C, Gauger N, Genov G, Grøttvik O, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Leonhardt V, Mehendale S, Mulawade R, Odland O, Papp G, Peitzmann T, Pettersen H, Piersimoni P, Protsenko M, Rehman A, Richter M, Röhrich D, Santana J, Schilling A, Seco J, Songmoolnak A, Sølie J, Tambave G, Tymchuk I, Ullaland K, Varga-Kofarago M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Yokoyama H, Zillien S (2023e) The Bergen proton CT system. Journal of Instrumentation 18/02:C02051. IOP Publishing, DOI: 10.1088/1748-0221/18/02/C02051

Hartmann L, Wendzel S (2022a) Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project History. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 13/3:4–24, DOI: 10.22667/JOWUA.2022.09.30.004

Schmidbauer T, Wendzel S (2022b) Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 13/1:137–166, DOI: 10.22667/JOWUA.2022.03.31.137

Mileva A, Velinov A, Dimitrova V, Caviglione L, Wendzel S (2022c) Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection. Entropy 24/2, DOI: 10.3390/e24020176

Szary P, Mazurczyk W, Wendzel S, Caviglione L (2022d) Analysis of Reversible Network Covert Channels. ACCESS 10:41226–41238. IEEE, DOI: 10.1109/ACCESS.2022.3168018

Mileva A, Velinov A, Hartmann L, Wendzel S, Mazurczyk W (2021a) Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels. Computers & Security 104:102207. Elsevier, DOI: 10.1016/j.cose.2021.102207

Keller J, Wendzel S (2021b) Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains. Applied Sciences 11/2, DOI: 10.3390/app11020731

Pettersen H, Aehle M, Alme J, Barnaföldi G, Borshchov V, Brink A van den, Chaar M, Eikeland V, Gregory F, Garth C, Gauger N, Genov G, Grøttvik O, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Leonhardt V, Mehendale S, Mulawade R, Odland O, Papp G, Peitzmann T, Piersimoni P, Protsenko M, Rehman A, Richter M, Santana J, Schilling A, Seco J, Songmoolnak A, Sølie J, Tambave G, Tymchuk I, Ullaland K, Varga-Kofarago M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Yokoyama H, Zillien S, Röhrich D (2021c) Investigating particle track topology for range telescopes in particle radiography using convolutional neural networks. Acta Oncologica 60/11:1413–1418. Taylor & Francis, DOI: 10.1080/0284186X.2021.1949037

Wendzel S, Lévy-Bencheton C, Caviglione L (2020) Not all Areas are Equal: Analysis of Citations in Information Security Research. Scientometrics 122/1:267–286. Springer, DOI: 10.1007/s11192-019-03279-6

Velinov A, Mileva A, Wendzel S, Mazurczyk W (2019a) Covert Channels in the MQTT-based Internet of Things. ACCESS 7:161899–161915. IEEE, DOI: 10.1109/ACCESS.2019.2951425

Wendzel S, Link F, Eller D, Mazurczyk W (2019b) Detection of Size Modulation Covert Channels Using Countermeasure Variation. Journal of Universal Computer Science (JUCS) 25/11:1396–1416, DOI: 10.3217/jucs-025-11-1396

Mazurczyk W, Wendzel S, Chourib M, Keller J (2019c) Countering adaptive network covert communication with dynamic wardens. Future Generation Computer Systems (FGCS) 94:712–725. Elsevier, DOI: 10.1016/j.future.2018.12.047

Mazurczyk W, Wendzel S (2018a) Information Hiding – Challenges for Forensic Experts. Communications of the ACM 61/1:86–94. ACM, DOI: 10.1145/3158416

Cabaj K, Caviglione L, Mazurczyk W, Wendzel S, Woodward A, Zander S (2018b) The New Threats of Information Hiding: the Road Ahead. IEEE IT Professional 20/3:31–39. IEEE, DOI: 10.1109/MITP.2018.032501746

Keidel R, Wendzel S, Zillien S, Conner ES, Haas G (2018c) WoDiCoF – A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms. Journal of Universal Computer Science (JUCS) 24/5:556–576, DOI: 10.3217/jucs-024-05-0556

Caviglione L, Wendzel S, Mazurczyk W (2017a) The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security and Privacy 15/6:12–17. IEEE, DOI: 10.1109/MSP.2017.4251117

Wendzel S, Caviglione L, Mazurczyk W, Lalande J-F (2017b) Network Information Hiding and Science 2.0: Can it be a Match? International Journal of Electronics and Telecommunications (IJET) 62/2:217–222. Polish Academy of Sciences, DOI: 10.1515/eletel-2017-0029

Spenger G, Keler J, Wendzel S (2017c) Enhanced Ant Colony-inspired Parallel Algorithm to Improve Cryptographic PRNGs. Journal of Cyber Security and Mobility (JCSM) 6/2:147–170. River Publishers, DOI: 10.13052/2245-1439.623

Wendzel S, Mazurczyk W, Haas G (2017d) Steganography for Cyber-physical Systems. Journal of Cyber Security and Mobility (JCSM) 6/2:105–126. River Publishers, DOI: 10.13052/2245-1439.621

Wendzel S (2016a) How to Increase the Security of Smart Buildings. Communications of the ACM (CACM) 59/5:47–49. ACM, DOI: 10.1145/2828636

Wendzel S, Mazurczyk W, Zander S (2016b) A Unified Description for Network Information Hiding Methods. Journal of Universal Computer Science (JUCS) 22/11:1456–1486, DOI: 10.3217/jucs-022-11-1456

Wendzel S, Kasem-Madani S (2016c) IoT Security: The Improvement-Decelerating ’Cycle of Blame’, DOI: 10.13052/popcas010

Kaur J, Wendzel S, Eissa O, Tonejc J, Meier M (2016d) Covert channel-internal control protocols: attacks and defense. Security and Communication Networks (SCN) 9/15:2986–2997. Wiley, DOI: 10.1002/sec.1471

Naumann M, Wendzel S, Mazurczyk W, Keller J (2016e) Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions. Security and Communication Networks (SCN) 9/15:2972–2985. Wiley, DOI: 10.1002/sec.1500

Mazurczyk W, Wendzel S, Azagra Villares I, Szczypiorski K (2016f) On importance of steganographic cost for network steganography. Security and Communication Networks (SCN) 9/8:781–790. Wiley, DOI: 10.1002/sec.1085

Wendzel S, Zander S, Fechner B, Herdin C (2015a) Pattern-based survey and categorization of network covert channel techniques. ACM Computing Surveys (CSUR) 47/3:1–26. ACM New York, NY, USA, DOI: 10.1145/2684195

Wendzel S, Palmer C (2015b) Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research. Journal of Universal Computer Science (JUCS) 21/12:1684–1705, DOI: 10.3217/jucs-021-12-1684

Szczypiorski K, Janicki A, Wendzel S (2015c) “The Good, The Bad And The Ugly”: Evaluation of Wi-Fi Steganography. Journal of Communications (JCM) 10/10:747–752, DOI: 10.12720/jcm.10.10.747-752

Wendzel S, Keller J (2014a) Hidden and under control. Annals of Telecommunications–Annales des Télécommunications (ANTE) 69/7:417–430. Springer, DOI: 10.1007/s12243-014-0423-x

Wendzel S, Keller J (2014b) IT-gestütztes Management und Controlling: Verdeckte Kanäle – eine zunehmende Gefahr für Unternehmensdaten. Controlling 26. Jahrgang/14/6. Beck, DOI: 10.15358/0935-0381_2014_6_304

Wendzel S, Keller J (2012) Preventing Protocol Switching Covert Channels. International Journal on Advances in Security 5/3 and 4. Iaria, DOI: 10.5281/zenodo.4618134

Wendzel S, Keller J (2011) Einführung in die Forschungsthematik der verdeckten Kanäle. Magdeburger Journal zur Sicherheitsforschung 2:115–124, http://www.researchgate.net/profile/Steffen_Wendzel/publication/216466431_Einfhrung_in_die_Forschungsthematik_der_verdeckten_Kanle/links/09e415005387fbf9a4000000.pdf


 

Conference and Workshop Papers

Zillien S, Schmidbauer T, Kubek M, Keller J, Wendzel S (2024a) Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION. In: Proc. 19th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2024). ACM, pp 80–95, DOI: 10.1145/3634737.3637676. Acceptance rate: 21%

Keller J, Heßeling C, Wendzel S (2024b) Robust and Homomorphic Covert Channels in Streams of Numeric Data. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM, DOI: 10.1145/3664476.3670879

Strachanski F, Petrov D, Schmidbauer T, Wendzel S (2024c) A Comprehensive Pattern-based Overview of Stegomalware. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM, DOI: 10.1145/3664476.3670886

Schymiczek J, Schmidbauer T, Wendzel S (2024d) A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM, DOI: 10.1145/3664476.3670877

Dittmann J, Krätzer C, Kiltz S, Altschaffel R, Vielhauer C, Wendzel S, Wefel S, Nitsch H (2024e) Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT). In: GI Sicherheit 2024 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V. (GI), pp 265–268, DOI: 10.18420/sicherheit2024_018

Schorr V, Kamenev N, Bleistein T, Werth D, Wendzel S, Weigold T (2023) Power Consumption Analysis as a Detection Indicator for Cyberattacks on Smart Home Devices. In: Proc. Energy Informatics.Academy Conference 2023, Part II. Springer, pp 224–239, DOI: 10.1007/978-3-031-48652-4_15

Schmidbauer T, Wendzel S (2022a) SoK: A Survey Of Indirect Network-level Covert Channels. In: Proc. 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2022). ACM, pp 546–560, DOI: 10.1145/3488932.3517418. Acceptance rate: 18.4%

Schmidbauer T, Keller J, Wendzel S (2022b) Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication. In: Proc. 17th International Conference on Availability, Reliability and Security (ARES 2022). ACM, DOI: 10.1145/3538969.3544455

Mayer N, Wendzel S, Keller J (2022c) Short Paper: Untersuchung des Gender-gaps bei Cybersecurity-Publikationen. In: GI Sicherheit 2022 – Sicherheit, Schutz und Zuverlässigkeit. pp 173–182, DOI: 10.18420/sicherheit2022_11

Bub D, Hartmann L, Bozakov Z, Wendzel S (2022d) Towards Passive Identification of Aged Android Devices in the Home Network. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2022). ACM, pp 17–20, DOI: 10.1145/3528580.3528584

Wendzel S, Caviglione L, Fechner B (2022e) Poster: Steganography Hiding Patterns: A Brief Review. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2022). ACM, pp 107–108, DOI: 10.1145/3528580.3532997

Wendzel S, Caviglione L, Mazurczyk W, Mileva A, Dittmann J, Krätzer C, Lamshöft K, Vielhauer C, Hartmann L, Keller J, Neubert T (2021a) A Revised Taxonomy of Steganography Embedding Patterns. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM, DOI: 10.1145/3465481.3470069

Zillien S, Wendzel S (2021b) Reconnection-Based Covert Channels in Wireless Networks. In: Jøsang A, Futcher L, Hagen J (eds) ICT Systems Security and Privacy Protection (IFIP SEC 2021). Springer International Publishing, Cham, pp 118–133, DOI: 10.1007/978-3-030-78120-0_8. Acceptance rate: 25%

Vrhovec S, Caviglione L, Wendzel S (2021c) Crème de la Crème: Lessons from Papers in Top Publications. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM, DOI: 10.1145/3465481.3470027

Schmidbauer T, Wendzel S (2021d) Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM, DOI: 10.1145/3465481.3470085

Mileva A, Caviglione L, Velinov A, Wendzel S, Dimitrova V (2021e) Risks and Opportunities for Information Hiding in DICOM Standard. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM, DOI: 10.1145/3465481.3470072

Hartmann L, Zillien S, Wendzel S (2021f) Reset- and Reconnection-based Covert Channels in CoAP. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). ACM, DOI: 10.1145/3487405.3487660

Hartmann L, Wendzel S (2021g) Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). ACM, DOI: 10.1145/3487405.3487662

Hartmann L, Wendzel S (2021h) How Feasible are Steganographic and Stealth Attacks on TIA Project Meta-data of ICS: A Case Study with Real-world Data. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). ACM, DOI: 10.1145/3487405.3487661

Chourib M, Wendzel S, Mazurczyk W (2021i) Adaptive Warden Strategy for Countering Network Covert Storage Channels. In: 46th IEEE Conference on Local Computer Networks (LCN 2021). IEEE, pp 148–153, https://arxiv.org/abs/2111.03310

Aehle M, Alme J, Barnaföldi GG, Borshchov V, Bodova T, Brink A van den, Eikeland V, Garth C, Gauger NR, Genov G, Grøttvik O, Feofilov G, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Leonhardt V, Mehendale S, Mulawade RN, Odland OH, Papp G, Peitzmann T, Pettersen HES, Piersimoni P, Protsenko M, Rehman AU, Richter M, Röhrich D, Samnøy AT, Schilling A, Seco J, Songmoolnak A, Sølie JR, Tambave G, Tymchuk I, Ullaland K, Varga-Köfaragó M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Yokoyama H, Zillien S (2021j) The Bergen proton CT system. In: 12th International Conference on Position Sensitive Detectors (PSD 2021), https://wiki.uib.no/pct/img_auth.php/7/7a/Poster_PSD12.pdf

Keller J, Wendzel S (2020a) Covert Channels in One-Time Passwords Based on Hash Chains. In: Proceedings of the European Interdisciplinary Cybersecurity Conference (EICC 2020). ACM, New York, NY, USA, DOI: 10.1145/3424954.3424966

Hartmann L, Wendzel S (2020b) Anomaly Detection in ICS Based on Data-History Analysis. In: Proceedings of the European Interdisciplinary Cybersecurity Conference (EICC 2020). ACM, New York, NY, USA, DOI: 10.1145/3424954.3424963

Schmidbauer T, Wendzel S (2020c) Covert Storage Caches Using the NTP Protocol. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020). ACM, New York, NY, USA, DOI: 10.1145/3407023.3409207

Szary P, Mazurczyk W, Wendzel S, Caviglione L (2020d) Design and Performance Evaluation of Reversible Network Covert Channels. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020). ACM, New York, NY, USA, DOI: 10.1145/3407023.3409215

Wendzel S (2019a) Protocol-independent Detection of “Message Ordering” Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). ACM, New York, NY, USA, pp 63:1–63:8, DOI: 10.1145/3339252.3341477

Schmidbauer T, Wendzel S, Mileva A, Mazurczyk W (2019b) Introducing Dead Drops to Network Steganography Using ARP-Caches and SNMP-Walks. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). ACM, New York, NY, USA, pp 64:1–64:10, DOI: 10.1145/3339252.3341488

Mazurczyk W, Szary P, Wendzel S, Caviglione L (2019c) Towards Reversible Storage Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). ACM, New York, NY, USA, pp 69:1–69:8, DOI: 10.1145/3339252.3341493

Wendzel S, Eller D, Mazurczyk W (2018a) One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. In: Proc. Central European Security Conference (CECC 2018). ACM, pp 1:1–1:6, DOI: 10.1145/3277570.3277571

Zillien S, Wendzel S (2018b) Detection of covert channels in TCP retransmissions. In: Proc. 23rd Nordic Conference on Secure IT Systems (NordSec 2018). Springer, pp 203–218, DOI: 10.1007/978-3-030-03638-6_13

Mazurczyk W, Wendzel S, Cabaj K (2018c) Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM, pp 10:1–10:10, DOI: 10.1145/3230833.3233261

Wendzel S (2018d) Get Me Cited, Scotty! Analysis of Citations in Covert Channel/Steganography Research. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM, pp 13:1–13:8, DOI: 10.1145/3230833.3233265

Wendzel S, Mazurczyk W, Haas G (2017a) Don’t you touch my nuts: Information hiding in cyber physical systems. In: 2017 IEEE Security and Privacy Workshops (SPW 2017). IEEE, pp 29–34, DOI: 10.1109/SPW.2017.40

Keller J, Spenger G, Wendzel S (2017b) Ant colony-inspired parallel algorithm to improve cryptographic pseudo random number generators. In: 2017 IEEE Security and Privacy Workshops (SPW 2017). IEEE, pp 17–22, DOI: 10.1109/SPW.2017.31

Kobekova A, Bültermann L, Tonejc J, Wendzel S (2017c) Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-IT. In: Tagungsband des 15. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH, pp 515–526, https://www.researchgate.net/publication/318015456_Was_bedeutet_das_IT-Sicherheitsgesetz_fur_Smart_Buildings_Konzepte_des_sicheren_Alterns_der_Gebaude-IT

Lehner F, Mazurczyk W, Keller J, Wendzel S (2017d) Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach. In: Proc. 42th IEEE Conference on Local Computer Networks (LCN 2017). IEEE, pp 78–85, DOI: 10.1109/LCN.2017.32

Wendzel S, Mazurczyk W (2016) Poster: An Educational Network Protocol for Covert Channel Analysis Using Patterns. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS 2016). ACM, New York, NY, USA, pp 1739–1741, DOI: 10.1145/2976749.2989037

Kaur J, Tonejc J, Wendzel S, Meier M (2015a) Securing BACnet’s pitfalls. In: Proc. 30th IFIP TC-11 International Information Security and Privacy Conference (IFIP SEC 2015). Springer, pp 616–629, DOI: 10.1007/978-3-319-18467-8_41. Acceptance rate: 19.8%

Anhaus EM, Wendzel S (2015b) BACtag – Data Leakage Protection für Gebäude. In: D-A-CH Security 2015. syssec, pp 417–248, https://www.researchgate.net/publication/276762604_BACtag_Data_Leakage_Protection_fur_Gebaude?ev=prf_pub

Tonejc J, Kaur J, Karsten A, Wendzel S (2015c) Visualizing BACnet data to facilitate humans in building-security decision-making. In: International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015). Springer, pp 693–704, DOI: 10.1007/978-3-319-20376-8_62

Caviglione L, Lalande J-F, Mazurczyk W, Wendzel S (2015d) Analysis of human awareness of security and privacy threats in smart environments. In: International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015). Springer, pp 165–177, DOI: 10.1007/978-3-319-20376-8_15

Kaur J, Wendzel S, Meier M (2015e) Countermeasures for covert channel-internal control protocols. In: 10th International Conference on Availability, Reliability and Security (ARES 2015); IWCC Workshop. IEEE, pp 422–428, DOI: 10.1109/ARES.2015.88. Paper received the Best Paper Award

Kaur J, Herdin C, Tonejc J, Wendzel S, Meier M, Szlósarczyk S (2015f) Novel Approaches for Security in Building Automation Systems. In: Tagungsband des 14. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH, pp 148–155

Szczypiorski K, Janicki A, Wendzel S (2015g) “The Good, The Bad And The Ugly”: Evaluation of Wi-Fi Steganography. In: 6th International Conference on Networking and Information Technology (ICNIT 2015). Tokyo, Japan

Wendzel S, Mazurczyk W, Caviglione L, Meier M (2014a) Hidden and uncontrolled–on the emergence of network steganographic threats. In: Securing Electronic Business Processes (ISSE 2014). Springer, pp 123–133, DOI: 10.1007/978-3-658-06708-3_9

Wendzel S, Herdin C, Wirth R, Masoodian M, Luz S, Kaur J (2014b) Mosaic-chart based visualization in building automation systems. In: Proceedings of the 9th Future Security Research Conference. Fraunhofer Verlag/MEV Verlag, Berlin, pp 687–690, http://www.researchgate.net/profile/Steffen_Wendzel/publication/265785944_Mosaic-chart_based_Visualization_in_Building_Automation_Systems/links/542ad4710cf29bbc126a771f.pdf

Wendzel S, Zwanger V, Meier M, Szlósarczyk S (2014c) Envisioning smart building botnets. In: Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V., https://dl.gi.de/20.500.12116/20053

Szlósarczyk S, Wendzel S, Kaur J, Meier M, Schubert F (2014d) Towards suppressing attacks on and improving resilience of building automation systems – an approach exemplified using BACnet. In: Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V., https://dl.gi.de/handle/20.500.12116/20060

Kaur J, Wendzel S (2014e) Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purpose. In: Proceedings Computer Science Conference for University of Bonn Students (CSCUBS), http://cscubs.cs.uni-bonn.de/2014/data/paper_8.pdf

Kaur J, Meier M, Szlósarczyk S, Wendzel S (2014f) A Cost-Efficient Building Automation Security Testbed for Educational Purposes. In: Proc. SECURWARE 2014. Iaria, Lisbon, https://www.wendzel.de/dr.org/files/Papers/SECURWARE14poster.pdf. poster

Lalande J-F, Wendzel S (2013a) Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In: Proc. 2013 International Conference on Availability, Reliability and Security (ARES), International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM 2013). IEEE, pp 701–710, DOI: 10.1109/ARES.2013.92

Kahler B, Wendzel S (2013b) How to own a building? Wardriving gegen die Gebäude-Automation. In: Proc. 20. DFN Workshop zur Sicherheit in vernetzten Systemen. BoD, pp H1–H13, https://www.researchgate.net/publication/235702099_How_to_own_a_Building_Wardriving_gegen_die_Gebaude-Automation

Backs P, Wendzel S, Keller J (2012a) Dynamic routing in covert channel overlays based on control protocols. In: 2012 International Conference for Internet Technology and Secured Transactions (ICITST 2012). IEEE, pp 32–39, https://ieeexplore.ieee.org/document/6470978

Wendzel S, Kahler B, Rist T (2012b) Covert channels and their prevention in building automation protocols: A prototype exemplified using BACnet. In: 2012 IEEE International Conference on Green Computing and Communications (GreenCom), Internet of Things (iThings) and Cyber-physical Systems (CPSCom 2012). IEEE, pp 731–736, DOI: 10.1109/GreenCom.2012.120

Wendzel S, Keller J (2012c) Systematic engineering of control protocols for covert channels. In: IFIP International Conference on Communications and Multimedia Security (CMS 2012). Springer, pp 131–144, DOI: 10.1007/978-3-642-32805-3_11

Wendzel S, Keller J (2012d) Design and implementation of an active warden addressing protocol switching covert channels. In: Proc. 7th International Conference on Internet Monitoring and Protection (ICIMP 2012). IARIA, pp 1–6, https://www.researchgate.net/publication/229092168_Design_and_Implementation_of_an_Active_Warden_Addressing_Protocol_Switching_Covert_Channels. Paper received the Best Paper Award

Wendzel S, Zander S (2012e) Detecting protocol switching covert channels. In: Proc. 37th Annual IEEE Conference on Local Computer Networks (LCN 2012). IEEE, pp 280–283, DOI: 10.1109/LCN.2012.6423628

Wendzel S (2012f) The problem of traffic normalization within a covert channel’s network environment learning phase. In: Sicherheit 2012 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V., pp 149–161, https://dl.gi.de/handle/20.500.12116/18270

Wendzel S (2012g) Covert and side channels in buildings and the prototype of a building-aware active warden. In: 2012 IEEE International Conference on Communications (ICC 2012). IEEE, pp 6753–6758, DOI: 10.1109/ICC.2012.6364876

Rist T, Wendzel S, Masoodian M, André E (2012h) Next-generation home automation systems. Pabst Science Publishers, https://www.researchgate.net/publication/229092368_Next-Generation_Home_Automation_Systems

Wendzel S (2012i) Control Protocols for Network Covert Channels. In: Proc. 7th GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), SIDAR-Report SR-2012-01. Gesellschaft für Informatik, FB Sicherheit, SIG SIDAR, Berlin, p 24

Rist T, Wendzel S, Masoodian M, Monigatti P, André E (2011a) Creating Awareness for Efficient Energy Use in Smart Homes. In: Feuerstein G, Ritter W (eds) Zusammenfassung der Beiträge zum Usability Day IX, Dornbirn, Austria. Pabst, pp 162–168, https://www.researchgate.net/publication/215661204_Creating_Awareness_for_Efficient_Energy_Use_in_Smart_Homes

Wendzel S (2011b) Mikroprotokolle in verdeckten Kanälen. In: Beiträge zum Doktorandenkolleg Ruhr 2011. Meinerzhagen Valbert

Wendzel S, Keller J (2011c) Low-attention forwarding for mobile network covert channels. In: Decker et. al. B de (ed) Proc. 12th Conference on Communications and Multimedia Security (CMS 2011). IFIP International Federation for Information Processing; Springer, pp 122–133, DOI: 10.1007/978-3-642-24712-5_10. Acceptance rate: 21.1%

Wendzel S, Rist T, Masoodian M, André E (2011d) A Secure Interoperable Architecture for Building-Automation Applications. In: Proc. 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL), DOI: 10.1145/2093698.2093706


 

Theses

Wendzel S (2020) Network information hiding: Terminology, taxonomy, methodology and countermeasures. Habilitation Thesis, Department of Mathematics; Computer Science, Unversity of Hagen, http://www.wendzel.de/dr.org/files/Papers/thesis_with_cover.pdf

Wendzel S (2013) Novel approaches for network covert storage channels. Dissertation, Department of Mathematics; Computer Science, Unversity of Hagen, https://ub-deposit.fernuni-hagen.de/receive/mir_mods_00000190

Wendzel S (2011) Analyse der Detektions- und Präventionsmethoden für verdeckte Kanäle. Master’s Thesis, Augsburg University of Applied Sciences

Wendzel S (2009) Protokollwechsel zur Realisierung von Covert Channels und Headerstrukturveränderungen zur Vermeidung von Covert Channels. Diplomarbeit, Kempten University of Applied Sciences


 

Technical Reports

Wendzel S, Caviglione L, Mazurczyk W, Mileva A, Dittmann J, Krätzer C, Lamshöft K, Vielhauer C, Hartmann L, Keller J, Neubert T, Zillien S (2022) A Generic Taxonomy for Steganography Methods, DOI: 10.36227/techrxiv.20215373. under review

Wendzel S (2008) Protocol channels as a new design alternative of covert channels. CoRR abs/0809.1949, DOI: 10.48550/arXiv.0809.1949


 

Miscellaneous Publications

Wendzel S (2020) Review of the World Scientific Publishing Co., Inc. book “Future Automation: Changes to Lives and to Businesses”, 2018). ACM Computing Reviews N.N. ACM

Wendzel S (2018a) Review of the article “Man-in-the-middle attacks on secure simple pairing in Bluetooth standard v5.0 and its countermeasure”. ACM Computing Reviews 49. ACM

Wendzel S (2018b) Ich hab’ nichts zu verbergen! Rezension zum Buch “Komplizen des Erkennungsdienstes”. Schwarz-auf-Weiss SAW

Wendzel S (2017a) Review of the ACM CSUR article “Out-of-band Covert Channels–A Survey”. ACM Computing Reviews 48/1:49. ACM

Wendzel S (2017b) Review of the Cambridge Univ. Press book “Darkweb Cyber Threat Intelligence Mining”. ACM Computing Reviews 48. ACM

Wendzel S (2017c) Zur IT-Sicherheit von Smart Homes. PC-Welt 03.08.2017,. Beitrag zum Experten-Netzwerk

Wendzel S (2017d) Steganografie: eine zunehmende Bedrohung. PC-Welt 18.10.2017,. Beitrag zum Experten-Netzwerk

Wendzel S (2017e) Made in Germany – Sicherheit als Vertrauensfaktor. CCI-Zeitung 2017/13,. Editorial

Wendzel S, Kobekova A, Tonejc J, Kaur J (2016a) IT-Sicherheit für Smart Buildings: ein Bericht zum BARNI-Projekt. Smart Home Summit

Wendzel S (2016b) Tatort Smart Building: die Gebäudeautomation muss sicherer werden. CCI-Zeitung 2016/08:16

Kobekova A, Wendzel S, Tonejc J (2016c) Smart Building – Sicherheitslücken schließen. PROTECTOR 2016/4:42–43

Mazurczyk W, Amann P, Caviglione L, Wendzel S (2016d) CUIng: Criminal use of information hiding initiative. European CIIP Newsletter 10/3:31–32

Contributor (2015a) Security and resilience of smart home environments: Good practices and recommendations. ENISA, https://www.enisa.europa.eu/publications/security-resilience-good-practices

Contributor (2015b) EU NIS Platform: State-of-the-art of secure ICT landscape. ENISA, https://resilience.enisa.europa.eu/nis-platform/shared-documents/wg3-documents/research-landscape-deliverable-v2/at_download/file

Contributor (2015c) EU NIS Platform: Cybersecurity strategic research agenda. ENISA, https://resilience.enisa.europa.eu/nis-platform/shared-documents/wg3-documents/strategic-research-agenda-final-v0.96/at_download/file

Wendzel S, Meier M, Tonejc J (2015d) Die zwei Handlungsfelder für Sicherheit in der Gebäudeautomation. BusSysteme Magazin 22/4:257

Wübbeling M, Wendzel S (2015e) IT-Sicherheitsmonitoring. Cyber Security Report 2015 19–21. Mittler Report

Messer-Schmidt K, Rösler D, Ruppricht C, Seebauer H, Wendzel S (2014a) Mit kritischen ITK-Systemen bewusst umgehen: ein Lösungsansatz des Arbeitskreis KRITIS (Gesellschaft für Informatik). digitalbusiness CLOUD 8:40–41, https://fg-secmgt.gi.de/ak-kritis/arbeitsergebnisse

Wendzel S (2014b) Exfiltration vertrauenswürdiger Daten – Protektionsmaßnahmen hinken den modernen Techniken der Angreifer hinterher. digitalbusiness CLOUD 2014/2:37

Wendzel S (2013a) Gefahrenpotential der Netzwerksteganografie. IT-SICHERHEIT 2013/6:58–59

Wendzel S (2013b) Sicherheitsaspekte in der Gebäude-Automation – Perspektiven der Personenüberwachung. IT-SICHERHEIT 2013/3:70–72

Wendzel S (2012a) Verdeckte Kommunikation in Gebäuden. Analyse der Gefahren und eine Middleware-basierte Gegenmaßnahme. BusSysteme Magazin 2012/03:182–183

Wendzel S, Rist T, André E, Masoodian M, Wirth R (2012b) Sicherheit beim Energiesparen durch Abstraktion. BusSysteme Magazin 12/2

Contributor (2012c) Soziale Netzwerke und ihre Auswirkungen auf die Unternehmenssicherheit,. Booklet published and edited by Bayerisches Landesamt für Verfassungsschutz (LfV).

Wendzel S (2011) Bewusstsein für die Sicherheit im Bereich der Gebäudeautomatisierung. Hakin9 (de) 2011/3:11–12

Wendzel S (2009) Protocol Channels. Hakin9 2009/6:38–40

Wendzel S (2007a) Forensik nach Angriffen auf Linux-Systeme. Hakin9 2007/06

Wendzel S (2007b) Abhärtung von Linux/BSD Systemen. Eine Einführung. Hakin9 2007/04

Wendzel S (2007c) Hostbasierte Intrusion Detection. Ein Einblick. Hakin9 2007/02

Wendzel S (2007d) Firewalls umgehen mit Protokoll-Tunneling. Hakin9 2007/01

Plötner J, Wendzel S (2006) Versionsverwaltung – Mit CVS oder Subversion Quelltexte verwalten. Linux-User 2006/10

Wendzel S (2005) Xyria:CDPNNTPd. FreeX 2005/5

Wendzel S (2003a) Das Allround-Genie Z-Shell. FreeX 2003/6

Wendzel S (2003b) sysctl in OpenBSD. FreeX 2003/5