Publications
Some of my fundamental papers
- introduction of hiding patterns (a taxonomy for covert channels), preprint (ACM CSUR, 2015)
- introduction of a generic taxonomy for steganography and a way to describe new covert channels in papers (under review)
- introduction of covert channel amplification and history covert channels (IEEE TDSC, in press)
Overview:
- Selected ranked publications
- Books
- Edited journal special issues
- Edited conference proceedings
- Book chapters
- Journal articles
- Conference papers
- Theses
- Technical reports
- Miscellaneous publications
Selected Ranked Publications
Wendzel S, Schmidbauer T, Zillien S, Keller J (2024a) DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data. IEEE Transactions on Dependable and Secure Computing (TDSC)./.: DOI: 10.1109/TDSC.2024.3410679. in press
Zillien S, Schmidbauer T, Kubek M, Keller J, Wendzel S (2024b) Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION. In: Proc. 19th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2024). ACM, pp 80–95, DOI: 10.1145/3634737.3637676. Acceptance rate: 21%
Zillien S, Wendzel S (2023a) Weaknesses of popular and recent covert channel detection methods and a remedy. IEEE Transactions on Dependable and Secure Computing (TDSC) 20/6:5156–5167, DOI: 10.1109/TDSC.2023.3241451
Lenz J, Bozakov Z, Wendzel S, Vrhovec S (2023b) Why People Replace their Aging Smart Devices: A Push–Pull–Mooring Perspective. Computers & Security (COSE) 130:103258, DOI: 10.1016/j.cose.2023.103258
Wendzel S, Caviglione L, Mazurczyk W (2023c) Avoiding research tribal wars using taxonomies. IEEE Computer 56/1:93–96. IEEE, DOI: 10.1109/MC.2022.3218175
Schmidbauer T, Wendzel S (2022) SoK: A Survey Of Indirect Network-level Covert Channels. In: Proc. 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2022). ACM, pp 546–560, DOI: 10.1145/3488932.3517418. Acceptance rate: 18.4%
Mileva A, Velinov A, Hartmann L, Wendzel S, Mazurczyk W (2021a) Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels. Computers & Security (COSE) 104:102207. Elsevier, DOI: 10.1016/j.cose.2021.102207
Zillien S, Wendzel S (2021b) Reconnection-Based Covert Channels in Wireless Networks. In: Jøsang A, Futcher L, Hagen J (eds) ICT Systems Security and Privacy Protection (IFIP SEC 2021). Springer International Publishing, Cham, pp 118–133, DOI: 10.1007/978-3-030-78120-0_8. Acceptance rate: 25%
Wendzel S, Lévy-Bencheton C, Caviglione L (2020) Not all Areas are Equal: Analysis of Citations in Information Security Research. Scientometrics 122/1:267–286. Springer, DOI: 10.1007/s11192-019-03279-6
Mazurczyk W, Wendzel S, Chourib M, Keller J (2019a) Countering adaptive network covert communication with dynamic wardens. Future Generation Computer Systems (FGCS) 94:712–725. Elsevier, DOI: 10.1016/j.future.2018.12.047
Wendzel S, Link F, Eller D, Mazurczyk W (2019b) Detection of Size Modulation Covert Channels Using Countermeasure Variation. Journal of Universal Computer Science (JUCS) 25/11:1396–1416, DOI: 10.3217/jucs-025-11-1396
Mazurczyk W, Wendzel S (2018a) Information Hiding – Challenges for Forensic Experts. Communications of the ACM (CACM) 61/1:86–94. ACM, DOI: 10.1145/3158416
Zillien S, Wendzel S (2018b) Detection of covert channels in TCP retransmissions. In: Proc. 23rd Nordic Conference on Secure IT Systems (NordSec 2018). Springer, pp 203–218, DOI: 10.1007/978-3-030-03638-6_13
Keidel R, Wendzel S, Zillien S, Conner ES, Haas G (2018c) WoDiCoF – A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms. Journal of Universal Computer Science (JUCS) 24/5:556–576, DOI: 10.3217/jucs-024-05-0556
Caviglione L, Wendzel S, Mazurczyk W (2017a) The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security & Privacy (S&P) 15/6:12–17. IEEE, DOI: 10.1109/MSP.2017.4251117
Lehner F, Mazurczyk W, Keller J, Wendzel S (2017b) Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach. In: Proc. 42th IEEE Conference on Local Computer Networks (LCN 2017). IEEE, pp 78–85, DOI: 10.1109/LCN.2017.32
Wendzel S (2016a) How to Increase the Security of Smart Buildings. Communications of the ACM (CACM) 59/5:47–49. ACM, DOI: 10.1145/2828636
Wendzel S, Mazurczyk W (2016b) Poster: An Educational Network Protocol for Covert Channel Analysis Using Patterns. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS 2016). ACM, New York, NY, USA, pp 1739–1741, DOI: 10.1145/2976749.2989037
Wendzel S, Mazurczyk W, Zander S (2016c) A Unified Description Method for Network Information Hiding Methods. Journal of Universal Computer Science (JUCS) 22/11:1456–1486, DOI: 10.3217/jucs-022-11-1456
Wendzel S, Zander S, Fechner B, Herdin C (2015a) Pattern-based survey and categorization of network covert channel techniques. ACM Computing Surveys (CSUR) 47/3:1–26. ACM New York, NY, USA, DOI: 10.1145/2684195
Kaur J, Tonejc J, Wendzel S, Meier M (2015b) Securing BACnet’s pitfalls. In: Proc. 30th IFIP TC-11 International Information Security and Privacy Conference (IFIP SEC 2015). Springer, pp 616–629, DOI: 10.1007/978-3-319-18467-8_41. Acceptance rate: 19.8%
Wendzel S, Palmer C (2015c) Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research. Journal of Universal Computer Science (JUCS) 21/12:1684–1705, DOI: 10.3217/jucs-021-12-1684
Wendzel S, Zander S (2012a) Detecting protocol switching covert channels. In: Proc. 37th Annual IEEE Conference on Local Computer Networks (LCN 2012). IEEE, pp 280–283, DOI: 10.1109/LCN.2012.6423628
Wendzel S, Keller J (2012b) Systematic engineering of control protocols for covert channels. In: IFIP International Conference on Communications and Multimedia Security (CMS 2012). Springer, pp 131–144, DOI: 10.1007/978-3-642-32805-3_11
Wendzel S, Keller J (2011) Low-attention forwarding for mobile network covert channels. In: Decker et. al. B de (ed) Proc. 12th Conference on Communications and Multimedia Security (CMS 2011). IFIP International Federation for Information Processing; Springer, pp 122–133, DOI: 10.1007/978-3-642-24712-5_10. Acceptance rate: 21.1%
Books
Wendzel S, Plötner J (2024) Linux. Der Grundkurs, 2nd edn. Rheinwerk Verlag, https://www.rheinwerk-verlag.de/linux_5931/
Wendzel S (2021a) IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung, 2nd edn. Springer, DOI: 10.1007/978-3-658-33423-9. 2021
Wendzel S, Plötner J (2021b) Linux. Der Grundkurs, 1st edn. Rheinwerk Verlag, https://www.rheinwerk-verlag.de/linux-der-grundkurs/
Wendzel S, Plötner J (2019) Einstieg in Linux, 8th edn. Rheinwerk Verlag, https://www.rheinwerk-verlag.de/einstieg-in-linux-linux-verstehen-und-einsetzen/
Wendzel S (2018) IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung, 1st edn. Springer, DOI: 10.1007/978-3-658-22603-9. This edition received more than 100k downloads at SpringerLink.
Mazurczyk W, Wendzel S, Zander S, Houmansadr A, Szczypiorski K (2016a) Information hiding in communication networks. Fundamentals, mechanisms, and applications. Wiley-IEEE, DOI: 10.1002/9781119081715. IEEE Series on Information and Communication Networks Security
Wendzel S, Ploetner J (2016b) Einstieg in Linux, 7th edn. Rheinwerk Verlag
Wendzel S, Ploetner J (2014) Einstieg in Linux, 6th edn. Galileo Press
Ploetner J, Wendzel S (2012a) Linux. Das umfassende Handbuch, 5th edn. Galileo Press, https://www.researchgate.net/publication/233765888_Linux_Das_umfassende_Handbuch
Wendzel S (2012b) Tunnel und verdeckte Kanäle im Netz, 1st edn. Vieweg+Teubner, DOI: 10.1007/978-3-8348-2143-0
Wendzel S, Ploetner J (2012c) Einstieg in Linux, 5th edn. Galileo Press
Ploetner J, Wendzel S (2011) Linux. Das umfassende Handbuch, 4th edn. Galileo Press
Wendzel S, Ploetner J (2010) Einstieg in Linux. Eine distributionsunabhängige Einführung, 4th edn. Galileo Press
Ploetner J, Wendzel S (2009) Linux. Das umfassende Handbuch, 3rd edn. Galileo Press
Wendzel S, Ploetner J (2008a) Einstieg in Linux. Eine distributionsunabhängige Einführung, 3rd edn. Galileo Press
Ploetner J, Wendzel S (2008b) Linux. Das umfassende Handbuch, 2nd edn. Galileo Press
Ploetner J, Wendzel S (2007) Praxisbuch Netzwerk-Sicherheit. VPN, WLAN, Intrusion Detection, Disaster Recovery, Kryptologie, für UNIX/Linux und Windows, 2nd edn. Galileo Press, http://www.researchgate.net/publication/233765886_Praxisbuch_Netzwerksicherheit
Wendzel S, Ploetner J (2006a) Einstieg in Linux. Eine distributionsunabhängige Einführung, 2nd edn. Galileo Press
Ploetner J, Wendzel S (2006b) Linux. Ein distributionsunabhängiges Handbuch, 1st edn. Galileo Press
Ploetner J, Wendzel S (2005) Praxisbuch Netzwerk-Sicherheit. VPN, WLAN, Intrusion Detection, Disaster Recovery, Kryptologie, für UNIX/Linux und Windows, 1st edn. Galileo Press
Wendzel S, Ploetner J (2004) Einstieg in Linux. Eine distributionsunabhängige Einführung, 1st edn. Galileo Press
Edited Journal Special Issues
Wendzel S, Mileva A, Franqueira VNL, Jaatun MG (2024) Editorial: Fighting cybersecurity risks from a multidisciplinary perspective. Journal of Universal Computer Science (JUCS) 30/9:1137–1139, DOI: 10.3897/jucs.131628
Caviglione L, Wendzel S, Vrhovec S, Mileva A (2022a) Security and Privacy Issues of Home Globalization. Security and Privacy (S&P) 20/1:10–11. IEEE, DOI: 10.1109/MSEC.2021.3127372
Wendzel S, Mazurczyk W, Caviglione L, Houmansadr A (2022b) Emerging topics in defending networked systems. Future Generation Computer Systems (FGCS) 128:317–319. Elsevier, DOI: 10.1016/j.future.2021.10.010
Wendzel S, Caviglione L, Mileva A, Lalande J-F, Mazurczyk W (2022c) Guest editorial: Information security methodology and replication studies. it – Information Technology (ITIT) 64/1-2:1–3. De Gruyter, Oldenbourg, DOI: 10.1515/itit-2022-0016
Caviglione L, Wendzel S, Mileva A, Vrhovec S (2021) Multidisciplinary solutions to modern cybersecurity challenges. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 12/3:1–3, DOI: 10.22667/JOWUA.2021.12.31.001
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J-F, Mazurczyk W (2020) Information security methodology, replication studies and information security education. Journal of Universal Computer Science (JUCS) 26/7:762–763, DOI: 10.3897/jucs.2020.041
Lv Z, Mazurczyk W, Wendzel S, Song H (2019a) Recent advances in cyber-physical security in industrial environments. IEEE Transactions on Industrial Informatics (TII) 15/12:6468–6471. IEEE, DOI: 10.1109/TII.2019.2945971
Mazurczyk W, Caviglione L, Wendzel S (2019b) Recent advancements in digital forensics, part 2. IEEE Security and Privacy (S&P) 17/1:7–8. IEEE, DOI: 10.1109/MSEC.2019.2896857
Caviglione L, Mazurczyk W, Wendzel S, Zander S (2018) Emerging and unconventional: New attacks and innovative detection techniques. Security and Communication Networks (SCN) 2018:1–7. Wiley-Hindawi, DOI: 10.1155/2018/9672523
Mazurczyk W, Caviglione L, Wendzel S (2017) Recent advancements in digital forensics – part 1. IEEE Security and Privacy (S&P) 15/6:10–11. IEEE, DOI: 10.1109/MSP.2017.4251106
Wendzel S, Keller J (2016) Special Issue on Security, Privacy and Reliability of Smart Buildings. Journal of Universal Computer Science (JUCS) 22/9:1201–1202, DOI: 10.3217/jucs-022-09
Edited Conference and Workshop Proceedings
Wendzel S, Wressnegger C, Hartmann L, Freiling F, Armknecht F, Reinfelder L (eds) (2024) Sicherheit 2024 – Beiträge der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Gesellschaft für Informatik e.V. (GI), https://dl.gi.de/handle/20.500.12116/43948. LNI Vol. 345
Mileva A, Franqueira V, Wendzel S (eds) (2023) Proceedings of the European Interdisciplinary Cybersecurity Conference 2023 (EICC 2023). ACM, DOI: 10.1145/3590777
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J-F, Mazurczyk W (eds) (2022) Proceedings of the Third International Workshop on Information Security Methodology and Replication Studies (IWSMR 2022). ACM,. Part of ARES’22 Proceedings
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J-F, Mazurczyk W (eds) (2021) Proceedings of the Third International Workshop on Information Security Methodology and Replication Studies (IWSMR 2021). ACM,. Part of ARES’21 Proceedings
Caviglione L, Mileva A, Wendzel S (eds) (2020a) Proceedings of the European Interdisciplinary Cybersecurity Conference 2020 (EICC 2020). ACM, DOI: 10.1145/3424954
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J-F, Mazurczyk W (eds) (2020b) Proceedings of the Second International Workshop on Information Security Methodology and Replication Studies (IWSMR 2020). ACM,. Part of ARES’20 Proceedings
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J-F, Mazurczyk W (eds) (2019) Proceedings of the First International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). ACM, Rennes, France,. Part of ARES’19 Proceedings
Meier M, Reinhardt D, Wendzel S (eds) (2016) Sicherheit 2016 – Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Gesellschaft für Informatik e.V. (GI), https://dl.gi.de/handle/20.500.12116/877. 978-3-88579-650-3, LNI Vol. 256
Pohl C, Schinzel S, Wendzel S (eds) (2013) Proceedings of the Eight GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING 2013). Gesellschaft für Informatik e.V. (GI), https://fg-sidar.gi.de/fileadmin/FG/SIDAR/Reports/SIDAR-Report-SR-2013-01.pdf
Book Chapters
Caviglione L, Mazurczyk W, Wendzel S (2019) Advanced information hiding techniques for modern botnets. In: Kambourakis G, others (eds) Botnets: Architectures, countermeasures, and challenges. Taylor & Francis, pp 165–188, DOI: 10.1201/9780429329913-4
Wendzel S, Olschewski D (2018) Internet of Things und Smart Contracts: Risiken bei der Digitalisierung von Unternehmen. Springer, DOI: 10.1007/978-3-658-22773-9_16
Wendzel S, Tonejc J, Kaur J, Kobekova A (2017) Cyber security of smart buildings. In: Song H, Fink G, Jeschke S (eds) Security and privacy in cyber-physical systems: Foundations and applications. Wiley-IEEE Press, pp 327–352, DOI: 10.1002/9781119226079.ch16
Wendzel S, Keller J (2012) Einführung in die Forschungsthematik der verdeckten Kanäle. In: Informationstechnologie und Sicherheitspolitik – Wird der dritte Weltkrieg im Internet ausgetragen? BoD
Journal Articles
Wendzel S, Schmidbauer T, Zillien S, Keller J (2024) DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data. IEEE Transactions on Dependable and Secure Computing (TDSC)./.: DOI: 10.1109/TDSC.2024.3410679. in press
Lenz J, Bozakov Z, Wendzel S, Vrhovec S Why People Replace their Aging Smart Devices: A Push–Pull–Mooring Perspective. Computers & Security (COSE) 130:103258, DOI: 10.1016/j.cose.2023.103258
Zillien S, Wendzel S (2023a) Weaknesses of popular and recent covert channel detection methods and a remedy. IEEE Transactions on Dependable and Secure Computing (TDSC) 20/6:5156–5167, DOI: 10.1109/TDSC.2023.3241451
Wendzel S, Caviglione L, Mazurczyk W (2023b) Avoiding research tribal wars using taxonomies. IEEE Computer 56/1:93–96. IEEE, DOI: 10.1109/MC.2022.3218175
Aehle M, Alme J, Barnaföldi GG, Blühdorn J, Bodova T, Borshchov V, Brink A van den, Eikeland VN, Feofilov G, Garth C, Gauger NR, Grøttvik OS, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Kusch L, Leonhardt V, Mehendale S, Mulawade RN, Odland OH, O’Neill G, Papp G, Peitzmann T, Pettersen HES, Piersimoni P, Pochampalli R, Protsenko M, Rauch M, Rehman AU, Richter M, Roehrich D, Sagebaum M, Santana J, Schilling A, Seco J, Songmoolnak A, Sudár Á, Tambave G, Tymchuk I, Ullaland K, Varga-Kőfaragó M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Zillien S (2023c) Exploration of differentiability in a proton computed tomography simulation framework. Physics in Medicine and Biology 68/24, DOI: 10.1088/1361-6560/ad0bdd
Schilling A, Aehle M, Alme J, Barnaföldi GG, Bodova T, Borshchov V, Brink A van den, Eikeland VN, Feofilov G, Garth C, Gauger NR, Grøttvik OS, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Leonhardt V, Mehendale S, Mulawade RN, Odland OH, O’Neill G, Papp G, Peitzmann T, Pettersen HES, Piersimoni P, Protsenko M, Rauch M, Rehman AU, Richter M, Roehrich D, Santana J, Seco J, Songmoolnak A, Sudár Á, Tambave G, Tymchuk I, Ullaland K, Varga-Kőfaragó M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Zillien S (2023d) Uncertainty-aware spot rejection rate as quality metric for proton therapy using a digital tracking calorimeter. Physics in Medicine and Biology 68:194001, DOI: 10.1088/1361-6560/acf5c2
Aehle M, Alme J, Barnaföldi G, Borshchov V, Brink A van den, Chaar M, Eikeland V, Gregory F, Garth C, Gauger N, Genov G, Grøttvik O, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Leonhardt V, Mehendale S, Mulawade R, Odland O, Papp G, Peitzmann T, Pettersen H, Piersimoni P, Protsenko M, Rehman A, Richter M, Röhrich D, Santana J, Schilling A, Seco J, Songmoolnak A, Sølie J, Tambave G, Tymchuk I, Ullaland K, Varga-Kofarago M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Yokoyama H, Zillien S (2023e) The Bergen proton CT system. Journal of Instrumentation 18/02:C02051. IOP Publishing, DOI: 10.1088/1748-0221/18/02/C02051
Hartmann L, Wendzel S (2022a) Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project History. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 13/3:4–24, DOI: 10.22667/JOWUA.2022.09.30.004
Schmidbauer T, Wendzel S (2022b) Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 13/1:137–166, DOI: 10.22667/JOWUA.2022.03.31.137
Mileva A, Velinov A, Dimitrova V, Caviglione L, Wendzel S (2022c) Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection. Entropy 24/2, DOI: 10.3390/e24020176
Szary P, Mazurczyk W, Wendzel S, Caviglione L (2022d) Analysis of Reversible Network Covert Channels. ACCESS 10:41226–41238. IEEE, DOI: 10.1109/ACCESS.2022.3168018
Mileva A, Velinov A, Hartmann L, Wendzel S, Mazurczyk W (2021a) Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels. Computers & Security 104:102207. Elsevier, DOI: 10.1016/j.cose.2021.102207
Keller J, Wendzel S (2021b) Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains. Applied Sciences 11/2, DOI: 10.3390/app11020731
Pettersen H, Aehle M, Alme J, Barnaföldi G, Borshchov V, Brink A van den, Chaar M, Eikeland V, Gregory F, Garth C, Gauger N, Genov G, Grøttvik O, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Leonhardt V, Mehendale S, Mulawade R, Odland O, Papp G, Peitzmann T, Piersimoni P, Protsenko M, Rehman A, Richter M, Santana J, Schilling A, Seco J, Songmoolnak A, Sølie J, Tambave G, Tymchuk I, Ullaland K, Varga-Kofarago M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Yokoyama H, Zillien S, Röhrich D (2021c) Investigating particle track topology for range telescopes in particle radiography using convolutional neural networks. Acta Oncologica 60/11:1413–1418. Taylor & Francis, DOI: 10.1080/0284186X.2021.1949037
Wendzel S, Lévy-Bencheton C, Caviglione L (2020) Not all Areas are Equal: Analysis of Citations in Information Security Research. Scientometrics 122/1:267–286. Springer, DOI: 10.1007/s11192-019-03279-6
Velinov A, Mileva A, Wendzel S, Mazurczyk W (2019a) Covert Channels in the MQTT-based Internet of Things. ACCESS 7:161899–161915. IEEE, DOI: 10.1109/ACCESS.2019.2951425
Wendzel S, Link F, Eller D, Mazurczyk W (2019b) Detection of Size Modulation Covert Channels Using Countermeasure Variation. Journal of Universal Computer Science (JUCS) 25/11:1396–1416, DOI: 10.3217/jucs-025-11-1396
Mazurczyk W, Wendzel S, Chourib M, Keller J (2019c) Countering adaptive network covert communication with dynamic wardens. Future Generation Computer Systems (FGCS) 94:712–725. Elsevier, DOI: 10.1016/j.future.2018.12.047
Mazurczyk W, Wendzel S (2018a) Information Hiding – Challenges for Forensic Experts. Communications of the ACM 61/1:86–94. ACM, DOI: 10.1145/3158416
Cabaj K, Caviglione L, Mazurczyk W, Wendzel S, Woodward A, Zander S (2018b) The New Threats of Information Hiding: the Road Ahead. IEEE IT Professional 20/3:31–39. IEEE, DOI: 10.1109/MITP.2018.032501746
Keidel R, Wendzel S, Zillien S, Conner ES, Haas G (2018c) WoDiCoF – A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms. Journal of Universal Computer Science (JUCS) 24/5:556–576, DOI: 10.3217/jucs-024-05-0556
Caviglione L, Wendzel S, Mazurczyk W (2017a) The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security and Privacy 15/6:12–17. IEEE, DOI: 10.1109/MSP.2017.4251117
Wendzel S, Caviglione L, Mazurczyk W, Lalande J-F (2017b) Network Information Hiding and Science 2.0: Can it be a Match? International Journal of Electronics and Telecommunications (IJET) 62/2:217–222. Polish Academy of Sciences, DOI: 10.1515/eletel-2017-0029
Spenger G, Keler J, Wendzel S (2017c) Enhanced Ant Colony-inspired Parallel Algorithm to Improve Cryptographic PRNGs. Journal of Cyber Security and Mobility (JCSM) 6/2:147–170. River Publishers, DOI: 10.13052/2245-1439.623
Wendzel S, Mazurczyk W, Haas G (2017d) Steganography for Cyber-physical Systems. Journal of Cyber Security and Mobility (JCSM) 6/2:105–126. River Publishers, DOI: 10.13052/2245-1439.621
Wendzel S (2016a) How to Increase the Security of Smart Buildings. Communications of the ACM (CACM) 59/5:47–49. ACM, DOI: 10.1145/2828636
Wendzel S, Mazurczyk W, Zander S (2016b) A Unified Description Method for Network Information Hiding Methods. Journal of Universal Computer Science (JUCS) 22/11:1456–1486, DOI: 10.3217/jucs-022-11-1456
Wendzel S, Kasem-Madani S (2016c) IoT Security: The Improvement-Decelerating ’Cycle of Blame’, DOI: 10.13052/popcas010
Kaur J, Wendzel S, Eissa O, Tonejc J, Meier M (2016d) Covert channel-internal control protocols: attacks and defense. Security and Communication Networks (SCN) 9/15:2986–2997. Wiley, DOI: 10.1002/sec.1471
Naumann M, Wendzel S, Mazurczyk W, Keller J (2016e) Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions. Security and Communication Networks (SCN) 9/15:2972–2985. Wiley, DOI: 10.1002/sec.1500
Mazurczyk W, Wendzel S, Azagra Villares I, Szczypiorski K (2016f) On importance of steganographic cost for network steganography. Security and Communication Networks (SCN) 9/8:781–790. Wiley, DOI: 10.1002/sec.1085
Wendzel S, Zander S, Fechner B, Herdin C (2015a) Pattern-based survey and categorization of network covert channel techniques. ACM Computing Surveys (CSUR) 47/3:1–26. ACM New York, NY, USA, DOI: 10.1145/2684195
Wendzel S, Palmer C (2015b) Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research. Journal of Universal Computer Science (JUCS) 21/12:1684–1705, DOI: 10.3217/jucs-021-12-1684
Szczypiorski K, Janicki A, Wendzel S (2015c) “The Good, The Bad And The Ugly”: Evaluation of Wi-Fi Steganography. Journal of Communications (JCM) 10/10:747–752, DOI: 10.12720/jcm.10.10.747-752
Wendzel S, Keller J (2014a) Hidden and under control. Annals of Telecommunications–Annales des Télécommunications (ANTE) 69/7:417–430. Springer, DOI: 10.1007/s12243-014-0423-x
Wendzel S, Keller J (2014b) IT-gestütztes Management und Controlling: Verdeckte Kanäle – eine zunehmende Gefahr für Unternehmensdaten. Controlling 26. Jahrgang/14/6. Beck, DOI: 10.15358/0935-0381_2014_6_304
Wendzel S, Keller J (2012) Preventing Protocol Switching Covert Channels. International Journal on Advances in Security 5/3 and 4. Iaria, DOI: 10.5281/zenodo.4618134
Wendzel S, Keller J (2011) Einführung in die Forschungsthematik der verdeckten Kanäle. Magdeburger Journal zur Sicherheitsforschung 2:115–124, http://www.researchgate.net/profile/Steffen_Wendzel/publication/216466431_Einfhrung_in_die_Forschungsthematik_der_verdeckten_Kanle/links/09e415005387fbf9a4000000.pdf
Conference and Workshop Papers
Zillien S, Schmidbauer T, Kubek M, Keller J, Wendzel S (2024a) Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION. In: Proc. 19th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2024). ACM, pp 80–95, DOI: 10.1145/3634737.3637676. Acceptance rate: 21%
Keller J, Heßeling C, Wendzel S (2024b) Robust and Homomorphic Covert Channels in Streams of Numeric Data. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM, DOI: 10.1145/3664476.3670879
Strachanski F, Petrov D, Schmidbauer T, Wendzel S (2024c) A Comprehensive Pattern-based Overview of Stegomalware. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM, DOI: 10.1145/3664476.3670886
Schymiczek J, Schmidbauer T, Wendzel S (2024d) A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM, DOI: 10.1145/3664476.3670877
Dittmann J, Krätzer C, Kiltz S, Altschaffel R, Vielhauer C, Wendzel S, Wefel S, Nitsch H (2024e) Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT). In: GI Sicherheit 2024 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V. (GI), pp 265–268, DOI: 10.18420/sicherheit2024_018
Schorr V, Kamenev N, Bleistein T, Werth D, Wendzel S, Weigold T (2023) Power Consumption Analysis as a Detection Indicator for Cyberattacks on Smart Home Devices. In: Proc. Energy Informatics.Academy Conference 2023, Part II. Springer, pp 224–239, DOI: 10.1007/978-3-031-48652-4_15
Schmidbauer T, Wendzel S (2022a) SoK: A Survey Of Indirect Network-level Covert Channels. In: Proc. 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2022). ACM, pp 546–560, DOI: 10.1145/3488932.3517418. Acceptance rate: 18.4%
Schmidbauer T, Keller J, Wendzel S (2022b) Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication. In: Proc. 17th International Conference on Availability, Reliability and Security (ARES 2022). ACM, DOI: 10.1145/3538969.3544455
Mayer N, Wendzel S, Keller J (2022c) Short Paper: Untersuchung des Gender-gaps bei Cybersecurity-Publikationen. In: GI Sicherheit 2022 – Sicherheit, Schutz und Zuverlässigkeit. pp 173–182, DOI: 10.18420/sicherheit2022_11
Bub D, Hartmann L, Bozakov Z, Wendzel S (2022d) Towards Passive Identification of Aged Android Devices in the Home Network. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2022). ACM, pp 17–20, DOI: 10.1145/3528580.3528584
Wendzel S, Caviglione L, Fechner B (2022e) Poster: Steganography Hiding Patterns: A Brief Review. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2022). ACM, pp 107–108, DOI: 10.1145/3528580.3532997
Wendzel S, Caviglione L, Mazurczyk W, Mileva A, Dittmann J, Krätzer C, Lamshöft K, Vielhauer C, Hartmann L, Keller J, Neubert T (2021a) A Revised Taxonomy of Steganography Embedding Patterns. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM, DOI: 10.1145/3465481.3470069
Zillien S, Wendzel S (2021b) Reconnection-Based Covert Channels in Wireless Networks. In: Jøsang A, Futcher L, Hagen J (eds) ICT Systems Security and Privacy Protection (IFIP SEC 2021). Springer International Publishing, Cham, pp 118–133, DOI: 10.1007/978-3-030-78120-0_8. Acceptance rate: 25%
Vrhovec S, Caviglione L, Wendzel S (2021c) Crème de la Crème: Lessons from Papers in Top Publications. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM, DOI: 10.1145/3465481.3470027
Schmidbauer T, Wendzel S (2021d) Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM, DOI: 10.1145/3465481.3470085
Mileva A, Caviglione L, Velinov A, Wendzel S, Dimitrova V (2021e) Risks and Opportunities for Information Hiding in DICOM Standard. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM, DOI: 10.1145/3465481.3470072
Hartmann L, Zillien S, Wendzel S (2021f) Reset- and Reconnection-based Covert Channels in CoAP. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). ACM, DOI: 10.1145/3487405.3487660
Hartmann L, Wendzel S (2021g) Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). ACM, DOI: 10.1145/3487405.3487662
Hartmann L, Wendzel S (2021h) How Feasible are Steganographic and Stealth Attacks on TIA Project Meta-data of ICS: A Case Study with Real-world Data. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). ACM, DOI: 10.1145/3487405.3487661
Chourib M, Wendzel S, Mazurczyk W (2021i) Adaptive Warden Strategy for Countering Network Covert Storage Channels. In: 46th IEEE Conference on Local Computer Networks (LCN 2021). IEEE, pp 148–153, https://arxiv.org/abs/2111.03310
Aehle M, Alme J, Barnaföldi GG, Borshchov V, Bodova T, Brink A van den, Eikeland V, Garth C, Gauger NR, Genov G, Grøttvik O, Feofilov G, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Leonhardt V, Mehendale S, Mulawade RN, Odland OH, Papp G, Peitzmann T, Pettersen HES, Piersimoni P, Protsenko M, Rehman AU, Richter M, Röhrich D, Samnøy AT, Schilling A, Seco J, Songmoolnak A, Sølie JR, Tambave G, Tymchuk I, Ullaland K, Varga-Köfaragó M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Yokoyama H, Zillien S (2021j) The Bergen proton CT system. In: 12th International Conference on Position Sensitive Detectors (PSD 2021), https://wiki.uib.no/pct/img_auth.php/7/7a/Poster_PSD12.pdf
Keller J, Wendzel S (2020a) Covert Channels in One-Time Passwords Based on Hash Chains. In: Proceedings of the European Interdisciplinary Cybersecurity Conference (EICC 2020). ACM, New York, NY, USA, DOI: 10.1145/3424954.3424966
Hartmann L, Wendzel S (2020b) Anomaly Detection in ICS Based on Data-History Analysis. In: Proceedings of the European Interdisciplinary Cybersecurity Conference (EICC 2020). ACM, New York, NY, USA, DOI: 10.1145/3424954.3424963
Schmidbauer T, Wendzel S (2020c) Covert Storage Caches Using the NTP Protocol. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020). ACM, New York, NY, USA, DOI: 10.1145/3407023.3409207
Szary P, Mazurczyk W, Wendzel S, Caviglione L (2020d) Design and Performance Evaluation of Reversible Network Covert Channels. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020). ACM, New York, NY, USA, DOI: 10.1145/3407023.3409215
Wendzel S (2019a) Protocol-independent Detection of “Message Ordering” Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). ACM, New York, NY, USA, pp 63:1–63:8, DOI: 10.1145/3339252.3341477
Schmidbauer T, Wendzel S, Mileva A, Mazurczyk W (2019b) Introducing Dead Drops to Network Steganography Using ARP-Caches and SNMP-Walks. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). ACM, New York, NY, USA, pp 64:1–64:10, DOI: 10.1145/3339252.3341488
Mazurczyk W, Szary P, Wendzel S, Caviglione L (2019c) Towards Reversible Storage Network Covert Channels. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). ACM, New York, NY, USA, pp 69:1–69:8, DOI: 10.1145/3339252.3341493
Wendzel S, Eller D, Mazurczyk W (2018a) One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. In: Proc. Central European Security Conference (CECC 2018). ACM, pp 1:1–1:6, DOI: 10.1145/3277570.3277571
Zillien S, Wendzel S (2018b) Detection of covert channels in TCP retransmissions. In: Proc. 23rd Nordic Conference on Secure IT Systems (NordSec 2018). Springer, pp 203–218, DOI: 10.1007/978-3-030-03638-6_13
Mazurczyk W, Wendzel S, Cabaj K (2018c) Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM, pp 10:1–10:10, DOI: 10.1145/3230833.3233261
Wendzel S (2018d) Get Me Cited, Scotty! Analysis of Citations in Covert Channel/Steganography Research. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM, pp 13:1–13:8, DOI: 10.1145/3230833.3233265
Wendzel S, Mazurczyk W, Haas G (2017a) Don’t you touch my nuts: Information hiding in cyber physical systems. In: 2017 IEEE Security and Privacy Workshops (SPW 2017). IEEE, pp 29–34, DOI: 10.1109/SPW.2017.40
Keller J, Spenger G, Wendzel S (2017b) Ant colony-inspired parallel algorithm to improve cryptographic pseudo random number generators. In: 2017 IEEE Security and Privacy Workshops (SPW 2017). IEEE, pp 17–22, DOI: 10.1109/SPW.2017.31
Kobekova A, Bültermann L, Tonejc J, Wendzel S (2017c) Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-IT. In: Tagungsband des 15. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH, pp 515–526, https://www.researchgate.net/publication/318015456_Was_bedeutet_das_IT-Sicherheitsgesetz_fur_Smart_Buildings_Konzepte_des_sicheren_Alterns_der_Gebaude-IT
Lehner F, Mazurczyk W, Keller J, Wendzel S (2017d) Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach. In: Proc. 42th IEEE Conference on Local Computer Networks (LCN 2017). IEEE, pp 78–85, DOI: 10.1109/LCN.2017.32
Wendzel S, Mazurczyk W (2016) Poster: An Educational Network Protocol for Covert Channel Analysis Using Patterns. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS 2016). ACM, New York, NY, USA, pp 1739–1741, DOI: 10.1145/2976749.2989037
Kaur J, Tonejc J, Wendzel S, Meier M (2015a) Securing BACnet’s pitfalls. In: Proc. 30th IFIP TC-11 International Information Security and Privacy Conference (IFIP SEC 2015). Springer, pp 616–629, DOI: 10.1007/978-3-319-18467-8_41. Acceptance rate: 19.8%
Anhaus EM, Wendzel S (2015b) BACtag – Data Leakage Protection für Gebäude. In: D-A-CH Security 2015. syssec, pp 417–248, https://www.researchgate.net/publication/276762604_BACtag_Data_Leakage_Protection_fur_Gebaude?ev=prf_pub
Tonejc J, Kaur J, Karsten A, Wendzel S (2015c) Visualizing BACnet data to facilitate humans in building-security decision-making. In: International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015). Springer, pp 693–704, DOI: 10.1007/978-3-319-20376-8_62
Caviglione L, Lalande J-F, Mazurczyk W, Wendzel S (2015d) Analysis of human awareness of security and privacy threats in smart environments. In: International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015). Springer, pp 165–177, DOI: 10.1007/978-3-319-20376-8_15
Kaur J, Wendzel S, Meier M (2015e) Countermeasures for covert channel-internal control protocols. In: 10th International Conference on Availability, Reliability and Security (ARES 2015); IWCC Workshop. IEEE, pp 422–428, DOI: 10.1109/ARES.2015.88. Paper received the Best Paper Award
Kaur J, Herdin C, Tonejc J, Wendzel S, Meier M, Szlósarczyk S (2015f) Novel Approaches for Security in Building Automation Systems. In: Tagungsband des 14. Deutschen IT-Sicherheitskongresses des BSI. SecuMedia Verlags-GmbH, pp 148–155
Szczypiorski K, Janicki A, Wendzel S (2015g) “The Good, The Bad And The Ugly”: Evaluation of Wi-Fi Steganography. In: 6th International Conference on Networking and Information Technology (ICNIT 2015). Tokyo, Japan
Wendzel S, Mazurczyk W, Caviglione L, Meier M (2014a) Hidden and uncontrolled–on the emergence of network steganographic threats. In: Securing Electronic Business Processes (ISSE 2014). Springer, pp 123–133, DOI: 10.1007/978-3-658-06708-3_9
Wendzel S, Herdin C, Wirth R, Masoodian M, Luz S, Kaur J (2014b) Mosaic-chart based visualization in building automation systems. In: Proceedings of the 9th Future Security Research Conference. Fraunhofer Verlag/MEV Verlag, Berlin, pp 687–690, http://www.researchgate.net/profile/Steffen_Wendzel/publication/265785944_Mosaic-chart_based_Visualization_in_Building_Automation_Systems/links/542ad4710cf29bbc126a771f.pdf
Wendzel S, Zwanger V, Meier M, Szlósarczyk S (2014c) Envisioning smart building botnets. In: Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V., https://dl.gi.de/20.500.12116/20053
Szlósarczyk S, Wendzel S, Kaur J, Meier M, Schubert F (2014d) Towards suppressing attacks on and improving resilience of building automation systems – an approach exemplified using BACnet. In: Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V., https://dl.gi.de/handle/20.500.12116/20060
Kaur J, Wendzel S (2014e) Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purpose. In: Proceedings Computer Science Conference for University of Bonn Students (CSCUBS), http://cscubs.cs.uni-bonn.de/2014/data/paper_8.pdf
Kaur J, Meier M, Szlósarczyk S, Wendzel S (2014f) A Cost-Efficient Building Automation Security Testbed for Educational Purposes. In: Proc. SECURWARE 2014. Iaria, Lisbon, https://www.wendzel.de/dr.org/files/Papers/SECURWARE14poster.pdf. poster
Lalande J-F, Wendzel S (2013a) Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In: Proc. 2013 International Conference on Availability, Reliability and Security (ARES), International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM 2013). IEEE, pp 701–710, DOI: 10.1109/ARES.2013.92
Kahler B, Wendzel S (2013b) How to own a building? Wardriving gegen die Gebäude-Automation. In: Proc. 20. DFN Workshop zur Sicherheit in vernetzten Systemen. BoD, pp H1–H13, https://www.researchgate.net/publication/235702099_How_to_own_a_Building_Wardriving_gegen_die_Gebaude-Automation
Backs P, Wendzel S, Keller J (2012a) Dynamic routing in covert channel overlays based on control protocols. In: 2012 International Conference for Internet Technology and Secured Transactions (ICITST 2012). IEEE, pp 32–39, https://ieeexplore.ieee.org/document/6470978
Wendzel S, Kahler B, Rist T (2012b) Covert channels and their prevention in building automation protocols: A prototype exemplified using BACnet. In: 2012 IEEE International Conference on Green Computing and Communications (GreenCom), Internet of Things (iThings) and Cyber-physical Systems (CPSCom 2012). IEEE, pp 731–736, DOI: 10.1109/GreenCom.2012.120
Wendzel S, Keller J (2012c) Systematic engineering of control protocols for covert channels. In: IFIP International Conference on Communications and Multimedia Security (CMS 2012). Springer, pp 131–144, DOI: 10.1007/978-3-642-32805-3_11
Wendzel S, Keller J (2012d) Design and implementation of an active warden addressing protocol switching covert channels. In: Proc. 7th International Conference on Internet Monitoring and Protection (ICIMP 2012). IARIA, pp 1–6, https://www.researchgate.net/publication/229092168_Design_and_Implementation_of_an_Active_Warden_Addressing_Protocol_Switching_Covert_Channels. Paper received the Best Paper Award
Wendzel S, Zander S (2012e) Detecting protocol switching covert channels. In: Proc. 37th Annual IEEE Conference on Local Computer Networks (LCN 2012). IEEE, pp 280–283, DOI: 10.1109/LCN.2012.6423628
Wendzel S (2012f) The problem of traffic normalization within a covert channel’s network environment learning phase. In: Sicherheit 2012 – Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V., pp 149–161, https://dl.gi.de/handle/20.500.12116/18270
Wendzel S (2012g) Covert and side channels in buildings and the prototype of a building-aware active warden. In: 2012 IEEE International Conference on Communications (ICC 2012). IEEE, pp 6753–6758, DOI: 10.1109/ICC.2012.6364876
Rist T, Wendzel S, Masoodian M, André E (2012h) Next-generation home automation systems. Pabst Science Publishers, https://www.researchgate.net/publication/229092368_Next-Generation_Home_Automation_Systems
Wendzel S (2012i) Control Protocols for Network Covert Channels. In: Proc. 7th GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), SIDAR-Report SR-2012-01. Gesellschaft für Informatik, FB Sicherheit, SIG SIDAR, Berlin, p 24
Rist T, Wendzel S, Masoodian M, Monigatti P, André E (2011a) Creating Awareness for Efficient Energy Use in Smart Homes. In: Feuerstein G, Ritter W (eds) Zusammenfassung der Beiträge zum Usability Day IX, Dornbirn, Austria. Pabst, pp 162–168, https://www.researchgate.net/publication/215661204_Creating_Awareness_for_Efficient_Energy_Use_in_Smart_Homes
Wendzel S (2011b) Mikroprotokolle in verdeckten Kanälen. In: Beiträge zum Doktorandenkolleg Ruhr 2011. Meinerzhagen Valbert
Wendzel S, Keller J (2011c) Low-attention forwarding for mobile network covert channels. In: Decker et. al. B de (ed) Proc. 12th Conference on Communications and Multimedia Security (CMS 2011). IFIP International Federation for Information Processing; Springer, pp 122–133, DOI: 10.1007/978-3-642-24712-5_10. Acceptance rate: 21.1%
Wendzel S, Rist T, Masoodian M, André E (2011d) A Secure Interoperable Architecture for Building-Automation Applications. In: Proc. 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL), DOI: 10.1145/2093698.2093706
Theses
Wendzel S (2020) Network information hiding: Terminology, taxonomy, methodology and countermeasures. Habilitation Thesis, Department of Mathematics; Computer Science, Unversity of Hagen, http://www.wendzel.de/dr.org/files/Papers/thesis_with_cover.pdf
Wendzel S (2013) Novel approaches for network covert storage channels. Dissertation, Department of Mathematics; Computer Science, Unversity of Hagen, https://ub-deposit.fernuni-hagen.de/receive/mir_mods_00000190
Wendzel S (2011) Analyse der Detektions- und Präventionsmethoden für verdeckte Kanäle. Master’s Thesis, Augsburg University of Applied Sciences
Wendzel S (2009) Protokollwechsel zur Realisierung von Covert Channels und Headerstrukturveränderungen zur Vermeidung von Covert Channels. Diplomarbeit, Kempten University of Applied Sciences
Technical Reports
Wendzel S, Caviglione L, Mazurczyk W, Mileva A, Dittmann J, Krätzer C, Lamshöft K, Vielhauer C, Hartmann L, Keller J, Neubert T, Zillien S (2022) A Generic Taxonomy for Steganography Methods, DOI: 10.36227/techrxiv.20215373. under review
Wendzel S (2008) Protocol channels as a new design alternative of covert channels. CoRR abs/0809.1949, DOI: 10.48550/arXiv.0809.1949
Miscellaneous Publications
Wendzel S (2020) Review of the World Scientific Publishing Co., Inc. book “Future Automation: Changes to Lives and to Businesses”, 2018). ACM Computing Reviews N.N. ACM
Wendzel S (2018a) Review of the article “Man-in-the-middle attacks on secure simple pairing in Bluetooth standard v5.0 and its countermeasure”. ACM Computing Reviews 49. ACM
Wendzel S (2018b) Ich hab’ nichts zu verbergen! Rezension zum Buch “Komplizen des Erkennungsdienstes”. Schwarz-auf-Weiss SAW
Wendzel S (2017a) Review of the ACM CSUR article “Out-of-band Covert Channels–A Survey”. ACM Computing Reviews 48/1:49. ACM
Wendzel S (2017b) Review of the Cambridge Univ. Press book “Darkweb Cyber Threat Intelligence Mining”. ACM Computing Reviews 48. ACM
Wendzel S (2017c) Zur IT-Sicherheit von Smart Homes. PC-Welt 03.08.2017,. Beitrag zum Experten-Netzwerk
Wendzel S (2017d) Steganografie: eine zunehmende Bedrohung. PC-Welt 18.10.2017,. Beitrag zum Experten-Netzwerk
Wendzel S (2017e) Made in Germany – Sicherheit als Vertrauensfaktor. CCI-Zeitung 2017/13,. Editorial
Wendzel S, Kobekova A, Tonejc J, Kaur J (2016a) IT-Sicherheit für Smart Buildings: ein Bericht zum BARNI-Projekt. Smart Home Summit
Wendzel S (2016b) Tatort Smart Building: die Gebäudeautomation muss sicherer werden. CCI-Zeitung 2016/08:16
Kobekova A, Wendzel S, Tonejc J (2016c) Smart Building – Sicherheitslücken schließen. PROTECTOR 2016/4:42–43
Mazurczyk W, Amann P, Caviglione L, Wendzel S (2016d) CUIng: Criminal use of information hiding initiative. European CIIP Newsletter 10/3:31–32
Contributor (2015a) Security and resilience of smart home environments: Good practices and recommendations. ENISA, https://www.enisa.europa.eu/publications/security-resilience-good-practices
Contributor (2015b) EU NIS Platform: State-of-the-art of secure ICT landscape. ENISA, https://resilience.enisa.europa.eu/nis-platform/shared-documents/wg3-documents/research-landscape-deliverable-v2/at_download/file
Contributor (2015c) EU NIS Platform: Cybersecurity strategic research agenda. ENISA, https://resilience.enisa.europa.eu/nis-platform/shared-documents/wg3-documents/strategic-research-agenda-final-v0.96/at_download/file
Wendzel S, Meier M, Tonejc J (2015d) Die zwei Handlungsfelder für Sicherheit in der Gebäudeautomation. BusSysteme Magazin 22/4:257
Wübbeling M, Wendzel S (2015e) IT-Sicherheitsmonitoring. Cyber Security Report 2015 19–21. Mittler Report
Messer-Schmidt K, Rösler D, Ruppricht C, Seebauer H, Wendzel S (2014a) Mit kritischen ITK-Systemen bewusst umgehen: ein Lösungsansatz des Arbeitskreis KRITIS (Gesellschaft für Informatik). digitalbusiness CLOUD 8:40–41, https://fg-secmgt.gi.de/ak-kritis/arbeitsergebnisse
Wendzel S (2014b) Exfiltration vertrauenswürdiger Daten – Protektionsmaßnahmen hinken den modernen Techniken der Angreifer hinterher. digitalbusiness CLOUD 2014/2:37
Wendzel S (2013a) Gefahrenpotential der Netzwerksteganografie. IT-SICHERHEIT 2013/6:58–59
Wendzel S (2013b) Sicherheitsaspekte in der Gebäude-Automation – Perspektiven der Personenüberwachung. IT-SICHERHEIT 2013/3:70–72
Wendzel S (2012a) Verdeckte Kommunikation in Gebäuden. Analyse der Gefahren und eine Middleware-basierte Gegenmaßnahme. BusSysteme Magazin 2012/03:182–183
Wendzel S, Rist T, André E, Masoodian M, Wirth R (2012b) Sicherheit beim Energiesparen durch Abstraktion. BusSysteme Magazin 12/2
Contributor (2012c) Soziale Netzwerke und ihre Auswirkungen auf die Unternehmenssicherheit,. Booklet published and edited by Bayerisches Landesamt für Verfassungsschutz (LfV).
Wendzel S (2011) Bewusstsein für die Sicherheit im Bereich der Gebäudeautomatisierung. Hakin9 (de) 2011/3:11–12
Wendzel S (2009) Protocol Channels. Hakin9 2009/6:38–40
Wendzel S (2007a) Forensik nach Angriffen auf Linux-Systeme. Hakin9 2007/06
Wendzel S (2007b) Abhärtung von Linux/BSD Systemen. Eine Einführung. Hakin9 2007/04
Wendzel S (2007c) Hostbasierte Intrusion Detection. Ein Einblick. Hakin9 2007/02
Wendzel S (2007d) Firewalls umgehen mit Protokoll-Tunneling. Hakin9 2007/01
Plötner J, Wendzel S (2006) Versionsverwaltung – Mit CVS oder Subversion Quelltexte verwalten. Linux-User 2006/10
Wendzel S (2005) Xyria:CDPNNTPd. FreeX 2005/5
Wendzel S (2003a) Das Allround-Genie Z-Shell. FreeX 2003/6
Wendzel S (2003b) sysctl in OpenBSD. FreeX 2003/5