Publications

2026

177.
Wendzel S, Volpert S, Zillien S, Lenz J, Rünz P, Caviglione L. A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges. Computers & Security. 2026; 164      [DOI] 
176.
Wendzel S, Zillien S, Zander S. AMPhitryon: Efficient small data compression for low-bandwidth covert channels. In: Proc. 41st ICT Systems Security and Privacy Protection (IFIP SEC 2026). Springer; 2026.
175.
Lenz J, Volpert S, Zillien S, Rünz P, Caviglione L, Wendzel S. Digital Control: National Tactics of Internet Censorship. In: uropean Interdisciplinary Cybersecurity Conference (EICC 2026). Springer; 2026.
174.
Weißenborn C, Wendzel S. History covert channels with relative timing pointers: Design, error resilience, and detectability. Journal of Information Security and Applications. 2026; 99      [DOI] 
173.
Velinov A, Mileva A, Volpert S, Zillien S, Wendzel S. Steganography in the QUIC Communication Protocol. Journal of Universal Computer Science (J.UCS). 2026; 32(2):181-208.      [DOI] 

2025

172.
Wendzel S, Keller J, Volpert S. Detection of Network Information Hiding Artifacts — A Case for HPC?. In: Proceedings of the 11th bwHPC Symposium. University of Tübingen, Germany: 2025 Sep. 23.     [File] 
171.
Wendzel S, Caviglione L, Mazurczyk W, Mileva A, Dittmann J, Krätzer C, Lamshöft K, Vielhauer C, Hartmann L, Keller J, Neubert T, Zillien S. A Generic Taxonomy for Steganography Methods. ACM Comput. Surv.. 2025;      [DOI]      [File] 
170.
Wendzel S, Krätzer C, Dittmann J, Caviglione L, Mileva A, Schmidbauer T, Vielhauer C, Zander S. Combining Different Existing Methods for Describing Steganography Hiding Methods. In: Coppens, Bart and Volckaert, Bruno and Naessens, Vincent and De Sutter, Bjorn, editors. Availability, Reliability and Security. Cham: Springer Nature Switzerland; 2025. p. 271—289.
169.
Petrov D, Ruffing P, Zillien S, Wendzel S. Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences. In: Dalla Preda, Mila and Schrittwieser, Sebastian and Naessens, Vincent and De Sutter, Bjorn, editors. Availability, Reliability and Security. Cham: Springer Nature Switzerland; 2025. p. 118—140.
168.
Wendzel S, Schmidbauer T, Zillien S, Keller J. DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data. IEEE Transactions on Dependable and Secure Computing (TDSC). 2025; 22(1):614-631.      [DOI]      [File] 
167.
Schoffit J, Pietzschmann L, Prechtel P, Eisermann D, Wendzel S, Kargl F. Enhancing client security in zero trust architectures: a device-agent policy enforcement point for compartmentalized network management. In: Koldehofe, Boris and Klingler, Florian and Sommer, Christoph and Hummel, Karin Anna and Amthor, Peter, editors. Proc. International Conference on Networked Systems 2025 (NetSys 2025). Ilmenau: ilmedia; 2025. p. 29—32.      [DOI]      [File] 

2024

166.
Volpert S, Winkelhofer S, Seybold D, Domaschka J, Wesner S. The Hidden Costs of Shared CPU Resources: A Closer Look at Cgroups and QoS. In: 2024 Nov. 1.
165.
Keßler R, Volpert S, Wesner S. Towards Improving Resource Allocation for Multi-Tenant HPC Systems: An Exploratory HPC Cluster Utilization Case Study. In: 2024 IEEE International Conference on Cluster Computing Workshops (CLUSTER Workshops). 2024 Sep. 14. p. 66-75.      [DOI] 
164.
Schymiczek J, Schmidbauer T, Wendzel S. A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM; 2024.      [DOI]      [File] 
163.
Strachanski F, Petrov D, Schmidbauer T, Wendzel S. A Comprehensive Pattern-based Overview of Stegomalware. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM; 2024.      [DOI]      [File] 
162.
Volpert S, Winkelhofer S, Wesner S, Domaschka J. An Empirical Analysis of Common OCI Runtimes' Performance Isolation Capabilities. In: Proceedings of the 15th ACM/SPEC International Conference on Performance Engineering. 2024. p. 60—70.
161.
Dittmann J, Krätzer C, Kiltz S, Altschaffel R, Vielhauer C, Wendzel S, Wefel S, Nitsch H. Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT). In: GI Sicherheit 2024 — Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V. (GI); 2024. p. 265—268.      [DOI]      [File] 
160.
Wendzel S, Mileva A, Franqueira VNL, Jaatun MG. Editorial: Fighting Cybersecurity Risks from a Multidisciplinary Perspective. Journal of Universal Computer Science (J.UCS). 2024; 30(9):1137—1139.      [DOI]      [File] 
159.
Volpert S, Winkelhofer S, Wesner S, Seybold D, Domaschka J. Exemplary Determination of Cgroups-Based QoS Isolation for a Database Workload. In: Companion of the 15th ACM/SPEC International Conference on Performance Engineering. 2024. p. 235—241.
158.
Wendzel S, Plötner J. Linux. Der Grundkurs. 2 ed. Rheinwerk Verlag; 2024.     [File] 
157.
Zillien S, Schmidbauer T, Kubek M, Keller J, Wendzel S. Look What's There! Utilizing the Internet's Existing Data for Censorship Circumvention with OPPRESSION. In: Proc. 19th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2024). ACM; 2024. p. 80—95.      [DOI]      [File] 
156.
Keller J, Heßeling C, Wendzel S. Robust and Homomorphic Covert Channels in Streams of Numeric Data. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM; 2024.      [DOI]      [File] 
155.
Wendzel S, Wressnegger C, Hartmann L, Freiling F, Armknecht F, Reinfelder L. Sicherheit 2024 — Beiträge der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Gesellschaft für Informatik e.V. (GI); 2024.     [File] 
154.
Lenz J. Warum Nutzer ihre alternden smarten Geräte ersetzen: Eine Push-Pull-Mooring Perspektive. In: Sicherheit 2024. Bonn: Gesellschaft für Informatik e.V.; 2024. p. 295—300.      [DOI] 

2023

153.
Volpert S, Erb B, Eisenhart G, Seybold D, Wesner S, Domaschka J. A Methodology and Framework to Determine the Isolation Capabilities of Virtualisation Technologies. In: Proceedings of the 2023 ACM/SPEC International Conference on Performance Engineering. 2023. p. 149—160.