Publikationen

2022

128.
Schmidbauer T, Wendzel S. SoK: A Survey Of Indirect Network-level Covert Channels. In: Proc. 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2022). ACM; 2022. p. 546—560.      [DOI]      [Datei] 
127.
Bub D, Hartmann L, Bozakov Z, Wendzel S. Towards Passive Identification of Aged Android Devices in the Home Network. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2022). ACM; 2022. p. 17—20.      [DOI]      [Datei] 

2021

126.
Wendzel S, Caviglione L, Mazurczyk W, Mileva A, Dittmann J, Krätzer C, Lamshöft K, Vielhauer C, Hartmann L, Keller J, Neubert T. A Revised Taxonomy of Steganography Embedding Patterns. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM; 2021.      [DOI]      [Datei] 
125.
Chourib M, Wendzel S, Mazurczyk W. Adaptive Warden Strategy for Countering Network Covert Storage Channels. In: 46th IEEE Conference on Local Computer Networks (LCN 2021). IEEE; 2021. p. 148—153.     [Datei] 
124.
Mileva A, Velinov A, Hartmann L, Wendzel S, Mazurczyk W. Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels. Computers & Security. 2021; 104102207.      [DOI]      [Datei] 
123.
Vrhovec S, Caviglione L, Wendzel S. Crème de la Crème: Lessons from Papers in Top Publications. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM; 2021.      [DOI]      [Datei] 
122.
Hartmann L, Wendzel S. Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). ACM; 2021.      [DOI]      [Datei] 
121.
Hartmann L, Wendzel S. How Feasible are Steganographic and Stealth Attacks on TIA Project Meta-data of ICS: A Case Study with Real-world Data. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). ACM; 2021.      [DOI]      [Datei] 
120.
Schmidbauer T, Wendzel S. Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM; 2021.      [DOI]      [Datei] 
119.
Pettersen H, Aehle M, Alme J, Barnaföldi G, Borshchov V, Brink A, Chaar M, Eikeland V, Gregory F, Garth C, Gauger N, Genov G, Grøttvik O, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Leonhardt V, Mehendale S, Mulawade R, Odland O, Papp G, Peitzmann T, Piersimoni P, Protsenko M, Rehman A, Richter M, Santana J, Schilling A, Seco J, Songmoolnak A, Sølie J, Tambave G, Tymchuk I, Ullaland K, Varga-Kőfaragó M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Yokoyama H, Zillien S, Röhrich D. Investigating particle track topology for range telescopes in particle radiography using convolutional neural networks. Acta Oncologica. 2021; 60(11):1413—1418.      [DOI]      [Datei] 
118.
Wendzel S. IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung . 2 ed. Springer; 2021.      [DOI]      [Datei] 
117.
Wendzel S, Plötner J. Linux. Der Grundkurs . 1 ed. Rheinwerk Verlag; 2021.     [Datei] 
116.
Caviglione L, Wendzel S, Mileva A, Vrhovec S. Multidisciplinary Solutions to Modern Cybersecurity Challenges. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). 2021; 12(3):1—3.      [DOI]      [Datei] 
115.
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J, Mazurczyk W. Proceedings of the Third International Workshop on Information Security Methodology and Replication Studies (IWSMR 2021). ACM; 2021.
114.
Zillien S, Wendzel S. Reconnection-Based Covert Channels in Wireless Networks. In: Jøsang, Audun and Futcher, Lynn and Hagen, Janne, editors. ICT Systems Security and Privacy Protection (IFIP SEC 2021). Cham: Springer International Publishing; 2021. p. 118—133.      [DOI]      [Datei] 
113.
Hartmann L, Zillien S, Wendzel S. Reset- and Reconnection-based Covert Channels in CoAP. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2021). ACM; 2021.      [DOI]      [Datei] 
112.
Keller J, Wendzel S. Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains. Applied Sciences. 2021; 11(2):      [DOI]      [Datei] 
111.
Mileva A, Caviglione L, Velinov A, Wendzel S, Dimitrova V. Risks and Opportunities for Information Hiding in DICOM Standard. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM; 2021.      [DOI]      [Datei] 
110.
Aehle M, Alme J, Barnaföldi GG, Borshchov V, Bodova T, Brink A, Eikeland V, Garth C, Gauger NR, Genov G, Grøttvik O, Feofilov G, Helstrup H, Igolkin S, Keidel R, Kobdaj C, Kortus T, Leonhardt V, Mehendale S, Mulawade RN, Odland OH, Papp G, Peitzmann T, Pettersen HES, Piersimoni P, Protsenko M, Rehman AU, Röhrich D, Samnøy AT, Schilling A, Seco J, Songmoolnak A, Sølie JR, Tambave G, Tymchuk I, Ullaland K, Varga-Köfaragó M, Volz L, Wagner B, Wendzel S, Wiebel A, Xiao R, Yang S, Yokoyama H, Zillien S. The Bergen proton CT system. In: 12th International Conference on Position Sensitive Detectors (PSD 2021). IOP Publishing; 2021. p. C02051.      [DOI]      [Datei] 

2020

109.
Domaschka J, Volpert S, Seybold D. Hathi: an MCDM-based approach to capacity planning for cloud-hosted DBMS. In: 2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC). 13 ed. IEE/ACM; 2020 Dez.. p. 143—154.
108.
Seybold D, Volpert S, Domaschka J. Mowgli. SPEC Research Group. 2020 Nov.;      [Weblink] 
107.
Hartmann L, Wendzel S. Anomaly Detection in ICS Based on Data-History Analysis. In: Proceedings of the European Interdisciplinary Cybersecurity Conference (EICC 2020). New York, NY, USA: ACM; 2020.      [DOI]      [Datei] 
106.
Keller J, Wendzel S. Covert Channels in One-Time Passwords Based on Hash Chains. In: Proceedings of the European Interdisciplinary Cybersecurity Conference (EICC 2020). New York, NY, USA: ACM; 2020.      [DOI]      [Datei] 
105.
Schmidbauer T, Wendzel S. Covert Storage Caches Using the NTP Protocol. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020). New York, NY, USA: ACM; 2020.      [DOI]      [Datei] 
104.
Szary P, Mazurczyk W, Wendzel S, Caviglione L. Design and Performance Evaluation of Reversible Network Covert Channels. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020). New York, NY, USA: ACM; 2020.      [DOI]      [Datei]