Prof. Dr. Steffen Wendzel

Steffen Wendzel is the Chair of the Institute of Information Resource Management (IRM / OMI) and Director of the kiz (university library and computing center). He received his habilitation (2020) and PhD (Dr. rer. nat., 2013) from the University of Hagen, Germany. Earlier, he was a lecturer (Privatdoz.) at the Faculty of Mathematics and Computer Science of the University of Hagen, Germany, a professor and director of the Center for Technology and Transfer (ZTT) at Hochschule Worms, and PostDoc at the Dep. Cyber Security, Fraunhofer FKIE, Bonn.
Current Roles:
Selected Past Roles:
His research focuses on
Steering Committee Memberships:
see above
Other Memberships:
Nominations/Scholarships:
Research Abroad:
Advisory Board/Editorial Board Memberships
Journal Special Issues as Guest Editor
Conference and Workshop Organization
Journal Reviews (Selection):
(Technical) Program Committee Memberships:
Reviews for Funding Proposals:
Reviews for books:
History Covert Channels, GI FG NetSec, online, 2024-11-28.
A Comprehensive Pattern-based Overview of Stegomalware, ARES CUING Workshop, Vienna, AT, 2024-07-31.
History Covert Channels and Covert Channel Amplification, IH&MMSec Rump Session Talk, Baiona, ES, 2024-06-24.
Neue Entwicklungen im Bereich der Steganographie und der Umgehung von Internetzensur, Forschungsseminar LG PV/VLSI, FernUniversität in Hagen, Hagen, 2024-04-24.
Recent Developments in Network Information Hiding, EURASIP Webinar, online, 2023-10-19.
Herausforderungen an die IT-Sicherheit in der Gebäudeautomation, VDI Arbeitskreis Bauen und Gebäudetechnik: Technische Ausrüstung, online, 2023-08-08.
Penetration-Testing mit Linux, Linux-Presentation-Day (LPD) 2023.1, Hochschule Worms, Worms, DE, 2023-05-26.
Obfuskierte und versteckte Datenkommunikation: Subdomänen und Forschungstrends, Cyberagentur, online, DE, 2023-04-05.
Obfuscation and Concealment Methods for Network Traffic, CentraleSupélec, Rennes, FR, 2023-03-30.
Inaugural lecture: Gemeinsamkeiten und neue Ansätze von Obfuskations- und Versteckmethoden in Netzwerken, FernUniversität in Hagen, Hagen, DE, 2023-02-13.
20 Jahre im Schnelldurchlauf: ein Linux-Handbuch im Wandel der Zeit, Linux-Presentation-Day (LPD) 2022, Hochschule Worms, Worms, DE, 2022-11-18.
Keynote: Describing Steganography Hiding Methods with a Unified Taxonomy, ARES CUING Workshop, Vienna, AT, 2022-08-24.
IT-Sicherheit für automatisierte Gebäude: ein Überblick, VDI Fachtagung Gebäudeautomation – intelligent und nachhaltig, Baden-Baden, DE, 2022-06-29.
Steganography Hiding Patterns: A Brief Review, EICC’22 DETONATOR Workshop, online, 2022-06-15/16.
Untersuchung des Gender-gaps bei Cybersecurity-Publikationen, GI Sicherheit 2022, Karlsruhe, DE, 2022-04-06.
A Revised Taxonomy of Steganography Embedding Patterns, ARES’21 CUING Workshop, online, 2021-08-18.
Keynote: Novel Approaches for Network Steganography Countermeasures, ZiTiS Forschungsseminar, online, 2021-07-13.
BePI: Fast and Memory Efficient Method for Billion-scale Random Walk with Restart, Talk in front of Habilitation Commission, Department of Mathematics and Computer Science, University of Hagen, DE, 2020-11-02.
Realisierung von Prozessen in Betriebssystem-Kerneln, Talk in front of Habilitation Commission, Department of Mathematics and Computer Science, University of Hagen, DE, 2020-09-21.
Recent Advances in Network Steganography Detection, DeepIntel Conference, Vienna, AT, 2019-11-27.
Anomalieerkennung für Smart Buildings, 2. Forum zum Erfahrungsaustausch in der Gebäudeautomation, BImA, Berlin, DE, 2019-11-26.
Protocol-independent Detection of Covert Channels Using the ‘Size Modulation’ Pattern, ARES’19 CUING Workshop, Canterbury, UK, 2019-08-27.
Smart Buildings – Herausforderungen an die IT-Sicherheit, Stuttgarter Sicherheitskonferenz, Stuttgart, 2019-07-15.
Data leakage and covert data exfiltration: The new threat of network information hiding, Smart Rail World Conference, Munich, 2019-06-18.
Taxonomie und wissenschaftliche Methodik für das Gebiet Network Information Hiding, FernUniversität in Hagen (Fakultätskolloquium Mathematik & Informatik), Hagen, 2019-05-27.
IT-Sicherheit automatisierter Gebäude im IoT, Auvesy-Konferenz, Karlsruhe, 2019-05-16.
Network Covert Channel Patterns: Current State and Methodology, University of Bonn (Oberseminar Inst. f. Informatik IV), 2019-01-16.
Detection of covert channels in TCP retransmissions, 23rd Nordic Conference on Secure IT Systems (NordSec), Oslo, NO, 2018-11-29.
IT-Sicherheit und das Internet der Dinge, VHS Böblingen-Sindelfingen e.V., online webinar, 2018-11-19.
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels, Central European Cybersecurity Conference (CECC), Ljubljana, SI, 2018-11-15.
Get me cited, Scotty! Analyzing Citations in Covert Channel/Steganography Research, ARES’18 CUING Workshop, Hamburg, DE, 2018-08-28.
Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach, ARES’18 CUING Workshop, Hamburg, DE, 2018-08-28.
Network Information Hiding, COINS PhD Summer School 2018 (full-day class), Metochi, Lesvos, GR, 2018-07-28.
IoT-Sicherheit für die GA-Industrie, VDMA, Frankfurt, 2018-05-02.
Steganography Ante Portas, Hack-in-the-Box (HITB), Amsterdam, NL, 2018-04-12.
IoT-Sicherheit – was ist neu und was ist wichtig?, Tüv-Süd Fachtagung Gebäude 4.0, München, 2018-04-11.
IoT-Sicherheit – was ist daran neu und was relevant?, GI SecMgt Workshop ‘Neue’ Technologien und ‘neue’ Bedrohungen, Frankfurt, 2017-11-24.
Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring, 42th IEEE Conference on Local Computer Networks (LCN), Singapore, SG, 2017-10-10.
Kryptografie und Netzwerksicherheit für die Gebäudeautomation, Bälz Seminar der Technischen Hochschule Köln, 2017-09-08.
Sicherheit im Internet der Dinge, KMU meets KMH, Worms, 2017-05-29.
Don’t You Touch My Nuts: Information Hiding In Cyber Physical Systems Using Smart Buildings, BioStar/IEEE Security and Privacy Workshops, San José, CA, United States, 2017-05-25,
Ant Colony-inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators, BioStar/IEEE Security and Privacy Workshops, San José, CA, United States, 2017-05-25 (per video stream).
IT-Sicherheit mit BARNI (Building Automation Reliable Network Infrastructure), Smart Home and Metering Summit 2016, München, Germany, 2016-06-29.
Forschung zur Sicherheit von Smart Buildings, SmartHome NRW-Event zur Sicherheit von Smart Homes, Bonn, Germany, 2016-04-26.
Novel Approaches for Network Covert Storage Channels, Murdoch University, Perth, Australia, 2016-02-19.
IT-Sicherheit von Smart Homes: Chancen und Risiken, Landeskriminalamt (LKA) Niedersachsen, Hannover, Germany, 2016-01-28.
Security in Smart Building Networks, NRW.Invest / Germany at its best, Tower Bridge House, London, United Kingdom, 2015-12-03.
inHaus-Event: Sicherheit von Smart Homes (event moderator), Fraunhofer inHaus-Zentrum, Duisburg, Germany, 2015-11-17.
Your house knows what you did last summer (talk and panel), ECO Internet Security Days (ISD) 2015, Brühl, Germany, 2015-09-17.
BACtag – Data Leakage Protection für Gebäude, D-A-CH Security 2015, St. Augustin, Germany, 2015-09-09.
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments, Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, United States, 2015-08-06.
Auf dem Weg zum sicheren Smart Building, Forum Bauindustrie 2015, Zurich, Switzerland, 2015-05-21.
Smart Buildings – sind sie kritische Infrastrukturen?, Workshop des AK KRITIS, Bonn, Germany, 2015-04-24.
Vortrag über den wissenschaftlichen Ausblick auf die Cyber Security der Zukunft, 2. Mannheimer Symposium des IKZ ‘Möglichkeiten und Auswirkungen des Cyberspace’‘, Mannheim, Germany, 2014-11-06.
Hidden and Uncontrolled: The Emergence of Network Steganography, ISSE 2014, Brussels, Belgium, 2014-10-14.
Area of Interest on Trustworthy (Hyperconnected) Infrastructure (of NIS-P. WG3): Short Progress Report, Seminar on Road-mapping Cybersecurity Research and Innovation, Florence, Italy, 2014-10-08.
Netzwerksicherheit in BACnet-Systemen (talk and panel), GLT Anwendertagung, Dresden, Germany, 2014-09-25.
BACnet Security and Botnets, SANS European ICS Security Summit, Amsterdam, The Netherlands, 2014-09-22.
Alice’s Adventures in Smart Building Land – Novel Adventures in a Cyber Physical Environment, Hack in the Box (HITB), Amsterdam, The Netherlands, 2014-05-29/30.
Smart Insecure Buildings, ITEC 2014 (International Training and Education Conference), Cologne, Germany, 2014-05-21.
Smart Industrial Buildings: Sicherheit für Automation und Management von Gebäuden, 2. VDI Fachkonferenz Industrial IT Security, Frankfurt, Germany, 2014-05-07.
Area of Interest on Trustworthy (Hyperconnected) Infrastructures, NIS Platform WG3 Meeting, Brussels, Belgium, 2014-04-29.
Part of Panel: Towards defining priorities for cybersecurity research in Horzon 2020’s work programme 2016-2017 – Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform, Trust in the Digital World Conference (TDW), Vienna, Austria, 2014-04-08.
Envisioning Smart Building Botnets, GI Sicherheit 2014, Vienna, Austria, 2014-03-21.
Data Leakage Protection: Zukünftige Herausforderungen zur Sicherung von Vertraulichkeit, Chemnitzer Linuxtage 2014, Chemnitz, Germany, 2014-03-15/16.
Zukünftige Herausforderungen für die Sicherheit Smarter Gebäude, 21. DFN Workshop zur Sicherheit in vernetzten Systemen, Hamburg, Germany, 2014-02-18.
Currently Addressed Challenges in Smart Building Security Research at Fraunhofer FKIE, 9th IT4SE Workshop, Augsburg, Germany, 2013-12-06.
Keynote: Nach dem Angriff: Versteckte Exfiltration vertraulicher Daten, Heise Events Konferenztag Prism, Tempora und Co. – Rezepte gegen den Abhörwahn, Köln, Germany, 2013-12-03.
Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels, ARES ECTCM Workshop, Regensburg, Germany, 2013-09-04.
Novel Approaches for Network Covert Storage Channels, PhD thesis defense talk at the University of Hagen, Hagen, Germany, 2013-05-07.
Novel Approaches for Network Covert Channels, Invited talk at Fraunhofer FKIE, Bonn, Germany, 2013-04-18.
Covert Channel-internal Control Protocols, Technical University Hamburg-Harburg (TUHH), Oberseminar, Hamburg, Germany, 2013-04-16.
Sicherheit in Sozialen Netzwerken, Mitgliederversammlung Genossenschaftsbank Unterallgäu, Ottobeuren, Germany, 2013-03-21.
Datenschutz und Datensicherheit im Zeitalter Sozialer Netzwerke, Forum Mindelheim/Genossenschaftsbank Unterallgäu eG, Mindelheim, Germany, 2013-03-18.
Ich weiß, was du letzte Woche getan hast! Seitenkanäle in der Gebäudeautomation, Chemnitzer Linuxtage 2013, Chemnitz, Germany, 2013-03-17.
The future of data exfiltration and malicious communication, TROOPERS’13, Heidelberg, Germany, 2013-03-13.
Dynamic Routing in Covert Channel Overlays Based on Control Protocols, International Workshop on Information Security, Theory and Practice (ISTP-2012), London, United Kingdom, 2012-12-10.
Covert Channels and their Prevention in Building Automation Protocols – A Prototype Exemplified Using BACnet, 2nd Workshop on Security of Systems and Software Resiliency, Besançon, France, 2012-11-20.
Systematic Engineering of Control Protocols for Covert Channels, 13th Conference on Communications and Multimedia Security (CMS), Canterbury, United Kingdom, 2012-09-04.
Control Protocols for Network Covert Channels, 7th GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), Berlin, Germany, 2012-07-06.
Covert and Side Channels in Buildings and the Prototype of a Building-aware Active Warden, IEEE Workshop on Security and Forensics in Communication Systems, Ottawa, Canada, 2012-06-15.
Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels, 7th International Conference on Internet Monitoring and Protection (ICIMP), Stuttgart, Germany, 2012-05-28.
Security in building automation systems and the prevention of malicious data communication in building automation networks, Linux-Informationstag der LUGA, Augsburg, Germany, 2012-03-24.
The Problem of Traffic Normalization Within a Covert Channel’s Network Environment Learning Phase, GI Sicherheit 2012, Darmstadt, Germany, 2012-03-08.
Micro protocols and dynamic protocol switches in network covert channels, Swinburne University, Melbourne, Australia, 2012-01-12.
A Secure Interoperable Architecture for Building-Automation Applications, 4th Int. Symp. on Applied Sciences in Biomedical and Communication Technologies, Barcelona, Spain, 2011-10-27.
Low-attention forwarding for mobile network covert channels, 12th IFIP Conference on Communications and Multimedia Security (CMS 2011), Ghent, Belgium, 2011-10-21.
Verdeckte Kanäle: Informationen durch die Hintertür, Datenspuren 2011, Dresden, Germany, 2011-10-15.
Verdeckte Kanäle – Neuland für freie Software, Open-Source-Treffen München, Germany, 2011-07-22.
Aktuelle Techniken und Methoden der verdeckten Kommunikationskanäle, Chaos Singularity (CoSin) 2011, Biel, Switzerland, 2011-06-25.
Europäische Forschungsprojekte im Schnittbereich IT und erneuerbare Energien, 1st IT4SE-Workshop, Augsburg University of Applied Sciences, Augsburg, Germany, 2010-12-07.
Einführung in verdeckte Kanäle, 9. Linux-Infotag der Linux-Usergroup Augsburg (LUGA), Augsburg, Germany, 2010-05-27.
Protocol Hopping Covert Channels und Protocol Channels, MetaRheinMain ChaosDays 0x8, Darmstadt, Germany, 2009-09-06.
Hostbasierte Sicherheit und Linux-Hardening, Secure Linux Administration Conference (SLAC), Berlin, Germany, 2006-12-07.