About

Steffen Wendzel is the Chair of the Institute of Information Resource Management (IRM / OMI) and Director of the kiz. He received his habilitation (2020) and PhD (Dr. rer. nat., 2013) from the University of Hagen, Germany. Earlier, he was a lecturer at the University of Hagen, Germany, a professor and director of the Center for Technology and Transfer (ZTT) at the Worms University of Applied Sciences, Germany, and PostDoc at Fraunhofer FKIE, Bonn, Germany.

Research

His research focuses on

  • Internet censorship (measurement and censorship circumvention)
  • Selected topics of network security (security automation networks (especially building automation networks) and IoT networks)
  • Network information hiding (network covert channels)
  • Management and human aspects of networked IT systems

Publications

127.
Wendzel S, Mazurczyk W, Caviglione L, Houmansadr A. Emerging Topics in Defending Networked Systems. Future Generation Computer Systems (FGCS). 2022; 128317—319.      [DOI]      [File] 
126.
Wendzel S, Caviglione L, Mileva A, Lalande J, Mazurczyk W. Guest Editorial: Information Security Methodology and Replication Studies. it — Information Technology (ITIT). 2022; 64(1-2):1—3.      [DOI]      [File] 
125.
Mileva A, Velinov A, Dimitrova V, Caviglione L, Wendzel S. Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection. Entropy. 2022; 24(2):      [DOI]      [File] 
124.
Caviglione L, Wendzel S, Vrhovec S, Mileva A. Security and Privacy Issues of Home Globalization. Security and Privacy (S&P). 2022; 20(1):10—11.      [DOI]      [File] 
123.
Wendzel S, Caviglione L, Checco A, Mileva A, Lalande J, Mazurczyk W. Proceedings of the Third International Workshop on Information Security Methodology and Replication Studies (IWSMR 2022). ACM; 2022.
122.
Schmidbauer T, Keller J, Wendzel S. Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication. In: Proc. 17th International Conference on Availability, Reliability and Security (ARES 2022). ACM; 2022.      [DOI]      [File] 
121.
Wendzel S, Caviglione L, Fechner B. Poster: Steganography Hiding Patterns: A Brief Review. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2022). ACM; 2022. p. 107—108.      [DOI]      [File] 
120.
Mayer N, Wendzel S, Keller J. Short Paper: Untersuchung des Gender-gaps bei Cybersecurity-Publikationen. In: GI Sicherheit 2022 — Sicherheit, Schutz und Zuverlässigkeit. 2022. p. 173—182.      [DOI]      [File] 
119.
Schmidbauer T, Wendzel S. SoK: A Survey Of Indirect Network-level Covert Channels. In: Proc. 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2022). ACM; 2022. p. 546—560.      [DOI]      [File] 
118.
Bub D, Hartmann L, Bozakov Z, Wendzel S. Towards Passive Identification of Aged Android Devices in the Home Network. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2022). ACM; 2022. p. 17—20.      [DOI]      [File] 

Open Thesis and Projects

Activities

Steering Committee Memberships:

Other Memberships:

Nominations/Scholarships:

Research Abroad:

  • 4/2023: Visiting colleagues at Technical University of Warsaw, Warsaw, Poland (host: Prof. Dr. Wojciech Mazurczyk).
  • 3/2023: Visiting colleagues at CentraleSupélec, Rennes, France (host: Prof. Dr. Jean-Francois Lalande).
  • 11-12/2022: Visiting researcher at Institute for Applied Mathematics and Information Technologies (IMATI), CNR, Genova, Italy (host: Dr. Luca Caviglione).
  • 02/2016: Visiting colleagues at the Murdoch University, Perth, Australia (host: Dr. Sebastian Zander).
  • 2013, 2014, 2015: several longer stays in Brussels, Belgium, for Fraunhofer Brussels as part of EU-related activities.
  • 10/2013: Visiting colleagues at the Warsaw University of Technology, Poland (host: Prof. Dr. Wojciech Mazurczyk).
  • 12/2011-01/2012: guest researcher at the University of Waikato, New Zealand, for the 2nd time for six weeks via project IT4SE (host: Dr. Masood Masoodian)
  • 12/2010-01/2011: guest researcher at the University of Waikato, New Zealand, for six weeks via project IT4SE (host: Dr. Masood Masoodian)

Advisory Board/Editorial Board Memberships

Journal Special Issues as Guest Editor

  • Journal of Universal Computer Science (J.UCS) special issue Fighting Cybersecurity Risks from a Multidisciplinary Perspective, 2023/2024, together with Aleksandra Mileva, Virginia N. L. Franqueira, and Martin Gilje Jaatun.
  • IEEE Security & Privacy (S&P) special issue on Security & Privacy Issues on Home Globalization, 2022, together with Luca Caviglione, Aleksandra Mileva and Simon Vrhovec.
  • Future Generation Computer Systems (FGCS) special issue on Emerging Topics in Defending Networked Systems, 2022, together with Luca Caviglione, Amir Houmansadr and Wojciech Mazurczyk.
  • it – Information Technology (ITIT) special issue on Information security methodology and replication studies, 2022, together with Luca Caviglione, Aleksandra Mileva, Jean-Francois Lalande and Wojciech Mazurczyk.
  • Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) special issue on Multidisciplinary Solutions to Modern Cybersecurity Challenges, 2021, together with Luca Caviglione, Aleksandra Mileva and Simon Vrhovec.
  • Journal of Universal Computer Science (J.UCS) special issue on Information Security Methodology, Replication Studies and Information Security Education, 2020, together with Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-Francois Lalande and Wojciech Mazurczyk.
  • IEEE Transactions on Industrial Informatics (TII) special section on Cyber-Physical Security in Industrial Environments, 2019, together with Zhihan Lv, Wojciech Mazurczyk and Houbing Song.
  • IEEE Security & Privacy special issue on Digital Forensics, part 2, together with W. Mazurczyk, L. Caviglione and S. Garfinkel, 2019.
  • Security and Communication Networks (SCN) special issue Emerging and Unconventional: New Attacks and Innovative Detection Techniques, 2018, together with Luca Caviglione, Wojciech Mazurczyk and Sebastian Zander.
  • IEEE S&P Magazine special issue on Digital Forensics, part 1, together with W. Mazurczyk, L. Caviglione and S. Garfinkel, 2017.
  • Journal of Universal Computer Science (J.UCS) special issue on Security, Privacy and Reliability of Smart Buildings, together with J. Keller, 2016.

Conference and Workshop Organization

Journal Reviews (Selection):

  • IEEE Communications Magazine
  • IEEE Network Magazine
  • IEEE Open Journal of the Communications Society (OJ-COMS)
  • IEEE Transactions on Information Forensics and Security (TIFS)
  • IEEE Spectrum magazine (Spectrum)
  • IEEE Security and Privacy Magazine
  • IEEE Internet of Things Journal
  • IEEE Signal Processing Letters
  • IEEE Transactions on Cognitive Communications and Networking (TCCN)
  • IEEE Transactions on Dependable and Secure Computing (TDSC)
  • IEEE Transactions on Industrial Informatics
  • IEEE Transactions on Education
  • IEEE IT Professional Journal
  • ACM Computing Reviews
  • Journal of Universal Computer Science (JUCS) 
  • Elsevier Computers & Security
  • Elsevier Computer Standards & Interfaces
  • Elsevier Applied Soft Computing
  • Elsevier Journal of Information Security & Applications
  • Elsevier Information Sciences
  • Elsevier International Journal of Intelligent Networks
  • Springer Annals of Telecommunications - Annales des Télécommunications (ANTE)
  • Springer Journal of Hardware and Systems Security}
  • Springer Multimedia Systems Journal (MMSJ)
  • Wiley Security and Communication Networks (SCN)
  • Journal of Cyber Security and Mobility (JCSM) 
  • Int. Journal on Advances in Security
  • IET Information Security
  • International Journal of Computer Systems Science and Engineering
  • Journal of Homeland Security and Emergency Management
  • Informatica Journal (Slovenian Society Informatika)
  • Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science

(Technical) Program Committee Memberships:

  • Selected Conferences:
    • ACSAC: ACSAC’24
    • ATC (Advanced and Trusted Computing): ATC’21, ATC’19
    • EICC (European Interdisciplinary Cybersecurity Conference, former Central European Cybersecurity Conference): EICC’25, EICC’24, (pc co-chair ‘23), EICC’22, EICC’21, (pc co-chair ‘20), CECC’19, CECC’18, CECC’17 (initial event)
    • HAS (Human Aspects of Information Security, Privacy and Trust): HAS’17, HAS’16, HAS’15
    • IFIP SEC: SEC’17, SEC’16, SEC’15
    • NSS: NSS’23, NSS’22, NSS’21, NSS’19, NSS’18, NSS’17
    • SICHERHEIT: (chair Sicherheit’24), Sicherheit’22, Sicherheit’20, Sicherheit’18, Sicherheit’16, Sicherheit’14.
    • CAST/GI Promotionspreis IT-Sicherheit: 2024, 2022
  • Selected Workshops:
    • BioStar/BCSN: BioStar’18, BioStar’17, BioStar’16, BCSN’15
    • CUING @ ARES (Criminal Use of Information Hiding): CUING’24, CUING’23, CUING’22, CUING’21, CUING’20, CUING’19, CUING’18, CUING’17 (initial event)
    • IWCC @ ARES (International Workshop on Cyber Crime): IWCC’24, IWCC’23, IWCC’22, IWCC’21, IWCC’20, IWCC’19, IWCC’18, IWCC’17, IWCC’16, IWCC’15, IWCC’14
    • PerEnergy (International Workshop on Pervasive Energy Services): PerEnergy’17, PerEnergy’16, PerEnergy’15
    • WTMC @ Euro S&P (Workshop on Traffic Measurement and Cybersecurity): WTMC’24, WTMC’23, WTMC’21, WTMC’20, WTMC’19, WTMC’18, WTMC’17, WTMC’16 (initial event)
  • Other PC Memberships (Selection): ACISP’20, EUSIPCO’23 and ‘19, IoT-SECFOR’19, IWDW’18, D-A-CH Security’18, AINA’17, D-A-CH Security’17, BigDAISy’17, IEACon’16, D-A-CH Security’16, GLOBECOM’15, ICIMP’13, ISTP’13
  • Invited reviews for: RAID’19, IECON’18, DIMVA’15, ICC’14
  • … and several special issue PC memberships for journals.

Reviews for Funding Proposals:

  • Innovationsförderagentur NRW/Forschungszentrum Jülich: NEXT.IN.NRW programme
  • Norges forskningsråd (Norwegian Research Society)

Reviews for books:

  • ACM Computing Reviews: multiple book reviews over the years (these appear in my list of publications as they are published reviews), since 2017
  • WILEY-IEEE Scientific: book proposal review, 2013
  • Galileo Press book review: Arnold Willemer: Linux-Server einrichten und administrieren mit Debian 6 GNU/Linux, 2011
  • Galileo Press book review: Dirk Becker: OpenVPN. Das Praxisbuch, 2008
  • Galileo Press book review: Thomas Theis: Einstieg in PHP5, 2006
  • Galileo Press book review: Sascha Kersken: Handbuch für Fachinformatiker; reviewed chapter on IT security, 2005

Talks

  1. A Comprehensive Pattern-based Overview of Stegomalware, ARES CUING Workshop, Vienna, AT, 2024-07-31.

  2. History Covert Channels and Covert Channel Amplification, IH&MMSec Rump Session Talk, Baiona, ES, 2024-06-24.

  3. Neue Entwicklungen im Bereich der Steganographie und der Umgehung von Internetzensur, Forschungsseminar LG PV/VLSI, FernUniversität in Hagen, Hagen, 2024-04-24.

  4. Recent Developments in Network Information Hiding, EURASIP Webinar, online, 2023-10-19.

  5. Herausforderungen an die IT-Sicherheit in der Gebäudeautomation, VDI Arbeitskreis Bauen und Gebäudetechnik: Technische Ausrüstung, online, 2023-08-08.

  6. Penetration-Testing mit Linux, Linux-Presentation-Day (LPD) 2023.1, Hochschule Worms, Worms, DE, 2023-05-26.

  7. Obfuskierte und versteckte Datenkommunikation: Subdomänen und Forschungstrends, Cyberagentur, online, DE, 2023-04-05.

  8. Obfuscation and Concealment Methods for Network Traffic, CentraleSupélec, Rennes, FR, 2023-03-30.

  9. Inaugural lecture: Gemeinsamkeiten und neue Ansätze von Obfuskations- und Versteckmethoden in Netzwerken, FernUniversität in Hagen, Hagen, DE, 2023-02-13.

  10. 20 Jahre im Schnelldurchlauf: ein Linux-Handbuch im Wandel der Zeit, Linux-Presentation-Day (LPD) 2022, Hochschule Worms, Worms, DE, 2022-11-18.

  11. Keynote: Describing Steganography Hiding Methods with a Unified Taxonomy, ARES CUING Workshop, Vienna, AT, 2022-08-24.

  12. IT-Sicherheit für automatisierte Gebäude: ein Überblick, VDI Fachtagung Gebäudeautomation – intelligent und nachhaltig, Baden-Baden, DE, 2022-06-29.

  13. Steganography Hiding Patterns: A Brief Review, EICC’22 DETONATOR Workshop, online, 2022-06-15/16.

  14. Untersuchung des Gender-gaps bei Cybersecurity-Publikationen, GI Sicherheit 2022, Karlsruhe, DE, 2022-04-06.

  15. A Revised Taxonomy of Steganography Embedding Patterns, ARES’21 CUING Workshop, online, 2021-08-18.

  16. Keynote: Novel Approaches for Network Steganography Countermeasures, ZiTiS Forschungsseminar, online, 2021-07-13.

  17. BePI: Fast and Memory Efficient Method for Billion-scale Random Walk with Restart, Talk in front of Habilitation Commission, Department of Mathematics and Computer Science, University of Hagen, DE, 2020-11-02.

  18. Realisierung von Prozessen in Betriebssystem-Kerneln, Talk in front of Habilitation Commission, Department of Mathematics and Computer Science, University of Hagen, DE, 2020-09-21.

  19. Recent Advances in Network Steganography Detection, DeepIntel Conference, Vienna, AT, 2019-11-27.

  20. Anomalieerkennung für Smart Buildings, 2. Forum zum Erfahrungsaustausch in der Gebäudeautomation, BImA, Berlin, DE, 2019-11-26.

  21. Protocol-independent Detection of Covert Channels Using the ‘Size Modulation’ Pattern, ARES’19 CUING Workshop, Canterbury, UK, 2019-08-27.

  22. Smart Buildings – Herausforderungen an die IT-Sicherheit, Stuttgarter Sicherheitskonferenz, Stuttgart, 2019-07-15.

  23. Data leakage and covert data exfiltration: The new threat of network information hiding, Smart Rail World Conference, Munich, 2019-06-18.

  24. Taxonomie und wissenschaftliche Methodik für das Gebiet Network Information Hiding, FernUniversität in Hagen (Fakultätskolloquium Mathematik & Informatik), Hagen, 2019-05-27.

  25. IT-Sicherheit automatisierter Gebäude im IoT, Auvesy-Konferenz, Karlsruhe, 2019-05-16.

  26. Network Covert Channel Patterns: Current State and Methodology, University of Bonn (Oberseminar Inst. f. Informatik IV), 2019-01-16.

  27. Detection of covert channels in TCP retransmissions, 23rd Nordic Conference on Secure IT Systems (NordSec), Oslo, NO, 2018-11-29.

  28. IT-Sicherheit und das Internet der Dinge, VHS Böblingen-Sindelfingen e.V., online webinar, 2018-11-19.

  29. One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels, Central European Cybersecurity Conference (CECC), Ljubljana, SI, 2018-11-15.

  30. Get me cited, Scotty! Analyzing Citations in Covert Channel/Steganography Research, ARES’18 CUING Workshop, Hamburg, DE, 2018-08-28.

  31. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach, ARES’18 CUING Workshop, Hamburg, DE, 2018-08-28.

  32. Network Information Hiding, COINS PhD Summer School 2018 (full-day class), Metochi, Lesvos, GR, 2018-07-28.

  33. IoT-Sicherheit für die GA-Industrie, VDMA, Frankfurt, 2018-05-02.

  34. Steganography Ante Portas, Hack-in-the-Box (HITB), Amsterdam, NL, 2018-04-12.

  35. IoT-Sicherheit – was ist neu und was ist wichtig?, Tüv-Süd Fachtagung Gebäude 4.0, München, 2018-04-11.

  36. IoT-Sicherheit – was ist daran neu und was relevant?, GI SecMgt Workshop ‘Neue’ Technologien und ‘neue’ Bedrohungen, Frankfurt, 2017-11-24.

  37. Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring, 42th IEEE Conference on Local Computer Networks (LCN), Singapore, SG, 2017-10-10.

  38. Kryptografie und Netzwerksicherheit für die Gebäudeautomation, Bälz Seminar der Technischen Hochschule Köln, 2017-09-08.

  39. Sicherheit im Internet der Dinge, KMU meets KMH, Worms, 2017-05-29.

  40. Don’t You Touch My Nuts: Information Hiding In Cyber Physical Systems Using Smart Buildings, BioStar/IEEE Security and Privacy Workshops, San José, CA, United States, 2017-05-25,

  41. Ant Colony-inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators, BioStar/IEEE Security and Privacy Workshops, San José, CA, United States, 2017-05-25 (per video stream).

  42. IT-Sicherheit mit BARNI (Building Automation Reliable Network Infrastructure), Smart Home and Metering Summit 2016, München, Germany, 2016-06-29.

  43. Forschung zur Sicherheit von Smart Buildings, SmartHome NRW-Event zur Sicherheit von Smart Homes, Bonn, Germany, 2016-04-26.

  44. Novel Approaches for Network Covert Storage Channels, Murdoch University, Perth, Australia, 2016-02-19.

  45. IT-Sicherheit von Smart Homes: Chancen und Risiken, Landeskriminalamt (LKA) Niedersachsen, Hannover, Germany, 2016-01-28.

  46. Security in Smart Building Networks, NRW.Invest / Germany at its best, Tower Bridge House, London, United Kingdom, 2015-12-03.

  47. inHaus-Event: Sicherheit von Smart Homes (event moderator), Fraunhofer inHaus-Zentrum, Duisburg, Germany, 2015-11-17.

  48. Your house knows what you did last summer (talk and panel), ECO Internet Security Days (ISD) 2015, Brühl, Germany, 2015-09-17.

  49. BACtag – Data Leakage Protection für Gebäude, D-A-CH Security 2015, St. Augustin, Germany, 2015-09-09.

  50. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments, Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, United States, 2015-08-06.

  51. Auf dem Weg zum sicheren Smart Building, Forum Bauindustrie 2015, Zurich, Switzerland, 2015-05-21.

  52. Smart Buildings – sind sie kritische Infrastrukturen?, Workshop des AK KRITIS, Bonn, Germany, 2015-04-24.

  53. Vortrag über den wissenschaftlichen Ausblick auf die Cyber Security der Zukunft, 2. Mannheimer Symposium des IKZ ‘Möglichkeiten und Auswirkungen des Cyberspace’‘, Mannheim, Germany, 2014-11-06.

  54. Hidden and Uncontrolled: The Emergence of Network Steganography, ISSE 2014, Brussels, Belgium, 2014-10-14.

  55. Area of Interest on Trustworthy (Hyperconnected) Infrastructure (of NIS-P. WG3): Short Progress Report, Seminar on Road-mapping Cybersecurity Research and Innovation, Florence, Italy, 2014-10-08.

  56. Netzwerksicherheit in BACnet-Systemen (talk and panel), GLT Anwendertagung, Dresden, Germany, 2014-09-25.

  57. BACnet Security and Botnets, SANS European ICS Security Summit, Amsterdam, The Netherlands, 2014-09-22.

  58. Alice’s Adventures in Smart Building Land – Novel Adventures in a Cyber Physical Environment, Hack in the Box (HITB), Amsterdam, The Netherlands, 2014-05-29/30.

  59. Smart Insecure Buildings, ITEC 2014 (International Training and Education Conference), Cologne, Germany, 2014-05-21.

  60. Smart Industrial Buildings: Sicherheit für Automation und Management von Gebäuden, 2. VDI Fachkonferenz Industrial IT Security, Frankfurt, Germany, 2014-05-07.

  61. Area of Interest on Trustworthy (Hyperconnected) Infrastructures, NIS Platform WG3 Meeting, Brussels, Belgium, 2014-04-29.

  62. Part of Panel: Towards defining priorities for cybersecurity research in Horzon 2020’s work programme 2016-2017 – Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform, Trust in the Digital World Conference (TDW), Vienna, Austria, 2014-04-08.

  63. Envisioning Smart Building Botnets, GI Sicherheit 2014, Vienna, Austria, 2014-03-21.

  64. Data Leakage Protection: Zukünftige Herausforderungen zur Sicherung von Vertraulichkeit, Chemnitzer Linuxtage 2014, Chemnitz, Germany, 2014-03-15/16.

  65. Zukünftige Herausforderungen für die Sicherheit Smarter Gebäude, 21. DFN Workshop zur Sicherheit in vernetzten Systemen, Hamburg, Germany, 2014-02-18.

  66. Currently Addressed Challenges in Smart Building Security Research at Fraunhofer FKIE, 9th IT4SE Workshop, Augsburg, Germany, 2013-12-06.

  67. Keynote: Nach dem Angriff: Versteckte Exfiltration vertraulicher Daten, Heise Events Konferenztag Prism, Tempora und Co. – Rezepte gegen den Abhörwahn, Köln, Germany, 2013-12-03.

  68. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels, ARES ECTCM Workshop, Regensburg, Germany, 2013-09-04.

  69. Novel Approaches for Network Covert Storage Channels, PhD thesis defense talk at the University of Hagen, Hagen, Germany, 2013-05-07.

  70. Novel Approaches for Network Covert Channels, Invited talk at Fraunhofer FKIE, Bonn, Germany, 2013-04-18.

  71. Covert Channel-internal Control Protocols, Technical University Hamburg-Harburg (TUHH), Oberseminar, Hamburg, Germany, 2013-04-16.

  72. Sicherheit in Sozialen Netzwerken, Mitgliederversammlung Genossenschaftsbank Unterallgäu, Ottobeuren, Germany, 2013-03-21.

  73. Datenschutz und Datensicherheit im Zeitalter Sozialer Netzwerke, Forum Mindelheim/Genossenschaftsbank Unterallgäu eG, Mindelheim, Germany, 2013-03-18.

  74. Ich weiß, was du letzte Woche getan hast! Seitenkanäle in der Gebäudeautomation, Chemnitzer Linuxtage 2013, Chemnitz, Germany, 2013-03-17.

  75. The future of data exfiltration and malicious communication, TROOPERS’13, Heidelberg, Germany, 2013-03-13.

  76. Dynamic Routing in Covert Channel Overlays Based on Control Protocols, International Workshop on Information Security, Theory and Practice (ISTP-2012), London, United Kingdom, 2012-12-10.

  77. Covert Channels and their Prevention in Building Automation Protocols – A Prototype Exemplified Using BACnet, 2nd Workshop on Security of Systems and Software Resiliency, Besançon, France, 2012-11-20.

  78. Systematic Engineering of Control Protocols for Covert Channels, 13th Conference on Communications and Multimedia Security (CMS), Canterbury, United Kingdom, 2012-09-04.

  79. Control Protocols for Network Covert Channels, 7th GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), Berlin, Germany, 2012-07-06.

  80. Covert and Side Channels in Buildings and the Prototype of a Building-aware Active Warden, IEEE Workshop on Security and Forensics in Communication Systems, Ottawa, Canada, 2012-06-15.

  81. Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels, 7th International Conference on Internet Monitoring and Protection (ICIMP), Stuttgart, Germany, 2012-05-28.

  82. Security in building automation systems and the prevention of malicious data communication in building automation networks, Linux-Informationstag der LUGA, Augsburg, Germany, 2012-03-24.

  83. The Problem of Traffic Normalization Within a Covert Channel’s Network Environment Learning Phase, GI Sicherheit 2012, Darmstadt, Germany, 2012-03-08.

  84. Micro protocols and dynamic protocol switches in network covert channels, Swinburne University, Melbourne, Australia, 2012-01-12.

  85. A Secure Interoperable Architecture for Building-Automation Applications, 4th Int. Symp. on Applied Sciences in Biomedical and Communication Technologies, Barcelona, Spain, 2011-10-27.

  86. Low-attention forwarding for mobile network covert channels, 12th IFIP Conference on Communications and Multimedia Security (CMS 2011), Ghent, Belgium, 2011-10-21.

  87. Verdeckte Kanäle: Informationen durch die Hintertür, Datenspuren 2011, Dresden, Germany, 2011-10-15.

  88. Verdeckte Kanäle – Neuland für freie Software, Open-Source-Treffen München, Germany, 2011-07-22.

  89. Aktuelle Techniken und Methoden der verdeckten Kommunikationskanäle, Chaos Singularity (CoSin) 2011, Biel, Switzerland, 2011-06-25.

  90. Europäische Forschungsprojekte im Schnittbereich IT und erneuerbare Energien, 1st IT4SE-Workshop, Augsburg University of Applied Sciences, Augsburg, Germany, 2010-12-07.

  91. Einführung in verdeckte Kanäle, 9. Linux-Infotag der Linux-Usergroup Augsburg (LUGA), Augsburg, Germany, 2010-05-27.

  92. Protocol Hopping Covert Channels und Protocol Channels, MetaRheinMain ChaosDays 0x8, Darmstadt, Germany, 2009-09-06.

  93. Hostbasierte Sicherheit und Linux-Hardening, Secure Linux Administration Conference (SLAC), Berlin, Germany, 2006-12-07.