Über

Steffen Wendzel leitet das Institut für Organisation und Management von Informationssystemen (OMI) sowie das Kommunikations- und Informationszentrums (kiz) der Universität Ulm. Er habilitierte sich 2020 an der FernUniversität in Hagen, an der er 2013 auch promovierte (magna cum laude). Zuvor war er Professor für IT-Sicherheit und Netzwerke an der Hochschule Worms und dort wissenschaftlicher Leiter des Zentrums für Technologie und Transfer (ZTT), Privatdozent an der FernUniversität in Hagen sowie PostDoc am Fraunhofer FKIE in Bonn.

Forschung

In seiner Forschung konzentriert sich Steffen Wendzel insbesondere auf die folgenden Gebiete:

  • Internetzensur (Messung und Zensurumgehung)
  • Selektierte Aspekte der Netzwerksicherheit (Sicherheit von Automationsnetzen (insbesondere Gebäudeautomation) und IoT-Umgebungen)
  • Network Information Hiding (Network Covert Channels)
  • Management von IT-Systemen sowie Human Aspects von Information Security

Publikationen

147.
Wendzel S, Schmidbauer T, Zillien S, Keller J. DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data. IEEE Transactions on Dependable and Secure Computing (TDSC). 2024; .(.):..      [DOI]      [Datei] 
146.
Wendzel S, Mileva A, Franqueira VNL, Jaatun MG. Editorial: Fighting Cybersecurity Risks from a Multidisciplinary Perspective. Journal of Universal Computer Science (J.UCS). 2024; 30(9):1137—1139.      [DOI]      [Datei] 
145.
Wendzel S, Plötner J. Linux. Der Grundkurs. 2 ed. Rheinwerk Verlag; 2024.     [Datei] 
144.
Wendzel S, Wressnegger C, Hartmann L, Freiling F, Armknecht F, Reinfelder L. Sicherheit 2024 — Beiträge der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Gesellschaft für Informatik e.V. (GI); 2024.     [Datei] 
143.
Schymiczek J, Schmidbauer T, Wendzel S. A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM; 2024.      [DOI]      [Datei] 
142.
Strachanski F, Petrov D, Schmidbauer T, Wendzel S. A Comprehensive Pattern-based Overview of Stegomalware. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM; 2024.      [DOI]      [Datei] 
141.
Dittmann J, Krätzer C, Kiltz S, Altschaffel R, Vielhauer C, Wendzel S, Wefel S, Nitsch H. Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT). In: GI Sicherheit 2024 — Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V. (GI); 2024. p. 265—268.      [DOI]      [Datei] 
140.
Zillien S, Schmidbauer T, Kubek M, Keller J, Wendzel S. Look What's There! Utilizing the Internet's Existing Data for Censorship Circumvention with OPPRESSION. In: Proc. 19th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2024). ACM; 2024. p. 80—95.      [DOI]      [Datei] 
139.
Keller J, Heßeling C, Wendzel S. Robust and Homomorphic Covert Channels in Streams of Numeric Data. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM; 2024.      [DOI]      [Datei] 
138.
Lenz J, Bozakov Z, Wendzel S, Vrhovec S. Why People Replace their Aging Smart Devices: A Push–Pull–Mooring Perspective. Computers & Security (COSE). 130103258.      [DOI]      [Datei] 

Offene Abschlussarbeiten und Projekte

Aktivitäten

Steering Committee Memberships:

  • 2017-2023 (re-elected 2020): Elected Member of EURASIP Special Area Team (SAT) on Biometrics, Data Forensics, and Security (BForSec)
  • since 2015: Europol EC3: Criminal Use of Information Hiding (CUIng) Initiative
  • 2014-2016: Arbeitskreis kritische Informations- und Kommunikationsinfrastrukturen (AK KRITIS) of the German Informatics Society (GI) SIG Management für Informationssicherheit, SECMGT 
  • 2013-2015: EU NIS Public-Private Platform Working Group 3 on Secure ICT research and innovation; Leading the AoI (Area of Interest) on Trustworthy (Hyperconnected) Infrastructures

Other Memberships:

  • IFIP TC11 Working Group 12 on Human Aspects of Information Security and Assurance
  • IFIP TC13 Working Group 10 on Human-Centred Technology for Sustainability
  • German Informatics Society (Gesellschaft für Informatik), incl. SICHERHEIT (SIG SIDAR, SIG NETSEC et al.), since 2008
  • IEEE, ACM, Deutscher Hochschulverband (DHV)

Nominations/Scholarships:

  • Elected Domain Expert, GI SIG (Fachbereich) Sicherheit, 2024.
  • Nominated for Akademiepreis des Landes Rheinland-Pfalz (2019 and 2022).
  • Featured Reviewer (ACM Computing Reviews), October 2018.
  • Youngest German professor at a University of Applied Sciences (of all professors registered at hlb), September 2018.
  • DAAD Scholarship for Academic Talks: Murdoch University, Perth, Australia, February 2016.
  • Best Paper Award at the International Workshop on Cyber Crime (IWCC 2015) for the paper: J. Kaur, S. Wendzel, M. Meier: Countermeasures for Covert Channel-internal Control Protocols, IEEE, 2015.
  • Best Paper Award at the The Seventh International Conference on Internet Monitoring and Protection (ICIMP’12), Stuttgart, 2012 for the paper: S. Wendzel, J. Keller: Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels, 2012.

Research Abroad:

  • 4/2023: Visiting colleagues at Technical University of Warsaw, Warsaw, Poland (host: Prof. Dr. Wojciech Mazurczyk).
  • 3/2023: Visiting colleagues at CentraleSupélec, Rennes, France (host: Prof. Dr. Jean-Francois Lalande).
  • 11-12/2022: Visiting researcher at Institute for Applied Mathematics and Information Technologies (IMATI), CNR, Genova, Italy (host: Dr. Luca Caviglione).
  • 02/2016: Visiting colleagues at the Murdoch University, Perth, Australia (host: Dr. Sebastian Zander).
  • 2013, 2014, 2015: several longer stays in Brussels, Belgium, for Fraunhofer Brussels as part of EU-related activities.
  • 10/2013: Visiting colleagues at the Warsaw University of Technology, Poland (host: Prof. Dr. Wojciech Mazurczyk).
  • 12/2011-01/2012: guest researcher at the University of Waikato, New Zealand, for the 2nd time for six weeks via project IT4SE (host: Dr. Masood Masoodian)
  • 12/2010-01/2011: guest researcher at the University of Waikato, New Zealand, for six weeks via project IT4SE (host: Dr. Masood Masoodian)

Advisory Board/Editorial Board Memberships

Journal Special Issues as Guest Editor

  • Journal of Universal Computer Science (J.UCS) special issue Fighting Cybersecurity Risks from a Multidisciplinary Perspective, 2023/2024, together with Aleksandra Mileva, Virginia N. L. Franqueira, and Martin Gilje Jaatun.
  • IEEE Security & Privacy (S&P) special issue on Security & Privacy Issues on Home Globalization, 2022, together with Luca Caviglione, Aleksandra Mileva and Simon Vrhovec.
  • Future Generation Computer Systems (FGCS) special issue on Emerging Topics in Defending Networked Systems, 2022, together with Luca Caviglione, Amir Houmansadr and Wojciech Mazurczyk.
  • it – Information Technology (ITIT) special issue on Information security methodology and replication studies, 2022, together with Luca Caviglione, Aleksandra Mileva, Jean-Francois Lalande and Wojciech Mazurczyk.
  • Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) special issue on Multidisciplinary Solutions to Modern Cybersecurity Challenges, 2021, together with Luca Caviglione, Aleksandra Mileva and Simon Vrhovec.
  • Journal of Universal Computer Science (J.UCS) special issue on Information Security Methodology, Replication Studies and Information Security Education, 2020, together with Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-Francois Lalande and Wojciech Mazurczyk.
  • IEEE Transactions on Industrial Informatics (TII) special section on Cyber-Physical Security in Industrial Environments, 2019, together with Zhihan Lv, Wojciech Mazurczyk and Houbing Song.
  • IEEE Security & Privacy special issue on Digital Forensics, part 2, together with W. Mazurczyk, L. Caviglione and S. Garfinkel, 2019.
  • Security and Communication Networks (SCN) special issue Emerging and Unconventional: New Attacks and Innovative Detection Techniques, 2018, together with Luca Caviglione, Wojciech Mazurczyk and Sebastian Zander.
  • IEEE S&P Magazine special issue on Digital Forensics, part 1, together with W. Mazurczyk, L. Caviglione and S. Garfinkel, 2017.
  • Journal of Universal Computer Science (J.UCS) special issue on Security, Privacy and Reliability of Smart Buildings, together with J. Keller, 2016.

Conference and Workshop Organization

Journal Reviews (Selection):

  • IEEE Communications Magazine
  • IEEE Network Magazine
  • IEEE Open Journal of the Communications Society (OJ-COMS)
  • IEEE Transactions on Information Forensics and Security (TIFS)
  • IEEE Spectrum magazine (Spectrum)
  • IEEE Security and Privacy Magazine
  • IEEE Internet of Things Journal
  • IEEE Signal Processing Letters
  • IEEE Transactions on Cognitive Communications and Networking (TCCN)
  • IEEE Transactions on Dependable and Secure Computing (TDSC)
  • IEEE Transactions on Industrial Informatics
  • IEEE Transactions on Education
  • IEEE IT Professional Journal
  • ACM Computing Reviews
  • Journal of Universal Computer Science (JUCS) 
  • Elsevier Computers & Security
  • Elsevier Computer Standards & Interfaces
  • Elsevier Applied Soft Computing
  • Elsevier Journal of Information Security & Applications
  • Elsevier Information Sciences
  • Elsevier International Journal of Intelligent Networks
  • Springer Annals of Telecommunications - Annales des Télécommunications (ANTE)
  • Springer Journal of Hardware and Systems Security}
  • Springer Multimedia Systems Journal (MMSJ)
  • Wiley Security and Communication Networks (SCN)
  • Journal of Cyber Security and Mobility (JCSM) 
  • Int. Journal on Advances in Security
  • IET Information Security
  • International Journal of Computer Systems Science and Engineering
  • Journal of Homeland Security and Emergency Management
  • Informatica Journal (Slovenian Society Informatika)
  • Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science

(Technical) Program Committee Memberships:

  • Selected Conferences:
    • ACSAC: ACSAC’24
    • ATC (Advanced and Trusted Computing): ATC’21, ATC’19
    • EICC (European Interdisciplinary Cybersecurity Conference, former Central European Cybersecurity Conference): EICC’25, EICC’24, (pc co-chair ‘23), EICC’22, EICC’21, (pc co-chair ‘20), CECC’19, CECC’18, CECC’17 (initial event)
    • HAS (Human Aspects of Information Security, Privacy and Trust): HAS’17, HAS’16, HAS’15
    • IFIP SEC: SEC’17, SEC’16, SEC’15
    • NSS: NSS’23, NSS’22, NSS’21, NSS’19, NSS’18, NSS’17
    • SICHERHEIT: (chair Sicherheit’24), Sicherheit’22, Sicherheit’20, Sicherheit’18, Sicherheit’16, Sicherheit’14.
    • CAST/GI Promotionspreis IT-Sicherheit: 2025, 2024, 2022
  • Selected Workshops:
    • BioStar/BCSN: BioStar’18, BioStar’17, BioStar’16, BCSN’15
    • CUING @ ARES (Criminal Use of Information Hiding): CUING’24, CUING’23, CUING’22, CUING’21, CUING’20, CUING’19, CUING’18, CUING’17 (initial event)
    • IWCC @ ARES (International Workshop on Cyber Crime): IWCC’24, IWCC’23, IWCC’22, IWCC’21, IWCC’20, IWCC’19, IWCC’18, IWCC’17, IWCC’16, IWCC’15, IWCC’14
    • PerEnergy (International Workshop on Pervasive Energy Services): PerEnergy’17, PerEnergy’16, PerEnergy’15
    • WTMC @ Euro S&P (Workshop on Traffic Measurement and Cybersecurity): WTMC’24, WTMC’23, WTMC’21, WTMC’20, WTMC’19, WTMC’18, WTMC’17, WTMC’16 (initial event)
  • Other PC Memberships (Selection): ACISP’20, EUSIPCO’23 and ‘19, IoT-SECFOR’19, IWDW’18, D-A-CH Security’18, AINA’17, D-A-CH Security’17, BigDAISy’17, IEACon’16, D-A-CH Security’16, GLOBECOM’15, ICIMP’13, ISTP’13
  • Invited reviews for: RAID’19, IECON’18, DIMVA’15, ICC’14
  • … and several special issue PC memberships for journals.

Reviews for Funding Proposals:

  • Innovationsförderagentur NRW/Forschungszentrum Jülich: NEXT.IN.NRW programme
  • Norges forskningsråd (Norwegian Research Society)

Reviews for books:

  • ACM Computing Reviews: multiple book reviews over the years (these appear in my list of publications as they are published reviews), since 2017
  • WILEY-IEEE Scientific: book proposal review, 2013
  • Galileo Press book review: Arnold Willemer: Linux-Server einrichten und administrieren mit Debian 6 GNU/Linux, 2011
  • Galileo Press book review: Dirk Becker: OpenVPN. Das Praxisbuch, 2008
  • Galileo Press book review: Thomas Theis: Einstieg in PHP5, 2006
  • Galileo Press book review: Sascha Kersken: Handbuch für Fachinformatiker; reviewed chapter on IT security, 2005

Vorträge

  1. A Comprehensive Pattern-based Overview of Stegomalware, ARES CUING Workshop, Vienna, AT, 2024-07-31.

  2. History Covert Channels and Covert Channel Amplification, IH&MMSec Rump Session Talk, Baiona, ES, 2024-06-24.

  3. Neue Entwicklungen im Bereich der Steganographie und der Umgehung von Internetzensur, Forschungsseminar LG PV/VLSI, FernUniversität in Hagen, Hagen, 2024-04-24.

  4. Recent Developments in Network Information Hiding, EURASIP Webinar, online, 2023-10-19.

  5. Herausforderungen an die IT-Sicherheit in der Gebäudeautomation, VDI Arbeitskreis Bauen und Gebäudetechnik: Technische Ausrüstung, online, 2023-08-08.

  6. Penetration-Testing mit Linux, Linux-Presentation-Day (LPD) 2023.1, Hochschule Worms, Worms, DE, 2023-05-26.

  7. Obfuskierte und versteckte Datenkommunikation: Subdomänen und Forschungstrends, Cyberagentur, online, DE, 2023-04-05.

  8. Obfuscation and Concealment Methods for Network Traffic, CentraleSupélec, Rennes, FR, 2023-03-30.

  9. Inaugural lecture: Gemeinsamkeiten und neue Ansätze von Obfuskations- und Versteckmethoden in Netzwerken, FernUniversität in Hagen, Hagen, DE, 2023-02-13.

  10. 20 Jahre im Schnelldurchlauf: ein Linux-Handbuch im Wandel der Zeit, Linux-Presentation-Day (LPD) 2022, Hochschule Worms, Worms, DE, 2022-11-18.

  11. Keynote: Describing Steganography Hiding Methods with a Unified Taxonomy, ARES CUING Workshop, Vienna, AT, 2022-08-24.

  12. IT-Sicherheit für automatisierte Gebäude: ein Überblick, VDI Fachtagung Gebäudeautomation – intelligent und nachhaltig, Baden-Baden, DE, 2022-06-29.

  13. Steganography Hiding Patterns: A Brief Review, EICC’22 DETONATOR Workshop, online, 2022-06-15/16.

  14. Untersuchung des Gender-gaps bei Cybersecurity-Publikationen, GI Sicherheit 2022, Karlsruhe, DE, 2022-04-06.

  15. A Revised Taxonomy of Steganography Embedding Patterns, ARES’21 CUING Workshop, online, 2021-08-18.

  16. Keynote: Novel Approaches for Network Steganography Countermeasures, ZiTiS Forschungsseminar, online, 2021-07-13.

  17. BePI: Fast and Memory Efficient Method for Billion-scale Random Walk with Restart, Talk in front of Habilitation Commission, Department of Mathematics and Computer Science, University of Hagen, DE, 2020-11-02.

  18. Realisierung von Prozessen in Betriebssystem-Kerneln, Talk in front of Habilitation Commission, Department of Mathematics and Computer Science, University of Hagen, DE, 2020-09-21.

  19. Recent Advances in Network Steganography Detection, DeepIntel Conference, Vienna, AT, 2019-11-27.

  20. Anomalieerkennung für Smart Buildings, 2. Forum zum Erfahrungsaustausch in der Gebäudeautomation, BImA, Berlin, DE, 2019-11-26.

  21. Protocol-independent Detection of Covert Channels Using the ‘Size Modulation’ Pattern, ARES’19 CUING Workshop, Canterbury, UK, 2019-08-27.

  22. Smart Buildings – Herausforderungen an die IT-Sicherheit, Stuttgarter Sicherheitskonferenz, Stuttgart, 2019-07-15.

  23. Data leakage and covert data exfiltration: The new threat of network information hiding, Smart Rail World Conference, Munich, 2019-06-18.

  24. Taxonomie und wissenschaftliche Methodik für das Gebiet Network Information Hiding, FernUniversität in Hagen (Fakultätskolloquium Mathematik & Informatik), Hagen, 2019-05-27.

  25. IT-Sicherheit automatisierter Gebäude im IoT, Auvesy-Konferenz, Karlsruhe, 2019-05-16.

  26. Network Covert Channel Patterns: Current State and Methodology, University of Bonn (Oberseminar Inst. f. Informatik IV), 2019-01-16.

  27. Detection of covert channels in TCP retransmissions, 23rd Nordic Conference on Secure IT Systems (NordSec), Oslo, NO, 2018-11-29.

  28. IT-Sicherheit und das Internet der Dinge, VHS Böblingen-Sindelfingen e.V., online webinar, 2018-11-19.

  29. One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels, Central European Cybersecurity Conference (CECC), Ljubljana, SI, 2018-11-15.

  30. Get me cited, Scotty! Analyzing Citations in Covert Channel/Steganography Research, ARES’18 CUING Workshop, Hamburg, DE, 2018-08-28.

  31. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach, ARES’18 CUING Workshop, Hamburg, DE, 2018-08-28.

  32. Network Information Hiding, COINS PhD Summer School 2018 (full-day class), Metochi, Lesvos, GR, 2018-07-28.

  33. IoT-Sicherheit für die GA-Industrie, VDMA, Frankfurt, 2018-05-02.

  34. Steganography Ante Portas, Hack-in-the-Box (HITB), Amsterdam, NL, 2018-04-12.

  35. IoT-Sicherheit – was ist neu und was ist wichtig?, Tüv-Süd Fachtagung Gebäude 4.0, München, 2018-04-11.

  36. IoT-Sicherheit – was ist daran neu und was relevant?, GI SecMgt Workshop ‘Neue’ Technologien und ‘neue’ Bedrohungen, Frankfurt, 2017-11-24.

  37. Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring, 42th IEEE Conference on Local Computer Networks (LCN), Singapore, SG, 2017-10-10.

  38. Kryptografie und Netzwerksicherheit für die Gebäudeautomation, Bälz Seminar der Technischen Hochschule Köln, 2017-09-08.

  39. Sicherheit im Internet der Dinge, KMU meets KMH, Worms, 2017-05-29.

  40. Don’t You Touch My Nuts: Information Hiding In Cyber Physical Systems Using Smart Buildings, BioStar/IEEE Security and Privacy Workshops, San José, CA, United States, 2017-05-25,

  41. Ant Colony-inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators, BioStar/IEEE Security and Privacy Workshops, San José, CA, United States, 2017-05-25 (per video stream).

  42. IT-Sicherheit mit BARNI (Building Automation Reliable Network Infrastructure), Smart Home and Metering Summit 2016, München, Germany, 2016-06-29.

  43. Forschung zur Sicherheit von Smart Buildings, SmartHome NRW-Event zur Sicherheit von Smart Homes, Bonn, Germany, 2016-04-26.

  44. Novel Approaches for Network Covert Storage Channels, Murdoch University, Perth, Australia, 2016-02-19.

  45. IT-Sicherheit von Smart Homes: Chancen und Risiken, Landeskriminalamt (LKA) Niedersachsen, Hannover, Germany, 2016-01-28.

  46. Security in Smart Building Networks, NRW.Invest / Germany at its best, Tower Bridge House, London, United Kingdom, 2015-12-03.

  47. inHaus-Event: Sicherheit von Smart Homes (event moderator), Fraunhofer inHaus-Zentrum, Duisburg, Germany, 2015-11-17.

  48. Your house knows what you did last summer (talk and panel), ECO Internet Security Days (ISD) 2015, Brühl, Germany, 2015-09-17.

  49. BACtag – Data Leakage Protection für Gebäude, D-A-CH Security 2015, St. Augustin, Germany, 2015-09-09.

  50. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments, Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, United States, 2015-08-06.

  51. Auf dem Weg zum sicheren Smart Building, Forum Bauindustrie 2015, Zurich, Switzerland, 2015-05-21.

  52. Smart Buildings – sind sie kritische Infrastrukturen?, Workshop des AK KRITIS, Bonn, Germany, 2015-04-24.

  53. Vortrag über den wissenschaftlichen Ausblick auf die Cyber Security der Zukunft, 2. Mannheimer Symposium des IKZ ‘Möglichkeiten und Auswirkungen des Cyberspace’‘, Mannheim, Germany, 2014-11-06.

  54. Hidden and Uncontrolled: The Emergence of Network Steganography, ISSE 2014, Brussels, Belgium, 2014-10-14.

  55. Area of Interest on Trustworthy (Hyperconnected) Infrastructure (of NIS-P. WG3): Short Progress Report, Seminar on Road-mapping Cybersecurity Research and Innovation, Florence, Italy, 2014-10-08.

  56. Netzwerksicherheit in BACnet-Systemen (talk and panel), GLT Anwendertagung, Dresden, Germany, 2014-09-25.

  57. BACnet Security and Botnets, SANS European ICS Security Summit, Amsterdam, The Netherlands, 2014-09-22.

  58. Alice’s Adventures in Smart Building Land – Novel Adventures in a Cyber Physical Environment, Hack in the Box (HITB), Amsterdam, The Netherlands, 2014-05-29/30.

  59. Smart Insecure Buildings, ITEC 2014 (International Training and Education Conference), Cologne, Germany, 2014-05-21.

  60. Smart Industrial Buildings: Sicherheit für Automation und Management von Gebäuden, 2. VDI Fachkonferenz Industrial IT Security, Frankfurt, Germany, 2014-05-07.

  61. Area of Interest on Trustworthy (Hyperconnected) Infrastructures, NIS Platform WG3 Meeting, Brussels, Belgium, 2014-04-29.

  62. Part of Panel: Towards defining priorities for cybersecurity research in Horzon 2020’s work programme 2016-2017 – Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform, Trust in the Digital World Conference (TDW), Vienna, Austria, 2014-04-08.

  63. Envisioning Smart Building Botnets, GI Sicherheit 2014, Vienna, Austria, 2014-03-21.

  64. Data Leakage Protection: Zukünftige Herausforderungen zur Sicherung von Vertraulichkeit, Chemnitzer Linuxtage 2014, Chemnitz, Germany, 2014-03-15/16.

  65. Zukünftige Herausforderungen für die Sicherheit Smarter Gebäude, 21. DFN Workshop zur Sicherheit in vernetzten Systemen, Hamburg, Germany, 2014-02-18.

  66. Currently Addressed Challenges in Smart Building Security Research at Fraunhofer FKIE, 9th IT4SE Workshop, Augsburg, Germany, 2013-12-06.

  67. Keynote: Nach dem Angriff: Versteckte Exfiltration vertraulicher Daten, Heise Events Konferenztag Prism, Tempora und Co. – Rezepte gegen den Abhörwahn, Köln, Germany, 2013-12-03.

  68. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels, ARES ECTCM Workshop, Regensburg, Germany, 2013-09-04.

  69. Novel Approaches for Network Covert Storage Channels, PhD thesis defense talk at the University of Hagen, Hagen, Germany, 2013-05-07.

  70. Novel Approaches for Network Covert Channels, Invited talk at Fraunhofer FKIE, Bonn, Germany, 2013-04-18.

  71. Covert Channel-internal Control Protocols, Technical University Hamburg-Harburg (TUHH), Oberseminar, Hamburg, Germany, 2013-04-16.

  72. Sicherheit in Sozialen Netzwerken, Mitgliederversammlung Genossenschaftsbank Unterallgäu, Ottobeuren, Germany, 2013-03-21.

  73. Datenschutz und Datensicherheit im Zeitalter Sozialer Netzwerke, Forum Mindelheim/Genossenschaftsbank Unterallgäu eG, Mindelheim, Germany, 2013-03-18.

  74. Ich weiß, was du letzte Woche getan hast! Seitenkanäle in der Gebäudeautomation, Chemnitzer Linuxtage 2013, Chemnitz, Germany, 2013-03-17.

  75. The future of data exfiltration and malicious communication, TROOPERS’13, Heidelberg, Germany, 2013-03-13.

  76. Dynamic Routing in Covert Channel Overlays Based on Control Protocols, International Workshop on Information Security, Theory and Practice (ISTP-2012), London, United Kingdom, 2012-12-10.

  77. Covert Channels and their Prevention in Building Automation Protocols – A Prototype Exemplified Using BACnet, 2nd Workshop on Security of Systems and Software Resiliency, Besançon, France, 2012-11-20.

  78. Systematic Engineering of Control Protocols for Covert Channels, 13th Conference on Communications and Multimedia Security (CMS), Canterbury, United Kingdom, 2012-09-04.

  79. Control Protocols for Network Covert Channels, 7th GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), Berlin, Germany, 2012-07-06.

  80. Covert and Side Channels in Buildings and the Prototype of a Building-aware Active Warden, IEEE Workshop on Security and Forensics in Communication Systems, Ottawa, Canada, 2012-06-15.

  81. Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels, 7th International Conference on Internet Monitoring and Protection (ICIMP), Stuttgart, Germany, 2012-05-28.

  82. Security in building automation systems and the prevention of malicious data communication in building automation networks, Linux-Informationstag der LUGA, Augsburg, Germany, 2012-03-24.

  83. The Problem of Traffic Normalization Within a Covert Channel’s Network Environment Learning Phase, GI Sicherheit 2012, Darmstadt, Germany, 2012-03-08.

  84. Micro protocols and dynamic protocol switches in network covert channels, Swinburne University, Melbourne, Australia, 2012-01-12.

  85. A Secure Interoperable Architecture for Building-Automation Applications, 4th Int. Symp. on Applied Sciences in Biomedical and Communication Technologies, Barcelona, Spain, 2011-10-27.

  86. Low-attention forwarding for mobile network covert channels, 12th IFIP Conference on Communications and Multimedia Security (CMS 2011), Ghent, Belgium, 2011-10-21.

  87. Verdeckte Kanäle: Informationen durch die Hintertür, Datenspuren 2011, Dresden, Germany, 2011-10-15.

  88. Verdeckte Kanäle – Neuland für freie Software, Open-Source-Treffen München, Germany, 2011-07-22.

  89. Aktuelle Techniken und Methoden der verdeckten Kommunikationskanäle, Chaos Singularity (CoSin) 2011, Biel, Switzerland, 2011-06-25.

  90. Europäische Forschungsprojekte im Schnittbereich IT und erneuerbare Energien, 1st IT4SE-Workshop, Augsburg University of Applied Sciences, Augsburg, Germany, 2010-12-07.

  91. Einführung in verdeckte Kanäle, 9. Linux-Infotag der Linux-Usergroup Augsburg (LUGA), Augsburg, Germany, 2010-05-27.

  92. Protocol Hopping Covert Channels und Protocol Channels, MetaRheinMain ChaosDays 0x8, Darmstadt, Germany, 2009-09-06.

  93. Hostbasierte Sicherheit und Linux-Hardening, Secure Linux Administration Conference (SLAC), Berlin, Germany, 2006-12-07.