Cyber Security Research Group (CSRG)

Informatik

Die Forschungsgruppe Cyber Security (Cyber Security Research Group, CSRG) befasst sich mit der IT-Sicherheit von lokalen und verteilten Systemen/dem IoT sowie den organisatorischen Aspekten von IT-Sicherheit in Unternehmen. Die Forschungsgruppe arbeitet  eng mit dem Zentrum für Technologie und Transfer (ZTT) zusammen.

Team

Mitarbeiter:

  • Prof. Dr. Steffen Wendzel
  • Prof. Dr. Bernd Ruhland
  • Prof. Dr. Herbert Thielen
  • Prof. Dr. Zdravko Bozakov
  • Prof. Dr. Jens Kohler
  • Daniel Bub, B.Sc. (Assistent, FB Informatik)
  • Laura Hartmann, M.Sc. (Wissenschaftl. Mitarbeiterin, Projekt MADISA, Projekt EMPOWER)
  • Julia Lenz, M.Sc. (Wissenschaftl. Mitarbeiterin, Projekt EMPOWER)
  • Thomas Weigold, M.Sc. (Wissenschaftl. Mitarbeiter, Projekt KIASH und Projekt EMPOWER)
  • Sebastian Zillien, M.Sc. (Wissenschaftl. Mitarbeiter, Projekt SIVERT)

Abschlussarbeiten (Bachelor- und Masterthesen)

Wir bieten die Betreuung von Abschlussarbeiten zu folgenden Themen (sowie angrenzenden Gebieten) an. Kontaktieren Sie uns gern, wenn Sie Interesse an einer Abschlussarbeit haben.

ThemaAnsprechpartner
Sicherheit von KommunikationsprotokollenProf. Wendzel / Prof. Bozakov / Prof. Thielen
Sicherheit von freier Software / Absicherung von IT-SystemenProf. Ruhland / Prof. Thielen
Organisatorische IT-Sicherheit (Governance und Business Continuity Mgmt. Notfallmgmt., MA-Sensibilisierung)Prof. Kurz
Sicherheit in Software-defined Networks (SDN) und Cloud ComputingProf. Bozakov
Steganografie / verdeckte Kanäle / Information HidingProf. Wendzel
Sichere (Cloud-basierte) SoftwareentwicklungProf. Kohler
Thesen im Zusammenhang mit Forschungsprojekten: 
Sicherheit im Internet der Dinge (IoT) / Forschungsprojekt KISATProf. Bozakov / Prof. Wendzel
Sicherheit von Industriesteueranlagen / Forschungsprojekt MADISAFr. Hartmann / Prof. Wendzel
Machine Learning Security / Forschungsprojekt SIVERTHr. Zillien / Prof. Wendzel
IT-Sicherheit von Smart Homes / Forschungsprojekt KIASHHr. Weigold / Prof. Wendzel
Forschungsprojekt WoDiCoF/WoDiCoF+Hr. Zillien / Prof. Wendzel
Forschungsprojekt SecureViewHr. Weigold / Prof. Bozakov
Forschungsprojekt EMPOWERFr. Hartmann / Prof. Wendzel

 

Aktuelle Publikationen

2023

Zillien S, Wendzel S (2023) Weaknesses of popular and recent covert channel detection methods and a remedy. IEEE Transactions on Dependable and Secure Computing (TDSC). DOI: 10.1109/TDSC.2023.3241451. in press.

Wendzel S, Caviglione L, Mazurczyk M (2023) Avoiding research tribal wars using taxonomies. IEEE Computer 56/1:93–96. IEEE, DOI: 10.1109/MC.2022.3218175.

2022

Schmidbauer T, Wendzel S (2022) SoK: A Survey Of Indirect Network-level Covert Channels. In: Proc. 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2022). ACM, pp 546–560, DOI: 10.1145/3488932.3517418. Acceptance rate: 18.4%

Wendzel S, Schmidbauer T, Zillien S, Keller J (2022) Did You See That? A Covert Channel Exploiting Recent Legitimate Traffic, DOI: 10.48550/arXiv.2212.11850

Wendzel S, Caviglione L, Mazurczyk W, Mileva A, Dittmann J, Krätzer C, Lamshöft K, Vielhauer C, Hartmann L, Keller J, Neubert T, Zillien S (2022) A Generic Taxonomy for Steganography Methods, DOI: 10.36227/techrxiv.20215373

Schmidbauer T, Keller J, Wendzel S (2022b) Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication. In: Proc. 17th International Conference on Availability, Reliability and Security (ARES 2022). ACM, DOI: 10.1145/3538969.3544455

Steffen Wendzel, Luca Caviglione, Bernhard Fechner (2022) Poster: Steganography Hiding Patterns: A Brief Review. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2022). ACM, DOI: 10.1145/3528580.3532997.

Daniel Bub, Laura Hartmann, Zdravko Bozakov, Steffen Wendzel (2022) Towards Passive Identification of Aged Android Devices in the Home Network. In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2022). ACM, DOI: 10.1145/3528580.3528584.

Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Amir Houmansadr (2022) Emerging topics in defending networked systems. Future Generation Computer Systems (FGCS) 128:317–319. Elsevier, DOI: 10.1016/j.future.2021.10.010.

Hartmann L, Wendzel S (2022a) Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project History. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 13/3:4–24, DOI: 10.22667/JOWUA.2022.09.30.004

Schmidbauer T, Wendzel S (2022b) Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 13/1:137–166, DOI: 10.22667/JOWUA.2022.03.31.137

Mileva A, Velinov A, Dimitrova V, Caviglione L, Wendzel S (2022c) Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection. Entropy 24/2, DOI: 10.3390/e24020176

Szary P, Mazurczyk W, Wendzel S, Caviglione L (2022d) Analysis of Reversible Network Covert Channels. ACCESS 10:41226–41238. IEEE, DOI: 10.1109/ACCESS.2022.3168018

2021

Luca Caviglione, Steffen Wendzel, Aleksandra Mileva, Simon Vrhovec (2021) Multidisciplinary solutions to modern cybersecurity challenges. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 12:1–3, DOI: 10.22667/JOWUA.2021.12.31.001

Mehdi Chourib, Steffen Wendzel, Wojciech Mazurczyk (2021) Adaptive Warden Strategy for Countering Network Covert Storage Channels. In: 46th IEEE Conference on Local Computer Networks, LCN 2021. IEEE, pp 148–153, https://arxiv.org/abs/2111.03310

Laura Hartmann, Steffen Wendzel: Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems, EICC 2021 - Doctoral Symposium, ACM, 2021.

Laura Hartmann, Steffen Wendzel: How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data, EICC 2021 - DETONATOR workshop, ACM, 2021.

Laura Hartmann, Sebastian Zillien, Steffen Wendzel: Reset- and Reconnection-based Covert Channels in CoAP, EICC 2021 - DETONATOR workshop, ACM, 2021.

Steffen Wendzel, Luca Caviglione, Alexandar Checco, Aleksandra Mileva, Jean-Francois Lalande, Wojciech Mazurczyk (eds) (2021) Proceedings of the Third International Workshop on Information Security Methodology and Replication Studies (IWSMR’21), part of ARES proceedings, ACM, 2021.

Steffen WendzelIT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung, 2nd edn. Springer, 2021.

Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert: A Revised Taxonomy of Steganography Embedding Patterns. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). Association for Computing Machinery, 2021. Verfügbar unter https://patterns.ztt.hs-worms.de.

Sebastian Zillien, Steffen WendzelReconnection-Based Covert Channels in Wireless Networks. In: Jøsang A, Futcher L, Hagen J (eds) ICT Systems Security and Privacy Protection (Proc. IFIP SEC 2021). Springer International Publishing, Cham, pp 118–133, 2021.

Simon Vrhovec, Luca Caviglione, Steffen Wendzel: Crème de la Crème: Lessons from Papers in Top Publications. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). Association for Computing Machinery, 2021.

Aleksandra Mileva, Luca Caviglione, Aleksandar Velinov, Steffen Wendzel et al.: Risks and Opportunities for Information Hiding in DICOM Standard. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). Association for Computing Machinery, 2021.

Tobias Schmidbauer, Steffen Wendzel: Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels. In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). Association for Computing Machinery, 2021.

Jens Marcus Woehe, Eberhard Kurz: Krisen in Digitalprojekten erfolgreich managen, Hanser, ISBN 978-3-446-46756-9, 2021.

Jörg Keller, Steffen Wendzel: Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains, MDPI Applied Sciences, Applied Sciences, Vol. 11(2), MDPI, 2021.

Aleksandra Mileva, Aleksandar Velinov, Laura Hartmann, Steffen Wendzel, Wojciech Mazurczyk: Comprehensive Analysis of MQTT 5.0 Susceptibility to Network Covert Channels, Computers & Security, Vol. 104, pp. 102207ff, Elsevier, 2021.

Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Amir Houmansadr (Eds.): Emerging Topics in Defending Networked Systems, Special Issue at Future Generation Computer Systems (FGCS), Elsevier, 2021.

2020

Steffen Wendzel, Cédric Lévy-Bencheton, Luca Caviglione: Not all Areas are Equal: Analysis of Citations in Information Security Research, Scientometrics, Vol. 122(1), pp. 267-286, Springer, 2020.

Tobias Schmidbauer, Steffen Wendzel: Covert Storage Caches using the NTP Protocol, in Proc. CUING Workshop 2020 (ARES 2020), ACM, 2020.

Przemysław Szary, Wojciech Mazurczyk, Luca Caviglione, Steffen Wendzel: Design and Performance Evaluation of Reversible Network Covert Channels, in Proc. CUING Workshop 2020 (ARES 2020), ACM, 2020.

Steffen Wendzel, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-Francois Lalande, Wojciech Mazurczyk: Special Issue Editorial: Information Security Methodology, Replication Studies and Information Security Education, Journal of Universal Computer Science, Vol. 26(7), pp. 762-763, 2020.

Luca Caviglione, Aleksandra Mileva, Steffen Wendzel (Eds.): Proceedings of the First European Interdisciplinary Cybersecurity Conference (EICC'2020), ACM, 2020.

Jörg Keller, Steffen Wendzel: Covert Channels in One-Time Passwords Based on Hash Chains, in Proc. European Interdisciplinary Cybersecurity Conference (EICC 2020), ACM, 2020.

Laura Hartmann, Steffen Wendzel: Anomaly Detection in ICS based on Data-history Analysis, in Proc. European Interdisciplinary Cybersecurity Conference (EICC 2020), ACM, 2020.

Steffen Wendzel: Review of the book Future Automation: Changes to Lives and to Businesses by Carone, T. (World Scientific Publishing Co, Inc., 2018), ACM Computing Reviews, 2020.

2019

Wojciech Mazurczyk, Steffen Wendzel, Mehdi Chourib, Jörg Keller: Countering Adaptive Network Covert Communication with Dynamic Wardens, Future Generation Computer Systems (FGCS), Vol. 94, pp. 712-725, Elsevier, 2019.
Impact factor: 4.639 (at time of publication).

Aleksandar Velinov, Aleksandra Mileva, Steffen Wendzel, Wojciech Mazurczyk: Covert Channels in MQTT-based Internet of Things, IEEE ACCESS, Vol. 7, pp. 161899-161915, 2019.

Steffen Wendzel: Protocol-independent Detection of `Messaging Ordering' Network Covert Channels, in Proc. Third International Workshop on Criminal Use of Information Hiding (CUING 2019), pp. 63:1-63:8, ACM, 2019.

Tobias Schmidbauer, Steffen Wendzel, Aleksandra Mileva and Wojciech Mazurczyk: Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks, in Proc. Third International Workshop on Criminal Use of Information Hiding (CUING 2019), pp. 64:1-64:10, ACM, 2019.

Wojciech Mazurczyk, Przemysław Szary, Steffen Wendzel and Luca Caviglione: Towards Reversible Storage Network Covert Channels, in Proc. Third International Workshop on Criminal Use of Information Hiding (CUING 2019), pp. 69:1-69:8, ACM, 2019.

Wojciech Mazurczyk, Luca Caviglione, Steffen Wendzel: Recent Advancements in Digital Forensics – part two (Special Issue Introductory Article), IEEE Security and Privacy Magazine, IEEE, Vol. 17(1), 2019.

Zhihan Lv, Wojciech Mazurczyk, Steffen Wendzel, Houbing Song (Eds.): Recent Advances in Cyber-Physical Security in Industrial Environments, IEEE Transactions on Industrial Informatics (TII), IEEE, 2019.

Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel: Advanced Information Hiding Techniques for Modern Botnets, in: G. Kambourakis et al. (Eds.): Botnets: Architectures, Countermeasures, and Challenges, CRC Series in Security, Privacy and Trust, Ch. 4, pp. 165-188, Taylor & Francis, 2019.

Steffen Wendzel, Johannes Plötner: Einstieg in Linux, 8th Edition, Rheinwerk Verlag, 2019.

Qi Wang; Jose M. Alcaraz Calero, [...], Zdravko Bozakov, et al.: Enable Advanced QoS-Aware Network Slicing in 5G Networks for Slice-Based Media Use Cases, IEEE Trans. Broadcast, Vol. 65(2), 2019.

2018

Steffen Wendzel, Daniela Eller, Wojciech Mazurczyk: One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels, in Proc. Central European Security Conference (CECC'18), pp. 1:1-1:6, ACM, 2018.

Sebastian Zillien, Steffen Wendzel: Detection of covert channels in TCP retransmissions, in Proc. 23rd Nordic Conference on Secure IT Systems (NordSec), LNCS 11252, pp. 203-218, Springer, 2018.

Wojciech Mazurczyk, Steffen Wendzel: Information Hiding – Challenges for Forensic Experts, Communications of the ACM, Vol. 61(1), pp. 86-94, ACM, January 2018.

Krzysztof Cabaj, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Alan Woodward, Sebastian Zander: The New Threats of Information Hiding: the Road Ahead, IEEE IT Professional, Vol. 20(3), pp. 31-39, IEEE, 2018. [preprint]

Steffen Wendzel: IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung, Springer Vieweg, ISBN 978-3-658-22603-9, 2018.

Ralf Keidel, Steffen Wendzel, Sebastian Zillien, Eric S. Conner and Georg Haas: WoDiCoF – A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms, Journal of Universal Computer Science, Vol. 24(5), pp. 556-576, 2018.

Wojciech Mazurczyk, Steffen Wendzel, Krzysztof Cabaj: Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach, in Proc. Second International Workshop on Criminal Use of Information Hiding (CUING 2018) at ARES, pp. 10:1-10:10, ACM, 2018.

Steffen Wendzel: Get Me Cited, Scotty! Analysis of Citations in Covert Channel/Steganography Research, in Proc. Second International Workshop on Criminal Use of Information Hiding (CUING 2018) at ARES, pp. 13:1-13:8, ACM, 2018.

Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Sebastian Zander: Special Issue Editorial: Emerging and Unconventional: New Attacks and Innovative Detection Techniques, Security and Communication Networks (SCN), Wiley-Hindawi, 2018.

Steffen Wendzel:  Review of the article ``Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth Standard V5.0 and Its Countermeasure'' (Springer Pers. Ubiquit. Comput., 2018) by Sun, Mu and Susilo, ACM Computing Reviews, 2018.

Steffen Wendzel, Detlef Olschewski: Internet of Things und Smart Contracts: Risiken bei der Digitalisierung von Unternehmen, in: Barton et al. (Hrsg.): Angewandte Wirtschaftsinformatik, Bd. III, pp. 291-302, Springer, 2018.

Qi Wang; Jose M. Alcaraz Calero, [...] Zdravko Bozakov et al.: SliceNet: End-to-End Cognitive Network Slicing and Slice Management Framework in Virtualised Multi-Domain, in: Multi-Tenant 5G Networks, BMSB, 2018.

2017

Ältere Publikationen (von Prof. Wendzel) (ab 2003).