WoDiCoF
Publications
Publications on WoDiCoF
Selected Publications on Network Covert Channels
S. Zillien, S. Wendzel: Weaknesses of popular and recent covert channel detection methods and a remedy , IEEE Trans. Dependable and Secure Computing (TDSC), in press.
S. Wendzel, L. Caviglione, W. Mazurczyk, A. Mileva, J. Dittmann, C. Krätzer, K. Lamshöft, C. Vielhauer, L. Hartmann, J. Keller, T. Neubert, S. Zillien (2022): A Generic Taxonomy for Steganography Methods , pre-print, 2022.Steganography Patterns Project Website
T. Schmidbauer, S. Wendzel (2022) SoK: A Survey Of Indirect Network-level Covert Channels , Proc. 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2022). ACM, pp 546–560, DOI: 10.1145/3488932.3517418.
S. Wendzel, L. Caviglione, W. Mazurczyk, A. Mileva, J. Dittmann, C. Krätzer, K. Lamshöft, C. Vielhauer, L. Hartmann, J. Keller, T. Neubert (2021): A Revised Taxonomy of Steganography Embedding Patterns , In: Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021). ACM, 2021. DOI: https://doi.org/10.1145/3465481.3470069 Steganography Patterns Project Website
Sebastian Zillien, Steffen Wendzel: Reconnection-Based Covert Channels in Wireless Networks In: Jøsang A., Futcher L., Hagen J. (eds) ICT Systems Security and Privacy Protection. SEC 2021. IFIP Advances in Information and Communication Technology, vol 625. Springer, Cham. 2021
Szary P, Mazurczyk W, Wendzel S, Caviglione L: Design and Performance Evaluation of Reversible Network Covert Channels In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES). Association for Computing Machinery, New York, NY, USA 2020
Steffen Wendzel, Florian Link, Daniela Eller, Wojciech Mazurczyk: Detection of Size Modulation Covert Channels Using Countermeasure Variation , Journal of Universal Computer Science (J.UCS), Vol. 25(11), 2019.
Aleksandar Velinov, Aleksandra Mileva, Steffen Wendzel, Wojciech Mazurczyk: Covert Channels in MQTT-based Internet of Things , IEEE ACCESS, Vol. 7, 2019.
Steffen Wendzel, Daniela Eller, Wojciech Mazurczyk: One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels, in Proc. Central European Security Conference (CECC'18), pp. 1:1-6, ACM, 2018.
Sebastian Zillien, Steffen Wendzel: Detection of covert channels in TCP retransmissions , in Proc. 23rd Nordic Conference on Secure IT Systems (NordSec), LNCS Vol. 11252, pp. 203-218, Springer, 2018.
Wojciech Mazurczyk, Steffen Wendzel: Information Hiding – Challenges for Forensic Experts , Communications of the ACM , Vol. 61(1), pp. 86-94, January 2018. [video introduction ]
Wojciech Mazurczyk, Steffen Wendzel, Krzysztof Cabaj: Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach , in Proc. 13th International Conference on Availability, Reliability and Security (ARES), pp. 10:1-10:10, ACM, 2018.
Krzysztof Cabaj, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Alan Woodward, Sebastian Zander: The New Threats of Information Hiding: the Road Ahead , IEEE IT Professional, Vol. 20(3), pp. 31-39, IEEE, 2018.
Luca Caviglione, Steffen Wendzel, Wojciech Mazurczyk: The Future of Digital Forensics: Challenges and the Road Ahead , IEEE Security & Privacy, Vol. 6, pp. 12-17, IEEE 2017.
Wojciech Mazurczyk, Steffen Wendzel, Sebastian Zander, Amir Houmansadr, Krzysztof Szczypiorski: Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications , IEEE Series on Information and Communication Networks Security , Wiley, 2016.
Steffen Wendzel, Sebastian Zander, Bernhard Fechner, Christian Herdin: Pattern-Based Survey and Categorization of Network Covert Channel Techniques , Computing Surveys (CSUR), Vol. 47(3), ACM, 2015.
Wojciech Mazurczyk, Luca Caviglione: Steganography in modern smartphones and mitigation techniques , IEEE Communications Surveys & Tutorials, Vol. 17(1), pp. 334-357, IEEE 2015.
Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier: Hidden and uncontrolled: on the emergence of network steganographic threats , in Proc. of ISSE 2014 Securing Electronic Business Processes, pp. pp. 123-133, Springer Vieweg, 2014.