Publications

book projects: I wrote 5 books (1x sole author, 1x first author, 3x 2nd author, overall: 15 editions), published 1 edited workshop proceedings and 1 book chapter. Publishers: Wiley-IEEE, Springer Vieweg and Galileo Press/Rheinwerk Verlag.


 Information Hiding in Communication Networks  Einstieg in Linux Tunnel und verdeckte Kanäle im Netz Linux. Das umfassende Handbuch Praxisbuch Netzwerksicherheit

scientific papers at ACM Computing Surveys (CSUR), Springer Annals of Telecommunications (ANTE), IFIP Sec, IEEE LCN, WILEY Security and Communication Networks (2x), IFIP CMS (2x) and others.

Books

  1. Wojciech Mazurczyk, Steffen Wendzel, Sebastian Zander, Amir Houmansadr, Krzysztof Szczypiorski:
    Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications,
    IEEE Series on Information and Communication Networks Security,
    Wiley, 2015 (in press, cf. Amazon.com).
  2. Steffen Wendzel, Johannes Plötner:
    Einstieg in Linux,
    6. Ed., Galileo Press, 2014. 
  3. Johannes Plötner, Steffen Wendzel:
    Linux. Das umfassende Handbuch,
    5. Ed., Galileo Press, 2012. [Download]
  4. Steffen Wendzel:
    Tunnel und verdeckte Kanäle im Netz,
    Springer-Vieweg, 2012.
  5. Steffen Wendzel, Johannes Plötner:
    Einstieg in Linux,
    5. Ed., Galileo Press, 2012.
  6.  Johannes Plötner, Steffen Wendzel:
    Linux. Das umfassende Handbuch,
    4. Ed., Galileo Press, 2011. [Download
  7. Steffen Wendzel, Johannes Plötner:
    Einstieg in Linux,
    4. Ed., Galileo Press, 2010.
  8. Johannes Plötner, Steffen Wendzel:
    Linux. Das umfassende Handbuch,
    3. Ed., Galileo Press, 2009. [Download]
  9. Johannes Plötner, Steffen Wendzel:
    Linux. Das umfassende Handbuch,
    2. Ed., Galileo Press, 2008. [Download]
  10. Steffen Wendzel, Johannes Plötner:
    Einstieg in Linux,
    3. Ed., Galileo Press, 2008.
  11. Johannes P., S. Wendzel:
    Praxisbuch Netzwerk-Sicherheit,
    2. Ed., Galieo Press, 2007. [Download]
  12. Johannes Plötner, Steffen Wendzel:
    Linux. Das umfassende Handbuch,
    1. Ed., Galileo Press, 2006. [Download]
  13. Steffen Wendzel, Johannes Plötner:
    Einstieg in Linux,
    2. Ed., Galileo Press, 2006.
  14. Johannes P., S. Wendzel:
    Praxisbuch Netzwerk-Sicherheit,
    1. Ed., Galieo Press, 2005. [Download]
  15. Steffen Wendzel, Johannes Plötner:
    Einstieg in Linux,
    1. Ed., Galileo Press, 2004.

Edited Publications

  1. Christoph Pohl, Sebastian Schinzel, Steffen Wendzel (Eds.):
    Tagungsband zum 8. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING),
    SIDAR-Report SR-2013-01, ISSN 2190-846X, München, 2013.

Book Chapters

  1. Steffen Wendzel, Jörg Keller:
    Einführung in die Forschungsthematik der verdeckten Kanäle,
    In: Informationstechnologie und Sicherheitspolitik – Wird der dritte Weltkrieg im Internet ausgetragen?, Buchkapitel, BoD, pp. 91-102, October 2012.

Journal Papers

  1. Steffen Wendzel, Sebastian Zander, Bernhard Fechner, Christian Herdin:
    Pattern-based Survey and Categorization of Network Covert Channel Techniques,
    Computing Surveys (CSUR), Vol. 47(3), ACM, 2015.
    Impact factor: 4.04.
  2. Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel:
    “The Good, The Bad And The Ugly”: Evaluation of Wi-Fi Steganography,
    reprint of a ICNIT 2015 paper in the Journal of Communications (JCM), 2015.
  3. Matthias Naumann, Steffen Wendzel, Wojciech Mazurczyk, Jörg Keller:
    Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions,
    Security and Communication Networks (SCN), Wiley, 2015 (to appear).
    Impact factor: 0.72.
  4. Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares, Krzysztof Szczypiorski:
    On Importance of Steganographic Cost For Network Steganography,
    Security and Communication Networks (SCN), Wiley, 2014.
    Impact factor: 0.4x.
  5. Steffen Wendzel, Jörg Keller:
    Hidden and Under Control:  A Survey and Outlook on Covert Channel-internal Control Protocols,
    Annals of Telecommunications (ANTE), Vol. 69, Issue 7, pp. 417-430, Springer Paris, 2014. (access via Springer Online).
    Impact factor: 0.56.
  6. Steffen Wendzel, Jörg Keller:
    IT-gestütztes Management und Controlling: Verdeckte Kanäle – eine zunehmende Gefahr für Unternehmensdaten,
    Controlling (Zeitschrift für erfolgsorientierte Unternehmenssteuerung), vol. 26, no 14/6, pp. 304-308, Beck, 2014.
  7. Steffen Wendzel, Jörg Keller:
    Preventing Protocol Switching Covert Channels,
    International Journal On Advances in Security, vol. 5 no. 3&4, pp. 81-93, IARIA, 2012.
  8. Steffen Wendzel, Jörg Keller:
    Einführung in die Forschungsthematik der verdeckten Kanäle,
    Magdeburger Journal zur Sicherheitsforschung, Stefan Schumacher (Editor), Bd. 2, pp. 115-124, 2011. 

Conference and Workshop Papers/Posters

  1. Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel:
    “The Good, The Bad And The Ugly”: Evaluation of Wi-Fi Steganography,
    ICNIT 2015 - 6th International Conference on Networking and Information Technology, Tokyo, Japan, 2015.
  2. Jaspreet Kaur, Steffen Wendzel, Michael Meier:
    Countermeasures for Covert Channel-internal Control Protocols,
    4th Int. Workshop on Cyber Crime (IWCC) @10th ARES, Toulouse, IEEE, 2015 (to appear).
  3. Jaspreet Kaur, Jernej Tonejc, Steffen Wendzel, Michael Meier:
    Securing BACnet's Pitfalls,
    30th International Information Security and Privacy Conference (IFIP SEC), IFIP AICT 455, pp. 616-629, Hamburg, Springer, 2015.
    (acceptance rate: 19.8%)
  4. Jernej Tonejc, Jaspreet Kaur, Adrian Karsten, Steffen Wendzel:
    Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making,
    3rd Int. Conf. Human Aspects of Information Security, Privacy and Trust (HAS), LNCS 9190, Springer, Los Angeles, 2015.
  5. Luca Caviglione, Jean-Francois Lalande, Wojciech Mazurczyk, Steffen Wendzel:
    Analysis of Human Awareness of Security and Privacy Threats in Smart Environments,
    3rd Int. Conf. Human Aspects of Information Security, Privacy and Trust (HAS), LNCS 9190, Springer, Los Angeles, 2015.
  6. Evi Anhaus, Steffen Wendzel:
    Data Leakage Protection für Gebäude,
    in Proc. D-A-CH Security, 2015.
  7. Jaspreet Kaur, Christian Herdin, Jernej Tonejc, Steffen Wendzel, Michael Meier, Sebastian Szlósarczyk:
    Novel Approaches for Security in Building Automation Systems,
    in Proc. 14. Sicherheitskongress des BSI, pp. 145-158, 2015.
  8. Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier:
    Hidden and Uncontrolled - On the Emergence of Network Steganography,
    Information Security Solutions Europe (ISSE'14), in: Securing Electronic Business Processes, pp. 123-133, Brussels, Springer-Vieweg, 2014.
  9. Steffen Wendzel, Christian Herdin, Roman Wirth, Masood Masoodian, Santonio Luz, Jaspreet Kaur:
    Mosaic-chart based Visualization in Building Automation Systems,
    9th Future Security (Security Research Conference), pp. 687-690, Fraunhofer Verlag/MEV Verlag, Berlin, 2014.
  10. Steffen Wendzel, Viviane Zwanger, Michael Meier, Sebastian Szlósarczyk:
    Envisioning Smart Building Botnets,
    GI Sicherheit 2014, LNI 228, pp. 319-329, GI, Vienna, 2014.
  11. Sebastian Szlósarczyk, Steffen Wendzel, Jaspreet Kaur, Michael Meier, Frank Schubert:
    Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet,
    Sicherheit 2014, LNI 228, pp. 407-418, GI, Vienna, 2014.
  12. Jaspreet Kaur, Michael Meier, Sebastian Szlósarczyk, Steffen Wendzel:
    A Cost-Efficient Building Automation Security Testbed for Educational Purposes,
    poster at SECURWARE 2014, Lisbon, 2014.
  13. Jaspreet Kaur, Steffen Wendzel:
    Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purpose,
    CSCUB, Bonn, 2014.
  14. Jean-François Lalande, Steffen Wendzel:
    Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels
    ,
    ECTCM Workshop @ ARES'13, pp. 701-710, Regensburg, 2013. (slides [pdf], download paper via IEEE Xplore)
  15. Jean-François Lalande, Steffen Wendzel:
    Attacking Smartphone Privacy Using Local Covert Channels
    , short talk at the Fourth International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE'2013), 2013.
  16. Benjamin Kahler, Steffen Wendzel:
    How to own a Building? Wardriving gegen die Gebäude-Automation,
    20. DFN Workshop „Sicherheit in vernetzten Systemen“, pp. H1-H13, 2013.
  17.  Steffen Wendzel, Sebastian Zander:
    Detecting Protocol Switching Covert Channels,
    37th IEEE Conf. on Local Computer Networks (LCN), pp. 280-283, Clearwater, Florida, 2012. (download via IEEE Xplore)
  18. Steffen Wendzel, Jörg Keller:
    Systematic Engineering of Control Protocols for Covert Channels,
    13th Conference on Communications and Multimedia Security (CMS 2012), LNCS 7394, pp. 131-144, Kent (Great Britain), 2012.
  19. Peter Backs, Steffen Wendzel, Jörg Keller:
    Dynamic Routing in Covert Channel Overlays Based on Control Protocols,
    ISTP'12 Workshop @ ICITST'12, IEEE, pp. 32-39, London, 2012.
  20. Steffen Wendzel, Benjamin Kahler, Thomas Rist:
    Covert Channels and their Prevention in Building Automation Protocols - A Prototype Exemplified Using BACnet,
    2nd Workshop on Security of Systems and Software Resiliency @ CPSCom'12, pp. 731-736, Besançon, France, IEEE, 2012. (download via IEEE Xplore)
  21. Steffen Wendzel:
    Covert and Side Channels in Buildings and the Prototype of a Building-aware Active Warden,
    SFCS'12 Workshop @ IEEE ICC'12, Ottawa, Canada, pp. 6753-6758, 2012.
  22. Thomas Rist, Steffen Wendzel, Masood Masoodian, Elisabeth André:
    Next-Generation Home Automation Systems,
    Techniken für Menschen im nächsten Jahrzehnt -- Beiträge zum Usability Day X, Pabst Science Publishers, pp. 80-87, Dornbirn, AT, 2012.
  23. Steffen Wendzel, Jörg Keller:
    Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels,
    7th International Conference on Internet Monitoring and Protection (ICIMP 2012), pp. 1-6, IARIA, Stuttgart, Germany, 2012.
    (full paper acceptance rate: 24%)
  24. Steffen Wendzel:
    The Problem of Traffic Normalization Within a Covert Channel's Network Environment Learning Phase,
    Sicherheit 2012 (6. Jahrestagung des Fachbereichs Sicherheit), LNI vol. 195, pp. 149-161, Gesellschaft für Informatik, Darmstadt, Germany, 2012.
  25. Steffen Wendzel:
    Control Protocols for Network Covert Channels,
    7th GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), SIDAR-Report SR-2012-01, page 24, Berlin, 2012.
  26. Steffen Wendzel, Jörg Keller:
    Low-attention forwarding for mobile network covert channels,
    12th Conference on Communications and Multimedia Security (CMS 2011), LNCS vol. 7025, pp. 122-133, Springer, Ghent, Belgium, 2011.
    (full paper acceptance rate: 21%)
  27. Steffen Wendzel, Thomas Rist et al.:
    A secure interoperable architecture for building automation applications,
    ISABEL'11, ACM, pp. 8:1-8:5, Barcelona, 2011. (download via ACM DL)
  28. Steffen Wendzel:
    Mikroprotokolle in verdeckten Netzwerkkanälen,
    Informatik Ruhr: Doktorandenkolleg 2011, Oct 6-7, Meinerzhagen Valbert, p. 35, Germany, 2011.
  29. Thomas Rist, Steffen Wendzel, Masood Masoodian, Paul Monigatti, Elisabeth André:
    Creating Awareness for Efficient Energy Use in Smart Homes,
    Intelligent Wohnen. Zusammenfassung der Beiträge zum Usability Day IX, Feuerstein Gerhild, Ritter Walter (Hrsg.), pp. 162-168, Dornbirn, AT, 2011.

Theses

  1. Steffen Wendzel:
    Novel Approaches for Network Covert Storage Channels,
    PhD thesis, University of Hagen, submitted: Jan-2013, defended: May-2013.
  2. Steffen Wendzel:
    Analyse der Detektions- und Präventionsmethoden für verdeckte Kanäle,
    Master's thesis, Augsburg University of Applied Sciences, Jun-2011.
  3. Steffen Wendzel:
    Protokollwechsel zur Realisierung von Covert Channels und Header-Strukturveränderungen zur Vermeidung von Covert Channels,
    Diplomarbeit, Kempten University of Applied Sciences, May-2009.

Other Scientific Publications

  1. Steffen Wendzel, Sebastian Szlósarczyk, Michael Meier:
    IT-Sicherheit in der Gebäude-Automation,
    Forschungsbericht des Fraunhofer FKIE, 2014.
  2. Thomas Rist, Steffen Wendzel, Elisabeth André, Masood Masoodian:
    IT4SE – IT for smart renewable energy generation and use. News from a German - New Zealand Research Cooperation within the BMBF-funded APRA Initiative,
    Forschungsbericht der Hochschule Augsburg, pp. 59-66, October 2011.
  3. Steffen Wendzel:
    Protocol Channels,
    Kempten University of Applied Sciences, technical report, July 2009.

Professional Publications

  1. Steffen Wendzel, Michael Meier, Jernej Tonejc:
    Die zwei Handlungsfelder für Sicherheit in der Gebäudeautomation,
    BusSysteme Magazin 4/2015. (to appear).
  2. Kirsten Messer-Schmidt, Dirk Rösler, Christopher Ruppricht, Heinrich Seebauer, Steffen Wendzel:
    Mit kritischen ITK-Systemen bewusst umgehen: ein Lösungsansatz des Arbeitskreis KRITIS (Gesellschaft für Informatik),
    digitalbusiness CLOUD, 8/14, pp. 40-41, 2014. 
  3. Steffen Wendzel:
    Exfiltration vertrauenswürdiger Daten - Protektionsmaßnahmen hinken den modernen Techniken der Angreifer hinterher,
    digitalbusiness CLOUD, 2/14, p. 37, 2014. 
  4. Steffen Wendzel:
    Gefahrenpotential der Netzwerksteganografie,
    IT-SICHERHEIT, 6/2013, pp. 58-59, 2013.
  5. Steffen Wendzel:
    Sicherheitsaspekte in der Gebäude-Automation. Perspektiven der Personenüberwachung,
    IT-SICHERHEIT 3/2013, pp. 70-72, 2013. 
  6. Steffen Wendzel:
    Verdeckte Kommunikation in Gebäuden. Analyse der Gefahren und eine Middleware-basierte  Gegenmaßnahme,
    BusSysteme Magazin, 03/2012, pp. 182-183, 2012.
  7. Steffen Wendzel, Thomas Rist, Roman Wirth, Elisabeth André, Masood Masoodian:
    Sicherheit beim Energiesparen durch Abstraktion,
    BusSysteme Magazin 2/2012, pp. 124-125, 2012.
  8. Roland Koch, Steffen Wendzel:
    Social Network Security, pt. 2,
    Hakin9 (en), 1/12, 2012.
  9. Steffen Wendzel, Roland Koch:
    Social Network Security, pt. 1,
    Hakin9 (en), 1/12, 2012.
  10. Steffen Wendzel:
    Bewusstsein für Sicherheit im Bereich der Gebäudeautomatisierung,
    Hakin9 (de), 3/2011, pp. 11-12, 2011. 
  11. Steffen Wendzel:
    Protocol Channels,
    Hakin9 (en) 06/2009.
  12. Steffen Wendzel:
    Intrusion Detection über Benutzerprofile,
    Hakin9 05/2008.
  13. Steffen Wendzel:
    Protocol Hopping Covert Channels,
    Hakin9 03/2008.
  14. Steffen Wendzel:
    Forensik nach Angriffen auf Linux-Systeme,
    Hakin9 06/2007.
  15. Steffen Wendzel:
    Abhärtung von Linux/BSD Systemen. Eine Einführung,
    Hakin9 04/2007.
  16. Steffen Wendzel:
    Hostbasierte Intrusion Detection. Ein Einblick,
    Hakin9 02/2007.
  17. Steffen Wendzel:
    Firewalls umgehen mit Protokoll-Tunneling,
    Hakin9 01/2007.
  18. Johannes Plötner, Steffen Wendzel:
    Versionsverwaltung,
    Linux-User 10/06.
  19. Johannes Plötner, Steffen Wendzel:
    Auszüge aus 'Linux. Das umfassende Handbuch',
    Linux Magazin 04/06.
  20. Steffen Wendzel:
    Xyria:CDPNNTPd,
    FreeX 5/05.
  21. Steffen Wendzel:
    Das Allround-Genie Z-Shell,
    FreeX 6/03.
  22. Steffen Wendzel:
    sysctl in OpenBSD,
    FreeX 5/03.
  23.  

EU-related Documents

  1. Contributor of: WG3 of the Network and Information Security (NIS) Platform's Strategic Research Agenda (SRA) as announced in the Cybersecurity Strategy of the European Union; currently in progress (to be published; draft available online).
  2. Contributor of: WG3 of the Network and Information Security (NIS) Platform's State of the Art of the Secure ICT Landscape Deliverable v2 (to be published)