Publikationen
2024
Leiwig, Maximilian and Swierzy, Ben and Bungartz, Christian and Meier, Michael. Replication data for ``Analyzing the Potency of Pretrained Transformer Models for Automated Program Repair''. 2024. PDFOhm, Marc and Bungartz, Christian and Boes, Felix and Meier, Michael. Assessing the Impact of Large Language Models on Cybersecurity Education: A Study of ChatGPT's Influence on Student Performance. In Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024. PDF
Ohm, Marc and Götz, Anja. Using Pre-trained Transformers to Detect Malicious Source Code Within JavaScript Packages. In INFORMATIK 2024, 529-538, 2024.
Pohl, Timo and Ohm, Marc and Boes, Felix and Meier, Michael. Wendzel, Steffen and Wressnegger, Christian and Hartmann, Laura and Freiling, Felix C. and Armknecht, Frederik and Reinfelder, Lena (ed.) You Can Run But You Can't Hide: Runtime Protection Against Malicious Package Updates For Node.js. In Sicherheit, Schutz und Zuverlässigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024, {P-345}: 231-241, 2024. PDF
Swierzy, Ben and Boes, Felix and Pohl, Timo and Bungartz, Christian and Meier, Michael. SoK: Automated Software Testing for TLS Libraries. In Proceedings of the 19th International Conference on Availability, Reliability and Security, ARES 2024, Vienna, Austria, 30 July 2024 - 2 August 2024, 54:1-54:12, 2024. PDF
Swierzy, Ben and Hoffmann, Melina and Boes, Felix and Betke, Felix and Hein, Lennart and Shevchishin, Maxim and Sohn, Jan-Niklas and Meier, Michael. Wendzel, Steffen and Wressnegger, Christian and Hartmann, Laura and Freiling, Felix C. and Armknecht, Frederik and Reinfelder, Lena (ed.) TEEM: A CPU Emulator for Teaching Transient Execution Attacks. In Sicherheit, Schutz und Zuverlässigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024, {P-345}: 203-214, 2024. PDF
2023
Ohm, Marc and Pohl, Timo and Boes, Felix. You Can Run But You Can't Hide: Runtime Protection Against Malicious Package Updates For Node.js. May 2023. PDFOhm, Marc and Stuke, Charlene. SoK: Practical Detection of Software Supply Chain Attacks. In Proceedings of the 18th International Conference on Availability, Reliability and Security, 1-11, August/September 2023. PDF
Ohm, Marc and Taufenbach, Lars and Weber, Karsten and Pohl, Timo. Power Consumption of Common Symmetric Encryption Algorithms on Low-Cost Microchips. In Proceedings of the 37th Edition of the EnviroInfo, October 2023. PDF
Pohl, Timo and Ohm, Marc. Measuring Resource Efficiency of LaTeX Paper Templates. In Proceedings of the 37rd Edition of the EnviroInfo, October 2023. PDF
Swierzy, Ben and Krämer, Markus and Vogel, Daniel and Meyer, Daniel and Meier, Michael. Analyzing the Feasibility of Privacy-Respecting Automated Tracking of Devices Fleeing a Burglary. In 2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 452-459, 2023. PDF
Viola, Felix and Vogel, Daniel. Wilfried Honekamp und Johannes Fähndrich (Hrsg.) (ed.) Passives Tracking von mobilen Wi-Fi Geräten durch Fingerprinting von Probe Requests. 133-144, March 2023. PDF
Vogel, Daniel and Krämer, Markus and Swierzy, Ben and Meyer, Daniel and Meier, Michael. On the Feasibility of Detecting Non-Cooperative Wi-Fi Devices via a Single Wi-Fi-Router. In WiP Proceedings of the Thirteenth International Conference on Indoor Positioning and Indoor Navigation - Work-in-Progress Papers (IPIN-WiP 2023), September 2023. PDF
2022
Kasem-Madani, Raedah Saffija. Maßgeschneiderte nutzbarkeitserhaltende Pseudonymisierung - Anforderungen, Beschreibung, Umsetzung. 2022. PDFMalderle, Timo and Boes, Felix and Muuss, Gina and Wübbeling, Matthias and Meier, Michael. Furnell, S. and Mori, P. and Weippl, E. and Camp, O. (ed.) Credential Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity Theft. In Communications in Computer and Information Science, 1545: 115-138, Febuary 2022. PDF
Ohm, Marc and Boes, Felix and Bungartz, Christian and Meier, Michael. On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages. In ARES 2022: Proceedings of the 17th International Conference on Availability, Reliability and Security, 1-10, August 2022. PDF
Ohm, Marc and Kempf, Lukas and Boes, Felix and Meier, Michael. Towards Detection of Malicious Software Packages Through Code Reuse by Malevolent Actors. In GI Sicherheit 2022, April 2022.
Sykosch, Arnold. Zur Messbarkeit von IT-Sicherheitsbewusstsein - Ein nutzerverhaltensbasierter Ansatz. 2022. PDF
Vogel, Daniel and Krämer, Markus. Collecting Identifying Data for Re-Identification of Mobile Devices carried at a Crime Scene using Wi-Fi Routers. INFORMATIK 2022, 2022. PDF
2021
Greis, Jakob and Yushchenko, Artem and Vogel, Daniel and Meier, Michael and Steinhage, Volker. Automated Identification of Vulnerable Devices in Networks using Traffic Data and Deep Learning. February 2021. PDFMalderle, Timo. Bedrohung durch Identitätsdatendiebstahl. 2021. PDF
Ohm, Marc-Philipp. Software Supply Chain Angriffe - Analyse und Erkennung. 2021. PDF
Pohl, Timo and Sykosch, Arnold. Benutzerfreundliche Schutzmechanismen gegen USB-basierte Angriffe unter Linux. 17. Deutscher IT-Sicherheitskongress, 17: Februar 2021.
2020
Kasem-Madani, Saffija and Malderle, Timo and Boes, Felix and Meier, Michael. Privacy-Preserving Warning Management for an Identity Leakage Warning Network. In EICC 2020: Proceedings of the European Interdisciplinary Cybersecurity Conference, Article No.: 4, pp 1–6, November 2020. PDFKasem-Madani, Saffija and Meier, Michael. Gritzalis, S. and Weippl, E. R. and Kotsis, G. and Tjoa, A. M. and Khalil, I. (ed.) Utility Requirement Description for Utility-Preserving and Privacy-Respecting Data Pseudonymization. In Lecture Notes in Computer Science, 12395: 2020.
Malderle, Timo and Knauer, Sven and Lang, Martin and Wübbeling, Matthias and Meier, Michael. Track Down Identity Leaks using Threat Intelligence. In Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,, 96-106, 2020. PDF
Malderle, Timo and Meier, Michael and Wübbeling, Matthias. Wer kennt mein Passwort? - Ein Frühwarndienst für Identitätsdatendiebstahl an Hochschulen. DFN Mitteilungen - Ausgabe 97, August 2020. PDF
Malderle, Timo and Wübbeling, Matthias and Meier, Michael. Effektive Warnung bei Identitätsdatendiebstahl an Hochschulen. In 27. DFN-Konferenz 2020 "Sicherheit in vernetzten Systemen", Februar 2020. PDF
Ohm, Marc and Plate, Henrik and Sykosch, Arnold and Meier, Michael. Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks. In Proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2020), 23-43, 2020. PDF
Ohm, Marc and Sykosch, Arnold and Meier, Michael. Towards detection of software supply chain attacks by forensic artifacts. In Proceedings of the 15th International Conference on Availability, Reliability and Security, 1-6, August 2020. PDF
Sykosch, Arnold and Doll, Christian and Wübbeling, Matthias and Meier, Michael. Generalizing the Phishing Principle: Analyzing User Behavior in Response to Controlled Stimuli for IT Security Awareness Assessment. In Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES), 08 2020. PDF
Vogel, Daniel and Akhmedjanov, Ulugbek and Ohm, Marc and Meier, Michael. An investigation on the feasibility of the bluetooth frequency hopping mechanism for the use as a covert channel technique. In Proceedings of the 15th International Conference on Availability, Reliability and Security, 70: 1-10, August 2020. PDF
Wendzel, Steffen and Lévy-Bencheton, Cédric and Caviglione, Luca. Not all Areas are Equal: Analysis of Citations in Information Security Research. Scientometrics, 122: 267-286, 11 2020.
2019
Doll, Christian and Sykosch, Arnold and Ohm, Marc and Meier, Michael. Automated Pattern Inference Based on Repeatedly Observed Malware Artifacts. In Proceedings of the 14th International Conference on Availability, Reliability and Security, 82, August 2019. PDFGonscherowski, Susan and Wübbeling, Matthias. #dataleak – Wie man Betroffene informiert. In Telemedicus Sommerkonferenz 2019: Über den Tellerrand, 2019.
Mazurczyk, Wojciech and Szary, Przemyslaw and Wendzel, Steffen and Caviglione, Luca. Towards Reversible Storage Network Covert Channels. In Proceedings of the 14th International Conference on Availability, Reliability and Security, 69:1-69:8, 2019. PDF
Ohm, Marc and Prahl-Kamps, Felix and Vogel, Daniel. The environmental impact of online advertisement. In Adjunct Proceedings of the 33rd edition of the EnviroInfo, 298-305, September 2019.
Schmidbauer, Tobias and Wendzel, Steffen and Mileva, Aleksandra and Mazurczyk, Wojciech. Introducing Dead Drops to Network Steganography Using ARP-Caches and SNMP-Walks. In Proceedings of the 14th International Conference on Availability, Reliability and Security, August 2019.
Vogel, Daniel and Rauschen, Daniel and Gläsel, Dennis. Susceptibility of LTE to Downlink Jamming. In 2019 International Conference on Military Communications and Information Systems (ICMCIS), 1-6, May 2019. PDF
Wendzel, Steffen. Protocol-independent Detection of "Messaging Ordering" Network Covert Channels. In Proceedings of the 14th International Conference on Availability, Reliability and Security, 63:1-63:8, August 2019. PDF
Wübbeling, Matthias. Prefix-Hijacking im Internetrouting - Monitoring, Analyse und Mitigation. 2019. PDF
2018
Cabaj, Krzysztof and Caviglione, Luca and Mazurczyk, Wojciech and Wendzel, Steffen and Woodward, Alan and Zander, Sebastian. The New Threats of Information Hiding: the Road Ahead. IEEE IT Professional, 20: 31-39, July 2018. PDFCaviglione, Luca and Mazurczyk, Wojciech and Wendzel, Steffen and Zander, Sebastian. Special Issue Editorial: Emerging and Unconventional: New Attacks and Innovative Detection Techniques. Security and Communication Networks (SCN), 1-7, July 2018. PDF
Susan Gonscherowski and Oliver Vettermann and Matthias Wübbeling and Timo Malderle. Datenkrake Leak-Checker - Lösung in Sicht?. digma (Zeitschrift für Datenrecht und Datensicherheit), June 2018.
Daniel Gruss and Michael Schwarz and Matthias Wübbeling and Simon Guggi and Timo Malderle and Stefan More and Moritz Lipp. Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security (ASIACCS '18), 297-311, 2018.
Keidel, Ralf and Wendzel, Steffen and Zillien, Sebastian and Conner, Eric S. and Haas, Georg. WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms. Journal of Universal Computer Science (J.UCS), 24: 556-576, July 2018. PDF
Malderle, Timo and Wübbeling, Matthias and Knauer, Sven and Meier, Michael. Langweg, Hanno and Meier, Michael and Witt, Bernhard C. and Reinhardt, Delphine (ed.) Ein Werkzeug zur automatisierten Analyse von Identitätsdaten-Leaks. In SICHERHEIT 2018, 43-54, 2018. PDF
Malderle, Timo and Wübbeling, Matthias and Knauer, Sven and Meier, Michael. Gathering and Analyzing Identity Leaks for a proactive Warning of affected Users (Short Paper). In Proceedings of the 15th ACM International Conference on Computing Frontiers, 208-211, 2018. PDF
Malderle, Timo and Wübbeling, Matthias and Knauer, Sven and Meier, Michael. Madureira A. and Abraham A. and Gandhi N. and Silva C. and Antunes M. (eds) (ed.) Warning of Affected Users About an Identity Leak. In Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018), 942: December 2018.
Malderle, Timo and Wübbeling, Matthias and Meier, Michael. Drews, Paul and Funk, Burkhardt and Niemeyer, Peter and Xie, Lin (ed.) Sammlung geleakter Identitätsdaten zur Vorbereitung proaktiver Opfer-Warnung. In Tagungsband Multikonferenz Wirtschaftsinformatik 2018, 4: 1381-1393, März 2018.
Mazurczyk, Wojciech and Wendzel, Steffen. Information Hiding -- Challenges for Forensic Experts. Communications of the ACM, 61: 86-94, July 2018. PDF
Mazurczyk, Wojciech and Wendzel, Steffen and Cabaj, Krzysztof. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. In ARES 2018, Proceedings of the 13th International Conference on Availability, Reliability and Security, 10:1-10:10, 2018. PDF
Sykosch, Arnold and Ohm, Marc and Meier, Michael. Hunting Observable Objects for Indication of Compromise. In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES), August 2018.
Wendzel, Steffen. Get Me Cited, Scotty! Analysis of Citations in Covert Channel/Steganography Research. In ARES 2018, Proceedings of the 13th International Conference on Availability, Reliability and Security, 13:1-13:8, 2018. PDF
Wendzel, Steffen. IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung. 2018. PDF
2017
Caviglione, Luca and Wendzel, Steffen and Mazurczyk, Wojciech. The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security and Privacy, 15: 12-17, July 2017. PDFKasem-Madani, Saffija and Meier, Michael and Wehner, Martin . Towards a Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization. 10436: 163-179, September 2017.
Lehner, Florian and Mazurczyk, Wojciech and Keller, Joerg and Wendzel, Steffen. Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach. In Proc. 42th IEEE Conference on Local Computer Networks (LCN), 78-85, July 2017. PDF
Mazurczyk, Wojciech and Caviglione, Luca and Wendzel, Steffen. Recent Advancements in Digital Forensics -- part one (Special Issue Introductory Article). IEEE Security and Privacy, 15: 10-11, July 2017. PDF
Spenger, Gabriele and Keler, Jörg and Wendzel, Steffen. Enhanced Ant Colony-inspired Parallel Algorithm to Improve Cryptographic PRNGs. Journal of Cyber Security and Mobility (JCSM), 6: 147-170, 2017. PDF
Steffen Wendzel and Wojciech Mazurczyk and Georg Haas. Steganography for Cyber-physical Systems. Journal of Cyber Security and Mobility (JCSM), 6: 105-126, 2017. PDF
Wendzel, Steffen and Tonejc, Jernej and Kaur, Jaspreet and Kobekova, Alexandra. Song, H. and Fink, G. and Jeschke, S. (ed.) Cyber Security of Smart Buildings. In Security and Privacy in Cyber-Physical Systems: Foundations and Applications, 327-352, July 2017. PDF
Wübbeling, Matthias and Meier, Michael. Reclaim Your Prefix: Mitigation of Prefix Hijacking Using IPSec Tunnels. In Proceedings of IEEE 42nd Conference on Local Computer Networks, 330 - 338, October 2017.
Wübbeling, Matthias and Sykosch, Arnold and Meier, Michael. Quantum suite - A look inside the NSA toolbox. In Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis. (Tagungsband zum 15. Deutschen IT-Sicherheitskongress), 239-254, May 2017.
2016
Meier, Michael and Reinhardt, Delphine and Wendzel, Steffen (editors) (ed.) Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). P-256: 5.-7. April 2016.Duessel, Patrick and Gehl, Christian and Flegel, Ulrich and Dietrich, Sven and Meier, Michael. Detecting Zero-Day Attacks Using Context-Aware Anomaly Detection At Application-Layer. International Journal of Information Security, July 2016.
Kasem-Madani, Saffija. A Framework Design for Privacy-Preserving Computation on Shared Data. March 2016.
Kasem-Madani, Saffija. A Framework for Privacy-Preservig Computation on Shared Data. March 2016.
Kasem-Madani, Saffija. GI Edition Proceedings (ed.) A Mechanism Design for Privacy-Preserving Computation on Shared Data. In Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, 2016.
Kaur, Jaspreet; Wendzel, Steffen and Eissa, Omar and Tonejc, Jernej and Meier, Michael. Covert Channel-internal Control Protocols: Attacks and Defense. Security and Communication Networks (SCN). Wiley, 9: 2986-2997, 2016. PDF
Mazurczyk, Wojciech and Amann, Philipp Caviglione, Luca and Wendzel, Steffen. CUIng: Criminal Use of Information Hiding Initiative. European CIIP Newsletter, 10: 31-32, 2016.
Naumann, Matthias and Wendzel, Steffen and Mazurczyk, Wojciech and Keller, Jörg. Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions. Security and Communication Networks (SCN), 9: 781-790, 2016.
Pohl, Christoph and Zugenmaier, Alf and Meier, Michael and Hof, Hans-Joachim. B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications. In ICT Systems Security and Privacy Protection, 455: 267-280, 2016.
Thomas, Georg and Duessel, Patrick and Meier, Michael. Ethical Issues of User Behavioral Analysis Through Machine Learning. In Proceedings of the European Security Conference 2016, June 2016.
Wendzel, Steffen. How to increase the security of smart buildings?. Communications of the ACM (CACM), 59: 47-49, 2016.
Wendzel, Steffen and Kasem-Madani, Saffija. IoT Security: The Improvement-Decelerating 'Cycle of Blame' (Short Paper). September 2016.
Wendzel, Steffen and Keller, Jörg (Eds.). Special Issue on Security, Privacy and Reliability of Smart Buildings. Journal of Universal Computer Science (J.UCS), 22: 1201-1202, Oktober 2016.
Wendzel, Steffen and Mazurczyk, Wojciech. POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 1739-1741, 2016. PDF
Wendzel, Steffen and Mazurczyk, Wojciech and Zander, Sebastian. A Unified Description Method for Network Information Hiding Methods. Journal of Universal Computer Science (J.UCS), 22: 1456-1486, Dezember 2016.
Wübbeling, Matthias and Meier, Michael. Improved Calculation of AS Resilience Against IP Prefix. In Proceedings of IEEE 41st Conference on Local Computer Networks Workshops, November 2016.
2015
Anhaus, Eva Marian and Wendzel, Steffen. BACtag - Data Leakage Protection für Gebäude. In Proc. D-A-CH Security 2015, 417-428, September 2015.Caviglione, Luca and Lalande, Jean-Francois and Mazurczyk, Wojciech and Wendzel, Steffen. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. In 3rd Int. Conf. Human Aspects of Information Security, Privacy and Trust (HAS), HCI International, Los Angeles, 9190: 165-177, 2015.
Christin, Delphine and Bub, Daniel M. and Moerov, Andrey and Kasem-Madani, Saffija. A Distributed Privacy-Preserving Mechanism for Mobile Urban Sensing Application. In Proceedings of the 10th IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 2015.
Kaur, Jaspreet and Herdin, Christian and Tonejc, Jernej and Wendzel, Steffen and Meier, Michael and Szlósarczyk, Sebastian. Novel Approaches for Security in Building Automation Systems. In 14. Sicherheitskongress des BSI, 145-158, 2015.
Kaur, Jaspreet and Tonejc, Jernej and Wendzel, Steffen and Meier, Michael. Securing Bacnet’s Pitfalls. In 30th International Information Security and Privacy Conference (IFIP SEC), 455: 616-629, 2015.
Kaur, Jaspreet and Wendzel, Steffen and Meier, Michael. Countermeasures for Covert Channel-internal Control Protocols. 4th Int. Workshop on Cyber Crime (IWCC) held together with the 10th ARES.. 422-428, 2015.
Naumann, Matthias and Wendzel, Steffen and Mazurczyk, Wojciech and Keller, Jörg. Micro protocol engineerin for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions. Security and Communication Networks (SCN), 2015.
Pohl, Christoph and Meier, Michael and Hof, Hans-Joachim. Apate - A Linux Kernel Module for High Interaction Honeypots. In Proceedings of the Ninth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), 133-138, August 2015.
Pohl, Christoph and Meier, Michael and Hof, Hans-Joachim. Apate A Linux Kernel Module for High Interaction Honeypots . In Proceedings of the Ninth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2015), 133-138, 2015.
Sykosch, Arnold and Wübbeling, Matthias. STIX 2 IDS. In Coordinating Attack Response at Internet Scale (CARIS) Workshop, June 2015.
Szczypierski, Krzysztopf and Janicki, Artur and Wendzel, Steffen. The Good, the bad, and the ugly: Evaluation of Wi-Fi Steganography. Journal of Communications, 10: 747-752, 2015.
Szczypiorski, Krzysztof and Janicki, Artur and Wendzel, Steffen. The Good, The Bad And The Ugly: Evaluation of Wi-Fi Steganography. Journal of Communications (JCM), 10: 747-752, 2015.
Tonejc, Jernej and Kaur, Jaspreet and Wendzel, Steffen. Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making. In 3rd Int. Conf. Human Aspects of Information Security, Privacy and Trust (HAS), HCI International, Los Angeles, 9190: 693-704, 2015.
Wendzel, Steffen and Palmer, Carolin. Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research. Journal of Universal Computer Science, 21: 1684-1705, 2015.
Wendzel, Steffen and Zander, Sebastian and Fechner, Bernhard and Herdin, Christian. Pattern-Based Survey and Categorization of Network Covert Channel Techniques. ACM Computing Surveys, 47: 501-5026, 2015.
Wojciech Mazurczyk, Wojciech and Wendzel, Steffen and Zander, Sebastian and Houmansadr, Amir and Szczypierski, Krzysztopf. Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications. 2015.
Wübbeling, Matthias. Linux Policy Routing zum sicheren Teilen von OpenVPN-Zugängen. IT-Administrator, 2015: October 2015.
Wübbeling, Matthias and Sykosch, Arnold and Meier, Michael. MonIKA: Cooperative IT Security Monitoring for Competing Participants. In Risiken kennen, Herausforderungen annehmen, Lösungen gestalten (Tagungsband zum 14. Deutschen IT-Sicherheitskongress), 427-438, May 2015.
Wübbeling, Matthias and Wendzel, Steffen. IT-Sicherheitsmonitoring. Sicherheitstechnischer Report -- Cyber Security Report 2015, 19-21, October 2015.
2014
Kaur, Jaspreet and Meier, Michael and Szlósarczyk, Sebastian and Wendzel, Steffen. A Cost-Efficient Building Automation Security Testbed for Educational Purposes. 2014.Kaur, Jaspreet and Meier, Michael and Szlósarczyk, Sebastian and Wendzel, Steffen. Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purpose, CSCUB. 2014.
Kiesling, Tobias and Motsch, Nils and Kaufmann, Helmut and Wübbeling, Matthias and Elsner, Till and Meier, Michael. Thoma, Klaus and Häring, Ivo and Leismann, Tobias (ed.) Collaborative Security Monitoring based on the MonIKA Framework for Privacy-Preserving Information Sharing. In Proceedings of 9th Future Security - Security Research Conference, 2014.
Mazurczyk, Wojciech and Wendzel, Steffen and Azagra Villares, Ignacio and Szczypiorski, Krzysztof. On Importance of Steganographic Cost For Network Steganography. Security and Communication Networks (SCN), 2014.
Sykosch, Arnold and Neff, René and Meier, Michael. Policy Driven Pseudonymination. Future Security, 9: 442-449, 2014.
Szlósarczyk, Sebastian and Wendzel, Steffen and Kaur, Jaspreet and Meier, Michael and Schubert, Frank. Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet. In Sicherheit 2014, 228: 407-418, 2014.
Wendzel, Steffen and Herdin, Christian and Wirth, Roman and Masoodian, Masood and Luz, Santonio and Kaur, Jaspreet. Mosaic-chart based Visualization in Building Automation Systems. In Proc. Future Security 2014, 687-690,, September 2014.
Wendzel, Steffen and Keller, Jörg. Hidden and Under Control: A Survey and Outlook on Covert Channel-internal Control Protocols. Annals of Telecommunications (ANTE), 69: 417-430, 2014.
Wendzel, Steffen and Keller, Jörg. IT-gestütztes Management und Controlling: Verdeckte Kanäle - eine zunehmende Gefahr für Unternehmensdaten. Controlling (Zeitschrift für erfolgsorientierte Unternehmenssteuerung), 26: 304-308, 2014.
Wendzel, Steffen and Mazurczyk, Wojciech and Caviglione, Luca and Meier, Michael. Hidden and Uncontrolled - On the Emergence of Network Steganography. In Information Security Solutions Europe ISSE’14, 123-133, 2014.
Wendzel, Steffen and Zwanger, Viviane and Meier, Michael and Szlósarczyk, Sebastian. Envisioning Smart Building Botnets. In Proceedings of the Seventh GI Conference on Sicherheit - Schutz und Zuverlässigkeit}, 228: 319-329, 2014.
Wendzel, Steffen and Zwanger, Viviane and Meier, Michael and Szlósarczyk, Sebastian. Envisioning Smart Building Botnets. In Sicherheit 2014, 228: 319-329, 2014.
Wübbeling, Matthias. Improved Routing Anomaly Detection to Protect End Users. In Proceedings of the Ninth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), SR-2014-0: 2014.
Wübbeling, Matthias and Elsner, Till and Meier, Michael. Brangetto, P. and Maybaum, M. and Stinissen, J. (ed.) Inter-AS Routing Anomalies: Improved Detection and Classification. In Proceedings of 6th International Conference on Cyber Conflict, June 2014.
Wübbeling, Matthias and Meier, Michael. Utilization of Traceroutes to Improve Cooperative Detection of Internet Routing Anomalies. In Proceedings of 9th Future Security - Security Research Conference, September 2014.
Zwanger, Viviane and Gerhards-Padilla, Elmar and Meier, Michael. Codescanner: Detecting (Hidden) x86/64 Code in Arbitrary Files. In MALWARE 2014, 118-127, October 2014.
2013
Elsner, Till and Sykosch, Arnold and Wübbeling, Matthias. Kooperatives Monitoring zum Schutz kritischer Infrastrukturen. Sonderheft AFCEA 2013, 2013.Kahler, B. and Wendzel, Steffen. How to own a Building? Wardriving gegen die Gebäudeautomation. In 20. DFN Workshop „Sicherheit in vernetzten Systemen“, H1-H13, 2013.
Lalande, Jean-Francois and Wendzel, Steffen. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In ECTCM Workshop, 701-710, 2013.
Roos, Philipp and Schumacher, Philipp and Elsner, Till and Meier, Michael and Wübbeling, Matthias. Rechtliche Betrachtung von Desinfektionsmaßnahmen zur Botnetzbekämpfung durch Internet-Service-Provider (in German). In Informationssicherheit stärken -- Vertrauen in die Zukunft schaffen (Tagungsband zum 13. Deutschen IT-Sicherheitskongress), 37-53, 2013.
Wendzel, Steffen. Novel Approaches for Network Covert Storage Channels. 2013.
Wübbeling, Matthias. Visibility of Routing Anomalies for End Users. In Proceedings of the Eight GI SIGSIDAR Graduate Workshop on Reactive Security (SPRING), Technical Report SR-2013-01: 2013.
2012
Aschenbruck, Nils and Martini, Peter and Meier, Michael and Tölle, Jens (editors) (ed.) Future Security - 7th Security Research Conference, Future Security 2012. 318: 4.-6. September 2012.Apel, Martin and Meier, Michael. Generalizing Behavioral Signatures for Detecting Unknown Malware Variants and Early Warning. Praxis der Informationsverarbeitung und Kommunikation, 1: 17-24, April 2012.
Backs, Peter and Wendzel, Steffen and Keller, Jörg. Dynamic Routing in Covert Channel Overlays Based on Control Protocols. In Proc. International Workshop on Information Security, Theory and Practice (ISTP-2012), 32-39, 2012.
Flegel, Ulrich and Meier, Michael. Modeling and Describing Misuse Scenarios Using Signature-Nets and Event Description Language. it - Information Technology, 2: 71-81, April 2012.
Rist, Thomas and Wendzel, Steffen and Masoodian, Masood and André, Elisabeth. Next-Generation Home Automation Systems. In Technik für Menschen im nächsten Jahrzehnt. Beiträge zum Usability Day X, 80-87, 2012.
Wendzel, Steffen. The Problem of Traffic Normalization Within a Covert Channel’s Network Environment Learning Phase. In Proc. Sicherheit’12, P-195: 149-161, 2012.
Wendzel, Steffen. (ed.) Tunnel und verdeckte Kanäle im Netz. 2012.
Wendzel, Steffen and Kahler, Benjamin and Rist, Thomas. Covert Channels and their Prevention in Building Automation Protocols - A Prototype Exemplified Using BACnet. In Proc. 2nd Workshop on Security of Systems and Software Resiliency, 731-736, 2012.
Wendzel, Steffen and Keller, Jörg. Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels. In Proc. 7th International Conference on Internet Monitoring and Protection (ICIMP 2012), 1-6, 2012.
Wendzel, Steffen and Keller, Jörg. Preventing Protocol Switching Covert Channels. International Journal On Advances in Security, 5: 81-93, 2012.
Wendzel, Steffen and Keller, Jörg. Systematic Engineering of Control Protocols for Covert Channels. In Proc. 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS 2012), 7394: 131-144, 2012.
Wendzel, Steffen and Zander, Sebastian. Detecting Protocol Switching Covert Channels. In Proc. 37th IEEE Conference on Local Computer Networks (LCN), 280-283, 2012.
2011
Meyer, Matthias and Meier, Michael. SEODisc: Analyse SEO vergifteter Suchmaschinenergebnisse. In 12. Deutschen IT-Sicherheitskongress, 375-387, 2011.Rist, Thomas and Wendzel, Steffen and Masoodian, Masood and Monigatti, Paul and André, Elisabeth. Creating Awareness for Efficient Energy Use in Smart Homes. In Intelligent Wohnen. Zusammenfassung der Beiträge zum Usability Day IX, 162-168, 2011.
Wendzel, Steffen and Keller, Jörg. Low-attention forwarding for mobile network covert channels. In Proc. Communications and Multimedia Security, 7025: 122-133, 2011.
2010
Apel, Martin and Biskup, Joachim and Flegel, Ulrich and Meier, Michael. Early Warning System on a National Level - Project AMSEL. In Proceedings of the European Workshop on Internet Early Warning and Network Intelligence (EWNI 2010), 2010.Apel, Martin and Biskup, Joachim and Flegel, Ulrich and Meier, Michael. Towards Early Warning Systems - Challenges, Technologies and Architecture . In Post-Proceedings of the 4th International Workshop on Critical Information Infrastructures Security (CRITIS2009), 6027: 151-164, 2010.
Apel, Martin and Meier, Michael. Clustering Malware for Generating Behavioral Signatures. In Proceedings of the Fifth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), SR-2010-01: 2010.
Büscher, Armin and Meier, Michael and Benzmüller, Ralf. Throwing a MonkeyWrench into Web Attackers Plans. In Proceedings of the 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2010), 6109: 28-39, 2010.
Flegel, Ulrich and Hoffmann, Johannes and Meier, Michael. Cooperation enablement for centralistic early warning systems. In Proceedings of the 25th International ACM Symposium on Applied Computing (SAC 2010), 2001-2008, 2010.
Uellenbeck, Sebastian and Meier, Michael. Verwaltung von Signaturen für Malware-Gruppen. In In Proceedings of the Fifth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), SR-2010-01: 2010.
2009
Apel, Martin and Bockermann, Christian and Meier, Michael. Measuring Similarity of Malware Behavior. In Proceedings of the 34th IEEE Conference on Local Computer Networks (LCN): IEEE Computer Society, 891-898, 2009.Blichmann, Christian and Dullien, Thomas and Meier, Michael. Automatisierte Signaturgenerierung für Malware-Stämme. In Proceedings of D-A-CH Security 2009, 361-372, 2009.
Bockermann, Christian and Apel, Martin and Meier, Michael. Learning SQL for Database Intrusion Detection using Context-Sensitive Modelling. In Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA2009), 5587: 196-205, 2009.
Büscher, Armin and Meier, Michael and Benzmüller, Ralf. MonkeyWrench - Bösartige Webseiten in die Zange genommen. In Sichere Wege in der vernetzten Welt - Tagungsband zum 11. Deutschen IT-Sicherheitskongress, 459-472, 2009.
Wendzel, Steffen. Protokollwechsel zur Realisierung von Covert Channels und Header-Strukturveränderungen zur Vermeidung von Covert Channels. January 2009.
2008
Biskup, Joachim and Hämmerli, Bernhard and Meier, Michael and Schmerl, Sebastian and Tölle, Jens and Vogel, Michael. Early Warning Systems. In Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 08102: 2008.Schmerl, Sebastian and König, Hartmut and Flegel, Ulrich and Meier, Michael and Rietz, Rene. Systematic Signature Engineering by Re-use of Snort Signatures. In Proceedings of the 24th International Annual Computer Security Applications Conference (ACSAC 2008), 23-32, 2008.
Wendzel, Steffen. Protocol channels as a new design alternative of covert channels. CoRR, abs/0809.1949: 1-2, 2008.
2007
Flegel, Ulrich and Meier, Michael. Authorization Architectures for Privacy-respecting Surveillance. In Proceedings of the Fourth European PKI Workshop: Theory and Practice (EuroPKI 2007), 4582: 1-17, 2007.Meier, Michael. Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmuster (in German). 2007.
Meier, Michael and Flegel, Ulrich and Schmerl, Sebastian. Efficiency Issues of Rete-based Expert Systems for Misuse Detection. In Proceedings of the 23rd International Annual Computer Security Applications Conference (ACSAC 2007), 151-160, 2007.
2006
Flegel, Ulrich and Meier, Michael. Herausforderungen für eine effektive, effiziente und datenschutzgerechte IT-Frühwarnung. In Proceedings of the BSI Workshop on ÏT-Frühwarnsysteme: Bundesamt für Sicherheit in der Informationstechnik, 39-42, 2006.Schmerl, Sebastian and Flegel, Ulrich and Meier, Michael. Vereinfachung der Signaturentwicklung durch Wiederverwendung. In Proceedings of the Third GI Conference on Sicherheit - Schutz und Zuverlässigkeit}, 77: 201-212, 2006.
Schmerl, Sebastian and König, Hartmut and Flegel, Ulrich and Meier, Michael. Simplifying Signature Derivation by Reuse. In Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS 2006), 3995: 436-450, 2006.
2005
Flegel, Ulrich and Hansen, Marit and Meier, Michael. Special Issue on Incident Management. Datenschutz und Datensicherheit, 29: July 2005.Meier, Michael and Schmerl, Sebastian. Effiziente Analyseverfahren für Intrusion-Detection-Systeme. In Proceedings of the 2nd GI Conference on “Sicherheit - Schutz und Zuverlässigkeit”, 62: 209-220, 2005.
Meier, Michael and Schmerl, Sebastian and König, Hartmut. Improving the Efficiency of Misuse Detection. In Proceedings of the Second Conference on Detection of Intrusions & Malware and Vulnerability Assessment (DIMVA2005), 3548: 188-205, 2005.
2004
Flegel, Ulrich and Meier, Michael. Proceedings of the International GI Workshop on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2004). 46: 2004.Meier, Michael. A Model for the Semantics of Attack Signatures in Misuse Detection Systems. In Proceedings of the 7th International Information Security Conference (ISC 2004), 3225: 158-169, 2004.
Meier, Michael and Flegel, Ulrich and König, Hartmut. Special Issue on Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment. 27: 186-187, December 2004.
2003
Holz, Thomas and Meier, Michael and König, Hartmut. High-Efficient Intrusion Detection Infrastructure. In Security, E-Learning, E-Services. Proceedings of the 17th DFN-Arbeitstagung über Kommunikationsnetze, 44: 217-232, 2003.2002
Holz, Thomas and Meier, Michael and König, Hartmut. An Efficient Intrusion Detection System Design. In Proceedings of the 2nd Information Security for South Africa Conference, 2002.Holz, Thomas and Meier, Michael and König, Hartmut. Bausteine für effiziente Intrusion Detection Systeme. Praxis der Informationsverarbeitung und Kommunikation - PIK, 25: 144-157, 2002.
Holz, Thomas and Meier, Michael and König, Hartmut. High-Efficient Intrusion Detection Infrastructure. In Proceedings of the NATO Symposium “Real Time Intrusion Detection”, RTO-MP-101: 2002.
Meier, Michael and Bischof, Niels and Holz, Thomas. SHEDEL - A Simple Hierarchical Event Description Language for Specifying Attack Signatures. In Proceedings of the 17th IFIP TC11 International Conference on Information Security (SEC), 214: 559-571, 2002.