Publikationen


    2023

    Ohm, Marc and Stuke, Charlene. SoK: Practical Detection of Software Supply Chain Attacks. In Proceedings of the 18th International Conference on Availability, Reliability and Security, 1-11, August/September 2023.  PDF

    Ohm, Marc and Taufenbach, Lars and Weber, Karsten and Pohl, Timo. Power Consumption of Common Symmetric Encryption Algorithms on Low-Cost Microchips. In Proceedings of the 37th Edition of the EnviroInfo, October 2023.  PDF

    Pohl, Timo and Ohm, Marc. Measuring Resource Efficiency of LaTeX Paper Templates. In Proceedings of the 37rd Edition of the EnviroInfo, October 2023.  PDF

    Swierzy, Ben and Krämer, Markus and Vogel, Daniel and Meyer, Daniel and Meier, Michael. Analyzing the Feasibility of Privacy-Respecting Automated Tracking of Devices Fleeing a Burglary. In 2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 452-459, 2023.  PDF

    Viola, Felix and Vogel, Daniel. Wilfried Honekamp und Johannes Fähndrich (Hrsg.) (ed.) Passives Tracking von mobilen Wi-Fi Geräten durch Fingerprinting von Probe Requests. 133-144, March 2023.  PDF

    Vogel, Daniel and Krämer, Markus and Swierzy, Ben and Meyer, Daniel and Meier, Michael. On the Feasibility of Detecting Non-Cooperative Wi-Fi Devices via a Single Wi-Fi-Router. In WiP Proceedings of the Thirteenth International Conference on Indoor Positioning and Indoor Navigation - Work-in-Progress Papers (IPIN-WiP 2023), September 2023.  PDF


    2022

    Malderle, Timo and Boes, Felix and Muuss, Gina and Wübbeling, Matthias and Meier, Michael. Furnell, S. and Mori, P. and Weippl, E. and Camp, O. (ed.) Credential Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity Theft. In Communications in Computer and Information Science, 1545: 115-138, Febuary 2022.  PDF

    Ohm, Marc and Boes, Felix and Bungartz, Christian and Meier, Michael. On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages. In ARES 2022: Proceedings of the 17th International Conference on Availability, Reliability and Security, 1-10, August 2022.  PDF

    Ohm, Marc and Kempf, Lukas and Boes, Felix and Meier, Michael. Towards Detection of Malicious Software Packages Through Code Reuse by Malevolent Actors. In GI Sicherheit 2022, April 2022.

    Vogel, Daniel and Krämer, Markus. Collecting Identifying Data for Re-Identification of Mobile Devices carried at a Crime Scene using Wi-Fi Routers. INFORMATIK 2022, 2022.  PDF


    2021

    Greis, Jakob and Yushchenko, Artem and Vogel, Daniel and Meier, Michael and Steinhage, Volker. Automated Identification of Vulnerable Devices in Networks using Traffic Data and Deep Learning. February 2021.  PDF

    Pohl, Timo and Sykosch, Arnold. Benutzerfreundliche Schutzmechanismen gegen USB-basierte Angriffe unter Linux. 17. Deutscher IT-Sicherheitskongress, 17: Februar 2021.


    2020

    Kasem-Madani, Saffija and Malderle, Timo and Boes, Felix and Meier, Michael. Privacy-Preserving Warning Management for an Identity Leakage Warning Network. In EICC 2020: Proceedings of the European Interdisciplinary Cybersecurity Conference, Article No.: 4, pp 1–6, November 2020.  PDF

    Kasem-Madani, Saffija and Meier, Michael. Gritzalis, S. and Weippl, E. R. and Kotsis, G. and Tjoa, A. M. and Khalil, I. (ed.) Utility Requirement Description for Utility-Preserving and Privacy-Respecting Data Pseudonymization. In Lecture Notes in Computer Science, 12395: 2020.

    Malderle, Timo and Knauer, Sven and Lang, Martin and Wübbeling, Matthias and Meier, Michael. Track Down Identity Leaks using Threat Intelligence. In Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,, 96-106, 2020.  PDF

    Malderle, Timo and Meier, Michael and Wübbeling, Matthias. Wer kennt mein Passwort? - Ein Frühwarndienst für Identitätsdatendiebstahl an Hochschulen. DFN Mitteilungen - Ausgabe 97, August 2020.  PDF

    Malderle, Timo and Wübbeling, Matthias and Meier, Michael. Effektive Warnung bei Identitätsdatendiebstahl an Hochschulen. In 27. DFN-Konferenz 2020 "Sicherheit in vernetzten Systemen", Februar 2020.  PDF

    Ohm, Marc and Plate, Henrik and Sykosch, Arnold and Meier, Michael. Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks. In Proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2020), 23-43, 2020.  PDF

    Ohm, Marc and Sykosch, Arnold and Meier, Michael. Towards detection of software supply chain attacks by forensic artifacts. In Proceedings of the 15th International Conference on Availability, Reliability and Security, 1-6, August 2020.  PDF

    Sykosch, Arnold and Doll, Christian and Wübbeling, Matthias and Meier, Michael. Generalizing the Phishing Principle: Analyzing User Behavior in Response to Controlled Stimuli for IT Security Awareness Assessment. In Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES), 08 2020.  PDF

    Vogel, Daniel and Akhmedjanov, Ulugbek and Ohm, Marc and Meier, Michael. An investigation on the feasibility of the bluetooth frequency hopping mechanism for the use as a covert channel technique. In Proceedings of the 15th International Conference on Availability, Reliability and Security, 70: 1-10, August 2020.  PDF

    Wendzel, Steffen and Lévy-Bencheton, Cédric and Caviglione, Luca. Not all Areas are Equal: Analysis of Citations in Information Security Research. Scientometrics, 122: 267-286, 11 2020.


    2019

    Doll, Christian and Sykosch, Arnold and Ohm, Marc and Meier, Michael. Automated Pattern Inference Based on Repeatedly Observed Malware Artifacts. In Proceedings of the 14th International Conference on Availability, Reliability and Security, 82, August 2019.  PDF

    Gonscherowski, Susan and Wübbeling, Matthias. #dataleak – Wie man Betroffene informiert. In Telemedicus Sommerkonferenz 2019: Über den Tellerrand, 2019.

    Mazurczyk, Wojciech and Szary, Przemyslaw and Wendzel, Steffen and Caviglione, Luca. Towards Reversible Storage Network Covert Channels. In Proceedings of the 14th International Conference on Availability, Reliability and Security, 69:1-69:8, 2019.  PDF

    Ohm, Marc and Prahl-Kamps, Felix and Vogel, Daniel. The environmental impact of online advertisement. In Adjunct Proceedings of the 33rd edition of the EnviroInfo, 298-305, September 2019.

    Schmidbauer, Tobias and Wendzel, Steffen and Mileva, Aleksandra and Mazurczyk, Wojciech. Introducing Dead Drops to Network Steganography Using ARP-Caches and SNMP-Walks. In Proceedings of the 14th International Conference on Availability, Reliability and Security, August 2019.

    Vogel, Daniel and Rauschen, Daniel and Gläsel, Dennis. Susceptibility of LTE to Downlink Jamming. In 2019 International Conference on Military Communications and Information Systems (ICMCIS), 1-6, May 2019.  PDF

    Wendzel, Steffen. Protocol-independent Detection of "Messaging Ordering" Network Covert Channels. In Proceedings of the 14th International Conference on Availability, Reliability and Security, 63:1-63:8, August 2019.  PDF

    Wübbeling, Matthias. Prefix-Hijacking im Internetrouting - Monitoring, Analyse und Mitigation. 2019.  PDF


    2018

    Cabaj, Krzysztof and Caviglione, Luca and Mazurczyk, Wojciech and Wendzel, Steffen and Woodward, Alan and Zander, Sebastian. The New Threats of Information Hiding: the Road Ahead. IEEE IT Professional, 20: 31-39, July 2018.  PDF

    Caviglione, Luca and Mazurczyk, Wojciech and Wendzel, Steffen and Zander, Sebastian. Special Issue Editorial: Emerging and Unconventional: New Attacks and Innovative Detection Techniques. Security and Communication Networks (SCN), 1-7, July 2018.  PDF

    Susan Gonscherowski and Oliver Vettermann and Matthias Wübbeling and Timo Malderle. Datenkrake Leak-Checker - Lösung in Sicht?. digma (Zeitschrift für Datenrecht und Datensicherheit), June 2018.

    Daniel Gruss and Michael Schwarz and Matthias Wübbeling and Simon Guggi and Timo Malderle and Stefan More and Moritz Lipp. Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security (ASIACCS '18), 297-311, 2018.

    Keidel, Ralf and Wendzel, Steffen and Zillien, Sebastian and Conner, Eric S. and Haas, Georg. WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms. Journal of Universal Computer Science (J.UCS), 24: 556-576, July 2018.  PDF

    Malderle, Timo and Wübbeling, Matthias and Knauer, Sven and Meier, Michael. Langweg, Hanno and Meier, Michael and Witt, Bernhard C. and Reinhardt, Delphine (ed.) Ein Werkzeug zur automatisierten Analyse von Identitätsdaten-Leaks. In SICHERHEIT 2018, 43-54, 2018.  PDF

    Malderle, Timo and Wübbeling, Matthias and Knauer, Sven and Meier, Michael. Gathering and Analyzing Identity Leaks for a proactive Warning of affected Users (Short Paper). In Proceedings of the 15th ACM International Conference on Computing Frontiers, 208-211, 2018.  PDF

    Malderle, Timo and Wübbeling, Matthias and Knauer, Sven and Meier, Michael. Madureira A. and Abraham A. and Gandhi N. and Silva C. and Antunes M. (eds) (ed.) Warning of Affected Users About an Identity Leak. In Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018), 942: December 2018.

    Malderle, Timo and Wübbeling, Matthias and Meier, Michael. Drews, Paul and Funk, Burkhardt and Niemeyer, Peter and Xie, Lin (ed.) Sammlung geleakter Identitätsdaten zur Vorbereitung proaktiver Opfer-Warnung. In Tagungsband Multikonferenz Wirtschaftsinformatik 2018, 4: 1381-1393, März 2018.

    Mazurczyk, Wojciech and Wendzel, Steffen. Information Hiding -- Challenges for Forensic Experts. Communications of the ACM, 61: 86-94, July 2018.  PDF

    Mazurczyk, Wojciech and Wendzel, Steffen and Cabaj, Krzysztof. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. In ARES 2018, Proceedings of the 13th International Conference on Availability, Reliability and Security, 10:1-10:10, 2018.  PDF

    Sykosch, Arnold and Ohm, Marc and Meier, Michael. Hunting Observable Objects for Indication of Compromise. In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES), August 2018.

    Wendzel, Steffen. Get Me Cited, Scotty! Analysis of Citations in Covert Channel/Steganography Research. In ARES 2018, Proceedings of the 13th International Conference on Availability, Reliability and Security, 13:1-13:8, 2018.  PDF

    Wendzel, Steffen. IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung. 2018.  PDF


    2017

    Caviglione, Luca and Wendzel, Steffen and Mazurczyk, Wojciech. The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security and Privacy, 15: 12-17, July 2017.  PDF

    Kasem-Madani, Saffija and Meier, Michael and Wehner, Martin . Towards a Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization. 10436: 163-179, September 2017.

    Lehner, Florian and Mazurczyk, Wojciech and Keller, Joerg and Wendzel, Steffen. Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach. In Proc. 42th IEEE Conference on Local Computer Networks (LCN), 78-85, July 2017.  PDF

    Mazurczyk, Wojciech and Caviglione, Luca and Wendzel, Steffen. Recent Advancements in Digital Forensics -- part one (Special Issue Introductory Article). IEEE Security and Privacy, 15: 10-11, July 2017.  PDF

    Spenger, Gabriele and Keler, Jörg and Wendzel, Steffen. Enhanced Ant Colony-inspired Parallel Algorithm to Improve Cryptographic PRNGs. Journal of Cyber Security and Mobility (JCSM), 6: 147-170, 2017.  PDF

    Steffen Wendzel and Wojciech Mazurczyk and Georg Haas. Steganography for Cyber-physical Systems. Journal of Cyber Security and Mobility (JCSM), 6: 105-126, 2017.  PDF

    Wendzel, Steffen and Tonejc, Jernej and Kaur, Jaspreet and Kobekova, Alexandra. Song, H. and Fink, G. and Jeschke, S. (ed.) Cyber Security of Smart Buildings. In Security and Privacy in Cyber-Physical Systems: Foundations and Applications, 327-352, July 2017.  PDF

    Wübbeling, Matthias and Meier, Michael. Reclaim Your Prefix: Mitigation of Prefix Hijacking Using IPSec Tunnels. In Proceedings of IEEE 42nd Conference on Local Computer Networks, 330 - 338, October 2017.

    Wübbeling, Matthias and Sykosch, Arnold and Meier, Michael. Quantum suite - A look inside the NSA toolbox. In Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis. (Tagungsband zum 15. Deutschen IT-Sicherheitskongress), 239-254, May 2017.


    2016

    Duessel, Patrick and Gehl, Christian and Flegel, Ulrich and Dietrich, Sven and Meier, Michael. Detecting Zero-Day Attacks Using Context-Aware Anomaly Detection At Application-Layer. International Journal of Information Security, July 2016.

    Kasem-Madani, Saffija. A Framework Design for Privacy-Preserving Computation on Shared Data. March 2016.

    Kasem-Madani, Saffija. A Framework for Privacy-Preservig Computation on Shared Data. March 2016.

    Kasem-Madani, Saffija. GI Edition Proceedings (ed.) A Mechanism Design for Privacy-Preserving Computation on Shared Data. In Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, 2016.

    Kaur, Jaspreet; Wendzel, Steffen and Eissa, Omar and Tonejc, Jernej and Meier, Michael. Covert Channel-internal Control Protocols: Attacks and Defense. Security and Communication Networks (SCN). Wiley, 9: 2986-2997, 2016.  PDF

    Mazurczyk, Wojciech and Amann, Philipp Caviglione, Luca and Wendzel, Steffen. CUIng: Criminal Use of Information Hiding Initiative. European CIIP Newsletter, 10: 31-32, 2016.

    Naumann, Matthias and Wendzel, Steffen and Mazurczyk, Wojciech and Keller, Jörg. Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions. Security and Communication Networks (SCN), 9: 781-790, 2016.

    Pohl, Christoph and Zugenmaier, Alf and Meier, Michael and Hof, Hans-Joachim. B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications. In ICT Systems Security and Privacy Protection, 455: 267-280, 2016.

    Thomas, Georg and Duessel, Patrick and Meier, Michael. Ethical Issues of User Behavioral Analysis Through Machine Learning. In Proceedings of the European Security Conference 2016, June 2016.

    Wendzel, Steffen. How to increase the security of smart buildings?. Communications of the ACM (CACM), 59: 47-49, 2016.

    Wendzel, Steffen and Kasem-Madani, Saffija. IoT Security: The Improvement-Decelerating 'Cycle of Blame' (Short Paper). September 2016.

    Wendzel, Steffen and Keller, Jörg (Eds.). Special Issue on Security, Privacy and Reliability of Smart Buildings. Journal of Universal Computer Science (J.UCS), 22: 1201-1202, Oktober 2016.

    Wendzel, Steffen and Mazurczyk, Wojciech. POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 1739-1741, 2016.  PDF

    Wendzel, Steffen and Mazurczyk, Wojciech and Zander, Sebastian. A Unified Description Method for Network Information Hiding Methods. Journal of Universal Computer Science (J.UCS), 22: 1456-1486, Dezember 2016.

    Wübbeling, Matthias and Meier, Michael. Improved Calculation of AS Resilience Against IP Prefix. In Proceedings of IEEE 41st Conference on Local Computer Networks Workshops, November 2016.

    Meier, Michael and Reinhardt, Delphine and Wendzel, Steffen (editors) (ed.) Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). P-256: 5.-7. April 2016.


    2015

    Anhaus, Eva Marian and Wendzel, Steffen. BACtag - Data Leakage Protection für Gebäude. In Proc. D-A-CH Security 2015, 417-428, September 2015.

    Caviglione, Luca and Lalande, Jean-Francois and Mazurczyk, Wojciech and Wendzel, Steffen. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. In 3rd Int. Conf. Human Aspects of Information Security, Privacy and Trust (HAS), HCI International, Los Angeles, 9190: 165-177, 2015.

    Christin, Delphine and Bub, Daniel M. and Moerov, Andrey and Kasem-Madani, Saffija. A Distributed Privacy-Preserving Mechanism for Mobile Urban Sensing Application. In Proceedings of the 10th IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 2015.

    Kaur, Jaspreet and Herdin, Christian and Tonejc, Jernej and Wendzel, Steffen and Meier, Michael and Szlósarczyk, Sebastian. Novel Approaches for Security in Building Automation Systems. In 14. Sicherheitskongress des BSI, 145-158, 2015.

    Kaur, Jaspreet and Tonejc, Jernej and Wendzel, Steffen and Meier, Michael. Securing Bacnet’s Pitfalls. In 30th International Information Security and Privacy Conference (IFIP SEC), 455: 616-629, 2015.

    Kaur, Jaspreet and Wendzel, Steffen and Meier, Michael. Countermeasures for Covert Channel-internal Control Protocols. 4th Int. Workshop on Cyber Crime (IWCC) held together with the 10th ARES.. 422-428, 2015.

    Naumann, Matthias and Wendzel, Steffen and Mazurczyk, Wojciech and Keller, Jörg. Micro protocol engineerin for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions. Security and Communication Networks (SCN), 2015.

    Pohl, Christoph and Meier, Michael and Hof, Hans-Joachim. Apate - A Linux Kernel Module for High Interaction Honeypots. In Proceedings of the Ninth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), 133-138, August 2015.

    Pohl, Christoph and Meier, Michael and Hof, Hans-Joachim. Apate A Linux Kernel Module for High Interaction Honeypots . In Proceedings of the Ninth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2015), 133-138, 2015.

    Sykosch, Arnold and Wübbeling, Matthias. STIX 2 IDS. In Coordinating Attack Response at Internet Scale (CARIS) Workshop, June 2015.

    Szczypierski, Krzysztopf and Janicki, Artur and Wendzel, Steffen. The Good, the bad, and the ugly: Evaluation of Wi-Fi Steganography. Journal of Communications, 10: 747-752, 2015.

    Szczypiorski, Krzysztof and Janicki, Artur and Wendzel, Steffen. The Good, The Bad And The Ugly: Evaluation of Wi-Fi Steganography. Journal of Communications (JCM), 10: 747-752, 2015.

    Tonejc, Jernej and Kaur, Jaspreet and Wendzel, Steffen. Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making. In 3rd Int. Conf. Human Aspects of Information Security, Privacy and Trust (HAS), HCI International, Los Angeles, 9190: 693-704, 2015.

    Wendzel, Steffen and Palmer, Carolin. Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research. Journal of Universal Computer Science, 21: 1684-1705, 2015.

    Wendzel, Steffen and Zander, Sebastian and Fechner, Bernhard and Herdin, Christian. Pattern-Based Survey and Categorization of Network Covert Channel Techniques. ACM Computing Surveys, 47: 501-5026, 2015.

    Wojciech Mazurczyk, Wojciech and Wendzel, Steffen and Zander, Sebastian and Houmansadr, Amir and Szczypierski, Krzysztopf. Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications. 2015.

    Wübbeling, Matthias. Linux Policy Routing zum sicheren Teilen von OpenVPN-Zugängen. IT-Administrator, 2015: October 2015.

    Wübbeling, Matthias and Sykosch, Arnold and Meier, Michael. MonIKA: Cooperative IT Security Monitoring for Competing Participants. In Risiken kennen, Herausforderungen annehmen, Lösungen gestalten (Tagungsband zum 14. Deutschen IT-Sicherheitskongress), 427-438, May 2015.

    Wübbeling, Matthias and Wendzel, Steffen. IT-Sicherheitsmonitoring. Sicherheitstechnischer Report -- Cyber Security Report 2015, 19-21, October 2015.


    2014

    Kaur, Jaspreet and Meier, Michael and Szlósarczyk, Sebastian and Wendzel, Steffen. A Cost-Efficient Building Automation Security Testbed for Educational Purposes. 2014.

    Kaur, Jaspreet and Meier, Michael and Szlósarczyk, Sebastian and Wendzel, Steffen. Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purpose, CSCUB. 2014.

    Kiesling, Tobias and Motsch, Nils and Kaufmann, Helmut and Wübbeling, Matthias and Elsner, Till and Meier, Michael. Thoma, Klaus and Häring, Ivo and Leismann, Tobias (ed.) Collaborative Security Monitoring based on the MonIKA Framework for Privacy-Preserving Information Sharing. In Proceedings of 9th Future Security - Security Research Conference, 2014.

    Mazurczyk, Wojciech and Wendzel, Steffen and Azagra Villares, Ignacio and Szczypiorski, Krzysztof. On Importance of Steganographic Cost For Network Steganography. Security and Communication Networks (SCN), 2014.

    Sykosch, Arnold and Neff, René and Meier, Michael. Policy Driven Pseudonymination. Future Security, 9: 442-449, 2014.

    Szlósarczyk, Sebastian and Wendzel, Steffen and Kaur, Jaspreet and Meier, Michael and Schubert, Frank. Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet. In Sicherheit 2014, 228: 407-418, 2014.

    Wendzel, Steffen and Herdin, Christian and Wirth, Roman and Masoodian, Masood and Luz, Santonio and Kaur, Jaspreet. Mosaic-chart based Visualization in Building Automation Systems. In Proc. Future Security 2014, 687-690,, September 2014.

    Wendzel, Steffen and Keller, Jörg. Hidden and Under Control: A Survey and Outlook on Covert Channel-internal Control Protocols. Annals of Telecommunications (ANTE), 69: 417-430, 2014.

    Wendzel, Steffen and Keller, Jörg. IT-gestütztes Management und Controlling: Verdeckte Kanäle - eine zunehmende Gefahr für Unternehmensdaten. Controlling (Zeitschrift für erfolgsorientierte Unternehmenssteuerung), 26: 304-308, 2014.

    Wendzel, Steffen and Mazurczyk, Wojciech and Caviglione, Luca and Meier, Michael. Hidden and Uncontrolled - On the Emergence of Network Steganography. In Information Security Solutions Europe ISSE’14, 123-133, 2014.

    Wendzel, Steffen and Zwanger, Viviane and Meier, Michael and Szlósarczyk, Sebastian. Envisioning Smart Building Botnets. In Proceedings of the Seventh GI Conference on Sicherheit - Schutz und Zuverlässigkeit}, 228: 319-329, 2014.

    Wendzel, Steffen and Zwanger, Viviane and Meier, Michael and Szlósarczyk, Sebastian. Envisioning Smart Building Botnets. In Sicherheit 2014, 228: 319-329, 2014.

    Wübbeling, Matthias. Improved Routing Anomaly Detection to Protect End Users. In Proceedings of the Ninth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), SR-2014-0: 2014.

    Wübbeling, Matthias and Elsner, Till and Meier, Michael. Brangetto, P. and Maybaum, M. and Stinissen, J. (ed.) Inter-AS Routing Anomalies: Improved Detection and Classification. In Proceedings of 6th International Conference on Cyber Conflict, June 2014.

    Wübbeling, Matthias and Meier, Michael. Utilization of Traceroutes to Improve Cooperative Detection of Internet Routing Anomalies. In Proceedings of 9th Future Security - Security Research Conference, September 2014.

    Zwanger, Viviane and Gerhards-Padilla, Elmar and Meier, Michael. Codescanner: Detecting (Hidden) x86/64 Code in Arbitrary Files. In MALWARE 2014, 118-127, October 2014.


    2013

    Elsner, Till and Sykosch, Arnold and Wübbeling, Matthias. Kooperatives Monitoring zum Schutz kritischer Infrastrukturen. Sonderheft AFCEA 2013, 2013.

    Kahler, B. and Wendzel, Steffen. How to own a Building? Wardriving gegen die Gebäudeautomation. In 20. DFN Workshop „Sicherheit in vernetzten Systemen“, H1-H13, 2013.

    Lalande, Jean-Francois and Wendzel, Steffen. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In ECTCM Workshop, 701-710, 2013.

    Roos, Philipp and Schumacher, Philipp and Elsner, Till and Meier, Michael and Wübbeling, Matthias. Rechtliche Betrachtung von Desinfektionsmaßnahmen zur Botnetzbekämpfung durch Internet-Service-Provider (in German). In Informationssicherheit stärken -- Vertrauen in die Zukunft schaffen (Tagungsband zum 13. Deutschen IT-Sicherheitskongress), 37-53, 2013.

    Wendzel, Steffen. Novel Approaches for Network Covert Storage Channels. 2013.

    Wübbeling, Matthias. Visibility of Routing Anomalies for End Users. In Proceedings of the Eight GI SIGSIDAR Graduate Workshop on Reactive Security (SPRING), Technical Report SR-2013-01: 2013.


    2012

    Apel, Martin and Meier, Michael. Generalizing Behavioral Signatures for Detecting Unknown Malware Variants and Early Warning. Praxis der Informationsverarbeitung und Kommunikation, 1: 17-24, April 2012.

    Backs, Peter and Wendzel, Steffen and Keller, Jörg. Dynamic Routing in Covert Channel Overlays Based on Control Protocols. In Proc. International Workshop on Information Security, Theory and Practice (ISTP-2012), 32-39, 2012.

    Flegel, Ulrich and Meier, Michael. Modeling and Describing Misuse Scenarios Using Signature-Nets and Event Description Language. it - Information Technology, 2: 71-81, April 2012.

    Rist, Thomas and Wendzel, Steffen and Masoodian, Masood and André, Elisabeth. Next-Generation Home Automation Systems. In Technik für Menschen im nächsten Jahrzehnt. Beiträge zum Usability Day X, 80-87, 2012.

    Wendzel, Steffen. The Problem of Traffic Normalization Within a Covert Channel’s Network Environment Learning Phase. In Proc. Sicherheit’12, P-195: 149-161, 2012.

    Wendzel, Steffen. (ed.) Tunnel und verdeckte Kanäle im Netz. 2012.

    Wendzel, Steffen and Kahler, Benjamin and Rist, Thomas. Covert Channels and their Prevention in Building Automation Protocols - A Prototype Exemplified Using BACnet. In Proc. 2nd Workshop on Security of Systems and Software Resiliency, 731-736, 2012.

    Wendzel, Steffen and Keller, Jörg. Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels. In Proc. 7th International Conference on Internet Monitoring and Protection (ICIMP 2012), 1-6, 2012.

    Wendzel, Steffen and Keller, Jörg. Preventing Protocol Switching Covert Channels. International Journal On Advances in Security, 5: 81-93, 2012.

    Wendzel, Steffen and Keller, Jörg. Systematic Engineering of Control Protocols for Covert Channels. In Proc. 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS 2012), 7394: 131-144, 2012.

    Wendzel, Steffen and Zander, Sebastian. Detecting Protocol Switching Covert Channels. In Proc. 37th IEEE Conference on Local Computer Networks (LCN), 280-283, 2012.

    Aschenbruck, Nils and Martini, Peter and Meier, Michael and Tölle, Jens (editors) (ed.) Future Security - 7th Security Research Conference, Future Security 2012. 318: 4.-6. September 2012.


    2011

    Meyer, Matthias and Meier, Michael. SEODisc: Analyse SEO vergifteter Suchmaschinenergebnisse. In 12. Deutschen IT-Sicherheitskongress, 375-387, 2011.

    Rist, Thomas and Wendzel, Steffen and Masoodian, Masood and Monigatti, Paul and André, Elisabeth. Creating Awareness for Efficient Energy Use in Smart Homes. In Intelligent Wohnen. Zusammenfassung der Beiträge zum Usability Day IX, 162-168, 2011.

    Wendzel, Steffen and Keller, Jörg. Low-attention forwarding for mobile network covert channels. In Proc. Communications and Multimedia Security, 7025: 122-133, 2011.


    2010

    Apel, Martin and Biskup, Joachim and Flegel, Ulrich and Meier, Michael. Early Warning System on a National Level - Project AMSEL. In Proceedings of the European Workshop on Internet Early Warning and Network Intelligence (EWNI 2010), 2010.

    Apel, Martin and Biskup, Joachim and Flegel, Ulrich and Meier, Michael. Towards Early Warning Systems - Challenges, Technologies and Architecture . In Post-Proceedings of the 4th International Workshop on Critical Information Infrastructures Security (CRITIS2009), 6027: 151-164, 2010.

    Apel, Martin and Meier, Michael. Clustering Malware for Generating Behavioral Signatures. In Proceedings of the Fifth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), SR-2010-01: 2010.

    Büscher, Armin and Meier, Michael and Benzmüller, Ralf. Throwing a MonkeyWrench into Web Attackers Plans. In Proceedings of the 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2010), 6109: 28-39, 2010.

    Flegel, Ulrich and Hoffmann, Johannes and Meier, Michael. Cooperation enablement for centralistic early warning systems. In Proceedings of the 25th International ACM Symposium on Applied Computing (SAC 2010), 2001-2008, 2010.

    Uellenbeck, Sebastian and Meier, Michael. Verwaltung von Signaturen für Malware-Gruppen. In In Proceedings of the Fifth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), SR-2010-01: 2010.


    2009

    Apel, Martin and Bockermann, Christian and Meier, Michael. Measuring Similarity of Malware Behavior. In Proceedings of the 34th IEEE Conference on Local Computer Networks (LCN): IEEE Computer Society, 891-898, 2009.

    Blichmann, Christian and Dullien, Thomas and Meier, Michael. Automatisierte Signaturgenerierung für Malware-Stämme. In Proceedings of D-A-CH Security 2009, 361-372, 2009.

    Bockermann, Christian and Apel, Martin and Meier, Michael. Learning SQL for Database Intrusion Detection using Context-Sensitive Modelling. In Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA2009), 5587: 196-205, 2009.

    Büscher, Armin and Meier, Michael and Benzmüller, Ralf. MonkeyWrench - Bösartige Webseiten in die Zange genommen. In Sichere Wege in der vernetzten Welt - Tagungsband zum 11. Deutschen IT-Sicherheitskongress, 459-472, 2009.

    Wendzel, Steffen. Protokollwechsel zur Realisierung von Covert Channels und Header-Strukturveränderungen zur Vermeidung von Covert Channels. January 2009.


    2008

    Biskup, Joachim and Hämmerli, Bernhard and Meier, Michael and Schmerl, Sebastian and Tölle, Jens and Vogel, Michael. Early Warning Systems. In Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 08102: 2008.

    Schmerl, Sebastian and König, Hartmut and Flegel, Ulrich and Meier, Michael and Rietz, Rene. Systematic Signature Engineering by Re-use of Snort Signatures. In Proceedings of the 24th International Annual Computer Security Applications Conference (ACSAC 2008), 23-32, 2008.

    Wendzel, Steffen. Protocol channels as a new design alternative of covert channels. CoRR, abs/0809.1949: 1-2, 2008.


    2007

    Flegel, Ulrich and Meier, Michael. Authorization Architectures for Privacy-respecting Surveillance. In Proceedings of the Fourth European PKI Workshop: Theory and Practice (EuroPKI 2007), 4582: 1-17, 2007.

    Meier, Michael. Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmuster (in German). 2007.

    Meier, Michael and Flegel, Ulrich and Schmerl, Sebastian. Efficiency Issues of Rete-based Expert Systems for Misuse Detection. In Proceedings of the 23rd International Annual Computer Security Applications Conference (ACSAC 2007), 151-160, 2007.


    2006

    Flegel, Ulrich and Meier, Michael. Herausforderungen für eine effektive, effiziente und datenschutzgerechte IT-Frühwarnung. In Proceedings of the BSI Workshop on ÏT-Frühwarnsysteme: Bundesamt für Sicherheit in der Informationstechnik, 39-42, 2006.

    Schmerl, Sebastian and Flegel, Ulrich and Meier, Michael. Vereinfachung der Signaturentwicklung durch Wiederverwendung. In Proceedings of the Third GI Conference on Sicherheit - Schutz und Zuverlässigkeit}, 77: 201-212, 2006.

    Schmerl, Sebastian and König, Hartmut and Flegel, Ulrich and Meier, Michael. Simplifying Signature Derivation by Reuse. In Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS 2006), 3995: 436-450, 2006.


    2005

    Flegel, Ulrich and Hansen, Marit and Meier, Michael. Special Issue on Incident Management. Datenschutz und Datensicherheit, 29: July 2005.

    Meier, Michael and Schmerl, Sebastian. Effiziente Analyseverfahren für Intrusion-Detection-Systeme. In Proceedings of the 2nd GI Conference on “Sicherheit - Schutz und Zuverlässigkeit”, 62: 209-220, 2005.

    Meier, Michael and Schmerl, Sebastian and König, Hartmut. Improving the Efficiency of Misuse Detection. In Proceedings of the Second Conference on Detection of Intrusions & Malware and Vulnerability Assessment (DIMVA2005), 3548: 188-205, 2005.


    2004

    Flegel, Ulrich and Meier, Michael. Proceedings of the International GI Workshop on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2004). 46: 2004.

    Meier, Michael. A Model for the Semantics of Attack Signatures in Misuse Detection Systems. In Proceedings of the 7th International Information Security Conference (ISC 2004), 3225: 158-169, 2004.

    Meier, Michael and Flegel, Ulrich and König, Hartmut. Special Issue on Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment. 27: 186-187, December 2004.


    2003

    Holz, Thomas and Meier, Michael and König, Hartmut. High-Efficient Intrusion Detection Infrastructure. In Security, E-Learning, E-Services. Proceedings of the 17th DFN-Arbeitstagung über Kommunikationsnetze, 44: 217-232, 2003.


    2002

    Holz, Thomas and Meier, Michael and König, Hartmut. An Efficient Intrusion Detection System Design. In Proceedings of the 2nd Information Security for South Africa Conference, 2002.

    Holz, Thomas and Meier, Michael and König, Hartmut. Bausteine für effiziente Intrusion Detection Systeme. Praxis der Informationsverarbeitung und Kommunikation - PIK, 25: 144-157, 2002.

    Holz, Thomas and Meier, Michael and König, Hartmut. High-Efficient Intrusion Detection Infrastructure. In Proceedings of the NATO Symposium “Real Time Intrusion Detection”, RTO-MP-101: 2002.

    Meier, Michael and Bischof, Niels and Holz, Thomas. SHEDEL - A Simple Hierarchical Event Description Language for Specifying Attack Signatures. In Proceedings of the 17th IFIP TC11 International Conference on Information Security (SEC), 214: 559-571, 2002.


    2000

    Meier, Michael and Holz, Thomas. Sicheres Schlüsselmanagement für verteilte Intrusion-Detection-Systeme. In Proceedings of Arbeitstagung Systemsicherheit, 275-286, 2000.