șÚÁÏŽ«ËÍĂĆ

About

Steffen Wendzel is the Chair of the Institute of Information Resource Management (IRM / OMI) and Director of the kiz (university library and computing center). He received his habilitation (2020) and PhD (Dr. rer. nat., 2013) from the University of Hagen, Germany. Earlier, he was a lecturer (Privatdoz.) at the Faculty of Mathematics and Computer Science of the University of Hagen, Germany, a professor and director of the Center for Technology and Transfer (ZTT) at Hochschule Worms, and PostDoc at the Dep. Cyber Security, Fraunhofer FKIE, Bonn.

Current Roles:

  • since 2024: Chair of the Institute of Information Resource Management (OMI)
  • since 2024: Director of the Library and Computing Center (kiz), Ulm University
  • since 2026: Scientific Spokesperson of BelWĂŒ
  • since 2024: Member: Working Group of the Scientific Computing Center Directors Baden-WĂŒrttemberg (ALWR)
  • since 2024: Member: Working Group of the Library Directors Baden-Württemberg (AG BibDir)
  • since 2025: Project lead: State-level High-performance Computing Project (jointly with Prof. M. Frank, KIT)
  • since 2025: Member: consultative group for bwInfoSec
  • since 2024: Member: Senatsausschuss Lehre, UniversitĂ€t Ulm
  • since 2024: Member: Lenkungsausschuss des Projekts Campusportal zur EinfĂŒhrung von HISinOne, Ulm University
  • since 2025: DFN Representative for Ulm University
  • since 2025: ZKI Representative for Ulm University

Selected Past Roles:

  • 2017-2023 (re-elected 2020): Member: EURASIP Special Area Team (SAT) on Biometrics, Data Forensics, and Security (BForSec)
  • 2015-2024: Member: Europol EC3: Criminal Use of Information Hiding (CUIng) Initiative
  • 2014-2016: Member: Arbeitskreis kritische Informations- und Kommunikationsinfrastrukturen (AK KRITIS) GI SIG Management fĂŒr Informationssicherheit, SECMGT
  • 2013-2015: Member: EU NIS Public-Private Platform Working Group 3 on Secure ICT research and innovation; Leading the AoI (Area of Interest) on Trustworthy (Hyperconnected) Infrastructures

Research

Core research topics:

  • Internet censorship (measurement and censorship circumvention)
  • Network information hiding (network covert channels)

Publications

150.
, Schmidbauer T, , Keller J. DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data. IEEE Transactions on Dependable and Secure Computing (TDSC). 2025; 22(1):614-631.             
149.
, KrĂ€tzer C, Dittmann J, Caviglione L, Mileva A, Schmidbauer T, Vielhauer C, Zander S. Combining Different Existing Methods for Describing Steganography Hiding Methods. In: Coppens, Bart and Volckaert, Bruno and Naessens, Vincent and De Sutter, Bjorn, editors. Availability, Reliability and Security. Cham: Springer Nature Switzerland; 2025. p. 271—289.
148.
Petrov D, Ruffing P, , . Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences. In: Dalla Preda, Mila and Schrittwieser, Sebastian and Naessens, Vincent and De Sutter, Bjorn, editors. Availability, Reliability and Security. Cham: Springer Nature Switzerland; 2025. p. 118—140.
147.
Schoffit J, Pietzschmann L, , Eisermann D, , Kargl F. Enhancing client security in zero trust architectures: a device-agent policy enforcement point for compartmentalized network management. In: Koldehofe, Boris and Klingler, Florian and Sommer, Christoph and Hummel, Karin Anna and Amthor, Peter, editors. Proc. International Conference on Networked Systems 2025 (NetSys 2025). Ilmenau: ilmedia; 2025. p. 29—32.             
146.
, Mileva A, Franqueira VNL, Jaatun MG. Editorial: Fighting Cybersecurity Risks from a Multidisciplinary Perspective. Journal of Universal Computer Science (J.UCS). 2024; 30(9):1137—1139.             
145.
, Plötner J. Linux. Der Grundkurs. 2 ed. Rheinwerk Verlag; 2024.      
144.
, Wressnegger C, Hartmann L, Freiling F, Armknecht F, Reinfelder L. Sicherheit 2024 — BeitrĂ€ge der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft fĂŒr Informatik e.V. (GI). Gesellschaft fĂŒr Informatik e.V. (GI); 2024.      
143.
Schymiczek J, Schmidbauer T, . A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM; 2024.             
142.
Strachanski F, Petrov D, Schmidbauer T, . A Comprehensive Pattern-based Overview of Stegomalware. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM; 2024.             
141.
Dittmann J, KrĂ€tzer C, Kiltz S, Altschaffel R, Vielhauer C, , Wefel S, Nitsch H. Attribution von verdeckten (Informations-)KanĂ€len im Bereich kritischer Infrastrukturen und Potentiale fĂŒr PrĂ€vention und Reaktion (ATTRIBUT). In: GI Sicherheit 2024 — Sicherheit, Schutz und ZuverlĂ€ssigkeit. Gesellschaft fĂŒr Informatik e.V. (GI); 2024. p. 265—268.             

Open Theses and Projects

9.
Censorship Resistant Scientific Repository [Master]. 2025 Jul..     [File] 
8.
Erweiterung bestehender Tunneling-Software fĂŒr den Einsatz in Experimentalumgebungen [Bachelor]. 2025.
7.
Exponat Internetzensur [Bachelor]. 2025.
6.
Fuzzing for Censorship Circumvention [Bachelor/Master]. 2025.
5.
Minimierung der False-positives bei der Messung von Internetzensur ĂŒber DNS, HTTP(S) und TLS [Bachelor/Master]. 2025.
4.
Platzreservierung Bibliothek [Bachelor]. 2025.
3.
Umsetzung einer KI-Chatbotinfrastruktur fĂŒr das kiz der UniversitĂ€t Ulm [Bachelor]. 2025.     [File] 
2.
Covert Channel Amplification for Censorship Circumvention [Bachelor/Master]. 2024.
1.
Evaluation of Tor Obfuscation Extensions [Bachelor/Master]. 2024.

Activities

Steering Committee Memberships:

see above

Other Memberships:

  • German Informatics Society (Gesellschaft fĂŒr Informatik), incl. (, et al.), since 2008
  • ACM
  • Deutscher Hochschulverband (DHV)

Nominations/Scholarships:

  • Elected Domain Expert, , 2024.
  • Nominated for Akademiepreis des Landes Rheinland-Pfalz (2019 and 2022).
  • Featured Reviewer (ACM Computing Reviews), October 2018.
  • Youngest German professor at a University of Applied Sciences (of all professors registered at hlb), September 2018.
  • DAAD Scholarship for Academic Talks: Murdoch University, Perth, Australia, February 2016.
  • Best Paper Award at the International Workshop on Cyber Crime (IWCC 2015) for the paper: J. Kaur, S. Wendzel, M. Meier: Countermeasures for Covert Channel-internal Control Protocols, IEEE, 2015.
  • Best Paper Award at the The Seventh International Conference on Internet Monitoring and Protection (ICIMP’12), Stuttgart, 2012 for the paper: S. Wendzel, J. Keller: Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels, 2012.

Research Abroad:

  • 4/2023: Visiting colleagues at Technical University of Warsaw, Warsaw, Poland (host: Prof. Dr. Wojciech Mazurczyk).
  • 3/2023: Visiting colleagues at °ä±đČÔłÙ°ùČč±ô±đł§łÜ±èĂ©±ô±đłŠ, Rennes, France (host: Prof. Dr. Jean-Francois Lalande).
  • 11-12/2022: Visiting researcher at Institute for Applied Mathematics and Information Technologies (IMATI), CNR, Genova, Italy (host: Dr. Luca Caviglione).
  • 02/2016: Visiting colleagues at the Murdoch University, Perth, Australia (host: Dr. Sebastian Zander).
  • 2013, 2014, 2015: several longer stays in Brussels, Belgium, for Fraunhofer Brussels as part of EU-related activities.
  • 10/2013: Visiting colleagues at the Warsaw University of Technology, Poland (host: Prof. Dr. Wojciech Mazurczyk).
  • 12/2011-01/2012: guest researcher at the University of Waikato, New Zealand, for the 2nd time for six weeks via project IT4SE (host: Dr. Masood Masoodian)
  • 12/2010-01/2011: guest researcher at the University of Waikato, New Zealand, for six weeks via project IT4SE (host: Dr. Masood Masoodian)

Advisory Board/Editorial Board Memberships

  • Member of Editorial Board of the (J.UCS)
  • Member of the Editorial Board of the Journal of Cyber Security and Mobility (JCSM)

Journal Special Issues as Guest Editor

  • Journal of Universal Computer Science (J.UCS) special issue , 2023/2024, together with Aleksandra Mileva, Virginia N. L. Franqueira, and Martin Gilje Jaatun.
  • IEEE Security & Privacy (S&P) special issue on , 2022, together with Luca Caviglione, Aleksandra Mileva and Simon Vrhovec.
  • Future Generation Computer Systems (FGCS) special issue on , 2022, together with Luca Caviglione, Amir Houmansadr and Wojciech Mazurczyk.
  • it – Information Technology (ITIT) special issue on , 2022, together with Luca Caviglione, Aleksandra Mileva, Jean-Francois Lalande and Wojciech Mazurczyk.
  • Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) special issue on Multidisciplinary Solutions to Modern Cybersecurity Challenges, 2021, together with Luca Caviglione, Aleksandra Mileva and Simon Vrhovec.
  • Journal of Universal Computer Science (J.UCS) special issue on Information Security Methodology, Replication Studies and Information Security Education, 2020, together with Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-Francois Lalande and Wojciech Mazurczyk.
  • IEEE Transactions on Industrial Informatics (TII) special section on Cyber-Physical Security in Industrial Environments, 2019, together with Zhihan Lv, Wojciech Mazurczyk and Houbing Song.
  • IEEE Security & Privacy special issue on , together with W. Mazurczyk, L. Caviglione and S. Garfinkel, 2019.
  • Security and Communication Networks (SCN) special issue , 2018, together with Luca Caviglione, Wojciech Mazurczyk and Sebastian Zander.
  • IEEE S&P Magazine special issue on , together with W. Mazurczyk, L. Caviglione and S. Garfinkel, 2017.
  • Journal of Universal Computer Science (J.UCS) special issue on , together with J. Keller, 2016.

Conference and Workshop Organization

  • Chair:
    • 13th (SICHERHEIT 2024), Worms, DE, 2024.
    • 4th International Workshop on Information Security Methodology and Replication Studies (IWSMR), co-located with ARES 2022, Vienna, AT.
    • 3rd International Workshop on Information Security Methodology and Replication Studies (IWSMR), co-located with ARES 2021, Vienna, AT.
    • 2nd International Workshop on Information Security Methodology and Replication Studies (IWSMR), co-located with ARES 2020, Dublin, IR.
    • International Workshop on Information Security Methodology and Replication Studies (IWSMR) (IWSMR 2019), held in conjunction with ARES’19 in Canterbury, UK.
    • International Workshop on Security, Privacy and Reliability of Smart Buildings (SmartBuildingSec’16), Bonn, 2016.
  • (PC) Co-chair:
    • Program Co-chair of (EICC), 2026, Darmstadt, DE.
    • Program Co-chair of (EICC), 2023, Stavanger, NO.
    • Program Co-chair of (EICC, former Central European Cybersecurity Conference, CECC) (also workshop co-chair), 2020, Rennes, FR.
    • Program Co-chair of , Bonn, 2016.
    • Co-chair of 8th SPRING graduate workshop on reactive security of the GI SIG SIDAR, Munich University of Applied Sciences, 2013
  • Session Organizer:
    • IH&MMSec’24 Special Session on Stego Malware: Attribution, Analysis and Detection (together with Claus Vielhauer), Baiona, Spain, 2024.
    • Session on High Performance Mission Critical System Development at HPCS 2019 in Dublin.
    • Session on “Emerging threats of Criminal Use of Information Hiding: Usage Scenarios and Detection Approaches” at 16th International Workshop on Digital Forensics and Watermarking (IWDW2017), Magdeburg, 2017
    • Session on “Human Aspects of Information Security, Privacy, and Trust for Smart Buildings” as well as member of the program board of Human Aspects of Information Security, Privacy and Trust (HAS) Conference @HCII 2015, Los Angeles, 2015
  • Organizer:
    • CAST-e.V.-Workshop zum Thema “Sicherheit von Smart Buildings”, Darmstadt, 2017.
    • Industry workshop “Sicherheit in Smart Buildings”, Fraunhofer inHaus-Zentrum, Duisburg, 2015.
    • 1st, 2nd, 3rd, 4th and 5th Building Automation Reliable Infrastructure (BARNI) Workshop, Fraunhofer FKIE, 2014-2015.

Journal Reviews (Selection):

IEEE Communications Magazine, IEEE Network Magazine, IEEE Open Journal of the Communications Society (OJ-COMS), IEEE Transactions on Information Forensics and Security (TIFS), IEEE Spectrum magazine (Spectrum), IEEE Security and Privacy Magazine, IEEE Internet of Things Journal, IEEE Signal Processing Letters, IEEE Transactions on Cognitive Communications and Networking (TCCN), IEEE Transactions on Dependable and Secure Computing (TDSC), IEEE Transactions on Industrial Informatics, IEEE Transactions on Education, IEEE IT Professional Journal, ACM Computing Reviews, Journal of Universal Computer Science (JUCS), Elsevier Computers & Security, Elsevier Computer Standards & Interfaces, Elsevier Applied Soft Computing, Elsevier Journal of Information Security & Applications, Elsevier Information Sciences, Elsevier International Journal of Intelligent Networks, Springer Annals of Telecommunications - Annales des Télécommunications (ANTE), Springer Journal of Hardware and Systems Security, Springer Multimedia Systems Journal (MMSJ), Wiley Security and Communication Networks (SCN), Journal of Cyber Security and Mobility (JCSM), Int. Journal on Advances in Security, IET Information Security, International Journal of Computer Systems Science and Engineering, Journal of Homeland Security and Emergency Management, Informatica Journal (Slovenian Society Informatika), Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science, etc. pp.

(Technical) Program Committee Memberships:

  • Selected Conferences:
    • ACSAC: ACSAC'26, ACSAC’25, ACSAC’24
    • ATC (Advanced and Trusted Computing): ATC’21, ATC’19
    • EICC (European Interdisciplinary Cybersecurity Conference, former Central European Cybersecurity Conference): (co-chair '26), EICC’25, EICC’24, (pc co-chair ‘23), EICC’22, EICC’21, (pc co-chair ‘20), CECC’19, CECC’18, CECC’17 (initial event)
    • ESORICS: ESORICS'26
    • HAS (Human Aspects of Information Security, Privacy and Trust): HAS’17, HAS’16, HAS’15
    • IFIP SEC: SEC’17, SEC’16, SEC’15
    • NSS: NSS’23, NSS’22, NSS’21, NSS’19, NSS’18, NSS’17
    • SICHERHEIT: Sicherheit'26, (chair Sicherheit’24), Sicherheit’22, Sicherheit’20, Sicherheit’18, (co-chair Sicherheit’16), Sicherheit’14.
    • CAST/GI Promotionspreis IT-Sicherheit: 2025, 2024, (rejected invitation in 2023), 2022
  • Selected Workshops:
    • CUING @ ARES (Criminal Use of Information Hiding): CUING'26, CUING’25, CUING’24, CUING’23, CUING’22, CUING’21, CUING’20, CUING’19, CUING’18, CUING’17 (initial event)
    • IWCC @ ARES (International Workshop on Cyber Crime): IWCC’25, IWCC’24, IWCC’23, IWCC’22, IWCC’21, IWCC’20, IWCC’19, IWCC’18, IWCC’17, IWCC’16, IWCC’15, IWCC’14
    • WTMC @ Euro S&P (Workshop on Traffic Measurement and Cybersecurity): WTMC’25, WTMC’24, WTMC’23, WTMC’21,
  • Other PC Memberships (Selection): Cyber Science'26, CyFRP’25, 4th GI/ITG KuVS FachgesprĂ€ch “Network Softwarization” (2025), EUSIPCO’23, ACISP’20, EUSIPCO’19, IoT-SECFOR’19, IWDW’18, BioStar’18, D-A-CH Security’18, PerEnergy’17, AINA’17, D-A-CH Security’17, BigDAISy’17, BioStar’17, IEACon’16, PerEnergy’16, BioStar’16, D-A-CH Security’16, GLOBECOM’15, PerEnergy’15, BCSN’15, ICIMP’13, ISTP’13
  • Invited reviews for: RAID’19, IECON’18, DIMVA’15, ICC’14
  • 
 and several special issue PC memberships for journals.

Reviews for Funding Proposals:

  • Innovationsförderagentur NRW/Forschungszentrum JĂŒlich: NEXT.IN.NRW programme
  • Norges forskningsrĂ„d (Norwegian Research Society)

Reviews for books:

  • ACM Computing Reviews: multiple book reviews over the years (these appear in my list of publications as they are published reviews), since 2017
  • WILEY-IEEE Scientific: book proposal review, 2013
  • Galileo Press book review: Arnold Willemer: Linux-Server einrichten und administrieren mit Debian 6 GNU/Linux, 2011
  • Galileo Press book review: Dirk Becker: OpenVPN. Das Praxisbuch, 2008
  • Galileo Press book review: Thomas Theis: Einstieg in PHP5, 2006
  • Galileo Press book review: Sascha Kersken: Handbuch fĂŒr Fachinformatiker; reviewed chapter on IT security, 2005

Talks

  1. Keynote: Wie das Internet zensiert wird – Perspektiven fĂŒr Forschung, Rechenzentren, Bibliotheken und Gesellschaft, SPRING Workshop, University of Heidelberg, Heidelberg, DE, 2025-04-21.
  2. Wie funktioniert Zensur im Internet?, ZAWiW, studium generale, University of Ulm, Ulm, DE, 2025-11-03.
  3. Detection of Network Information Hiding Artifacts – A Case for HPC?, 11th bwHPC Symposium, University of TĂŒbingen, TĂŒbingen, DE, 2025-09-23.
  4. Describing Steganography Hiding Methods by Combining Pre-Existing Methodology, ARES CUING Workshop, Ghent, BE, 2025-08-12.
  5. Guest Lecture on Internet Censorship, University of Maribor, Faculty of Criminal Justice and Security, online, 2025-05-09.
  6. Internetzensur – ein Einblick, Lange Nacht der Bibliotheken, kiz-Bibliothekszentrale der UniversitĂ€t Ulm, Ulm, DE, 2025-04-04.
  7. History Covert Channels, GI FG NetSec, online, 2024-11-28.
  8. A Comprehensive Pattern-based Overview of Stegomalware, ARES CUING Workshop, Vienna, AT, 2024-07-31.
  9. History Covert Channels and Covert Channel Amplification, IH&MMSec Rump Session Talk, Baiona, ES, 2024-06-24.
  10. Neue Entwicklungen im Bereich der Steganographie und der Umgehung von Internetzensur, Forschungsseminar LG PV/VLSI, FernUniversitÀt in Hagen, Hagen, 2024-04-24.
  11. Recent Developments in Network Information Hiding, EURASIP Webinar, online, 2023-10-19.
  12. Herausforderungen an die IT-Sicherheit in der GebĂ€udeautomation, VDI Arbeitskreis Bauen und GebĂ€udetechnik: Technische AusrĂŒstung, online, 2023-08-08.
  13. Penetration-Testing mit Linux, Linux-Presentation-Day (LPD) 2023.1, Hochschule Worms, Worms, DE, 2023-05-26.
  14. Obfuskierte und versteckte Datenkommunikation: SubdomÀnen und Forschungstrends, Cyberagentur, online, DE, 2023-04-05.
  15. Obfuscation and Concealment Methods for Network Traffic, °ä±đČÔłÙ°ùČč±ô±đł§łÜ±èĂ©±ô±đłŠ, Rennes, FR, 2023-03-30.
  16. Inaugural lecture: Gemeinsamkeiten und neue AnsÀtze von Obfuskations- und Versteckmethoden in Netzwerken, FernUniversitÀt in Hagen, Hagen, DE, 2023-02-13.
  17. 20 Jahre im Schnelldurchlauf: ein Linux-Handbuch im Wandel der Zeit, Linux-Presentation-Day (LPD) 2022, Hochschule Worms, Worms, DE, 2022-11-18.
  18. Keynote: Describing Steganography Hiding Methods with a Unified Taxonomy, ARES CUING Workshop, Vienna, AT, 2022-08-24.
  19. IT-Sicherheit fĂŒr automatisierte GebĂ€ude: ein Überblick, VDI Fachtagung GebĂ€udeautomation – intelligent und nachhaltig, Baden-Baden, DE, 2022-06-29.
  20. Steganography Hiding Patterns: A Brief Review, EICC’22 DETONATOR Workshop, online, 2022-06-15/16.
  21. Untersuchung des Gender-gaps bei Cybersecurity-Publikationen, GI Sicherheit 2022, Karlsruhe, DE, 2022-04-06.
  22. A Revised Taxonomy of Steganography Embedding Patterns, ARES’21 CUING Workshop, online, 2021-08-18.
  23. Keynote: Novel Approaches for Network Steganography Countermeasures, ZiTiS Forschungsseminar, online, 2021-07-13.
  24. BePI: Fast and Memory Efficient Method for Billion-scale Random Walk with Restart, Talk in front of Habilitation Commission, Department of Mathematics and Computer Science, University of Hagen, DE, 2020-11-02.
  25. Realisierung von Prozessen in Betriebssystem-Kerneln, Talk in front of Habilitation Commission, Department of Mathematics and Computer Science, University of Hagen, DE, 2020-09-21.
  26. Recent Advances in Network Steganography Detection, DeepIntel Conference, Vienna, AT, 2019-11-27.
  27. Anomalieerkennung fĂŒr Smart Buildings, 2. Forum zum Erfahrungsaustausch in der GebĂ€udeautomation, BImA, Berlin, DE, 2019-11-26.
  28. Protocol-independent Detection of Covert Channels Using the ‘Size Modulation’ Pattern, ARES’19 CUING Workshop, Canterbury, UK, 2019-08-27.
  29. Smart Buildings – Herausforderungen an die IT-Sicherheit, Stuttgarter Sicherheitskonferenz, Stuttgart, 2019-07-15.
  30. Data leakage and covert data exfiltration: The new threat of network information hiding, Smart Rail World Conference, Munich, 2019-06-18.
  31. Taxonomie und wissenschaftliche Methodik fĂŒr das Gebiet Network Information Hiding, FernUniversitĂ€t in Hagen (FakultĂ€tskolloquium Mathematik & Informatik), Hagen, 2019-05-27.
  32. IT-Sicherheit automatisierter GebÀude im IoT, Auvesy-Konferenz, Karlsruhe, 2019-05-16.
  33. Network Covert Channel Patterns: Current State and Methodology, University of Bonn (Oberseminar Inst. f. Informatik IV), 2019-01-16.
  34. Detection of covert channels in TCP retransmissions, 23rd Nordic Conference on Secure IT Systems (NordSec), Oslo, NO, 2018-11-29.
  35. IT-Sicherheit und das Internet der Dinge, VHS Böblingen-Sindelfingen e.V., online webinar, 2018-11-19.
  36. One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels, Central European Cybersecurity Conference (CECC), Ljubljana, SI, 2018-11-15.
  37. Get me cited, Scotty! Analyzing Citations in Covert Channel/Steganography Research, ARES’18 CUING Workshop, Hamburg, DE, 2018-08-28.
  38. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach, ARES’18 CUING Workshop, Hamburg, DE, 2018-08-28.
  39. Network Information Hiding, COINS PhD Summer School 2018 (full-day class), Metochi, Lesvos, GR, 2018-07-28.
  40. IoT-Sicherheit fĂŒr die GA-Industrie, VDMA, Frankfurt, 2018-05-02.
  41. Steganography Ante Portas, Hack-in-the-Box (HITB), Amsterdam, NL, 2018-04-12.
  42. IoT-Sicherheit – was ist neu und was ist wichtig?, TĂŒv-SĂŒd Fachtagung GebĂ€ude 4.0, MĂŒnchen, 2018-04-11.
  43. IoT-Sicherheit – was ist daran neu und was relevant?, GI SecMgt Workshop ‘Neue’ Technologien und ‘neue’ Bedrohungen, Frankfurt, 2017-11-24.
  44. Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring, 42th IEEE Conference on Local Computer Networks (LCN), Singapore, SG, 2017-10-10.
  45. Kryptografie und Netzwerksicherheit fĂŒr die GebĂ€udeautomation, BĂ€lz Seminar der Technischen Hochschule Köln, 2017-09-08.
  46. Sicherheit im Internet der Dinge, KMU meets KMH, Worms, 2017-05-29.
  47. Don’t You Touch My Nuts: Information Hiding In Cyber Physical Systems Using Smart Buildings, BioStar/IEEE Security and Privacy Workshops, San JosĂ©, CA, United States, 2017-05-25,
  48. Ant Colony-inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators, BioStar/IEEE Security and Privacy Workshops, San José, CA, United States, 2017-05-25 (per video stream).
  49. IT-Sicherheit mit BARNI (Building Automation Reliable Network Infrastructure), Smart Home and Metering Summit 2016, MĂŒnchen, Germany, 2016-06-29.
  50. Forschung zur Sicherheit von Smart Buildings, SmartHome NRW-Event zur Sicherheit von Smart Homes, Bonn, Germany, 2016-04-26.
  51. Novel Approaches for Network Covert Storage Channels, Murdoch University, Perth, Australia, 2016-02-19.
  52. IT-Sicherheit von Smart Homes: Chancen und Risiken, Landeskriminalamt (LKA) Niedersachsen, Hannover, Germany, 2016-01-28.
  53. Security in Smart Building Networks, NRW.Invest / Germany at its best, Tower Bridge House, London, United Kingdom, 2015-12-03.
  54. inHaus-Event: Sicherheit von Smart Homes (event moderator), Fraunhofer inHaus-Zentrum, Duisburg, Germany, 2015-11-17.
  55. Your house knows what you did last summer (talk and panel), ECO Internet Security Days (ISD) 2015, BrĂŒhl, Germany, 2015-09-17.
  56. BACtag – Data Leakage Protection fĂŒr GebĂ€ude, D-A-CH Security 2015, St. Augustin, Germany, 2015-09-09.
  57. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments, Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, United States, 2015-08-06.
  58. Auf dem Weg zum sicheren Smart Building, Forum Bauindustrie 2015, Zurich, Switzerland, 2015-05-21.
  59. Smart Buildings – sind sie kritische Infrastrukturen?, Workshop des AK KRITIS, Bonn, Germany, 2015-04-24.
  60. Vortrag ĂŒber den wissenschaftlichen Ausblick auf die Cyber Security der Zukunft, 2. Mannheimer Symposium des IKZ ‘Möglichkeiten und Auswirkungen des Cyberspace’‘, Mannheim, Germany, 2014-11-06.
  61. Hidden and Uncontrolled: The Emergence of Network Steganography, ISSE 2014, Brussels, Belgium, 2014-10-14.
  62. Area of Interest on Trustworthy (Hyperconnected) Infrastructure (of NIS-P. WG3): Short Progress Report, Seminar on Road-mapping Cybersecurity Research and Innovation, Florence, Italy, 2014-10-08.
  63. Netzwerksicherheit in BACnet-Systemen (talk and panel), GLT Anwendertagung, Dresden, Germany, 2014-09-25.
  64. BACnet Security and Botnets, SANS European ICS Security Summit, Amsterdam, The Netherlands, 2014-09-22.
  65. Alice’s Adventures in Smart Building Land – Novel Adventures in a Cyber Physical Environment, Hack in the Box (HITB), Amsterdam, The Netherlands, 2014-05-29/30.
  66. Smart Insecure Buildings, ITEC 2014 (International Training and Education Conference), Cologne, Germany, 2014-05-21.
  67. Smart Industrial Buildings: Sicherheit fĂŒr Automation und Management von GebĂ€uden, 2. VDI Fachkonferenz Industrial IT Security, Frankfurt, Germany, 2014-05-07.
  68. Area of Interest on Trustworthy (Hyperconnected) Infrastructures, NIS Platform WG3 Meeting, Brussels, Belgium, 2014-04-29.
  69. Part of Panel: Towards defining priorities for cybersecurity research in Horzon 2020’s work programme 2016-2017 – Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform, Trust in the Digital World Conference (TDW), Vienna, Austria, 2014-04-08.
  70. Envisioning Smart Building Botnets, GI Sicherheit 2014, Vienna, Austria, 2014-03-21.
  71. Data Leakage Protection: ZukĂŒnftige Herausforderungen zur Sicherung von Vertraulichkeit, Chemnitzer Linuxtage 2014, Chemnitz, Germany, 2014-03-15/16.
  72. ZukĂŒnftige Herausforderungen fĂŒr die Sicherheit Smarter GebĂ€ude, 21. DFN Workshop zur Sicherheit in vernetzten Systemen, Hamburg, Germany, 2014-02-18.
  73. Currently Addressed Challenges in Smart Building Security Research at Fraunhofer FKIE, 9th IT4SE Workshop, Augsburg, Germany, 2013-12-06.
  74. Keynote: Nach dem Angriff: Versteckte Exfiltration vertraulicher Daten, Heise Events Konferenztag Prism, Tempora und Co. â€“ Rezepte gegen den Abhörwahn, Köln, Germany, 2013-12-03.
  75. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels, ARES ECTCM Workshop, Regensburg, Germany, 2013-09-04.
  76. Novel Approaches for Network Covert Storage Channels, PhD thesis defense talk at the University of Hagen, Hagen, Germany, 2013-05-07.
  77. Novel Approaches for Network Covert Channels, Invited talk at Fraunhofer FKIE, Bonn, Germany, 2013-04-18.
  78. Covert Channel-internal Control Protocols, Technical University Hamburg-Harburg (TUHH), Oberseminar, Hamburg, Germany, 2013-04-16.
  79. Sicherheit in Sozialen Netzwerken, Mitgliederversammlung Genossenschaftsbank UnterallgÀu, Ottobeuren, Germany, 2013-03-21.
  80. Datenschutz und Datensicherheit im Zeitalter Sozialer Netzwerke, Forum Mindelheim/Genossenschaftsbank UnterallgÀu eG, Mindelheim, Germany, 2013-03-18.
  81. Ich weiß, was du letzte Woche getan hast! SeitenkanĂ€le in der GebĂ€udeautomation, Chemnitzer Linuxtage 2013, Chemnitz, Germany, 2013-03-17.
  82. The future of data exfiltration and malicious communication, °Őžé°ż°ż±Ê·Ąžéł§â€™13, Heidelberg, Germany, 2013-03-13.
  83. Dynamic Routing in Covert Channel Overlays Based on Control Protocols, International Workshop on Information Security, Theory and Practice (ISTP-2012), London, United Kingdom, 2012-12-10.
  84. Covert Channels and their Prevention in Building Automation Protocols – A Prototype Exemplified Using BACnet, 2nd Workshop on Security of Systems and Software Resiliency, Besançon, France, 2012-11-20.
  85. Systematic Engineering of Control Protocols for Covert Channels, 13th Conference on Communications and Multimedia Security (CMS), Canterbury, United Kingdom, 2012-09-04.
  86. Control Protocols for Network Covert Channels, 7th GI FG SIDAR Graduierten-Workshop ĂŒber Reaktive Sicherheit (SPRING), Berlin, Germany, 2012-07-06.
  87. Covert and Side Channels in Buildings and the Prototype of a Building-aware Active Warden, IEEE Workshop on Security and Forensics in Communication Systems, Ottawa, Canada, 2012-06-15.
  88. Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels, 7th International Conference on Internet Monitoring and Protection (ICIMP), Stuttgart, Germany, 2012-05-28.
  89. Security in building automation systems and the prevention of malicious data communication in building automation networks, Linux-Informationstag der LUGA, Augsburg, Germany, 2012-03-24.
  90. The Problem of Traffic Normalization Within a Covert Channel’s Network Environment Learning Phase, GI Sicherheit 2012, Darmstadt, Germany, 2012-03-08.
  91. Micro protocols and dynamic protocol switches in network covert channels, Swinburne University, Melbourne, Australia, 2012-01-12.
  92. A Secure Interoperable Architecture for Building-Automation Applications, 4th Int. Symp. on Applied Sciences in Biomedical and Communication Technologies, Barcelona, Spain, 2011-10-27.
  93. Low-attention forwarding for mobile network covert channels, 12th IFIP Conference on Communications and Multimedia Security (CMS 2011), Ghent, Belgium, 2011-10-21.
  94. Verdeckte KanĂ€le: Informationen durch die HintertĂŒr, Datenspuren 2011, Dresden, Germany, 2011-10-15.
  95. Verdeckte KanĂ€le – Neuland fĂŒr freie Software, Open-Source-Treffen MĂŒnchen, Germany, 2011-07-22.
  96. Aktuelle Techniken und Methoden der verdeckten KommunikationskanÀle, Chaos Singularity (CoSin) 2011, Biel, Switzerland, 2011-06-25.
  97. EuropÀische Forschungsprojekte im Schnittbereich IT und erneuerbare Energien, 1st IT4SE-Workshop, Augsburg University of Applied Sciences, Augsburg, Germany, 2010-12-07.
  98. EinfĂŒhrung in verdeckte KanĂ€le, 9. Linux-Infotag der Linux-Usergroup Augsburg (LUGA), Augsburg, Germany, 2010-05-27.
  99. Protocol Hopping Covert Channels und Protocol Channels, MetaRheinMain ChaosDays 0x8, Darmstadt, Germany, 2009-09-06.
  100. Hostbasierte Sicherheit und Linux-Hardening, Secure Linux Administration Conference (SLAC), Berlin, Germany, 2006-12-07.