ºÚÁÏ´«ËÍÃÅ

Publications

2026

180.
, , , , Rünz P, Caviglione L. A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges. Computers & Security. 2026; 164       
179.
. AdullamoT: Using IoT Devices as Relays for Time-decoupled Secret Exchange and Censorship Circumvention. In: Proc. 14th ACM Workshop on Information Hiding and Multimedia Security (ACM IH&MMSec 2026), Florence, Italy, June 17-19. ACM; 2026.       
178.
, , Zander S. AMPhitryon: Efficient small data compression for low-bandwidth covert channels. In: Proc. 41st ICT Systems Security and Privacy Protection (IFIP SEC 2026). Springer; 2026.
177.
, , , Rünz P, Caviglione L, . Digital Control: National Tactics of Internet Censorship. In: European Interdisciplinary Cybersecurity Conference (EICC 2026). Springer; 2026.
176.
von Suchodoletz D, Neumair B, Frank M, Heuveline V, Walter T, , Kohl-Frey O, Farrenkopf S, Pfister A, Beutner J, Resch M, Dorn R, Nau T. Framework Concept of the Universities in the State of Baden-Württemberg: High-Performance Computing (HPC) and Data-Intensive Computing (DIC) in the Period 2025–2032. In: Proceedings of the 10th bwHPC Symposium: HPC Activites in Baden-Württemberg. Karlsruhe: KIT Scientific Publishing; 2026.       
175.
°Â±ð¾±ÃŸ±ð²Ô²ú´Ç°ù²Ô&²Ô²ú²õ±è;°ä, . History covert channels with relative timing pointers: Design, error resilience, and detectability. Journal of Information Security and Applications. 2026; 99       
174.
Skwarek V, Wöhnert KH, Kaven S, . Sicherheit 2026 — Beiträge der 13. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Bonn: Gesellschaft für Informatik e.V. (GI); 2026.             
173.
Velinov A, Mileva A, , , . Steganography in the QUIC Communication Protocol. Journal of Universal Computer Science (J.UCS). 2026; 32(2):181-208.       

2025

172.
, Keller J, . Detection of Network Information Hiding Artifacts — A Case for HPC?. In: Proceedings of the 11th bwHPC Symposium. University of Tübingen, Germany: 2025 Sep. 23.      
171.
, Caviglione L, Mazurczyk W, Mileva A, Dittmann J, Krätzer C, Lamshöft K, Vielhauer C, Hartmann L, Keller J, Neubert T, . A Generic Taxonomy for Steganography Methods. ACM Comput. Surv.. 2025;             
170.
, Krätzer C, Dittmann J, Caviglione L, Mileva A, Schmidbauer T, Vielhauer C, Zander S. Combining Different Existing Methods for Describing Steganography Hiding Methods. In: Coppens, Bart and Volckaert, Bruno and Naessens, Vincent and De Sutter, Bjorn, editors. Availability, Reliability and Security. Cham: Springer Nature Switzerland; 2025. p. 271—289.
169.
Petrov D, Ruffing P, , . Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences. In: Dalla Preda, Mila and Schrittwieser, Sebastian and Naessens, Vincent and De Sutter, Bjorn, editors. Availability, Reliability and Security. Cham: Springer Nature Switzerland; 2025. p. 118—140.
168.
, Schmidbauer T, , Keller J. DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data. IEEE Transactions on Dependable and Secure Computing (TDSC). 2025; 22(1):614-631.             
167.
Schoffit J, Pietzschmann L, , Eisermann D, , Kargl F. Enhancing client security in zero trust architectures: a device-agent policy enforcement point for compartmentalized network management. In: Koldehofe, Boris and Klingler, Florian and Sommer, Christoph and Hummel, Karin Anna and Amthor, Peter, editors. Proc. International Conference on Networked Systems 2025 (NetSys 2025). Ilmenau: ilmedia; 2025. p. 29—32.             

2024

166.
, Seybold D, Domaschka J, Wesner S. The Hidden Costs of Shared CPU Resources: A Closer Look at Cgroups and QoS. In: 2024 Nov. 1.
165.
°­±ðß±ô±ð°ù&²Ô²ú²õ±è;¸é, . Towards Improving Resource Allocation for Multi-Tenant HPC Systems: An Exploratory HPC Cluster Utilization Case Study. In: 2024 IEEE International Conference on Cluster Computing Workshops (CLUSTER Workshops). 2024 Sep. 14. p. 66-75.       
164.
Schymiczek J, Schmidbauer T, . A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM; 2024.             
163.
Strachanski F, Petrov D, Schmidbauer T, . A Comprehensive Pattern-based Overview of Stegomalware. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM; 2024.             
162.
, Domaschka J. An Empirical Analysis of Common OCI Runtimes' Performance Isolation Capabilities. In: Proceedings of the 15th ACM/SPEC International Conference on Performance Engineering. 2024. p. 60—70.
161.
Dittmann J, Krätzer C, Kiltz S, Altschaffel R, Vielhauer C, , Wefel S, Nitsch H. Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT). In: GI Sicherheit 2024 — Sicherheit, Schutz und Zuverlässigkeit. Gesellschaft für Informatik e.V. (GI); 2024. p. 265—268.             
160.
, Mileva A, Franqueira VNL, Jaatun MG. Editorial: Fighting Cybersecurity Risks from a Multidisciplinary Perspective. Journal of Universal Computer Science (J.UCS). 2024; 30(9):1137—1139.             
159.
, Seybold D, Domaschka J. Exemplary Determination of Cgroups-Based QoS Isolation for a Database Workload. In: Companion of the 15th ACM/SPEC International Conference on Performance Engineering. 2024. p. 235—241.
158.
, Plötner J. Linux. Der Grundkurs. 2 ed. Rheinwerk Verlag; 2024.      
157.
, Schmidbauer T, Kubek M, Keller J, . Look What's There! Utilizing the Internet's Existing Data for Censorship Circumvention with OPPRESSION. In: Proc. 19th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2024). ACM; 2024. p. 80—95.             
156.
Keller J, Heßeling C, . Robust and Homomorphic Covert Channels in Streams of Numeric Data. In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024). ACM; 2024.