Aged 17, I started writing books (sold 65,000 printed+electronic copies so far and counted 110,000+ downloads of my (older) editions). A list of my 140+ publications can be found here. My publications appeared in high-quality journals/conference such as
- ACM Computing Surveys (CSUR),
- Communications of the ACM (CACM),
- Elsevier Future Generation Computer Systems (FGCS),
- IEEE ACCESS,
- IEEE Transactions on Industrial Informatics (TII),
- IEEE Security & Privacy,
- IEEE Local Computer Networks (LCN),
- IFIP Information Security and Privacy Protection Conf. (SEC),
- Springer Scientometrics,
- Wiley Security and Communication Networks (SCN),
- Springer Annals of Telecommunications and
- Journal of Universal Computer Science (J.UCS).
My research focuses on network information hiding (network covert channels and network steganography), science of security (SoC), IoT/smart buildings/homes, security of embedded communication protocols, and information security terminology/taxonomy.
Some of my key publications are on the fundamentals (SoC) of network information hiding: taxonomy/patterns/fundamentals [1,2], creativity evaluation of research paper submissions  and scientific methodology of information hiding . Some of my other key contributions are focusing on traffic normalization and active wardens [5, 6] and covert channel optimization [7,8].
I am a member of several steering committees, initiatives, program and organizing committees (cf. details). I am (or was) lecturing and supervising at Augsburg University of Applied Sciences, Bonn University and Hagen University. A list of my projects, both funded and spare-time software projects, is also available.
In addition to information security, I am interested in university history, campus novels, and retro computing – in particular: operating system history and historic network protocols. I own a small collection of rather historic books on these retro computing topics. Since about five years, I am also a mid-distance runner (5km to half-marathon).
Find (information about) me here: Twitter, Google Scholar and ResearchGate.
Contact: steffen (at) wendzel (dot) de (PGP pub key: FD701BD1).
Recent News (Selection):
- My tool NeFiAS (Network Forensic & Anomaly Detection System) is an accessible hands-on tool for network covert channel detection. I just made the code of NeFiAS public. I also attached a documentation. Have fun with it!
- Great news! Our research project SIVERT (English: Secure and Intelligent Visualization and Real-time Reconstruction Techniques for Proton computed tomography, German: Sichere und Intelligente Visualisierungs- und Echtzeit-Rekonstruktions-Techniken für die Protonen-Computertomografie) was started today. Minister president Malu Dreyer came to initiate the project on October 1st. We receive quite some funding from the Rhineland-Palatinate/MWWK (717.000 EUR) for six PhD students, student assistants and travel budget for the next couple of years and will conduct AI-aided research to improve cancer treatment (also in terms of safety) jointly with TU Kaiserslautern and University of Bergen. Looking forward to post more information on this in the coming months.
- Recently gave a lecture (in German) on process management in operating systems at University of Hagen. Slides are here.
- Two new posters have been accepted at EICC'20:
- Jörg Keller, Steffen Wendzel: Covert Channels in One-Time Passwords Based on Hash Chains, in Proc. European Interdisciplinary Cybersecurity Conference (EICC 2020), ACM, in press.
- Laura Hartmann, Steffen Wendzel: Anomaly Detection in ICS based on Data-history Analysis, in Proc. European Interdisciplinary Cybersecurity Conference (EICC 2020), ACM, in press.
- Our new special issue on Information Security Methodology, Replication Studies and Education at the Journal of Universal Computer Science has been published; featuring selected extended articles of last year's ARES IWSMR workshop.
- We just submitted the EU proposal TRESPACE today. Thanks to all supporters!
- We published two new papers at CUING'2020 workshop (part of ARES 2020):
- Tobias Schmidbauer, Steffen Wendzel: Covert Storage Caches using the NTP Protocol, in Proc. CUING Workshop 2020 (ARES 2020), ACM, 2020.
- Przemysław Szary, Wojciech Mazurczyk, Luca Caviglione, Steffen Wendzel: Design and Performance Evaluation of Reversible Network Covert Channels, in Proc. CUING Workshop 2020 (ARES 2020), ACM, 2020.
- On August 25th, our 2nd IWSMR workshop was held at ARES 2020.
- I wrote a review of the book Future automation: changes to lives and to businesses by Timothy Carone. The review was published by ACM Computing Reviews, cf. here (requires access; e-mail me for a pre-print).
- I updated my covert channel tools page on GitHub.
- Just realized my books count more than 110,000 downloads! Thanks, readers!
- I started an open online class on network information hiding.
- My project proposal ACCAEL (Anti Cyber-crime Actions on the European Level) was granted (21.750 EUR).
- Check out the Call for Papers for EICC'2020.
- I am co-chairing this year's European Interdisciplinary Cybersecurity Conference (EICC) in Rennes, France. In previous editions, this conference was called Central European Cybersecurity Conference (CECC).
- Good news: We will organize the 2nd International Workshop on Information Security Methodology and Replication Studies (IWSMR) under the umbrella of ARES 2020 in Dublin. See here: https://www.ares-conference.eu/workshops/iwsmr-2020/
- We organize a new special issue for MDPI Computers on Information Hiding, Steganography and Covert Channels, see https://www.mdpi.com/journal/computers/special_issues/InformationHiding_NetworkSteganography_CovertChannels. Also check our other active SIs for Elsevier FGCS and J.UCS.
- I submitted my habilitation thesis one week ago - yey!
The early-access version (open access) of our paper on MQTT covert channels is now available:
- Aleksandar Velinov, Aleksandra Mileva, Steffen Wendzel, Wojciech Mazurczyk: Covert Channels in MQTT-based Internet of Things, IEEE ACCESS, accepted.
I am proud to say that for the second time, I got a paper accepted in a non-computer science journal, namely Scientometrics (website of the publisher). Yes, our paper has to do with cyber security, somehow, but it is an analysis of citations.
- Steffen Wendzel, Cédric Lévy-Bencheton, Luca Caviglione: Not all Areas are Equal: Analysis of Citations in Information Security Research, Scientometrics, Springer, in press.