I gave talks in several countries (Europe, America, Asia, Oceania), at various industry events (e.g. SANS European ICS Security Summit, Secure Linux Administration Conference VDI Fachkonferenz Industrial IT Security), various academic conferences (e.g. CMS, HCII, ARES, ...) and also at hacking conferences such as Hack-in-the-Box AMS (HITB, 2x), TROOPERS, DeepIntel, Datenspuren, and Chemnitzer Linuxtage (2x). I also took part in several panels, was moderator, and gave guest talks at several universities.

If you are interested in me giving a talk at your event, then please be invited to contact me: steffen (at) wendzel (dot) de.

Selected Talks

  1. "BePI: Fast and Memory-efficient Method for Billion-Scale Random Walk with Restart",
    FernUniversität in Hagen (talk in front of habilitation commission on topic outside of own research scope), Fakultät MI, DE; 2020-11-02.
  2. "Realisierung von Prozessen in Betriebssystem-Kernen" [pdf],
    FernUniversität Hagen
    (talk in front of habilitation commission), Fakultät MI, DE, 2020-09-21.
  3. "Recent Advances in Network Steganography Detection",
    DeepIntel, Vienna, AT, 2019-11-27.
  4. "Protocol-independent detection of covert channels using the `Size Modulation' pattern",
    ARES'19 CUING Workshop, Canterbury, UK, 2019-08-27.
  5. "Smart Buildings - Herausforderungen an die IT-Sicherheit",
    Stuttgarter Sicherheitskonferenz, Stuttgart, DE, 2019-07-19.
  6. "Data leakage and covert data exfiltration: The new threat of network information hiding",
    Smart Rail World Conference, Munich, 2019-06-18.
  7. "Taxonomie und wissenschaftliche Methodik für das Gebiet Network Information Hiding",
    FernUniversität in Hagen (Fakultätskolloquium), Hagen, 2019-05-27.
  8. "IT-Sicherheit automatisierter Gebäude im IoT",
    Auvesy-Konferenz, Karlsruhe, 2019-05-16.
  9. "Network Covert Channel Patterns: Current State and Methodology",
    Universität Bonn (Oberseminar Inst. f. Informatik IV), 2019-01-16.
  10. "Detection of covert channels in TCP retransmissions",
    23rd Nordic Conference on Secure IT Systems (NordSec), Oslo, NO, 2018-11-29.
  11. "IT-Sicherheit und das Internet der Dinge",
    VHS Böblingen-Sindelfingen e.V. (online webinar), 2018-11-19.
  12. "One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels",
    Central European Cybersecurity Conference (CECC), Ljubljana, SI, 2018-11-15.
  13. "Get me cited, Scotty! Analyzing Citations in Covert Channel/Steganography Research",
    ARES'18 CUING Workshop, Hamburg, DE, 2018-08-28.
  14. "Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach ",
    ARES'18 CUING Workshop, Hamburg, DE, 2018-08-28.
  15. "Network Information Hiding" [Slides (PDF)],
    COINS PhD Summer School 2018, Metochi, Lesvos, GR, 2018-07-28.
  16. "IoT-Sicherheit für die GA-Industrie",
    VDMA, Frankfurt, 2018-05-02.
  17. "Steganography Ante Portas" [Slides (PDF)], [Video (YouTube)],
    Hack-in-the-Box (HITB), Amsterdam, NL, 2018-04-12.
  18. "IoT-Sicherheit -- was ist neu und was ist wichtig?",
    Tüv-Süd Fachtagung Gebäude 4.0, München, 2018-04-11.
  19. "IoT-Sicherheit -- was ist daran neu und was relevant?",
    GI SecMgt Workshop 'Neue' Technologien und 'neue' Bedrohungen, Frankfurt, 2017-11-24.
  20. "Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring" [slides (PDF)],
    42th IEEE LCN, Singapore, SG, 2017-10-10.
  21. "Kryptografie und Netzwerksicherheit für die Gebäudeautomation",
    Bälz Seminar, Technische Hochschule Köln, 2017-09-08.
  22. "Sicherheit im Internet der Dinge",
    KMU meets KMH, Worms, 2017-05-29.
  23. "Don't You Touch My Nuts: Information Hiding In Cyber Physical Systems Using Smart Buildings" [slides (PDF)] [Video],
    BioStar/IEEE Security and Privacy Workshops, San José, CA, United States, 2017-05-25 (per video stream).
  24. "Ant Colony-inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators",
    BioStar/IEEE Security and Privacy Workshops, San José, CA, United States, 2017-05-25 (per video stream).
  25. "IT-Sicherheit mit BARNI (Building Automation Reliable Network Infrastructure)",
    Smart Home and Metering Summit 2016, München, Germany, 2016-06-29.
  26. "Forschung zur Sicherheit von Smart Buildings",
    SmartHome NRW-Event zur Sicherheit von Smart Homes, Bonn, Germany, 2016-04-26.
  27. "Novel Approaches for Network Covert Storage Channels",
    Guest talk at the Murdoch University, Perth, Australia, 2016-02-19.
  28. "IT-Sicherheit von Smart Homes: Chancen und Risiken",
    Landeskriminalamt (LKA) Niedersachsen, Hannover, Germany, 2016-01-28.
  29. "Security in Smart Building Networks",
    NRW.Invest / Germany at its best, Tower Bridge House, London, United Kingdom, 2015-12-03.
  30. inHaus-Event: "Sicherheit von Smart Homes" (event moderator),
    Fraunhofer inHaus-Zentrum, Duisburg, Germany, 2015-11-17.
  31. "Your house knows what you did last summer" (talk and panel),
    ECO Internet Security Days (ISD) 2015, Brühl, Germany, 2015-09-17.
  32. "BACtag – Data Leakage Protection für Gebäude",
    D-A-CH Security 2015, St. Augustin, Germany, 2015-09-09.
  33. "Analysis of Human Awareness of Security and Privacy Threats in Smart Environments",
    Human Aspects of Information Security, Privacy and Trust Conference, Los Angeles, United States, 2015-08-06.
  34. "Auf dem Weg zum sicheren Smart Building",
    Forum Bauindustrie 2015, Zurich, Switzerland, 2015-05-21.
  35. "Smart Buildings -- sind sie kritische Infrastrukturen?",
    Workshop des AK KRITIS, Bonn, Germany, 2015-04-24.
  36. Vortrag über den wissenschaftlichen Ausblick auf die Cyber Security der Zukunft,
    2. Mannheimer Symposium des IKZ „Möglichkeiten und Auswirkungen des Cyberspace“, Mannheim, Germany, 2014-11-06.
  37. "Hidden and Uncontrolled: The Emergence of Network Steganography",
    ISSE 2014, Brussels, Belgium, 2014-10-14.
  38. "Area of Interest on Trustworthy (Hyperconnected) Infrastructure (of NIS-P. WG3): Short Progress Report",
    Seminar on Road-mapping Cybersecurity Research and Innovation, Florence, Italy, 2014-10-08.
  39. "Netzwerksicherheit in BACnet-Systemen" (talk and panel),
    GLT Anwendertagung, Dresden, Germany, 2014-09-25.
  40.  "BACnet Security and Botnets",
    SANS European ICS Security Summit, Amsterdam, The Netherlands, 2014-09-22.
  41. "Alice's Adventures in Smart Building Land – Novel Adventures in a Cyber Physical Environment" [PDF],
    Hack in the Box (HITB), Amsterdam, The Netherlands, 2014-05-29/30.
  42. "Smart Insecure Buildings",
    ITEC 2014 (International Training and Education Conference), Cologne, Germany, 2014-05-21.
  43. "Smart Industrial Buildings: Sicherheit für Automation und Management von Gebäuden",
    2. VDI Fachkonferenz Industrial IT Security, Frankfurt, Germany, 2014-05-07.
  44.  "Area of Interest on Trustworthy (Hyperconnected) Infrastructures",
    NIS Platform WG3 Meeting, Brussels, Belgium, 2014-04-49.
  45. taking part at the panel "Towards defining priorities for cybersecurity research in Horzon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform"
    Trust in the Digital World Conference (TDW), Vienna, Austria, 2014-04-08.
  46. "Envisioning Smart Building Botnets",
    GI Sicherheit 2014, Vienna, Austria, 2014-03-21.
  47. "Data Leakage Protection: Zukünftige Herausforderungen zur Sicherung von Vertraulichkeit",
    Chemnitzer Linuxtage 2014, Chemnitz, Germany, 2014-03-15/16.
  48. "Zukünftige Herausforderungen für die Sicherheit Smarter Gebäude",
    21th DFN Workshop „Sicherheit in vernetzten Systemen“, Hamburg, Germany, 2014-02-18.
  49. "Currently Addressed Challenges in Smart Building Security Research at Fraunhofer FKIE",
    9th IT4SE Workshop, Augsburg, Germany, 2013-12-06.
  50. Keynote: "Nach dem Angriff: Versteckte Exfiltration vertraulicher Daten",
    Heise Events Konferenztag "Prism, Tempora und Co. – Rezepte gegen den Abhörwahn", Köln, Germany, 2013-12-03.
  51. "Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels" [PDF],
    ARES ECTCM Workshop, Regensburg, Germany, 2013-09-04.
  52. "Novel Approaches for Network Covert Storage Channels" [Thesis as PDF] (slides, PDF),
    PhD thesis defense talk at the University of Hagen, Hagen, Germany, 2013-05-07.
  53. "Novel Approaches for Network Covert Channels"
    Invited talk at Fraunhofer FKIE, Bonn, Germany, 2013-04-18.
  54. "Covert Channel-internal Control Protocols"
    Oberseminar at TUHH, Hamburg, Germany, 2013-04-16.
  55. "Sicherheit in Sozialen Netzwerken",
    Mitgliederversammlung Genossenschaftsbank Unterallgäu, Ottobeuren, Germany, 2013-03-21.
  56. "Datenschutz und Datensicherheit im Zeitalter Sozialer Netzwerke",
    Forum Mindelheim/Genossenschaftsbank Unterallgäu eG, Mindelheim, Germany, 2013-03-18.
  57. "Ich weiß, was du letzte Woche getan hast! Seitenkanäle in der Gebäudeautomation",
    Chemnitzer Linuxtage 2013, Chemnitz, Germany, 2013-03-17.
  58. "The future of data exfiltration and malicious communication" [Slides (PDF)], [Video (YouTube)],
    TROOPERS'13, Heidelberg, Germany, 2013-03-13.
  59. "Dynamic Routing in Covert Channel Overlays Based on Control Protocols",
    International Workshop on Information Security, Theory and Practice (ISTP-2012), London, United Kingdom, 2012-12-10.
  60. "Covert Channels and their Prevention in Building Automation Protocols – A Prototype Exemplified Using BACnet",
    2nd Workshop on Security of Systems and Software Resiliency, Besançon, France, 2012-11-20
  61. "Systematic Engineering of Control Protocols for Covert Channels",
    13th Conference on Communications and Multimedia Security (CMS), Canterbury, United Kingdom, 2012-09-04.
  62. "Control Protocols for Network Covert Channels",
    7th GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), Berlin, Germany, 2012-07-06.
  63.  "Covert and Side Channels in Buildings and the Prototype of a Building-aware Active Warden",
    IEEE Workshop on Security and Forensics in Communication Systems, Ottawa, Canada, 2012-06-15.
  64. "Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels" [PDF],
    7th ICIMP Conference (IARIA), Stuttgart, Germany, 2012-05-28.
  65. "Security in building automation systems and the prevention of malicious data communication in building automation networks",
    Linux-Informationstag der LUGA, Augsburg, Germany, 2012-03-24.
  66. "The Problem of Traffic Normalization Within a Covert Channel's Network Environment Learning Phase"
    GI Sicherheit 2012, Darmstadt, Germany, 2012-03-08.
  67. "Micro protocols and dynamic protocol switches in network covert channels",
    Guest Talk at the Swinburne University, Melbourne, Australia, 2012-01-12.
  68. "A Secure Interoperable Architecture for Building-Automation Applications",
    4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, Barcelona, Spain, 2011-10-27.
  69. "Low-attention forwarding for mobile network covert channels",
    IFIP 12th Communications and Multimedia Security (CMS) 2011, Ghent, Belgium, 2011-10-21.
  70. "Verdeckte Kanäle: Informationen durch die Hintertür",
    Datenspuren 2011, Dresden, Germany, 2011-10-15.
  71. "Verdeckte Kanäle - Neuland für freie Software",
    Open-Source-Treffen München, Germany, 2011-07-22.
  72. "Aktuelle Techniken und Methoden der verdeckten Kommunikationskanäle",
    Chaos Singularity (CoSin) 2011, Biel, Switzerland, 2011-06-25.
  73. "Europäische Forschungsprojekte im Schnittbereich IT und erneuerbare Energien",
    1st IT4SE-Workshop, Augsburg University of Applied Sciences, Augsburg, Germany, 2010-12-07.
  74. "Einführung in verdeckte Kanäle (Covert Channels)"
    9. Linux-Infotag der Linux-Usergroup Augsburg (LUGA), Augsburg, Germany, 2010-05-27.
  75. "Protocol Hopping Covert Channels und Protocol Channels"
    MetaRheinMain ChaosDays 0x8, Darmstadt, Germany, 2009-09-06.
  76. "Hostbasierte Sicherheit und Linux-Hardening"
    Secure Linux Administration Conference (SLAC), Berlin, Germany, 2006-12-07.