Aged 17, I started writing books (sold 65,000 printed+electronic copies so far and counted 60,000+ free downloads of my older editions). A list of my 130+ publications can be found here. My publications appeared in high-quality journals/conference such as ACM CSUR, Comm. ACM, Elsevier FGCS, Wiley SCN, IEEE Security & Privacy, IEEE LCN, IFIP SEC, Springer ANTE and J.UCS. However, I also wrote books about the Linux operating system and contributed open source code/patches to the free software community. There is also a list of selected talks that I gave.
My research focuses on network information hiding (network covert channels and network steganography), science of security (SoC), IoT/smart buildings/homes, security of embedded communication protocols, and information security terminology/taxonomy.
Some of my key publications are on the fundamentals (SoC) of network information hiding: taxonomy/patterns/fundamentals [1,2], creativity evaluation of research paper submissions  and scientific methodology of information hiding . Some of my other key contributions are focusing on traffic normalization and active wardens [5, 6] and covert channel optimization [7,8].
I am a member of several steering committees, initiatives, program and organizing committees (cf. details). I am (or was) lecturing and supervising at Augsburg University of Applied Sciences, Bonn University and Hagen University. A list of my projects, both funded and spare-time software projects, is also available.
In addition to information security, I am interested in university history, campus novels, and retro computing – in particular: operating system history and historic network protocols. I own a small collection of rather historic books on these retro computing topics. Since about five years, I am also a mid-distance runner (5km to half-marathon).
Find (information about) me here: Twitter, Google Scholar and ResearchGate.
Contact: steffen (at) wendzel (dot) de (PGP pub key: FD701BD1).
Recent News (Selection):
- It seems I will invest some time in the coming months to complete my text adventure engine that I partially implemented in 2007 (script language plus compiler written in C; just the interpreter and some features for the script language are missing).
- Our new paper has been accepted at Elsevier FGCS:
Wojciech Mazurczyk, Steffen Wendzel, Mehdi Chourib, Jörg Keller: Countering Adaptive Network Covert Communication with Dynamic Wardens, Future Generation Computer Systems (FGCS), Elsevier (in press).
Just e-mail me if you have no access to the paper.
- I am serving as a leading guest editor for an upcoming Elsevier Future Generation Computer Systems (FGCS) special issue on Emerging Topics in Defending Networked Systems (Impact factor: 4.64!).
- We organize a special issue on "Cyber-Physical Security in Industrial Environments" for IEEE Transactions on Industrial Internet (impact factor: 5.4!). The submission site is already open (just select our SI during the submission procedure).
- Check out our new project WoDiCoF, which is a testbed for covert channel detection algorithms.
- We are in the news:
- Computer.org: Hacker's latest weapon: Steganography, (2018-11-15)
- Gave a talk on countermeasure variation at CECC'18 last week in Ljubljana.
- I am currently a featured reviewer (ACM Computing Reviews).
- I received the printed editions of my new book. Here is a photo.
- A new paper got accepted at NordSec'18:
Sebastian Zillien, Steffen Wendzel: Detection of covert channels in TCP retransmissions, in Proc. NordSec, Springer, 2018/in press.
I wrote a blog post on the topic that we are going to cover in this paper and another paper.
- I contributed a section to the new issue of the newsletter of the German Informatics Society (text in German), see here.
- The online version of my new German book on TCP/IP and IoT network security is now available. The print version is still in press.
- Das Cover zu meinem noch unveröffentlichen Buch ist da. Es erscheint in Kürze bei Springer-Vieweg.
- A new paper has been accepted at CECC'18:
Steffen Wendzel, Daniela Eller, Wojciech Mazurczyk: One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels, in Proc. Central European Security Conference (CECC'18), to appear.