Steffen Wendzel

@cdpxe@dju.social
148 Followers
114 Following
216 Posts
Professor @UniUlm; director of the university library and the computing centre (kiz), director of the Inst. Inf. Res. Mgmt. (IRM). Working on different topics of cyber security and network security -- https://www.wendzel.de | private account
Personal websitehttps://www.wendzel.de
Github profilehttps://github.com/cdpxe
dblp profilehttps://dblp.uni-trier.de/pid/53/3957.html
Scholar profilehttps://scholar.google.de/citations?user=DZqkZ1IAAAAJ&hl=de&oi=ao

A Generic Taxonomy for #Steganography. Published today by ACM Comp. Surveys (CSUR). Joint-work w/ W. Mazurczyk , @lucacav, A. Mileva, @Jana_Dittmann, @kraetzer, K. Lamshöft, @THB_Security_Research, L. Hartmann, J. Keller, @TN_THB and @niosat

Paper: https://dl.acm.org/doi/10.1145/3729165

#infosec #surveys #taxonomy #informationhiding #covertchannels #stego

There's supplemental material available (just scroll down on the linked page). It also features the description method for steganography techniques.

A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges -- https://arxiv.org/abs/2502.14945
A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges

Internet censorship limits the access of nodes residing within a specific network environment to the public Internet, and vice versa. During the last decade, techniques for conducting Internet censorship have been developed further. Consequently, methodology for measuring Internet censorship had been improved as well. In this paper, we firstly provide a survey of Internet censorship techniques. Secondly, we survey censorship measurement methodology, including a coverage of available datasets. In cases where it is beneficial, we bridge the terminology and taxonomy of Internet censorship with related domains, namely traffic obfuscation and information hiding. We cover both, technical and human aspects, as well as recent trends, and challenges.

arXiv.org
Liebe Studierende, wir bieten seitens des OMI-Instituts im Sommersemester neue spannende Module im Bereich IT-Sicherheit an der Univ. Ulm an. Schauen Sie doch mal vorbei!
Drei Tage lang besprachen wir an einem Kurort in Schwaben Cybersecurity-Themen. Der heutige Tag war dem Projekt @ATTRIBUT gewidmet und befasste sich mit Stegomalware-Attribution.

I extracted a few screenshots regarding the findings for stegomalware:

Paper: https://dl.acm.org/doi/10.1145/3664476.3670886

Slides: https://www.wendzel.de/dr.org/files/Papers/cuing24_stegomalware_talk.pdf

A Comprehensive Pattern-based Overview of Stegomalware | Proceedings of the 19th International Conference on Availability, Reliability and Security

ACM Other conferences

We present a new class of covert channels that we call `history covert channels` combined with the paradigm of covert channel amplification.

https://ieeexplore.ieee.org/document/10551462/

Our paper will appear in IEEE Trans. Dep. Sec. Comp. (TDSC).

New stickers for http://stego-punk.net, made by my team.
Stego-Punk.net

Stego-Punk.net Research Group

Stego-Punk.net

Oh, just noticed that one of our papers finally reached 200 citations. I would like to thank all citing authors for appreciating our work!
https://scholar.google.de/citations?user=DZqkZ1IAAAAJ&hl=de&oi=ao

#steganography #netsec #infosec

Steffen Wendzel

Hochschule Worms/FernUniversität in Hagen, Germany - 1.978-mal zitiert - Covert Channels - Steganography - IoT Security - Information Hiding - Cyber Security

BildChatGPT? Das kann ja nur gut werden.