Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–18 of 18 results for author: Wendzel, S

.
  1. DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data

    Authors: Steffen Wendzel, Tobias Schmidbauer, Sebastian Zillien, Jörg Keller

    Abstract: Covert channels are stealthy communication channels that enable manifold adversary and legitimate scenarios, ranging from malware communications to the exchange of confidential information by journalists and censorship circumvention. We introduce a new class of covert channels that we call history covert channels. We further present a new paradigm: covert channel amplification. All covert channels… ▽ More

    Submitted 7 June, 2024; v1 submitted 22 December, 2022; originally announced December 2022.

    Comments: 20 pages. IEEE Transactions on Dependable and Secure Computing (TDSC), 2024

  2. arXiv:2202.05551  [pdf, other

    physics.med-ph cs.MS

    Exploration of Differentiability in a Proton Computed Tomography Simulation Framework

    Authors: Max Aehle, Johan Alme, Gergely Gábor Barnaföldi, Johannes Blühdorn, Tea Bodova, Vyacheslav Borshchov, Anthony van den Brink, Viljar Eikeland, Gregory Feofilov, Christoph Garth, Nicolas R. Gauger, Ola Grøttvik, Håvard Helstrup, Sergey Igolkin, Ralf Keidel, Chinorat Kobdaj, Tobias Kortus, Lisa Kusch, Viktor Leonhardt, Shruti Mehendale, Raju Ningappa Mulawade, Odd Harald Odland, George O'Neill, Gábor Papp, Thomas Peitzmann , et al. (25 additional authors not shown)

    Abstract: Objective. Algorithmic differentiation (AD) can be a useful technique to numerically optimize design and algorithmic parameters by, and quantify uncertainties in, computer simulations. However, the effectiveness of AD depends on how "well-linearizable" the software is. In this study, we assess how promising derivative information of a typical proton computed tomography (pCT) scan computer simulati… ▽ More

    Submitted 12 May, 2023; v1 submitted 11 February, 2022; originally announced February 2022.

    Comments: 27 pages, 11 figures

  3. Adaptive Warden Strategy for Countering Network Covert Storage Channels

    Authors: Mehdi Chourib, Steffen Wendzel, Wojciech Mazurczyk

    Abstract: The detection and elimination of covert channels are performed by a network node, known as a warden. Especially if faced with adaptive covert communication parties, a regular warden equipped with a static set of normalization rules is ineffective compared to a dynamic warden. However, dynamic wardens rely on periodically changing rule sets and have their own limitations, since they do not consider… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

    Comments: Pre-print of LCN'21 paper

    Journal ref: 2021 IEEE 46th Conference on Local Computer Networks (LCN)

  4. A Revised Taxonomy of Steganography Embedding Patterns

    Authors: Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert

    Abstract: Steganography embraces several hiding techniques which spawn across multiple domains. However, the related terminology is not unified among the different domains, such as digital media steganography, text steganography, cyber-physical systems steganography, network steganography (network covert channels), local covert channels, and out-of-band covert channels. To cope with this, a prime attempt ha… ▽ More

    Submitted 16 June, 2021; originally announced June 2021.

    Journal ref: Proc. of the 16th International Conference on Availability, Reliability and Security (ARES'21), August 17--20, 2021, Vienna, Austria

  5. Protocol-independent Detection of "Messaging Ordering" Network Covert Channels

    Authors: Steffen Wendzel

    Abstract: Detection methods are available for several known covert channels. However, a type of covert channel that received little attention within the last decade is the "message ordering" channel. Such a covert channel changes the order of PDUs (protocol data units, i.e. packets) transferred over the network to encode hidden information. The advantage of these channels is that they cannot be blocked easi… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

    Journal ref: Published in Proc. ARES 2019 (CUING Workshop)

  6. Countering Adaptive Network Covert Communication with Dynamic Wardens

    Authors: Wojciech Mazurczyk, Steffen Wendzel, Mehdi Chourib, Jörg Keller

    Abstract: Network covert channels are hidden communication channels in computer networks. They influence several factors of the cybersecurity economy. For instance, by improving the stealthiness of botnet communications, they aid and preserve the value of darknet botnet sales. Covert channels can also be used to secretly exfiltrate confidential data out of organizations, potentially resulting in loss of mar… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

    Journal ref: Elsevier FGCS, Volume 94, May 2019, Pages 712-725

  7. arXiv:1801.00694  [pdf

    cs.CR

    The New Threats of Information Hiding: the Road Ahead

    Authors: K. Cabaj, L. Caviglione, W. Mazurczyk, S. Wendzel, A. Woodward, S. Zander

    Abstract: Compared to cryptography, steganography is a less discussed domain. However, there is a recent trend of exploiting various information hiding techniques to empower malware, for instance to bypass security frameworks of mobile devices or to exfiltrate sensitive data. This is mostly due to the need to counteract increasingly sophisticated security mechanisms, such as code analysis, runtime counterme… ▽ More

    Submitted 2 January, 2018; originally announced January 2018.

    Comments: 9 pages, 1 figure

  8. arXiv:1609.06664  [pdf, other

    cs.CR

    Why Johnny Can't Use Stego: a Human-oriented Perspective on the Application of Steganography

    Authors: Steffen Wendzel

    Abstract: Steganography is the discipline that deals with concealing the existence of secret communications. Existing research already provided several fundamentals for defining steganography and presented a multitude of hiding methods and countermeasures for this research discipline. We identified that no work exists that discusses the process of applying steganography from an individual's perspective. T… ▽ More

    Submitted 21 September, 2016; originally announced September 2016.

    Comments: 17 pages, 1 figure

  9. arXiv:1512.07438  [pdf, other

    cs.CR

    Unified Description for Network Information Hiding Methods

    Authors: Steffen Wendzel, Wojciech Mazurczyk, Sebastian Zander

    Abstract: Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe the embedding of hidden information. We introduce the first unified description of hiding methods in network steganography. Our description metho… ▽ More

    Submitted 9 January, 2017; v1 submitted 23 December, 2015; originally announced December 2015.

    Comments: 24 pages, 7 figures, 1 table; currently under review

    Journal ref: Journal of Universal Computer Science (J.UCS), vol. 22, no. 11 (2016), 1456-1486

  10. arXiv:1511.08507  [pdf, other

    cs.MM cs.CR cs.CY

    Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research

    Authors: Steffen Wendzel, Carolin Palmer

    Abstract: The research discipline of network steganography deals with the hiding of information within network transmissions, e.g. to transfer illicit information in networks with Internet censorship. The last decades of research on network steganography led to more than hundred techniques for hiding data in network transmissions. However, previous research has shown that most of these hiding techniques are… ▽ More

    Submitted 26 November, 2015; originally announced November 2015.

    Comments: to appear in Journal of Universal Computer Science (J.UCS)

    ACM Class: D.2.11; D.4.6; K.6.5; K.7.m

    Journal ref: Journal of Universal Computer Science, Vol. 21(12), 2015

  11. arXiv:1508.04978  [pdf

    cs.MM cs.CR

    "The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography

    Authors: Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel

    Abstract: In this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of "the moving observer". We considered three levels of undetectability named: "good", "bad", and "ugly". To illustrate this method we chose Wi-Fi steganography as a solid family of information hiding protocols. We present the state of the art in this area covering well-known hidin… ▽ More

    Submitted 9 September, 2015; v1 submitted 20 August, 2015; originally announced August 2015.

    Comments: 6 pages, 6 figures, to appear in Proc. of: ICNIT 2015 - 6th International Conference on Networking and Information Technology, Tokyo, Japan, November 5-6, 2015

  12. arXiv:1505.07757  [pdf, other

    cs.MM cs.CY

    Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions

    Authors: Matthias Naumann, Steffen Wendzel, Wojciech Mazurczyk, Jörg Keller

    Abstract: Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer. They enrich this transfer with features such as reliability, dynamic overlay routing, or performance optimization --- just to mention a few. We present different desig… ▽ More

    Submitted 28 May, 2015; originally announced May 2015.

    Comments: 20 pages, 7 figures, 4 tables

  13. arXiv:1502.06460  [pdf, other

    cs.CR

    Visualizing BACnet data to facilitate humans in building-security decision-making

    Authors: Jernej Tonejc, Jaspreet Kaur, Adrian Karsten, Steffen Wendzel

    Abstract: Building automation systems (BAS) are interlinked networks of hardware and software, which monitor and control events in the buildings. One of the data communication protocols used in BAS is Building Automation and Control networking protocol (BACnet) which is an internationally adopted ISO standard for the communication between BAS devices. Although BAS focus on providing safety for inhabitants,… ▽ More

    Submitted 24 February, 2015; v1 submitted 23 February, 2015; originally announced February 2015.

    Comments: 12 pages, 5 figures, 2 tables, presented at HCI International 2015, Los Angeles, CA, USA, 2-7 August 2015. Updated lab figure

    ACM Class: C.2.2; C.2.3; K.6.5

  14. arXiv:1502.00868  [pdf, ps, other

    cs.CY cs.CR

    Analysis of Human Awareness of Security and Privacy Threats in Smart Environments

    Authors: Luca Caviglione, Jean-Francois Lalande, Wojciech Mazurczyk, Steffen Wendzel

    Abstract: Smart environments integrate Information and Communication Technologies (ICT) into devices, vehicles, buildings and cities to offer an increased quality of life, energy efficiency and economical sustainability. In this perspective, the individual has a core role and so has networking, which enables such entities to cooperate. However, the huge amount of sensitive data, social aspects and the mixed… ▽ More

    Submitted 3 February, 2015; originally announced February 2015.

    Comments: 12 pages, 1 table

  15. arXiv:1407.2029  [pdf

    cs.CR

    Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

    Authors: Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier

    Abstract: Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography. Similarly, other malicious activities can profit from network steganography, such as data leakage or the exchange of pedophile data. This paper provides an introduction to network steganography and highlights i… ▽ More

    Submitted 8 July, 2014; originally announced July 2014.

    Comments: 11 pages

    Journal ref: ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference, N. Pohlmann, H. Reimer, W. Schneider (Editors), pp. 1-11

  16. A Pattern-based Survey and Categorization of Network Covert Channel Techniques

    Authors: Steffen Wendzel, Sebastian Zander, Bernhard Fechner, Christian Herdin

    Abstract: Network covert channels are used to hide communication inside network protocols. Within the last decades, various techniques for covert channels arose. We surveyed and analyzed 109 techniques developed between 1987 and 2013 and show that these techniques can be reduced to only 11 different patterns. Moreover, the majority (69.7%) of techniques can be categorized in only four different patterns, i.… ▽ More

    Submitted 19 March, 2015; v1 submitted 11 June, 2014; originally announced June 2014.

    Comments: 27 pages, 4 figures, 3 tables, accepted for publication in ACM Computing Surveys (CSUR, submitted on Dec-2013, accepted in Oct-2014). The final publication will be available via ACM

    Journal ref: ACM Computing Surveys, Vol. 47(3), ACM, 2015

  17. arXiv:1406.2519  [pdf

    cs.MM cs.CR

    On Importance of Steganographic Cost For Network Steganography

    Authors: Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares, Krzysztof Szczypiorski

    Abstract: Network steganography encompasses the information hiding techniques that can be applied in communication network environments and that utilize hidden data carriers for this purpose. In this paper we introduce a characteristic called steganographic cost which is an indicator for the degradation or distortion of the carrier caused by the application of the steganographic method. Based on exemplary c… ▽ More

    Submitted 10 June, 2014; originally announced June 2014.

    Comments: 15 pages, 14 figures, 3 tables

  18. arXiv:0809.1949  [pdf, ps, other

    cs.CR

    Protocol Channels

    Authors: Steffen Wendzel

    Abstract: Covert channel techniques are used by attackers to transfer data in a way prohibited by the security policy. There are two main categories of covert channels: timing channels and storage channels. This paper introduces a new storage channel technique called a protocol channel. A protocol channel switches one of at least two protocols to send a bit combination to a destination. The main goal of a p… ▽ More

    Submitted 14 May, 2011; v1 submitted 11 September, 2008; originally announced September 2008.

    Comments: 2 pages

    ACM Class: K.6.5; D.4.6