| SoK: A survey of indirect network-level covert channels T Schmidbauer, S Wendzel Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 23 | 2022 |
| Introducing dead drops to network steganography using ARP-caches and SNMP-walks T Schmidbauer, S Wendzel, A Mileva, W Mazurczyk Proceedings of the 14th International Conference on Availability …, 2019 | 21 | 2019 |
| A comprehensive pattern-based overview of stegomalware F Strachanski, D Petrov, T Schmidbauer, S Wendzel Proceedings of the 19th International Conference on Availability …, 2024 | 19 | 2024 |
| Challenging channels: Encrypted covert channels within challenge-response authentication T Schmidbauer, J Keller, S Wendzel Proceedings of the 17th International Conference on Availability …, 2022 | 19 | 2022 |
| Covert storage caches using the NTP protocol T Schmidbauer, S Wendzel Proceedings of the 15th International Conference on Availability …, 2020 | 14 | 2020 |
| DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data S Wendzel, T Schmidbauer, S Zillien, J Keller IEEE Transactions on Dependable and Secure Computing 22 (1), 614-631, 2024 | 13* | 2024 |
| Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime. T Schmidbauer, S Wendzel J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13 (1), 137-166, 2022 | 13 | 2022 |
| Hunting shadows: Towards packet runtime-based detection of computational intensive reversible covert channels T Schmidbauer, S Wendzel Proceedings of the 16th International Conference on Availability …, 2021 | 9 | 2021 |
| Look what’s there! utilizing the internet’s existing data for censorship circumvention with OPPRESSION S Zillien, T Schmidbauer, M Kubek, J Keller, S Wendzel Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | 3 | 2024 |
| Combining Different Existing Methods for Describing Steganography Hiding Methods S Wendzel, C Krätzer, J Dittmann, L Caviglione, A Mileva, T Schmidbauer, ... International Conference on Availability, Reliability and Security, 271-289, 2025 | | 2025 |
| A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning J Schymiczek, T Schmidbauer, S Wendzel Proceedings of the 19th International Conference on Availability …, 2024 | | 2024 |
| Novel Sophisticated Network-Level Covert Channels T Schmidbauer University of Hagen, Germany, 2023 | | 2023 |