Publikationen

2024

[24-01]

S. Zillien, T. Schmidbauer, M. Kubek, J. Keller, S. Wendzel.
Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION.
In: Proc. 19th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2024), Singapore, July 1-5, pp. 80-95, 2024.

[24-02] M. Boulasikis, C. Kessler, F. Gruian, J. Keller, S. Litzinger.

Packet-Type Aware Scheduling of Moldable Streaming Tasks on Multicore Systems with DVFS.
In: Proc. 39th ACM/SIGAPP Symposium On Applied Computing (SAC), Avila, Spain, April 8-12, pp. 449-451,2024.

[24-03] M. Walter, J. Keller.

5G UnCovert: Hiding Information in 5G New Radio.
In: Proc. GI Sicherheit 2024, Worms, Apr 9-11, pp. 33-46, 2024.

[24-04]

P. Tippe.
A Study of Deanonymization Attacks of Onion Services.
In: Proc. GI Sicherheit 2024, Worms, Apr 9-11, pp. 281-287, 2024.

[24-05]

C. Heßeling, S. Litzinger, J. Keller.
Archive-based Covert Channel in Sensor Streaming Data.
In: Journal of Universal Computer Science, Vol. 30 No. 8 pp. 1048-1067, August 2024.

[24-06] P. Tippe.

Onion Services in the Wild: A Study of Deanonymization Attacks.
In: Proc. 24th Privacy Enhancing Technologies Symposium (PETS), Bristol, UK, July 15–20, pp. 291-310, 2024.

[24-07] K. Hölk, W. Mazurczyk, M. Zuppelli, L. Caviglione.

Investigating HTTP Covert Channels Through Fuzz Testing.
In: Proc. International Conference on Availability, Reliability and Security (ARES 2024), Vienna, July 30-August 2, pp. 19:1-19:9, 2024.

[24-08]

J. Keller, S. Imhof, P. Sobe.
Error Correction and Erasure Codes for Robust Network Steganography.
In: Journal of Systems Architecture,Vol. 153 Art. 103191, 2024.

[24-09] S. Wendzel, T. Schmidbauer, S. Zillien, J. Keller.
DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data.
To appear in: IEEE Transactions on Dependable and Secure Computing, 2024.
[24-10]

M. Olbort, D. Spiekermann, J. Keller.
Manipulating the Swap Memory for Forensic Investigation.
In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024), Wien, July 30-August 2, pp. 199:1-199:6, 2024.

[24-11]

J. Keller, C. Heßeling, S. Wendzel.
Robust and Homomorphic Covert Channels in Streams of Numeric Data.
In: Proc. 19th International Conference on Availability, Reliability and Security (ARES 2024), Wien, July 30-August 2, pp. 79:1-79:4, 2024.

[24-12]

D. Spiekermann, J. Keller.
Challenges of Digital Investigations in Nowadays Communication Networks.
In: Proc. 2024 IEEE International Conference on Cyber Security and Resilience (IEEE CSR) Workshops, London, Sept 2-4, pp. 872-877, 2024.

[24-13] S. Khosravi, C. Kessler, S. Litzinger, J. Keller.

Energy-Efficient Scheduling of Moldable Streaming Computations for the Edge-Cloud Continuum.
In: Proc. 9th IEEE International Conference on Fog and Mobile Edge Computing (FMEC 2024), Malmö, Sept 2-5, pp. 268-276, 2024.

[24-14]

D. Spiekermann, T. Eggendorfer, J. Keller.
Deep Learning for Network Intrusion Detection in Virtual Networks.
In: Electronics vol. 13 no. 8 art no. 3617, 2024.

[24-15]

L. Oden, S. Litzinger, J. Keller.
Fast Compression of Floating-Point Values with Exponent/Mantissa Shuffling.
To appear in: Proc. 30th PARS-Workshop, Ingolstadt, Sept 25-26, 2024.

[24-16] P. Tippe, L. Donah.
Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services.
To appear in: Proc. 29th Nordic Conference on Secure IT Systems (NordSec 2024), Karlstad, Sweden, Nov 6-7, 2024.
[24-17] M. Walter, J. Keller.
Design and Evaluation of Steganographic Channels in Fifth-Generation New Radio.
In: Future Internet, vol. 16 no. 11 art. no. 410, 2024.

2023

[23-01] S. Litzinger, J. Keller, C. Kessler.
Packing Multiple Types of Cores for Energy-Optimized Heterogeneous Hardware-Software Co-Design of Moldable Streaming Computations.

In: IEEE Access, Vol. 11 pp. 19301-19311, 2023.

[23-02] J. Keller, C. Heßeling.
Improving Covert Channel Bandwidth by Variable-Length Exponent Re-Coding in Floating-Point Representations.
In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2023), Stavanger, June 14-15, pp. 125-128, 2023.
[23-03]

J. Keller, S. Langsdorf.
Error Codes in and for Network Steganography.
In: Proc. 36th GI/ITG International Conference on Architecture of Computing Systems (ARCS2023), Athen, June 13-15, pp. 81-93, 2023.

[23-04]

P. Rajba, J. Keller, W. Mazurczyk.
Proof-of-work based new encoding scheme for information hiding purposes.
In: Proc. 18th International Conference on Availability, Reliability and Security (ARES 2023), Benevento, August 29-Sept 1, Art. no. 45, 2023.

[23-05]

M. Schneider, D. Spiekermann, J. Keller.
Network Covert Channels in Routing Protocols.
In: Proc. 18th International Conference on Availability, Reliability and Security (ARES 2023), Benevento, August 29-Sept 1, Art. no. 42, 2023.

[23-06]

C. Heßeling, S. Litzinger, J. Keller.
Reversible Network Covert Channel by Payload Modulation in Streams of Decimal Sensor Values.
In: Proc. 19th IEEE International Conference on eScience, Limassol, Cyprus, October 9-13, pp. 1-8, 2023.

[23-07]

D. Spiekermann, J. Keller.
Challenges of Network Forensic Investigation in Fog and Edge Computing.
In: Future Internet Vol. 15 No.10 Art. 342 , 2023.

[23-08]

S. Litzinger.
Heuristic Scheduling of Streaming Applications for Energy Efficiency on Heterogeneous Multicores.
In: Proc. 25th IEEE International Conference on High Performance Computing and Communications (HPCC 2023), 13-15 Dec. 2023, Melbourne, Australia, pp. 225-232, 2023.