ATTRIBUT Publikationen


Name der Autorinnen und Autoren 

Publikationsort, Journal  

Titel

J. Dittmann, C. Krätzer, S. Kiltz, R. Altschaffel, C. Vielhauer, S. Wendzel, S. Wefel, H. Nitsch

 GI Sicherheit 2024, Practitioners Track

Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT)

https://doi.org/10.18420/SICHERHEIT2024_018

J.Dittmann, C. Kraetzer, J. Alemann, B. Birnbaum

[Dittmann2024]

ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec '24)

Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification

https://doi.org/10.1145/3658664.3659641

S. Zillien, D. Petrov, P. Ruffing, F. Gross

[Zillien2024]

IH&MMSec '24

A Development Framework for TCP/IP Network Steganography Malware Detection

https://doi.org/10.1145/3658664.3659651

M. Knöchel, S. Karius

[Knöchel2024]

IH&MMSec '24

Text Steganography Methods and their Influence in Malware: A Comprehensive Overview and Evaluation

https://doi.org/10.1145/3658664.3659637

S. Kiltz, J. Dittmann, F. Loewe, C. Heidecke, M. John, J. Mädel, F. Preißler

[Kiltz2024]

IH&MMSec '24

Forensic Image Trace Map for Image-Stego-Malware Analysis: Validation of the Effectiveness with Structured Image Sets

https://doi.org/10.1145/3658664.3659659

OVGU: Robert Altschaffel

EUROPOL EC3 Cyber Innovation Forum 2024 - https://www.europol.europa.eu/publications-events/events/ec3-cyber-innovation-forum-2024

Using newly designed forensic Trace Maps as a basis for Detection and Attribution in stego-malware scenarios

R. Altschaffel, S. Kiltz, K. Lamshöft, J. Dittmann

BSI IT-Sicherheitskongress 2024

ICS/OT-Sicherheit: Evaluation und Validierung der Erkennungsleistung von Stego-Malware in industriellen Steuernetzwerken mittels Synthese und Simulation.

https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Veranstaltungen/ITSiKongress/20ter/Kongressdokumentation_2024.pdf?__blob=publicationFile&v=5

Alle Partner

OVGU Webseiten

Sammlung von Open Data Forschungsdatensätzen aus dem Projekt

Übersicht: https://cloud.ovgu.de/s/2de8WN3ct5abmDe

Rand Alchokr

Technal Report

Exemplary Analysis of PlumX and Altmetrics for Measuring Stego and StegoMalware Impacts.

https://datasets-amsl.cs.uni-magdeburg.de/index.php/s/Mw5e7yZyB2f77FR

Robert Altschaffel, Jana Dittmann, and Lennox Lingk

Proc. The Eighteenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2024). 3-7 November 2024, Nice, France, 978-1-68558-206-7, 2024.

Information Hiding Detection in Industrial Control Systems - Statistical Analysis in Modbus TCP/IP

https://www.thinkmind.org/library/SECURWARE/SECURWARE_2024/securware_2024_2_140_30060.html

Tom Neubert, Bjarne Peuker, Eric Schueler, Henning Ullrich, Laura Buxhoidt, and Claus Vielhauer

Proc. The Eighteenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2024). 3-7 November 2024, Nice, France, 978-1-68558-206-7, 2024.

An Analysis Framework for Steganographic Network Data in Industrial Control Systems.


https://www.thinkmind.org/library/SECURWARE/SECURWARE_2024/securware_2024_2_130_30058.html

Jana Dittmann, Stefan Kiltz, Robert Altschaffel, Judith Antal

Proceedings of the 2025 ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC '25). San Jose, USA, June 18 - 20, 2025. Association for Computing Machinery (ACM), New York, NY. 2025.

Traces left by the originator - Forensic Fingerprinting Hidden malware in images to enable attribution on the example of SteganoAmor

https://dl.acm.org/doi/10.1145/3733102.3733127

Claus Vielhauer, Fabian Loewe, Michael Pilgermann

Proceedings of the 2025 ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC '25). San Jose, USA, June 18 - 20, 2025. Association for Computing Machinery (ACM), New York, NY. 2025.

Towards Modeling Hidden & Steganographic Malware Communication based on Images

https://dl.acm.org/doi/10.1145/3733102.3733152

T. Neubert, E. Schueler, H. Ullrich, L. Buxhoidt, C. Vielhauer

IARIA International Journal on Advances in Security, 2025, 18

Extended Analysis, Detection and Attribution of Steganographic Embedding Methods in Network Data of Industrial Controls Systems

https://www.iariajournals.org/security/sec_v18_n12_2025_paged.pdf

Felix Feist, Sebastian Karius, Mandy Knöchel, and Sandro Wefel

Proceedings of the 2025 ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC '25). San Jose, USA, June 18 - 20, 2025. Association for Computing Machinery (ACM), New York, NY. 2025.

Support of Forensic Attribution by Visualizing Textual Embeddings of Stegomalware

https://dl.acm.org/doi/10.1145/3733102.3733136

D. Petrov, P. Ruffing, S. Zillien, S. Wendzel

Dalla Preda, M., Schrittwieser, S., Naessens, V., De Sutter, B. (eds) Availability, Reliability and Security. ARES 2025. Lecture Notes in Computer Science, vol 15992. Springer, Cham.

Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences

https://doi.org/10.1007/978-3-032-00624-0_6

Christian Krätzer, Jana Dittmann, Jost Alemann, Robert Altschaffel, Stefan Kiltz, Claus Vielhauer, Sandro Wefel, Denis Petrov, Pascal Ruffing, Mandy Knöchel, and Sebastian Karius

Proc. of the GI Informatik Festival 2025

Project ATTRIBUT - Open Data and FOSS from the Perspective of a Research Project on the Attribution of Hidden Communication Channels.

https://nextcloud.gi.de/s/YcW26W9ApSLD6on


Letzte Änderung: 26.09.2025

Sie können eine Nachricht versenden an: Webmaster
Sicherheitsabfrage:
Captcha
 
Lösung: