Diese Seite ist ein Ausdruck von: https://omen.cs.uni-magdeburg.de/fz/contenido48/cms/front_content.php?lang=1&idart=770&idcat=213
ATTRIBUT Publikationen
|
Name der Autorinnen und Autoren |
Publikationsort, Journal |
Titel |
|
J. Dittmann, C. Krätzer, S. Kiltz, R. Altschaffel, C. Vielhauer, S. Wendzel, S. Wefel, H. Nitsch |
GI Sicherheit 2024, Practitioners Track |
Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT) |
|
J.Dittmann, C. Kraetzer, J. Alemann, B. Birnbaum [Dittmann2024] |
ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec '24) |
Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification |
|
S. Zillien, D. Petrov, P. Ruffing, F. Gross [Zillien2024] |
IH&MMSec '24 |
A Development Framework for TCP/IP Network Steganography Malware Detection |
|
M. Knöchel, S. Karius [Knöchel2024] |
IH&MMSec '24 |
Text Steganography Methods and their Influence in Malware: A Comprehensive Overview and Evaluation |
|
S. Kiltz, J. Dittmann, F. Loewe, C. Heidecke, M. John, J. Mädel, F. Preißler [Kiltz2024] |
IH&MMSec '24 |
Forensic Image Trace Map for Image-Stego-Malware Analysis: Validation of the Effectiveness with Structured Image Sets |
|
OVGU: Robert Altschaffel |
EUROPOL EC3 Cyber Innovation Forum 2024 - https://www.europol.europa.eu/publications-events/events/ec3-cyber-innovation-forum-2024 |
Using newly designed forensic Trace Maps as a basis for Detection and Attribution in stego-malware scenarios |
|
R. Altschaffel, S. Kiltz, K. Lamshöft, J. Dittmann |
BSI IT-Sicherheitskongress 2024 |
ICS/OT-Sicherheit: Evaluation und Validierung der Erkennungsleistung von Stego-Malware in industriellen Steuernetzwerken mittels Synthese und Simulation. |
|
Alle Partner |
OVGU Webseiten |
Sammlung von Open Data Forschungsdatensätzen aus dem Projekt Übersicht: https://cloud.ovgu.de/s/2de8WN3ct5abmDe |
|
Rand Alchokr |
Technal Report |
Exemplary Analysis of PlumX and Altmetrics for Measuring Stego and StegoMalware Impacts. https://datasets-amsl.cs.uni-magdeburg.de/index.php/s/Mw5e7yZyB2f77FR |
|
Robert Altschaffel, Jana Dittmann, and Lennox Lingk |
Proc. The Eighteenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2024). 3-7 November 2024, Nice, France, 978-1-68558-206-7, 2024. |
Information Hiding Detection in Industrial Control Systems - Statistical Analysis in Modbus TCP/IP https://www.thinkmind.org/library/SECURWARE/SECURWARE_2024/securware_2024_2_140_30060.html |
|
Tom Neubert, Bjarne Peuker, Eric Schueler, Henning Ullrich, Laura Buxhoidt, and Claus Vielhauer |
Proc. The Eighteenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2024). 3-7 November 2024, Nice, France, 978-1-68558-206-7, 2024. |
An Analysis Framework for Steganographic Network Data in Industrial Control Systems. |
|
Jana Dittmann, Stefan Kiltz, Robert Altschaffel, Judith Antal |
Proceedings of the 2025 ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC '25). San Jose, USA, June 18 - 20, 2025. Association for Computing Machinery (ACM), New York, NY. 2025. |
Traces left by the originator - Forensic Fingerprinting Hidden malware in images to enable attribution on the example of SteganoAmor |
|
Claus Vielhauer, Fabian Loewe, Michael Pilgermann |
Proceedings of the 2025 ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC '25). San Jose, USA, June 18 - 20, 2025. Association for Computing Machinery (ACM), New York, NY. 2025. |
Towards Modeling Hidden & Steganographic Malware Communication based on Images |
|
T. Neubert, E. Schueler, H. Ullrich, L. Buxhoidt, C. Vielhauer |
IARIA International Journal on Advances in Security, 2025, 18 |
Extended Analysis, Detection and Attribution of Steganographic Embedding Methods in Network Data of Industrial Controls Systems https://www.iariajournals.org/security/sec_v18_n12_2025_paged.pdf |
|
Felix Feist, Sebastian Karius, Mandy Knöchel, and Sandro Wefel |
Proceedings of the 2025 ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC '25). San Jose, USA, June 18 - 20, 2025. Association for Computing Machinery (ACM), New York, NY. 2025. |
Support of Forensic Attribution by Visualizing Textual Embeddings of Stegomalware |
|
D. Petrov, P. Ruffing, S. Zillien, S. Wendzel |
Dalla Preda, M., Schrittwieser, S., Naessens, V., De Sutter, B. (eds) Availability, Reliability and Security. ARES 2025. Lecture Notes in Computer Science, vol 15992. Springer, Cham. |
Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences |
|
Christian Krätzer, Jana Dittmann, Jost Alemann, Robert Altschaffel, Stefan Kiltz, Claus Vielhauer, Sandro Wefel, Denis Petrov, Pascal Ruffing, Mandy Knöchel, and Sebastian Karius |
Proc. of the GI Informatik Festival 2025 |
Project ATTRIBUT - Open Data and FOSS from the Perspective of a Research Project on the Attribution of Hidden Communication Channels. |