I gave talks in several countries (Europe, America, Asia, Oceania), at various industry events (e.g. SANS European ICS Security Summit, Secure Linux Administration Conference, several VDI events, …), various academic conferences (e.g. LCN, NordSec, CMS, …), government organizations (e.g., ZiTiS, Cyberagentur, LKA Niedersachsen), universities (e.g., CentraleSupélec, U Bonn, Murdoch U Perth, Swinburn U Melbourne, …), EU events and also at hacking conferences such as Hack-in-the-Box AMS (HITB (2x), TROOPERS, DeepIntel, Datenspuren, …). I also took part in several panels and was moderator of some.

  1. Recent Developments in Network Information Hiding, EURASIP Webinar, online, 2023-10-19.

  2. Herausforderungen an die IT-Sicherheit in der Gebäudeautomation, VDI Arbeitskreis Bauen und Gebäudetechnik: Technische Ausrüstung, online, 2023-08-08.

  3. Penetration-Testing mit Linux, Linux-Presentation-Day (LPD) 2023.1, Hochschule Worms, Worms, DE, 2023-05-26.

  4. Obfuskierte und versteckte Datenkommunikation: Subdomänen und Forschungstrends, Cyberagentur, online, DE, 2023-04-05.

  5. Obfuscation and Concealment Methods for Network Traffic, CentraleSupélec, Rennes, FR, 2023-03-30.

  6. Inaugural lecture: Gemeinsamkeiten und neue Ansätze von Obfuskations- und Versteckmethoden in Netzwerken, FernUniversität in Hagen, Hagen, DE, 2023-02-13.

  7. 20 Jahre im Schnelldurchlauf: ein Linux-Handbuch im Wandel der Zeit, Linux-Presentation-Day (LPD) 2022, Hochschule Worms, Worms, DE, 2022-11-18.

  8. Keynote: Describing Steganography Hiding Methods with a Unified Taxonomy, ARES CUING Workshop, Vienna, AT, 2022-08-24.

  9. IT-Sicherheit für automatisierte Gebäude: ein Überblick, VDI Fachtagung Gebäudeautomation – intelligent und nachhaltig, Baden-Baden, DE, 2022-06-29.

  10. Steganography Hiding Patterns: A Brief Review, EICC’22 DETONATOR Workshop, online, 2022-06-15/16.

  11. Untersuchung des Gender-gaps bei Cybersecurity-Publikationen, GI Sicherheit 2022, Karlsruhe, DE, 2022-04-06.

  12. A Revised Taxonomy of Steganography Embedding Patterns, ARES’21 CUING Workshop, online, 2021-08-18.

  13. Keynote: Novel Approaches for Network Steganography Countermeasures, ZiTiS Forschungsseminar, online, 2021-07-13.

  14. BePI: Fast and Memory Efficient Method for Billion-scale Random Walk with Restart, Talk in front of Habilitation Commission, Department of Mathematics and Computer Science, University of Hagen, DE, 2020-11-02.

  15. Realisierung von Prozessen in Betriebssystem-Kerneln, Talk in front of Habilitation Commission, Department of Mathematics and Computer Science, University of Hagen, DE, 2020-09-21.

  16. Recent Advances in Network Steganography Detection, DeepIntel Conference, Vienna, AT, 2019-11-27.

  17. Anomalieerkennung für Smart Buildings, 2. Forum zum Erfahrungsaustausch in der Gebäudeautomation, BImA, Berlin, DE, 2019-11-26.

  18. Protocol-independent Detection of Covert Channels Using the ‘Size Modulation’ Pattern, ARES’19 CUING Workshop, Canterbury, UK, 2019-08-27.

  19. Smart Buildings – Herausforderungen an die IT-Sicherheit, Stuttgarter Sicherheitskonferenz, Stuttgart, 2019-07-15.

  20. Data leakage and covert data exfiltration: The new threat of network information hiding, Smart Rail World Conference, Munich, 2019-06-18.

  21. Taxonomie und wissenschaftliche Methodik für das Gebiet Network Information Hiding, FernUniversität in Hagen (Fakultätskolloquium Mathematik & Informatik), Hagen, 2019-05-27.

  22. IT-Sicherheit automatisierter Gebäude im IoT, Auvesy-Konferenz, Karlsruhe, 2019-05-16.

  23. Network Covert Channel Patterns: Current State and Methodology, University of Bonn (Oberseminar Inst. f. Informatik IV), 2019-01-16.

  24. Detection of covert channels in TCP retransmissions, 23rd Nordic Conference on Secure IT Systems (NordSec), Oslo, NO, 2018-11-29.

  25. IT-Sicherheit und das Internet der Dinge, VHS Böblingen-Sindelfingen e.V., online webinar, 2018-11-19.

  26. One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels, Central European Cybersecurity Conference (CECC), Ljubljana, SI, 2018-11-15.

  27. Get me cited, Scotty! Analyzing Citations in Covert Channel/Steganography Research, ARES’18 CUING Workshop, Hamburg, DE, 2018-08-28.

  28. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach, ARES’18 CUING Workshop, Hamburg, DE, 2018-08-28.

  29. Network Information Hiding, COINS PhD Summer School 2018 (full-day class), Metochi, Lesvos, GR, 2018-07-28.

  30. IoT-Sicherheit für die GA-Industrie, VDMA, Frankfurt, 2018-05-02.

  31. Steganography Ante Portas, Hack-in-the-Box (HITB), Amsterdam, NL, 2018-04-12.

  32. IoT-Sicherheit – was ist neu und was ist wichtig?, Tüv-Süd Fachtagung Gebäude 4.0, München, 2018-04-11.

  33. IoT-Sicherheit – was ist daran neu und was relevant?, GI SecMgt Workshop ‘Neue’ Technologien und ‘neue’ Bedrohungen, Frankfurt, 2017-11-24.

  34. Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring, 42th IEEE Conference on Local Computer Networks (LCN), Singapore, SG, 2017-10-10.

  35. Kryptografie und Netzwerksicherheit für die Gebäudeautomation, Bälz Seminar der Technischen Hochschule Köln, 2017-09-08.

  36. Sicherheit im Internet der Dinge, KMU meets KMH, Worms, 2017-05-29.

  37. Don’t You Touch My Nuts: Information Hiding In Cyber Physical Systems Using Smart Buildings, BioStar/IEEE Security and Privacy Workshops, San José, CA, United States, 2017-05-25,

  38. Ant Colony-inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators, BioStar/IEEE Security and Privacy Workshops, San José, CA, United States, 2017-05-25 (per video stream).

  39. IT-Sicherheit mit BARNI (Building Automation Reliable Network Infrastructure), Smart Home and Metering Summit 2016, München, Germany, 2016-06-29.

  40. Forschung zur Sicherheit von Smart Buildings, SmartHome NRW-Event zur Sicherheit von Smart Homes, Bonn, Germany, 2016-04-26.

  41. Novel Approaches for Network Covert Storage Channels, Murdoch University, Perth, Australia, 2016-02-19.

  42. IT-Sicherheit von Smart Homes: Chancen und Risiken, Landeskriminalamt (LKA) Niedersachsen, Hannover, Germany, 2016-01-28.

  43. Security in Smart Building Networks, NRW.Invest / Germany at its best, Tower Bridge House, London, United Kingdom, 2015-12-03.

  44. inHaus-Event: Sicherheit von Smart Homes (event moderator), Fraunhofer inHaus-Zentrum, Duisburg, Germany, 2015-11-17.

  45. Your house knows what you did last summer (talk and panel), ECO Internet Security Days (ISD) 2015, Brühl, Germany, 2015-09-17.

  46. BACtag – Data Leakage Protection für Gebäude, D-A-CH Security 2015, St. Augustin, Germany, 2015-09-09.

  47. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments, Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, United States, 2015-08-06.

  48. Auf dem Weg zum sicheren Smart Building, Forum Bauindustrie 2015, Zurich, Switzerland, 2015-05-21.

  49. Smart Buildings – sind sie kritische Infrastrukturen?, Workshop des AK KRITIS, Bonn, Germany, 2015-04-24.

  50. Vortrag über den wissenschaftlichen Ausblick auf die Cyber Security der Zukunft, 2. Mannheimer Symposium des IKZ ‘Möglichkeiten und Auswirkungen des Cyberspace’‘, Mannheim, Germany, 2014-11-06.

  51. Hidden and Uncontrolled: The Emergence of Network Steganography, ISSE 2014, Brussels, Belgium, 2014-10-14.

  52. Area of Interest on Trustworthy (Hyperconnected) Infrastructure (of NIS-P. WG3): Short Progress Report, Seminar on Road-mapping Cybersecurity Research and Innovation, Florence, Italy, 2014-10-08.

  53. Netzwerksicherheit in BACnet-Systemen (talk and panel), GLT Anwendertagung, Dresden, Germany, 2014-09-25.

  54. BACnet Security and Botnets, SANS European ICS Security Summit, Amsterdam, The Netherlands, 2014-09-22.

  55. Alice’s Adventures in Smart Building Land – Novel Adventures in a Cyber Physical Environment, Hack in the Box (HITB), Amsterdam, The Netherlands, 2014-05-29/30.

  56. Smart Insecure Buildings, ITEC 2014 (International Training and Education Conference), Cologne, Germany, 2014-05-21.

  57. Smart Industrial Buildings: Sicherheit für Automation und Management von Gebäuden, 2. VDI Fachkonferenz Industrial IT Security, Frankfurt, Germany, 2014-05-07.

  58. Area of Interest on Trustworthy (Hyperconnected) Infrastructures, NIS Platform WG3 Meeting, Brussels, Belgium, 2014-04-29.

  59. Part of Panel: Towards defining priorities for cybersecurity research in Horzon 2020’s work programme 2016-2017 – Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform, Trust in the Digital World Conference (TDW), Vienna, Austria, 2014-04-08.

  60. Envisioning Smart Building Botnets, GI Sicherheit 2014, Vienna, Austria, 2014-03-21.

  61. Data Leakage Protection: Zukünftige Herausforderungen zur Sicherung von Vertraulichkeit, Chemnitzer Linuxtage 2014, Chemnitz, Germany, 2014-03-15/16.

  62. Zukünftige Herausforderungen für die Sicherheit Smarter Gebäude, 21. DFN Workshop zur Sicherheit in vernetzten Systemen, Hamburg, Germany, 2014-02-18.

  63. Currently Addressed Challenges in Smart Building Security Research at Fraunhofer FKIE, 9th IT4SE Workshop, Augsburg, Germany, 2013-12-06.

  64. Keynote: Nach dem Angriff: Versteckte Exfiltration vertraulicher Daten, Heise Events Konferenztag Prism, Tempora und Co. – Rezepte gegen den Abhörwahn, Köln, Germany, 2013-12-03.

  65. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels, ARES ECTCM Workshop, Regensburg, Germany, 2013-09-04.

  66. Novel Approaches for Network Covert Storage Channels, PhD thesis defense talk at the University of Hagen, Hagen, Germany, 2013-05-07.

  67. Novel Approaches for Network Covert Channels, Invited talk at Fraunhofer FKIE, Bonn, Germany, 2013-04-18.

  68. Covert Channel-internal Control Protocols, Technical University Hamburg-Harburg (TUHH), Oberseminar, Hamburg, Germany, 2013-04-16.

  69. Sicherheit in Sozialen Netzwerken, Mitgliederversammlung Genossenschaftsbank Unterallgäu, Ottobeuren, Germany, 2013-03-21.

  70. Datenschutz und Datensicherheit im Zeitalter Sozialer Netzwerke, Forum Mindelheim/Genossenschaftsbank Unterallgäu eG, Mindelheim, Germany, 2013-03-18.

  71. Ich weiß, was du letzte Woche getan hast! Seitenkanäle in der Gebäudeautomation, Chemnitzer Linuxtage 2013, Chemnitz, Germany, 2013-03-17.

  72. The future of data exfiltration and malicious communication, TROOPERS’13, Heidelberg, Germany, 2013-03-13.

  73. Dynamic Routing in Covert Channel Overlays Based on Control Protocols, International Workshop on Information Security, Theory and Practice (ISTP-2012), London, United Kingdom, 2012-12-10.

  74. Covert Channels and their Prevention in Building Automation Protocols – A Prototype Exemplified Using BACnet, 2nd Workshop on Security of Systems and Software Resiliency, Besançon, France, 2012-11-20.

  75. Systematic Engineering of Control Protocols for Covert Channels, 13th Conference on Communications and Multimedia Security (CMS), Canterbury, United Kingdom, 2012-09-04.

  76. Control Protocols for Network Covert Channels, 7th GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), Berlin, Germany, 2012-07-06.

  77. Covert and Side Channels in Buildings and the Prototype of a Building-aware Active Warden, IEEE Workshop on Security and Forensics in Communication Systems, Ottawa, Canada, 2012-06-15.

  78. Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels, 7th International Conference on Internet Monitoring and Protection (ICIMP), Stuttgart, Germany, 2012-05-28.

  79. Security in building automation systems and the prevention of malicious data communication in building automation networks, Linux-Informationstag der LUGA, Augsburg, Germany, 2012-03-24.

  80. The Problem of Traffic Normalization Within a Covert Channel’s Network Environment Learning Phase, GI Sicherheit 2012, Darmstadt, Germany, 2012-03-08.

  81. Micro protocols and dynamic protocol switches in network covert channels, Swinburne University, Melbourne, Australia, 2012-01-12.

  82. A Secure Interoperable Architecture for Building-Automation Applications, 4th Int. Symp. on Applied Sciences in Biomedical and Communication Technologies, Barcelona, Spain, 2011-10-27.

  83. Low-attention forwarding for mobile network covert channels, 12th IFIP Conference on Communications and Multimedia Security (CMS 2011), Ghent, Belgium, 2011-10-21.

  84. Verdeckte Kanäle: Informationen durch die Hintertür, Datenspuren 2011, Dresden, Germany, 2011-10-15.

  85. Verdeckte Kanäle – Neuland für freie Software, Open-Source-Treffen München, Germany, 2011-07-22.

  86. Aktuelle Techniken und Methoden der verdeckten Kommunikationskanäle, Chaos Singularity (CoSin) 2011, Biel, Switzerland, 2011-06-25.

  87. Europäische Forschungsprojekte im Schnittbereich IT und erneuerbare Energien, 1st IT4SE-Workshop, Augsburg University of Applied Sciences, Augsburg, Germany, 2010-12-07.

  88. Einführung in verdeckte Kanäle, 9. Linux-Infotag der Linux-Usergroup Augsburg (LUGA), Augsburg, Germany, 2010-05-27.

  89. Protocol Hopping Covert Channels und Protocol Channels, MetaRheinMain ChaosDays 0x8, Darmstadt, Germany, 2009-09-06.

  90. Hostbasierte Sicherheit und Linux-Hardening, Secure Linux Administration Conference (SLAC), Berlin, Germany, 2006-12-07.