Publications

2024

  1. CSNet Poster
    Adaptive Optimization of TLS Overhead for Wireless Communication in Critical Infrastructure
    Jörn Bodenhausen, Laurenz Grote, Michael Rademacher, and Martin Henze
    In Proceedings of the 2024 8th Cyber Security in Networking Conference (CSNet) - Poster Session, Dec 2024
  2. CSET
    Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection Datasets
    Philipp Bönninghausen, Rafael Uetz, and Martin Henze
    In Proceedings of the 17th Cyber Security Experimentation and Test Workshop (CSET), Aug 2024
  3. USENIX Sec
    You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks
    Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, and Martin Henze
    In Proceedings of the 33rd USENIX Security Symposium (USENIX Sec), Aug 2024
  4. ASIA CCS
    Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication
    Eric Wagner, David Heye, Martin Serror, Ike Kunze, Klaus Wehrle, and Martin Henze
    In Proceedings of the 19th ACM ASIA Conference on Computer and Communications Security (ASIA CCS), Jul 2024
  5. NOMS
    Unconsidered Installations: Discovering IoT Deployments in the IPv6 Internet
    Markus Dahlmanns, Felix Heidenreich, Johannes Lohmöller, Jan Pennekamp, Klaus Wehrle, and Martin Henze
    In Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS), May 2024
  6. ACNS
    When and How to Aggregate Message Authentication Codes on Lossy Channels?
    Eric Wagner, Martin Serror, Klaus Wehrle, and Martin Henze
    In Proceedings of the 22nd Conference on Applied Cryptography and Network Security (ACNS), Mar 2024
  7. Illicit Blockchain Content: Its Different Shapes, Consequences, and Remedies
    Roman Matzutt, Martin Henze, Dirk Müllmann, and Klaus Wehrle
    In Blockchains – A Handbook on Fundamentals, Platforms and Applications, Mar 2024
  8. ACNS Poster
    Towards Secure 5G Infrastructures for Production Systems
    Martin Henze, Maximilian Ortmann, Thomas Vogt, Osman Ugus, Kai Hermann, Svenja Nohr, Zeren Lu, Sotiris Michaelides, Angela Massonet, and Robert H. Schmitt
    In Proceedings of the 22nd Conference on Applied Cryptography and Network Security (ACNS) – Poster Session, Mar 2024

2023

  1. MobiQuitous
    Securing Wireless Communication in Critical Infrastructure: Challenges and Opportunities
    Jörn Bodenhausen, Christian Sorgatz, Thomas Vogt, Kolja Grafflage, Sebastian Rötzel, Michael Rademacher, and Martin Henze
    In Proceedings of the 20th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), Nov 2023
  2. LCN
    Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols
    Eric Wagner, Nils Rothaug, Konrad Wolsing, Lennart Bader, Klaus Wehrle, and Martin Henze
    In Proceedings of the 48th IEEE Conference on Local Computer Networks (LCN), Oct 2023
  3. JSys
    SoK: Evaluations in Industrial Intrusion Detection Research
    Olav Lamberts, Konrad Wolsing, Eric Wagner, Jan Pennekamp, Jan Bauer, Klaus Wehrle, and Martin Henze
    Journal of Systems Research, Oct 2023
  4. ISGT-Europe
    Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids
    Ömer Sen, Simon Glomb, Martin Henze, and Andreas Ulbig
    In Proceedings of the 2023 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), Oct 2023
  5. CyberICPS
    METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks
    Lennart Bader, Eric Wagner, Martin Henze, and Martin Serror
    In Proceedings of the 8th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS), Sep 2023
  6. ESORICS
    One IDS is not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection
    Konrad Wolsing, Dominik Kus, Eric Wagner, Jan Pennekamp, Klaus Wehrle, and Martin Henze
    In Proceedings of the 28th European Symposium on Research in Computer Security (ESORICS), Sep 2023
  7. SEST
    Investigation of Multi-stage Attack and Defense Simulation for Data Synthesis
    Ömer Sen, Bozhidar Ivanov, Martin Henze, and Andreas Ulbig
    In Proceedings of the 6th International Conference on Smart Energy Systems and Technologies (SEST), Sep 2023
  8. EuroS&P
    Comprehensively Analyzing the Impact of Cyberattacks on Power Grids
    Lennart Bader, Martin Serror, Olav Lamberts, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, and Martin Henze
    In Proceedings of the 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), Jul 2023
  9. CAiSE
    Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking
    Jan Pennekamp, Johannes Lohmöller, Eduard Vlad, Joscha Loos, Niklas Rodemann, Patrick Sapel, Ina Berenice Fink, Seth Schmitz, Christian Hopmann, Matthias Jarke, Günther Schuh, Klaus Wehrle, and Martin Henze
    In Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE), Jun 2023
  10. PowerTech
    An Approach To Abstract Multi-Stage Cyberattack Data Generation For ML-based IDS In Smart Grids
    Ömer Sen, Philipp Malskorn, Simon Glomb, Immanuel Hacker, Martin Henze, and Andreas Ulbig
    In Proceedings of 2023 IEEE Belgrade PowerTech, Jun 2023
  11. CIRED
    A Cyber-Physical Digital Twin Approach to Replicating Realistic Multi-Stage Cyberattacks on Smart Grids
    Ömer Sen, Nathalie Bleser, Martin Henze, and Andreas Ulbig
    In Proceedings of the 2023 International Conference on Electricity Distribution (CIRED), Jun 2023
  12. Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead
    Jan Pennekamp, Anastasiia Belova, Thomas Bergs, Matthias Bodenbenner, Andreas Bührig-Polaczek, Markus Dahlmanns, Ike Kunze, Moritz Kröger, Sandra Geisler, Martin Henze, Daniel Lütticke, Benjamin Montavon, Philipp Niemietz, Lucia Ortjohann, Maximilian Rudack, Robert H. Schmitt, Uwe Vroomen, Klaus Wehrle, and Michael Zeng
    In Internet of Production: Fundamentals, Applications and Proceedings, Feb 2023

2022

  1. SEGAN
    On Using Contextual Correlation to Detect Multi-stage Cyber Attacks in Smart Grids
    Ömer Sen, Dennis van der Velde, Katharina A. Wehrmeister, Immanuel Hacker, Martin Henze, and Michael Andres
    Sustainable Energy, Grids and Networks, Dec 2022
  2. CUMUL & Co: High-Impact Artifacts for Website Fingerprinting Research
    Jan Pennekamp, Martin Henze, Andreas Zinnen, Fabian Lanze, Klaus Wehrle, and Andriy Panchenko
    Dec 2022
  3. ACSAC Poster
    Poster: Ensemble Learning for Industrial Intrusion Detection
    Dominik Kus, Konrad Wolsing, Jan Pennekamp, Eric Wagner, Martin Henze, and Klaus Wehrle
    Dec 2022
  4. CCS Poster
    Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring
    Martin Serror, Lennart Bader, Martin Henze, Arne Schwarze, and Kai Nürnberger
    In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS) – Poster Session, Nov 2022
  5. RAID
    IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
    Konrad Wolsing, Eric Wagner, Antoine Saillard, and Martin Henze
    In Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Oct 2022
  6. LCN
    Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset
    Konrad Wolsing, Antoine Saillard, Jan Bauer, Eric Wagner, Christian van Sloun, Ina Berenice Fink, Mari Schmidt, Klaus Wehrle, and Martin Henze
    In Proceedings of the 47th IEEE Conference on Local Computer Networks (LCN), Sep 2022
  7. On Specification-based Cyber-Attack Detection in Smart Grids
    Ömer Sen, Dennis van der Velde, Maik Lühman, Florian Sprünken, Immanuel Hacker, Andreas Ulbig, Michael Andres, and Martin Henze
    In Proceedings of the 11th DACH+ Conference on Energy Informatics, Sep 2022
  8. ESORICS
    Can Industrial Intrusion Detection Be SIMPLE?
    Konrad Wolsing, Lea Thiemt, Christian van Sloun, Eric Wagner, Klaus Wehrle, and Martin Henze
    In Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS), Sep 2022
  9. CSET
    PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
    Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner, Martin Henze, and Martin Serror
    In Proceedings of the 15th Workshop on Cyber Security Experimentation and Test (CSET), Aug 2022
  10. WiSec
    BP-MAC: Fast Authentication for Short Messages
    Eric Wagner, Martin Serror, Klaus Wehrle, and Martin Henze
    In Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May 2022
  11. ASIA CCS
    Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things
    Markus Dahlmanns, Johannes Lohmöller, Jan Pennekamp, Jörn Bodenhausen, Klaus Wehrle, and Martin Henze
    In Proceedings of the 17th ACM ASIA Conference on Computer and Communications Security (ASIA CCS), May 2022
  12. CPSS
    A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection
    Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, and Martin Henze
    In Proceedings of the 8th ACM Cyber-Physical System Security Workshop (CPSS), May 2022
  13. WiSec
    Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes
    Eric Wagner, Jan Bauer, and Martin Henze
    In Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May 2022
  14. ICBC
    Scalable and Privacy-Focused Company-Centric Supply Chain Management
    Eric Wagner, Roman Matzutt, Jan Pennekamp, Lennart Bader, Irakli Bajelidze, Klaus Wehrle, and Martin Henze
    In Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), May 2022

2021

  1. ACSAC
    Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments
    Rafael Uetz, Christian Hemminghaus, Louis Hackländer, Philipp Schlipper, and Martin Henze
    In Proceedings of the 37th Annual Computer Security Applications Conference (ACSAC), Dec 2021