2025

  1. GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection
    Konrad Wolsing, Eric Wagner, Luisa Lux, Klaus Wehrle, and Martin Henze
    In Proceedings of the 34th USENIX Security Symposium (USENIX Sec’25), 2025
  2. CAIBA: Multicast Source Authentication for CAN Through Reactive Bit Flipping
    Eric Wagner, Frederik Basels, Jan Bauer, Till Zimmermann, Klaus Wehrle, and Martin Henze
    In Proceedings of the 2025 IEEE 10th European Symposium on Security and Privacy (EuroS&P’25), 2025
  3. Sherlock: A Dataset for Process-aware Intrusion Detection Research on Power Grid Networks
    Eric Wagner, Lennart Bader, Konrad Wolsing, and Martin Serror
    In Proceedings of the 15th ACM Conference on Data and Application Security and Privacy (CODASPY’25), 2025
  4. Integrating MAC Aggregation over Lossy Channels in DTLS 1.3
    Eric Wagner, David Heye, Jan Bauer, Klaus Wehrle, and Martin Serror
    In Proceedings of the 33rd IEEE International Conference on Network Protocols (ICNP’25), 2025
  5. CERERE-An Emulation Environment to Evaluate the Resilience of Complex Systems against Cyber Electro-Magnetic Activities
    Matteo Attenni, Sara Belluccini, Giordano Colò, Andrea Pompili, Pietro Tedeschi, Lennart Bader, and 5 more authors
    In Proceedings of the 2025 International Conference on Military Communication and Information Systems (ICMCIS’25), 2025

2024

  1. An Interdisciplinary Survey on Information Flows in Supply Chains
    Jan Pennekamp, Roman Matzutt, Christopher Klinkmüller, Lennart Bader, Martin Serror, Eric Wagner, and 9 more authors
    ACM Computing Surveys, 2024
  2. Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication
    Eric Wagner, David Heye, Martin Serror, Ike Kunze, Klaus Wehrle, and Martin Henze
    In Proceedings of the 19th ACM Asia Conference on Computer and Communications Security (AsiaCCS’24), 2024
  3. When and How to Aggregate Message Authentication Codes on Lossy Channels?
    Eric Wagner, Martin Serror, Klaus Wehrle, and Martin Henze
    In Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS’24), 2024
  4. Deployment Challenges of Industrial Intrusion Detection Systems
    Konrad Wolsing, Eric Wagner, Frederik Basels, Patrick Wagner, and Klaus Wehrle
    In Proceedings of the 10th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (ICPS’24), 2024
  5. Blockchain Technology Accelerating Industry 4.0
    Jan Pennekamp, Lennart Bader, Eric Wagner, Jens Hiller, Roman Matzutt, and Klaus Wehrle
    In Blockchains – A Handbook on Fundamentals, 2024
  6. Towards Improving Accountability in Sensitive-Disclosure Scenarios
    Roman Matzutt and Eric Wagner
    In Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference (EICC’24), 2024

2023

  1. METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks
    Lennart Bader, Eric Wagner, Martin Henze, and Martin Serror
    In Proceedings of the 8th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS’23), 2023
  2. SoK: Evaluations in Industrial Intrusion Detection Research
    Olav Lamberts, Konrad Wolsing, Eric Wagner, Jan Pennekamp, Jan Bauer, Klaus Wehrle, and 1 more author
    Journal of Systems Research, 2023
  3. Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols
    Eric Wagner, Nils Rothaug, Konrad Wolsing, Lennart Bader, Klaus Wehrle, and Martin Henze
    In Proceedings of the IEEE 48th Conference on Local Computer Networks (LCN’23), 2023
  4. One IDS is not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection
    Konrad Wolsing, Dominik Kus, Eric Wagner, Jan Pennekamp, Klaus Wehrle, and Martin Henze
    In Proceedings of the 28th European Symposium on Research in Computer Security (ESORICS’23), 2023

2022

  1. BP-MAC: Fast Authentication for Short Messages
    Eric Wagner, Martin Serror, Klaus Wehrle, and Martin Henze
    In Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’22), 2022
  2. Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes
    Eric Wagner, Jan Bauer, and Martin Henze
    In Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’22), 2022
  3. A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection
    Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, and 2 more authors
    In Proceedings of the 8th ACM Cyber-Physical System Security Workshop (CPSS’22), 2022
  4. Scalable and Privacy-Focused Company-Centric Supply Chain Management
    Eric Wagner, Roman Matzutt, Jan Pennekamp, Lennart Bader, Irakli Bajelidze, Klaus Wehrle, and 1 more author
    In Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC’22), 2022
  5. Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset
    Konrad Wolsing, Antoine Saillard, Jan Bauer, Eric Wagner, Christian Sloun, Ina Berenice Fink, and 3 more authors
    In Proceedings of the 47th IEEE Conference on Local Computer Networks (LCN’22), 2022
  6. Can Industrial Intrusion Detection Be SIMPLE?
    Konrad Wolsing, Lea Thiemt, Christian Sloun, Eric Wagner, Klaus Wehrle, and Martin Henze
    In Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS’22), 2022
  7. IPAL: Breaking Up Silos of Protocol-Dependent and Domain-Specific Industrial Intrusion Detection Systems
    Konrad Wolsing, Eric Wagner, Antoine Saillard, and Martin Henze
    In Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID’22), 2022
  8. PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
    Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner, Martin Henze, and Martin Serror
    In Proceedings of the 15th Workshop on Cyber Security Experimentation and Test (CSET’22), 2022
  9. Poster: Ensemble Learning for Industrial Intrusion Detection
    Dominik Kus, Konrad Wolsing, Jan Pennekamp, Eric Wagner, Martin Henze, and Klaus Wehrle
    2022

2021

  1. Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use
    Jan Pennekamp, Erik Buchholz, Markus Dahlmanns, Ike Kunze, Stefan Braun, Eric Wagner, and 3 more authors
    In Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER’21), 2021

2020

  1. QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation
    Martin Serror, Eric Wagner, René Glebke, and Klaus Wehrle
    In Proceedings of the IFIP/IEEE Networking Conference (NETWORKING’20), 2020
  2. Poster: Facilitating Protocol-independent Industrial Intrusion Detection Systems
    Konrad Wolsing, Eric Wagner, and Martin Henze
    In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS’20), 2020

2019

  1. Dispute Resolution for Smart Contract-based Two-Party Protocols
    Eric Wagner, Achim Völker, Frederik Fuhrmann, Roman Matzutt, and Klaus Wehrle
    In Proceedings of the 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC’19), 2019

2018

  1. Secure Low Latency Communication for Constrained Industrial IoT Scenarios
    Jens Hiller, Martin Henze, Martin Serror, Eric Wagner, Jan Niklas Richter, and Klaus Wehrle
    In Proceedings of the 42nd IEEE Conference on Local Computer Networks (LCN’18), 2018