Dr.-Ing. Carsten Willems

  • Mitglied - Institut Horst Görtz Institut für IT-Sicherheit
  • Ehemalige/r Mitarbeiter/in - Lehrstuhl Systemsicherheit
Willems, Carsten

Adresse

Ruhr-Uni­ver­si­tät Bo­chum
Lehrstuhl für Systemsicherheit
Uni­ver­si­täts­stras­se 150
44780 Bo­chum

E-Mail:
carsten.willems@rub.de S/MIME Schlüssel

Lehrveranstaltungen

Veröffentlichungen

2013
An Experimental Security Analysis of Two Satphone Standards

Benedikt Driessen, Ralf Hund, Carsten Willems, Chris­tof Paar, Thorsten Holz - ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 3, Article 10, Publication date: November 2013

Instrumenting Existing System Components for Dynamic Analysis of Malicious Software

Carsten Willems - Ruhr-University Bochum, pages 1-225, URN urn:nbn:de:hbz:294-38044, June 2013

Practical Timing Side Channel Attacks Against Kernel Space ASLR

Ralf Hund, Carsten Willems, Thorsten Holz - IEEE Symposium on Security and Privacy ("Oakland"), San Francisco, CA, May 2013

2012
Down to the Bare Metal: Using Processor Features for Binary Analysis

Carsten Willems, Ralf Hund, Amit Vasudevan, Andreas Fobian, Dennis Felsch, Thorsten Holz - Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2012

Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis

Carsten Willems, Felix C. Freiling, Thorsten Holz - Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2012

CXPInspector: Hypervisor-Based, Hardware-Assisted System Monitoring

Carsten Willems, Ralf Hund, Thorsten Holz - TR-HGI-2012-002, Ruhr-Uni­ver­si­tät Bo­chum, Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), November 2012

Down to the Bare Metal: Using Processor Features for Binary Analysis

Carsten Willems, Ralf Hund, Dennis Felsch, Andreas Fobian, Thorsten Holz - TR-HGI-2012-001, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), November 2012

Don’t Trust Satellite Phones: A Security Analysis of Two Satphone Standards

Benedikt Driessen, Ralf Hund, Carsten Willems, Chris­tof Paar, Thorsten Holz - IEEE Symposium on Security and Privacy ("Oakland"), San Francisco, CA, May 2012 - **Best Paper Award**

Reverse Code Engineering - State of the Art and Countermeasures

Carsten Willems - it - Information Technology, Volume 54, Number 2, pages 53-63, March 2012

Analyse und Vergleich von BckR2D2-I und II

Andreas Dewald, Felix Freiling, Thomas Schreck, Michael Spreitzenbarth, Johannes Stüttgen, Stefan Vömel, Carsten Willems - GI Si­cher­heit - Schutz und Zu­ver­läs­sig­keit, Jah­res­ta­gung des Fach­be­reichs Si­cher­heit der Ge­sell­schaft für In­for­ma­tik, Darmstadt, Ger­ma­ny, März 2012

Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis

Carsten Willems, Felix, Freiling - Technical Reports CS-2012,1 University of Erlangen, Department Informatik, February 2012

2011
Automated Identification of Cryptographic Primitives in Binary Programs

Felix Gröbert, Carsten Willems, Thorsten Holz - 14th International Symposium on Recent Advances in Intrusion Detection (RAID), Menlo Park, CA, September 2011

Automatic Analysis of Malware Behavior using Machine Learning

Konrad Rieck, Philipp Trinius, Carsten Willems, Thorsten Holz - Journal of Computer Security, Vol. 19, No. 4, pages 639-668, 2011

Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis

Carsten Willems, Felix Freiling - Technical Report TR-2011-002, University of Mannheim, Department of Computer Science, May 2011

Internals of Windows Memory Management (not only) for Malware Analysis

Carsten Willems - Technical Report TR-2011-001, University of Mannheim, Department of Computer Science, April 2011

Das Internet-Malware-Analyse-System (InMAS)

Markus Engelberth, Felix C. Freiling, Jan Goebel, Christian Gorecki, Thorsten Holz, Ralf Hund, Philipp Trinius, Carsten Willems - Datenschutz und Datensicherheit (DuD), Volume 35, Number 4, pp. 247-252

2009
A Malware Instruction Set for Behavior-Based Analysis

Philipp Trinius, Carsten Willems, Thorsten Holz, Konrad Rieck - Technical Report TR-2009-007, University of Mannheim, December 2009

Automatic Analysis of Malware Behavior using Machine Learning

Philipp Trinius, Carsten Willems, Thorsten Holz, Konrad Rieck - Berlin Institute of Technology, Technical Report 18-2009

Frühe Warnung durch Beobachten und Verfolgen von bösartiger Software im Deutschen Internet: Das Internet-Malware-Analyse System (InMAS)

Markus Engelberth, Felix Freiling, Jan Goebel, Christian Gorecki, Thorsten Holz, Philipp Trinius, Carsten Willems - 11. Deutscher IT-Sicherheitskongress des Bundesamtes für Sicherheit in der Informationstechnik (BSI), Bonn, May 2009

MalOffice - Detecting malicious documents with combined static and dynamic analysis

Markus Engelberth, Carsten Willems, Thorsten Holz - Virus Bulletin Conference, Geneva, Switzerland, September 2009

2008
Learning and Classification of Malware Behavior

Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov - Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Paris, France, July 2008

2007
Measurement and Analysis of Autonomous Spreading Malware in a University Environment

Thorsten Holz, Jan Goebel, Carsten Willems - Con­fe­rence on De­tec­tion of In­tru­si­ons and Mal­wa­re & Vul­nerabi­li­ty As­sess­ment (DIMVA), Lucerne, Switzerland, July 2007

Toward Automated Dynamic Malware Analysis Using CWSandbox

Carsten Willems, Thorsten Holz, Felix C. Freiling - IEEE Security & Privacy, Volume 5, Number 2, Pages 32-39, March/April 2007