Veröffentlichungen

A Practical Attack to De-Anonymize Social Network Users

2010 - Gilbert Wondracek, Thorsten Holz, Engin Kirda, Christopher Kruegel

IEEE Symposium on Security and Privacy ("Oakland"), Berkeley, CA, May 2010 [PDF]

Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries

2010 - Clemens Kolbitsch, Thorsten Holz, Christopher Kruegel, Engin Kirda

IEEE Symposium on Security and Privacy ("Oakland"), Berkeley, CA, May 2010 [PDF]

Verfolgen und Abschwächen von Malicious Remote Control Networks

2010 - Thorsten Holz

Ausgezeichnete Informatikdissertationen 2009. LNI D-10, pages 101-110, May 2010 [Dagstuhl Seminar]

ADSandbox: Sandboxing JavaScript to Fight Malicious Websites

2010 - Andreas Dewald, Thorsten Holz, Felix C. Freiling

ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 2010 [PDF]

Botzilla: Detecting the "Phoning Home" of Malicious Software

2010 - Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorsten Holz, Pavel Laskov

ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 2010 [PDF]

Cooperation enablement for centralistic early warning systems

2010 - Ulrich Flegel, Johannes Hoffmann, Michael Meier

ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 2010 [PDF]

ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks

2010 - Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy

Technical Report HGI-TR-2010-001 [PDF]

Pat­terns for Se­cu­re Boot and Se­cu­re Sto­r­a­ge in Com­pu­ter Sys­tems

2010 - Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy

4th In­ter­na­tio­nal Work­shop on Se­cu­re sys­tems me­tho­do­lo­gies using pat­terns (SPat­tern 2010), In Proceedings of ARES 2010: International Conference on Availability, Reliability and Security, pp.569-573, IEEE Computer Society, 2010 [pdf]

The InMAS Approach

2010 - Markus Engelberth, Felix Freiling, Jan Goebel, Christian Gorecki, Thorsten Holz, Ralf Hund, Philipp Trinius, Carsten Willems

1st European Workshop on Internet Early Warning and Network Intelligence (EWNI'10) [PDF]

A Malware Instruction Set for Behavior-Based Analysis

2009 - Philipp Trinius, Carsten Willems, Thorsten Holz, Konrad Rieck

Technical Report TR-2009-007, University of Mannheim, December 2009 [MADOC Link] [PDF]
Seite: