Veröffentlichungen

You Can Run but You Can’t Read: Preventing Disclosure Exploits in Executable Code

2014 - Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny

21st ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, USA, November 2014 [PDF]

How Secure is TextSecure?

2014 - Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jörg Schwenk, Thorsten Holz

Cryptology ePrint Archive, Report 2014/904, 31 Oct 2014 [pdf]

The Art of False Alarms in the Game of Deception: Leveraging Fake Honeypots for Enhanced Security

2014 - Apostolis Zarras

48th IEEE International Carnahan Conference on Security Technology (ICCST), Rome, Italy, October 2014 [PDF]

CloudSylla: Detecting Suspicious System Calls in the Cloud

2014 - Marc Kührer, Johannes Hoffmann, Thorsten Holz

16th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), Paderborn, Germany, September 2014 [PDF]

Evaluating the Effectiveness of Current Anti-ROP Defenses

2014 - Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz

Re­se­arch in At­tacks, In­tru­si­ons and De­fen­ses (RAID) Sym­po­si­um, Gothenburg, Sweden, September 2014 [PDF]

Paint it Black: Evaluating the Effectiveness of Malware Blacklists

2014 - Marc Kührer, Christian Rossow, Thorsten Holz

Re­se­arch in At­tacks, In­tru­si­ons and De­fen­ses (RAID) Sym­po­si­um, Gothenburg, Sweden, September 2014 [PDF]

Tac­tile One-Ti­me Pad. Smart­pho­ne Au­then­ti­fi­ca­ti­on. Resi­li­ent Against Shoul­der Sur­fing

2014 - Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, Thorsten Holz

TR-HGI-2014-003, Ruhr-Uni­ver­si­tät Bo­chum, Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), September 2014 [PDF]

Static Detection of Second-Order Vulnerabilities in Web Applications

2014 - Johannes Dahse, Thorsten Holz

23rd USENIX Security Symposium, San Diego, CA, USA, August 2014 - ** Internet Defense Prize by Facebook ** [PDF]

Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data

2014 - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz

23rd USENIX Security Symposium, San Diego, CA, USA, August 2014 [PDF]

Exit from Hell? Reducing the Impact of Amplification DDoS Attacks

2014 - Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz

23rd USENIX Security Symposium, San Diego, CA, USA, August 2014 [PDF]
Seite: