Veröffentlichungen

Breaking LTE on Layer Two

2019 - David Rupprecht, Katharina Kohls, Christina Pöpper, Thorsten Holz

To appear in the IEEE Symposium on Security & Privacy, May 2019 [Website] [[PDF]]

An Exploratory Analysis of Microcode as a Building Block for System Defenses

2018 - Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Chris­tof Paar, Thorsten Holz

ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty (CCS), Toronto, October 2018

Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs

2018 - Tobias Urban, Dennis Tatang, Thorsten Holz, Norbert Pohlmann

European Symposium on Research in Computer Security (ESORICS), Barcelona, Spain, September 2018 [PDF]

Preventing Malicious SDN Applications From Hiding Adverse Network Manipulations

2018 - Christian Röpke, Thorsten Holz

ACM SIGCOMM Workshop on Security in Softwarized Networks: Prospects and Challenges (SecSoN 2018), Budapest, Hungary, 2018 [PDF]

POSTER: User Perception and Expectations on Deleting Instant Messages -or- "What Happens If I Press This Button?"

2018 - Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth

USENIX Symposium on Usable Privacy and Security 2018 (SOUPS '18). Baltimore, MD, USA, August 12-14, 2018

SoK: Make JIT-Spray Great Again

2018 - Robert Gawlik, Thorsten Holz

USENIX Workshop on Offensive Technologies (WOOT), Baltimore, US, August 2018 [PDF]

On the Weaknesses of Function Table Randomization

2018 - Moritz Contag, Robert Gawlik, Andre Pawlowski, Thorsten Holz

Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Paris, France, June 2018 [GitHub] [PDF]

On Security Research Towards Future Mobile Network Generations

2018 - David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper

IEEE Communications Surveys and Tutorials [arXiv]

SDN Ro2tkits: A Case Study of Subverting A Closed Source SDN Controller

2018 - Christian Röpke

GI Sicherheit, Konstanz, Germany, 2018

Masters of Time: An Overview of the NTP Ecosystem

2018 - Teemu Rytilahti, Dennis Tatang, Janosch Köpper, Thorsten Holz

IEEE European Symposium on Security and Privacy (Euro S&P), London, United Kingdom, April 2018 [GitHub] [PDF]

Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure

2018 - Enes Göktaş, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Cristiano Giuffrida

IEEE European Symposium on Security and Privacy (Euro S&P), London, United Kingdom, April 2018 [PDF]

User Perception and Expectations on Deleting Instant Messages -or- "What Happens If I Press This Button?"

2018 - Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth

European Workshop on Usable Security (EuroUSEC) 2018, London, England, 23 April 2018 [PDF] [Slides]

An Empirical Study on Online Price Differentiation

2018 - Thomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz

ACM Conference on Data and Applications Security and Privacy (CODASPY 2018) Tempe, AZ, March 2018 [ACM DL] [GitHub] [PDF]

Breaking and Fixing Destructive Code Read Defenses

2017 - Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz

Annual Computer Security Applications Conference (ACSAC), Puerto Rico, USA, December 2017 [PDF]

ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers

2017 - Ali Abbasi, Emmanuele Zambon, Sandro Etalle, Thorsten Holz

Annual Computer Security Applications Conference (ACSAC), Puerto Rico, USA, December 2017 [PDF]

An Empirical Study on Price Differentiation Based on System Fingerprints

2017 - Thomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz

Technical Report, arXiv:1712.03031, December 2017 [arXiv] [PDF]

SDN-Guard: Protecting SDN Controllers Against SDN Rootkits

2017 - Dennis Tatang, Florian Quinkert, Joel Frank, Christian Röpke, Thorsten Holz

IEEE Workshop on Security in NFV-SDN (SN-2017), Berlin, November 2017 [PDF]

On the Significance of Process Comprehension for Conducting Targeted ICS Attacks

2017 - Benjamin Green, Marina Krotofil, Ali Abbasi

3rd ACM Workshop on Cyber-Physical Systems Security and Privacy, November 2017, Dallas, USA. [PDF]

On Security Research towards Future Mobile Network Generations

2017 - David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper

arXiv:1710.08932, November 2017 [arXiv] [PDF]

kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels

2017 - Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, Thorsten Holz

USENIX Security Symposium, Vancouver, Canada, August 2017 [GitHub] [PDF]
Seite: