Aurora: Statistical Crash Analysis for Automated Root Cause Explanation
Tim Blazytko,
Moritz Schlögel,
Cornelius Aschermann,
Ali Abbasi,
Joel Frank,
Simon Wörner,
Thorsten Holz -
USENIX Security Symposium, Boston, MA, USA, August 2020
CORSICA: Cross-Origin Web Service Identification
Christian Dresen,
Fabian Ising,
Damian Poddebniak,
Tobias Kappert,
Thorsten Holz,
Sebastian Schinzel -
ACM Asia Conference on Computer & Communications Security (ASIACCS), Taipei, Taiwan, June 2020
GRIMOIRE: Synthesizing Structure while Fuzzing
Tim Blazytko,
Cornelius Aschermann,
Moritz Schlögel,
Ali Abbasi,
Sergej Schumilo,
Simon Wörner,
Thorsten Holz -
USENIX Security Symposium, Santa Clara, CA, USA, August 2019
Breaking LTE on Layer Two
David Rupprecht,
Katharina Kohls,
Thorsten Holz,
Christina Pöpper -
IEEE Symposium on Security & Privacy (Oakland), May 2019
Nautilus: Fishing for Deep Bugs with Grammars
Cornelius Aschermann,
Tommaso Frassetto,
Thorsten Holz,
Patrick Jauernig,
Ahmad-Reza Sadeghi,
Daniel Teuchert -
Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019
Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure
Enes Göktaş,
Benjamin Kollenda,
Philipp Koppe,
Erik Bosman,
Georgios Portokalidis,
Thorsten Holz,
Herbert Bos,
Cristiano Giuffrida -
IEEE European Symposium on Security and Privacy (Euro S&P), London, United Kingdom, April 2018
MARX: Uncovering Class Hierarchies in C++ Programs
Andre Pawlowski,
Moritz Contag,
Victor van der Veen,
Chris Ouwehand,
Thorsten Holz,
Herbert Bos,
Elias Athanasopoulos,
Cristiano Giuffrida -
Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, February 2017
Subversive-C: Abusing and Protecting Dynamic Message Dispatch
Julian Lettner,
Benjamin Kollenda,
Andrei Homescu,
Per Larsen,
Felix Schuster,
Lucas Davi,
Ahmad-Reza Sadeghi,
Thorsten Holz,
Michael Franz -
2016 USENIX Annual Technical Conference (USENIX ATC '16), Denver, USA, June 2016
A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level
Victor van der Veen,
Enes Goktas,
Moritz Contag,
Andre Pawlowski,
Xi Chen,
Sanjay Rawat,
Herbert Bos,
Thorsten Holz,
Elias Athanasopoulos,
Cristiano Giuffrida -
IEEE Symposium on Security and Privacy ("Oakland"), San Jose, CA, May 2016
How Secure is TextSecure?
Tilman Frosch,
Christian Mainka,
Christoph Bader,
Florian Bergsma,
Jörg Schwenk,
Thorsten Holz -
IEEE European Symposium on Security and Privacy (EuroS&P 2016)
On Network Operating System Security
Christian Röpke,
Thorsten Holz -
International Journal of Network Management (IJNM) - Special Issue on Software-Defined Networking and Network Function Virtualization for Flexible Network Management, 2016
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks
Stephen Crane,
Stijn Volckaert,
Felix Schuster,
Christopher Liebchen,
Per Larsen,
Lucas Davi,
Ahmad-Reza Sadeghi,
Thorsten Holz,
Bjorn De Sutter,
Michael Franz -
22nd ACM Conference on Computer and Communications Security (CCS), Denver, October 2015
On Locational Privacy in the Absence of Anonymous Payments
Tilman Frosch,
Sven Schäge,
Martin Goll,
Thorsten Holz -
Gutwirth, S., Leenes R., P. De Hert and Y. Poullet, Data protection on the Move. Current Developments in ICT and Privacy/Data Protection. Springer (forthcoming, 2015), Dordrecht.
How Secure is TextSecure?
Tilman Frosch,
Christian Mainka,
Christoph Bader,
Florian Bergsma,
Jörg Schwenk,
Thorsten Holz -
Cryptology ePrint Archive, Report 2014/904, 31 Oct 2014
Evaluating the Effectiveness of Current Anti-ROP Defenses
Felix Schuster,
Thomas Tendyck,
Jannik Pewny,
Andreas Maaß,
Martin Steegmanns,
Moritz Contag,
Thorsten Holz -
Research in Attacks, Intrusions and Defenses (RAID) Symposium, Gothenburg, Sweden, September 2014
Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data
Sebastian Vogl,
Robert Gawlik,
Behrad Garmany,
Thomas Kittel,
Jonas Pfoh,
Claudia Eckert,
Thorsten Holz -
23rd USENIX Security Symposium, San Diego, CA, USA, August 2014
POSTER: Control-Flow Integrity for Smartphones.
Lucas Davi,
Alexandra Dmitrienko,
Manuel Egele,
Thorsten Holz,
Ralf Hund,
Stefan Nürnberger,
Ahmad-Reza Sadeghi,
Thomas Fischer -
18th ACM Conference on Computer and Communications Security (CCS'11)
Das Internet-Malware-Analyse-System (InMAS)
Markus Engelberth,
Felix C. Freiling,
Jan Goebel,
Christian Gorecki,
Thorsten Holz,
Ralf Hund,
Philipp Trinius,
Carsten Willems -
Datenschutz und Datensicherheit (DuD), Volume 35, Number 4, pp. 247-252
A Malware Instruction Set for Behavior-Based Analysis
Philipp Trinius,
Carsten Willems,
Thorsten Holz,
Konrad Rieck -
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Berlin, Germany, October 2010
Towards secure deletion on smartphones
Michael Spreitzenbarth,
Thorsten Holz -
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Berlin, Germany, October 2010
Abusing Social Networks for Automated User Profiling
Marco Balduzzi,
Christian Platzer,
Thorsten Holz,
Engin Kirda,
Davide Balzarotti,
Christopher Kruegel -
13th International Symposium on Recent Advances in Intrusion Detection (RAID), Ottawa, Canada, September 2010
The InMAS Approach
Markus Engelberth,
Felix Freiling,
Jan Goebel,
Christian Gorecki,
Thorsten Holz,
Ralf Hund,
Philipp Trinius,
Carsten Willems -
1st European Workshop on Internet Early Warning and Network Intelligence (EWNI'10)
Towards Next-Generation Botnets
Ralf Hund,
Matthias Hamann,
Thorsten Holz -
European Conference on Computer Network Defense (EC2ND), Dublin, Ireland, December 2008
Learning and Classification of Malware Behavior
Konrad Rieck,
Thorsten Holz,
Carsten Willems,
Patrick Düssel,
Pavel Laskov -
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Paris, France, July 2008