Publications
The Nepenthes Platform: An Efficient Approach to Collect Malware
2006 - Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix Freiling
9th International Symposium on Recent Advances in Intrusion Detection (RAID), Hamburg, Germany, September 2006 [pdf]The Effect of Stock Spam on Financial Markets
2006 - Rainer Böhme, Thorsten Holz
Workshop on the Economics of Information Security (WEIS), University of Cambridge, June 2006 [SSRN Link]Design and Implementation of the Honey-DVD
2006 - Maximillian Dornseif, Felix Freiling, Nils Gedicke, Thorsten Holz
IEEE Information Assurance Workshop (IAW), West Point, NY, June 2006 [pdf]Design and Implementation of a Secure Linux Device Encryption Architecture
2006 - Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Michael Scheibel
LinuxTag 2006. [pdf]Safety, Liveness, and Information Flow: Dependability Revisited
2006 - Zinaida Benenson, Felix Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso
ARCS Workshop on Dependability and Fault-Tolerance, Frankfurt am Main, Germany, March 2006 [pdf]Effektives Sammeln von Malware mit Honeypots
2006 - Thorsten Holz, Georg Wicherski
DFN-CERT Workshop "Sicherheit in vernetzten Systemen", Hamburg, March 2006 [pdf]Learning More About Attack Patterns With Honeypots
2006 - Thorsten Holz
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Magdeburg, February 2006 [pdf]Multilateral Security Considerations for Adaptive Mobile Applications
2005 - Adrian Spalka, Armin B. Cremers, Marcel Winandy
Proceedings of the 2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005), pp. 133-137, INSTICC, 2005.Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks
2005 - Felix Freiling, Thorsten Holz, Georg Wicherski
European Symposium on Research in Computer Security (ESORICS), Milan, Italy, September 2005 [pdf]A Pointillist Approach for Comparing Honeypots
2005 - Fabien Pouget, Thorsten Holz
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Vienna, Austria, July 2005 [pdf]Detecting Honeypots and Other Suspicious Environments
2005 - Thorsten Holz, Frederic Raynal
IEEE Information Assurance Workshop (IAW), West Point, NY, June 2005 [pdf]NoSEBrEaK - Attacking Honeynets
2004 - Maximillian Dornseif, Thorsten Holz, Christian N. Klein
IEEE Information Assurance Workshop (IAW), West Point, NY, June 2004 [pdf]Ermittlung von Verwundbarkeiten mit elektronischen Ködern
2004 - Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Dortmund, Germany, July 2004 [pdf]