Publications

Neuralyzer: Flexible Expiration Times for the Revocation of Online Data

2016 - Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper

In Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2016 *** OUTSTANDING PAPER AWARD *** [PDF]

Poster: Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation

2016 - Johannes Hoffmann, Teemu Rytilahti, Marcel Winandy, Giorgio Giacinto, Thorsten Holz

Pro­cee­dings of the ACM Con­fe­rence on Data and Ap­p­li­ca­ti­on Se­cu­ri­ty and Pri­va­cy (ACM CO­DAS­PY) 2016

Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding

2016 - Robert Gawlik, Benjamin Kollenda, Philipp Koppe, Behrad Garmany, Thorsten Holz

An­nual Net­work & Di­stri­bu­ted Sys­tem Se­cu­ri­ty Sym­po­si­um (NDSS), San Diego, Fe­bru­ary 2016 [PDF]

On the Robustness of Mobile Device Fingerprinting

2015 - Thomas Hupperich, Marc Kührer, Thorsten Holz, Giorgio Giacinto

31th Annual Computer Security Applications Conference (ACSAC), Los Angeles, USA, December 2015 [PDF]

Security Analysis of PHP Bytecode Protection Mechanisms

2015 - Dario Weißer, Johannes Dahse, Thorsten Holz

Research in Attacks, Intrusions and Defenses (RAID) Symposium, Kyoto, Japan, November 2015 [PDF]

SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks

2015 - Christian Röpke, Thorsten Holz

Research in Attacks, Intrusions and Defenses (RAID) Symposium, Kyoto, Japan, November 2015 [PDF]

On The Vagueness Of Online Profiling

2015 - Martin Degeling

"Profile, Predict, Prevent" Blockchain Workshops [pdf]

Going Wild: Large-Scale Classification of Open DNS Resolvers

2015 - Marc Kührer, Thomas Hupperich, Jonas Bushart, Christian Rossow, Thorsten Holz

15th ACM In­ter­net Me­a­su­re­ment Con­fe­rence (IMC), Tokyo, Japan, Oc­to­ber 2015 [PDF]

Multi-Layer Access Control for SDN-based Telco Clouds

2015 - Bernd Jäger, Christian Röpke, Iris Adam, Thorsten Holz

Nordic Conference on Secure IT System (NordSec), Stockholm, Sweden, October 2015 [PDF]

It's a TRAP: Table Randomization and Protection against Function Reuse Attacks

2015 - Stephen Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, Michael Franz

22nd ACM Conference on Computer and Communications Security (CCS), Denver, October 2015 [PDF]

Revealing the Relationship Network Behind Link Spam

2015 - Apostolis Zarras, Antonis Papadogiannakis, Sotiris Ioannidis, Thorsten Holz

13th Annual Conference on Privacy, Security and Trust (PST), Izmir, Turkey, July 2015 [PDF]

Experience Report: An Empirical Study of PHP Security Mechanism Usage

2015 - Johannes Dahse, Thorsten Holz

International Symposium on Software Testing and Analysis (ISSTA) [PDF]

Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications

2015 - Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz

36th IEEE Symposium on Security and Privacy (Oakland), San Jose, May 2015 [PDF]

Cross-Architecture Bug Search in Binary Executables

2015 - Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz

36th IEEE Symposium on Security and Privacy (Oakland), San Jose, May 2015 [PDF]

VC3: Trustworthy Data Analytics in the Cloud using SGX

2015 - Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz , Mark Russinovich

36th IEEE Symposium on Security and Privacy (Oakland), San Jose, May 2015 [PDF]

A Practical Investigation of Identity Theft Vulnerabilities in Eduroam

2015 - Sebastian Brenza, Andre Pawlowski, Christina Pöpper

In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2015 [Project Webpage] [PDF]

Retaining Control over SDN Network Services

2015 - Christian Röpke, Thorsten Holz

International Conference on Networked Systems (NetSys), 2015

Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones

2015 - Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, Thorsten Holz

Financial Cryptography and Data Security 2015 [pdf]

Leveraging Semantic Signatures for Bug Search in Binary Programs

2014 - Jannik Pewny, Felix Schuster, Lukas Bernhard, Christian Rossow, Thorsten Holz

An­nual Com­pu­ter Se­cu­ri­ty Ap­p­li­ca­ti­ons Con­fe­rence (ACSAC), New Or­leans, USA, De­cem­ber 2014 [PDF]

Towards Automated Integrity Protection of C++ Virtual Function Tables in Binary Programs

2014 - Robert Gawlik, Thorsten Holz

An­nual Com­pu­ter Se­cu­ri­ty Ap­p­li­ca­ti­ons Con­fe­rence (ACSAC), New Or­leans, USA, De­cem­ber 2014 [GitHub] [PDF]
Page: