Publications
A Note on the Security in the Card Management System of the German E-Health Card
2010 - Marcel Winandy
Electronic Healthcare, Third International Conference, eHealth 2010, LNICST 69, pp. 196-203, Springer, 2012. [PDF] [Bibtex]TruWalletM: Secure Web Authentication on Mobile Platforms
2010 - Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, Marcel Winandy
Trusted Systems, Second International Conference, INTRUST 2010, LNCS 6802/2011, Springer, 2011. [Bibtex] [PDF]Securing the E-Health Cloud
2010 - Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
Proceedings of the 1st ACM International Health Informatics Symposium (IHI 2010), ACM, 2010. [pdf] [Bibtex]Privilege Escalation Attacks on Android.
2010 - Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy
Information Security, 13th International Conference, ISC 2010, LNCS 6531/2011, pp. 346-360, Springer 2011. [Bibtex] [PDF]A Malware Instruction Set for Behavior-Based Analysis
2010 - Philipp Trinius, Carsten Willems, Thorsten Holz, Konrad Rieck
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Berlin, Germany, October 2010 [PDF]Towards secure deletion on smartphones
2010 - Michael Spreitzenbarth, Thorsten Holz
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Berlin, Germany, October 2010 [PDF]Return-Oriented Programming without Returns
2010 - Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy
17th ACM Conference on Computer and Communications Security (CCS 2010) [PDF]Abusing Social Networks for Automated User Profiling
2010 - Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel
13th International Symposium on Recent Advances in Intrusion Detection (RAID), Ottawa, Canada, September 2010 [PDF]Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments
2010 - Hans Löhr, Thomas Pöppelmann, Johannes Rave, Martin Steegmanns, Marcel Winandy
Proceedings of 5th Annual Workshop on Scalable Trusted Computing (STC 2010), ACM 2010. [PDF]Return-Oriented Programming without Returns on ARM
2010 - Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy
Technical Report HGI-TR-2010-002 [PDF]Token-Based Cloud Computing -- Secure Outsourcing of Data and Arbitrary Computations with Lower Latency
2010 - Ahmad-Reza Sadeghi, Thomas Schneider, Marcel Winandy
3rd International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud, June 22, Berlin, Germany. [Trust2010.org] [PDF]Is the Internet for Porn? An Insight Into the Online Adult Industry
2010 - Gilbert Wondracek, Thorsten Holz, Christian Platzer, Engin Kirda, Christopher Kruegel
Workshop on the Economics of Information Security (WEIS), Harvard University, USA, June 2010 [PDF]Trusted Virtual Domains: Color Your Network
2010 - Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
Datenschutz und Datensicherheit (DuD) 5/2010, p. 289-298. [SpringerLink] [PDF]A Practical Attack to De-Anonymize Social Network Users
2010 - Gilbert Wondracek, Thorsten Holz, Engin Kirda, Christopher Kruegel
IEEE Symposium on Security and Privacy ("Oakland"), Berkeley, CA, May 2010 [PDF]Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
2010 - Clemens Kolbitsch, Thorsten Holz, Christopher Kruegel, Engin Kirda
IEEE Symposium on Security and Privacy ("Oakland"), Berkeley, CA, May 2010 [PDF]Verfolgen und Abschwächen von Malicious Remote Control Networks
2010 - Thorsten Holz
Ausgezeichnete Informatikdissertationen 2009. LNI D-10, pages 101-110, May 2010 [Dagstuhl Seminar]ADSandbox: Sandboxing JavaScript to Fight Malicious Websites
2010 - Andreas Dewald, Thorsten Holz, Felix C. Freiling
ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 2010 [PDF]Botzilla: Detecting the "Phoning Home" of Malicious Software
2010 - Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorsten Holz, Pavel Laskov
ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 2010 [PDF]Cooperation enablement for centralistic early warning systems
2010 - Ulrich Flegel, Johannes Hoffmann, Michael Meier
ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 2010 [PDF]ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks
2010 - Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
Technical Report HGI-TR-2010-001 [PDF]Patterns for Secure Boot and Secure Storage in Computer Systems
2010 - Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
4th International Workshop on Secure systems methodologies using patterns (SPattern 2010), In Proceedings of ARES 2010: International Conference on Availability, Reliability and Security, pp.569-573, IEEE Computer Society, 2010 [pdf]The InMAS Approach
2010 - Markus Engelberth, Felix Freiling, Jan Goebel, Christian Gorecki, Thorsten Holz, Ralf Hund, Philipp Trinius, Carsten Willems
1st European Workshop on Internet Early Warning and Network Intelligence (EWNI'10) [PDF]