Publications
Breaking and Fixing Destructive Code Read Defenses
2017 - Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), Puerto Rico, USA, December 2017 [PDF]ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers
2017 - Ali Abbasi, Emmanuele Zambon, Sandro Etalle, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), Puerto Rico, USA, December 2017 [PDF]An Empirical Study on Price Differentiation Based on System Fingerprints
2017 - Thomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz
Technical Report, arXiv:1712.03031, December 2017 [arXiv] [PDF]SDN-Guard: Protecting SDN Controllers Against SDN Rootkits
2017 - Dennis Tatang, Florian Quinkert, Joel Frank, Christian Röpke, Thorsten Holz
IEEE Workshop on Security in NFV-SDN (SN-2017), Berlin, November 2017 [PDF]On the Significance of Process Comprehension for Conducting Targeted ICS Attacks
2017 - Benjamin Green, Marina Krotofil, Ali Abbasi
3rd ACM Workshop on Cyber-Physical Systems Security and Privacy, November 2017, Dallas, USA. [PDF]On Security Research towards Future Mobile Network Generations
2017 - David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper
arXiv:1710.08932, November 2017 [arXiv] [PDF]Assisting users in a world full of cameras: A privacy-aware infrastructure for computer vision applications
2017 - Anupam Das, Martin Degeling, Xiaoyou Wang, Junjue Wang, Normand Sadeh, Mahadev Satyanarayanan
Computer Vision and Pattern Recognition Workshops (CVPRW) [pdf]kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels
2017 - Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, Thorsten Holz
USENIX Security Symposium, Vancouver, Canada, August 2017 [GitHub] [PDF]Reverse Engineering x86 Processor Microcode
2017 - Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz
USENIX Security Symposium, Vancouver, Canada, August 2017 [GitHub] [PDF]Syntia: Synthesizing the Semantics of Obfuscated Code
2017 - Tim Blazytko, Moritz Contag, Cornelius Aschermann, Thorsten Holz
USENIX Security Symposium, Vancouver, Canada, August 2017 [GitHub] [PDF]Googles Interessenprofiling
2017 - Martin Degeling
in "Profile: Interdisziplinäre Beiträge"Profile: Interdisziplinäre Beiträge
2017 - Martin Degeling, Julius Othmer, Andreas Weich, Bianca Westermann
[pdf]μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems
2017 - Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle
International Conference on Network and System Security, August 2017, Helsinki, Finland. [PDF]Towards Automated Discovery of Crash-Resistant Primitives in Binaries
2017 - Benjamin Kollenda, Enes Goktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, R.K. Konoth, Cristiano Giuffrida, Herbert Bo, Thorsten Holz
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) [PDF]Towards privacy-aware smart buildings: Capturing, communicating, and enforcing privacy policies and preferences
2017 - Primal Pappachan, Martin Degeling, Roberto Yus, Anupam Das, Sruti Bhagavatula, William Melicher, Pardis Emami Naeini, Shikun Zhang, Lujo Bauer, Alfred Kobsa, Sharad Mehrotra, Norman Sadeh, Nalini Venkatasubramanian
ICDCS Workshop on Internet of Things Computing and Applications [pdf]How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles
2017 - Moritz Contag, Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz, Stefan Savage
IEEE Symposium on Security and Privacy ("Oakland"), San Jose, CA, May 2017 [PDF]What is wrong about Robocops as consultants? A technology-centric critique of predictive policing
2017 - Martin Degeling, Bettina Berendt
AI & SOCIETY, August 2018 [pdf] [DOI]Privacy expectations and preferences in an IoT World
2017 - Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Cranor, Norman Sadeh
Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS) [pdf]POSTER: Traffic Analysis Attacks in Anonymity Networks
2017 - Katharina Kohls, Christina Pöpper
ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017 [PDF]MARX: Uncovering Class Hierarchies in C++ Programs
2017 - Andre Pawlowski, Moritz Contag, Victor van der Veen, Chris Ouwehand, Thorsten Holz, Herbert Bos, Elias Athanasopoulos, Cristiano Giuffrida
Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, February 2017 [GitHub] [PDF]Toward Improved Audio CAPTCHAs Based on Auditory Perception and Language Understanding
2017 - Hendrik Meutzner, Santosh Gupta, Viet-Hung Nguyen, Thorsten Holz, Dorothea Kolossa
ACM Transactions on Privacy and Security (TOPS), Volume 19, Issue 4, February 2017May the Force be with You: The Future of Force-Sensitive Authentication
2017 - Katharina Krombholz, Thomas Hupperich, Thorsten Holz
Journal of Internet Computing, Special Issue of Usable Security and Privacy, 2017 [pdf]