Publications
VC3: Trustworthy Data Analytics in the Cloud
2014 - Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich
MSR-TR-2014-39, Microsoft Research, December 2014 [Microsoft Research]Technical Report: Towards Automated Integrity Protection of C++ Virtual Function Tables in Binary Programs
2014 - Robert Gawlik, Thorsten Holz
TR-HGI-2014-004, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), December 2014 [PDF]Leveraging Semantic Signatures for Bug Search in Binary Programs
2014 - Jannik Pewny, Felix Schuster, Lukas Bernhard, Christian Rossow, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, December 2014 [PDF]Towards Automated Integrity Protection of C++ Virtual Function Tables in Binary Programs
2014 - Robert Gawlik, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, December 2014 [GitHub] [PDF]Using Automatic Speech Recognition for Attacking Acoustic CAPTCHAs: The Trade-off between Usability and Security
2014 - Hendrik Meutzner, Viet Hung Nguyen, Thorsten Holz, Dorothea Kolossa
Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, December 2014 - ** Outstanding Paper Award ** [PDF]The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements
2014 - Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, Giovanni Vigna
14th ACM SIGCOMM Internet Measurement Conference (IMC), Vancouver, Canada, November 2014 [PDF]Code Reuse Attacks in PHP: Automated POP Chain Generation
2014 - Johannes Dahse, Nikolai Krein, Thorsten Holz
21st ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, USA, November 2014 - ** Best Student Paper Award ** [PDF]You Can Run but You Can’t Read: Preventing Disclosure Exploits in Executable Code
2014 - Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny
21st ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, USA, November 2014 [PDF]How Secure is TextSecure?
2014 - Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jörg Schwenk, Thorsten Holz
Cryptology ePrint Archive, Report 2014/904, 31 Oct 2014 [pdf]The Art of False Alarms in the Game of Deception: Leveraging Fake Honeypots for Enhanced Security
2014 - Apostolis Zarras
48th IEEE International Carnahan Conference on Security Technology (ICCST), Rome, Italy, October 2014 [PDF]