Publications
Sichere Webanwendungen
2008 - Mario Heiderich, Christian Matthies, Johannes Dahse, fukami
GALILEO PRESS, Auflage 1, ISBN-10: 3836211947, ISBN-13: 978-3836211949Towards Next-Generation Botnets
2008 - Ralf Hund, Matthias Hamann, Thorsten Holz
European Conference on Computer Network Defense (EC2ND), Dublin, Ireland, December 2008 [PDF]Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains
2008 - Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Rani Husseiki, Yacine Gasmi, Patrick Stewin, Martin Unger
STC '08: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, p. 71-80, ACM, 2008. [pdf]Analyzing Mobile Malware
2008 - Michael Becher, Ralf Hund
Chapter 8 in "Mobile Malware Attacks and Defense", Syngress Media, October 2008As the Net Churns: Fast-Flux Botnet Observations
2008 - Jose Nazario, Thorsten Holz
International Conference on Malicious and Unwanted Software, October 2008 [pdf]Reconstructing Peoples Lives: A Case Study in Teaching Forensic Computing
2008 - Felix Freiling, Thorsten Holz, Martin Mink
International Conference on IT Security Incident Management & IT Forensics (IMF), Mannheim, Germany, September 2008 [pdf]Property-Based TPM Virtualization
2008 - Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
Information Security, 11th International Conference, ISC 2008, LNCS 5222, p. 1-16, Springer, 2008. [pdf] [bibtex]Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis
2008 - Yacine Gasmi, Christian Hessmann, Martin Pittenauer, Marcel Winandy
INFORMATIK 2008, Beherrschbare Systeme - dank Informatik, Band 1, Beiträge der 38. Jahrestagung der Gesellschaft für Informatik e.V. (GI), LNI 133, GI, 2008.Learning and Classification of Malware Behavior
2008 - Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Paris, France, July 2008 [PDF]Studying Malicious Websites and the Underground Economy on the Chinese Web
2008 - Jianwei Zhuge, Thorsten Holz, Chengyu Song, Jinpeng Guo, Xinhui Han, Wei Zou
Workshop on the Economics of Information Security (WEIS), Hanover, NH, USA, June 2008 [pdf]