Publications

User Perception and Expectations on Deleting Instant Messages -or- "What Happens If I Press This Button?"

2018 - Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth

European Workshop on Usable Security (EuroUSEC) 2018, London, England, 23 April 2018 [PDF] [Slides]

Towards a Roadmap for Privacy Technologies and the General Data Protection Regulation: A transatlantic initiative

2018 - Stefan Schiffner, Bettina Berendt, Triin Siil, Martin Degeling, Robert Riemann, Florian Schaub, Kim Wuyts, Massimo Attoresi, Seda Gürses, Achim Klabunde, Jules Polonetsky, Norman Sadeh, Gabriela Zanfir-Fortuna

Proceedings of the Annual Privacy Forum 2018 [pdf]

An Empirical Study on Online Price Differentiation

2018 - Thomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz

ACM Conference on Data and Applications Security and Privacy (CODASPY 2018) Tempe, AZ, USA, March 2018 [ACM DL] [GitHub] [PDF]

Breaking and Fixing Destructive Code Read Defenses

2017 - Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz

Annual Computer Security Applications Conference (ACSAC), Puerto Rico, USA, December 2017 [PDF]

ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers

2017 - Ali Abbasi, Emmanuele Zambon, Sandro Etalle, Thorsten Holz

Annual Computer Security Applications Conference (ACSAC), Puerto Rico, USA, December 2017 [PDF]

SDN-Guard: Protecting SDN Controllers Against SDN Rootkits

2017 - Dennis Tatang, Florian Quinkert, Joel Frank, Christian Röpke, Thorsten Holz

IEEE Workshop on Security in NFV-SDN (SN-2017), Berlin, November 2017 [PDF]

On the Significance of Process Comprehension for Conducting Targeted ICS Attacks

2017 - Benjamin Green, Marina Krotofil, Ali Abbasi

3rd ACM Workshop on Cyber-Physical Systems Security and Privacy, November 2017, Dallas, USA. [PDF]

Assisting users in a world full of cameras: A privacy-aware infrastructure for computer vision applications

2017 - Anupam Das, Martin Degeling, Xiaoyou Wang, Junjue Wang, Normand Sadeh, Mahadev Satyanarayanan

Computer Vision and Pattern Recognition Workshops (CVPRW) [pdf]

kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels

2017 - Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, Thorsten Holz

USENIX Security Symposium, Vancouver, Canada, August 2017 [GitHub] [PDF]

Reverse Engineering x86 Processor Microcode

2017 - Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Chris­tof Paar, Thorsten Holz

USENIX Security Symposium, Vancouver, Canada, August 2017 [GitHub] [PDF]

Syntia: Synthesizing the Semantics of Obfuscated Code

2017 - Tim Blazytko, Moritz Contag, Cornelius Aschermann, Thorsten Holz

USENIX Security Symposium, Vancouver, Canada, August 2017 [GitHub] [PDF]

μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems

2017 - Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle

International Conference on Network and System Security, August 2017, Helsinki, Finland. [PDF]

Towards Automated Discovery of Crash-Resistant Primitives in Binaries

2017 - Benjamin Kollenda, Enes Goktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, R.K. Konoth, Cristiano Giuffrida, Herbert Bo, Thorsten Holz

IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) [PDF]

Towards privacy-aware smart buildings: Capturing, communicating, and enforcing privacy policies and preferences

2017 - Primal Pappachan, Martin Degeling, Roberto Yus, Anupam Das, Sruti Bhagavatula, William Melicher, Pardis Emami Naeini, Shikun Zhang, Lujo Bauer, Alfred Kobsa, Sharad Mehrotra, Norman Sadeh, Nalini Venkatasubramanian

ICDCS Workshop on Internet of Things Computing and Applications [pdf]

How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles

2017 - Moritz Contag, Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz, Stefan Savage

IEEE Symposium on Security and Privacy ("Oakland"), San Jose, CA, May 2017 [PDF]

Privacy expectations and preferences in an IoT World

2017 - Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Cranor, Norman Sadeh

Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS) [pdf]

MARX: Uncovering Class Hierarchies in C++ Programs

2017 - Andre Pawlowski, Moritz Contag, Victor van der Veen, Chris Ouwehand, Thorsten Holz, Herbert Bos, Elias Athanasopoulos, Cristiano Giuffrida

Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, February 2017 [GitHub] [PDF]

EvilCoder: Automated Bug Insertion

2016 - Jannik Pewny, Thorsten Holz

Annual Computer Security Applications Conference (ACSAC), Los Angeles, California, USA, December 2016 [GitHub] [PDF]

Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation

2016 - Ali Abbasi, Majid Hashemi, Emmanuele Zambon, Sandro Etalle

11th International Conference on Critical Information Infrastructures Security, October 10-12, 2016, Paris, France. [PDF]

Privacy by Socio-Technical Design - a collaborative approach for privacy friendly system design

2016 - Martin Degeling, Christopher Lentzsch, Alexander Nolte, Thomas Herrmann, Kai-Uwe Loser

2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016)
Page: