Publications
Sichere Webanwendungen
2008 - Mario Heiderich, Christian Matthies, Johannes Dahse, fukami
GALILEO PRESS, Auflage 1, ISBN-10: 3836211947, ISBN-13: 978-3836211949Towards Next-Generation Botnets
2008 - Ralf Hund, Matthias Hamann, Thorsten Holz
European Conference on Computer Network Defense (EC2ND), Dublin, Ireland, December 2008 [PDF]Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains
2008 - Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Rani Husseiki, Yacine Gasmi, Patrick Stewin, Martin Unger
STC '08: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, p. 71-80, ACM, 2008. [pdf]Analyzing Mobile Malware
2008 - Michael Becher, Ralf Hund
Chapter 8 in "Mobile Malware Attacks and Defense", Syngress Media, October 2008As the Net Churns: Fast-Flux Botnet Observations
2008 - Jose Nazario, Thorsten Holz
International Conference on Malicious and Unwanted Software, October 2008 [pdf]Reconstructing Peoples Lives: A Case Study in Teaching Forensic Computing
2008 - Felix Freiling, Thorsten Holz, Martin Mink
International Conference on IT Security Incident Management & IT Forensics (IMF), Mannheim, Germany, September 2008 [pdf]Property-Based TPM Virtualization
2008 - Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
Information Security, 11th International Conference, ISC 2008, LNCS 5222, p. 1-16, Springer, 2008. [pdf] [bibtex]Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis
2008 - Yacine Gasmi, Christian Hessmann, Martin Pittenauer, Marcel Winandy
INFORMATIK 2008, Beherrschbare Systeme - dank Informatik, Band 1, Beiträge der 38. Jahrestagung der Gesellschaft für Informatik e.V. (GI), LNI 133, GI, 2008.Learning and Classification of Malware Behavior
2008 - Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Paris, France, July 2008 [PDF]Studying Malicious Websites and the Underground Economy on the Chinese Web
2008 - Jianwei Zhuge, Thorsten Holz, Chengyu Song, Jinpeng Guo, Xinhui Han, Wei Zou
Workshop on the Economics of Information Security (WEIS), Hanover, NH, USA, June 2008 [pdf]Kernel-Level Interception and Applications on Mobile Devices
2008 - Michael Becher, Ralf Hund
Technical Report TR-2008-003, Universität Mannheim, May 2008 [PDF]Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
2008 - Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix C. Freiling
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Francisco, CA, April 2008 [pdf]Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients
2008 - Ali Ikinci, Thorsten Holz, Felix Freiling
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Saarbrücken, April 2008 - **Best Paper Award** [pdf]Property-Based TPM Virtualization
2008 - Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
Technical Report HGI-TR-2008-001, Horst Görtz Institute for IT-Security, Ruhr-University Bochum, 2008. [PDF]Rishi: Identifizierung von Bots durch Auswerten der IRC Nicknamen
2008 - Jan Göbel, Thorsten Holz
DFN-CERT Workshop "Sicherheit in vernetzten Systemen", Hamburg, February 2008 [pdf]Measuring and Detecting Fast-Flux Service Networks
2008 - Thorsten Holz, Christian Gorecki, Konrad Rieck, Felix Freiling
Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2008 [pdf]