Publications
Towards Automated Generation of Exploitation Primitives for Web Browsers
2018 - Behrad Garmany, Martin Stoffel, Robert Gawlik, Philipp Koppe, Tim Blazytko, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, USA, December 2018 [GitHub] [PDF]The Unwanted Sharing Economy: An Analysis of Cookie Syncing and User Transparency under GDPR
2018 - Tobias Urban, Dennis Tatang, Martin Degeling, Thorsten Holz, Norbert Pohlmann
Technical Report, arXiv:1811.08660, November 2018 [arXiv]Profiling im Web. Von Liquiditat und Segmentierung
2018 - Martin Degeling
Vortrag bei der Jahrestagung der Gesellschaft für Wissenschafts- und Technikforschung 2018, Berlin. [website] [Slides]The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios
2018 - Pardis Emami-Naeini, Martin Degeling, Lujo Bauer, Richard Chow, Lorrie Cranor, Mohammad Reza Haghighat, Heather Patterson
ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW) 2018 [pdf]An Exploratory Analysis of Microcode as a Building Block for System Defenses
2018 - Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
ACM Conference on Computer and Communications Security (CCS), Toronto, October 2018 [GitHub] [PDF]Tracking and Tricking a Profiler - Measuring and Influencing Bluekai’s Interest Profiling
2018 - Martin Degeling, Jan Nierhoff
Workshop on Privacy in the Electronic Society (WPES 2018) in conjunction with CCS 2018 [pdf (researchgate)]Intervenierbarkeit zum Schutz informationeller Selbstbestimmung
2018 - Martin Degeling, Thomas Herrmann
In "Die Fortentwicklung des Datenschutzes: Zwischen Systemgestaltung und Selbstregulierung", edited by Alexander Roßnagel, Michael Friedewald, and Marit Hansen, 193–208. DuD-Fachbeiträge. Wiesbaden: Springer Fachmedien Wiesbaden. [Springer.com] [DOI]Race to the bottom: embedded control systems binary security: an industrial control system protection approach
2018 - Ali Abbasi
[external] [pdf]Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs
2018 - Tobias Urban, Dennis Tatang, Thorsten Holz, Norbert Pohlmann
European Symposium on Research in Computer Security (ESORICS), Barcelona, Spain, September 2018 - ** Best Paper Award ** [PDF]Preventing Malicious SDN Applications From Hiding Adverse Network Manipulations
2018 - Christian Röpke, Thorsten Holz
ACM SIGCOMM Workshop on Security in Softwarized Networks: Prospects and Challenges (SecSoN 2018), Budapest, Hungary, 2018 [PDF]