Publications
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
2009 - Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
STC'09: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, p. 19-28, ACM, 2009. [pdf]Software distribution as a malware infection vector
2009 - Felix Gröbert, Ahmad-Reza Sadeghi, Marcel Winandy
International Conference for Internet Technology and Secured Transactions (ICITST 2009) [Bibtex]Walowdac - Analysis of a Peer-to-Peer Botnet
2009 - Ben Stock, Jan Göbel, Markus Engelberth, Felix Freiling, Thorsten Holz
European Conference on Computer Network Defense (EC2ND), Milan, Italy, November 2009 [pdf]Transparent Mobile Storage Protection in Trusted Virtual Domains
2009 - Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy
23rd Large Installation System Administration Conference (LISA '09), p. 159--172, USENIX Association, 2009. [pdf]Visual Analysis of Malware Behavior (Short paper)
2009 - Philipp Trinius, Thorsten Holz, Jan Göbel, Felix Freiling
Workshop on Visualization for Cyber Security (VizSec), Atlantic City, NJ, USA, October 2009 [pdf]Automatically Generating Models for Botnet Detection
2009 - Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Göbel, Christopher Kruegel, Engin Kirda
European Symposium on Research in Computer Security (ESORICS), Saint Malo, France, September 2009 [pdf]Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones
2009 - Thorsten Holz, Markus Engelberth, Felix Freiling
European Symposium on Research in Computer Security (ESORICS), Saint Malo, France, September 2009 [pdf]A Pattern for Secure Graphical User Interface Systems.
2009 - Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
3rd International Workshop on Secure systems methodologies using patterns (SPattern 2009), in DEXA '09: Proceedings of the 20th International Workshop on Database and Expert Systems Application, p.186-190, IEEE Computer Society, 2009. [pdf] [bibtex]Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms
2009 - Ralf Hund, Thorsten Holz, Felix Freiling
USENIX Security Symposium, Montreal, Canada, August 2009 [PDF]Towards Proactive Spam Filtering (Extended Abstract)
2009 - Jan Göbel, Thorsten Holz, Philipp Trinius
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Milan, Italy, July 2009 [pdf]