Publications
Technical Report: On the Effectiveness of Fingerprinting Mobile Devices
2015 - Thomas Hupperich, Marc Kührer, Thorsten Holz, Giorgio Giacinto
TR-HGI-2015-002, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), December 2015 [PDF]On the Robustness of Mobile Device Fingerprinting
2015 - Thomas Hupperich, Marc Kührer, Thorsten Holz, Giorgio Giacinto
31th Annual Computer Security Applications Conference (ACSAC), Los Angeles, USA, December 2015 [PDF]Security Analysis of PHP Bytecode Protection Mechanisms
2015 - Dario Weißer, Johannes Dahse, Thorsten Holz
Research in Attacks, Intrusions and Defenses (RAID) Symposium, Kyoto, Japan, November 2015 [PDF]SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks
2015 - Christian Röpke, Thorsten Holz
Research in Attacks, Intrusions and Defenses (RAID) Symposium, Kyoto, Japan, November 2015 [PDF]On The Vagueness Of Online Profiling
2015 - Martin Degeling
"Profile, Predict, Prevent" Blockchain Workshops [pdf]Going Wild: Large-Scale Classification of Open DNS Resolvers
2015 - Marc Kührer, Thomas Hupperich, Jonas Bushart, Christian Rossow, Thorsten Holz
15th ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 2015 [PDF]Multi-Layer Access Control for SDN-based Telco Clouds
2015 - Bernd Jäger, Christian Röpke, Iris Adam, Thorsten Holz
Nordic Conference on Secure IT System (NordSec), Stockholm, Sweden, October 2015 [PDF]It's a TRAP: Table Randomization and Protection against Function Reuse Attacks
2015 - Stephen Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, Michael Franz
22nd ACM Conference on Computer and Communications Security (CCS), Denver, October 2015 [PDF]On Locational Privacy in the Absence of Anonymous Payments
2015 - Tilman Frosch, Sven Schäge, Martin Goll, Thorsten Holz
Gutwirth, S., Leenes R., P. De Hert and Y. Poullet, Data protection on the Move. Current Developments in ICT and Privacy/Data Protection. Springer (forthcoming, 2015), Dordrecht. [pdf]Revealing the Relationship Network Behind Link Spam
2015 - Apostolis Zarras, Antonis Papadogiannakis, Sotiris Ioannidis, Thorsten Holz
13th Annual Conference on Privacy, Security and Trust (PST), Izmir, Turkey, July 2015 [PDF]Experience Report: An Empirical Study of PHP Security Mechanism Usage
2015 - Johannes Dahse, Thorsten Holz
International Symposium on Software Testing and Analysis (ISSTA) [PDF]Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
2015 - Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
36th IEEE Symposium on Security and Privacy (Oakland), San Jose, May 2015 [PDF]Cross-Architecture Bug Search in Binary Executables
2015 - Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz
36th IEEE Symposium on Security and Privacy (Oakland), San Jose, May 2015 [PDF]VC3: Trustworthy Data Analytics in the Cloud using SGX
2015 - Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz , Mark Russinovich
36th IEEE Symposium on Security and Privacy (Oakland), San Jose, May 2015 [PDF]A Practical Investigation of Identity Theft Vulnerabilities in Eduroam
2015 - Sebastian Brenza, Andre Pawlowski, Christina Pöpper
In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2015 [Project Webpage] [PDF]Retaining Control over SDN Network Services
2015 - Christian Röpke, Thorsten Holz
International Conference on Networked Systems (NetSys), 2015FPGA Trojans through Detecting and Weakening of Cryptographic Primitives
2015 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Christof Paar
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Volume PP Issue 99, February 2015. [DOI] [pdf]Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones
2015 - Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, Thorsten Holz
Financial Cryptography and Data Security 2015 [pdf]