Publications
Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing
2020 - Emre Güler, Philipp Görz, Elia Geretto, Andrea Jemmett, Sebastian Österlund, Herbert Bos, Cristiano Giuffrida, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), Virtual, December 2020 [PDF]Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems
2020 - Lea Schönherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa
Annual Computer Security Applications Conference (ACSAC), Virtual, December 2020 [arXiv Preprint] [PDF]Plenty of Phish in the Sea: Analyzing Potential Pre-Attack Surfaces
2020 - Tobias Urban, Matteo Große-Kampmann, Dennis Tatang, Thorsten Holz, Norbert Pohlmann
European Symposium on Research in Computer Security (ESORICS), Guildford, UK, September 2020 [PDF]Data Sharing in Mobile Apps — User Privacy Expectations in Europe
2020 - Nils Quermann, Martin Degeling
5th European Workshop on Usable Security (EuroUSEC 2020) [pdf]Aurora: Statistical Crash Analysis for Automated Root Cause Explanation
2020 - Tim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz
USENIX Security Symposium, Boston, MA, USA, August 2020 [PDF]Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE
2020 - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
USENIX Security Symposium, Boston, MA, USA, August 2020 [Website] [PDF]EthBMC: A Bounded Model Checker for Smart Contracts
2020 - Joel Frank, Cornelius Aschermann, Thorsten Holz
USENIX Security Symposium, Boston, MA, USA, August 2020 [PDF]HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation
2020 - Abraham A. Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, Mathias Payer
USENIX Security Symposium, Boston, MA, USA, August 2020 [PDF]Leveraging Frequency Analysis for Deep Fake Image Recognition
2020 - Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer , Dorothea Kolossa, Thorsten Holz
International Conference on Machine Learning (ICML), July 2020 [arXiv Preprint] [PDF]Be the Phisher - Understanding Users’ Perception of Malicious Domains
2020 - Florian Quinkert, Martin Degeling, Jim Blythe, Thorsten Holz
ACM Asia Conference on Computer & Communications Security (ASIACCS), Taipei, Taiwan, June 2020 [PDF]