Publications
Control-Flow Restrictor: Compiler-based CFI for iOS
2013 - Jannik Pewny, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, December 2013 [PDF]k-subscription: Privacy-Preserving Microblogging Browsing through Obfuscation
2013 - Panagiotis Papadopoulos, Antonis Papadogiannakis, Michalis Polychronakis, Apostolis Zarras, Thorsten Holz, Evangelos P. Markatos
29th Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, December 2013 [PDF]PRIME: Private RSA Infrastructure for Memory-less Encryption
2013 - Behrad Garmany, Tilo Müller
Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, December 2013 - **Best Paper Award** [PDF]Towards Reducing the Attack Surface of Software Backdoors
2013 - Felix Schuster, Thorsten Holz
20th ACM Conference on Computer and Communications Security (CCS), Berlin, November 2013 [PDF]Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns
2013 - Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, Thorsten Holz
ACM Conference on Computer and Communications Security (CCS), Berlin, November 2013 [PDF]mXSS Attacks: Attacking well-secured Web-Applications by using innerHTML Mutations
2013 - Mario Heiderich, Jörg Schwenk, Tilman Frosch, Jonas Magazinius, Edward Z. Yang
20th ACM Conference on Computer and Communications Security (CCS), Berlin, Germany, November 2013 [PDF]Mobile Malware Detection Based on Energy Fingerprints - A Dead End?
2013 - Johannes Hoffmann, Stephan Neumann, Thorsten Holz
Research in Attacks, Intrusions and Defenses (RAID) Symposium, St. Lucia, October 2013 [PDF]POSTER: On the Usability of Secure GUIs
2013 - Atanas Filyanov, Aysegül Nas, Melanie Volkamer, Marcel Winandy
9th Symposium on Usable Privacy and Security (SOUPS 2013), Newcastle, UK, July 24-26, 2013. [Extended Abstract] [Poster]Preventing Backdoors In Server Applications With A Separated Software Architecture (Short Paper)
2013 - Felix Schuster, Stefan Rüster, Thorsten Holz
10th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Berlin, July 2013 [PDF]Standardorientierte Speicherung von verschlüsselten Dokumenten in einem XDS-Repository
2013 - Lennart Köster, Fatih Korkmaz, Marcel Winandy
Proceedings of the eHealth2013, May 23-24, Vienna, Austria, OCG, 2013.Practical Timing Side Channel Attacks Against Kernel Space ASLR
2013 - Ralf Hund, Carsten Willems, Thorsten Holz
IEEE Symposium on Security and Privacy ("Oakland"), San Francisco, CA, May 2013 [pdf]MobileSandbox: Ein Analyseframework für Android Applikationen
2013 - Michael Spreitzenbarth, Johannes Hoffmann, Hanno Lemoine, Thomas Schreck, Florian Echtler
Proceedings of the 13th Deutscher IT-Sicherheitskongress, Bonn, Germany, 2013 [PDF]PSiOS: Bring Your Own Privacy & Security to iOS Devices
2013 - Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
ACM Symposium on Information, Computer and Communications Security (ASIACCS), Hangzhou, China, May 2013 - **Distinguished Paper Award** [pdf]Mobile-Sandbox: Looking Deeper into Android Applications
2013 - Michael Spreitzenbarth, Florian Echtler, Thomas Schreck, Felix C. Freiling, Johannes Hoffmann
28th International ACM Symposium on Applied Computing (SAC), Coimbra, Portugal, March 2013 [pdf]Slicing Droids: Program Slicing for Smali Code
2013 - Johannes Hoffmann, Martin Ussath, Michael Spreitzenbarth, Thorsten Holz
28th International ACM Symposium on Applied Computing (SAC), Coimbra, Portugal, March 2013 [pdf]