Publications
The Art of False Alarms in the Game of Deception: Leveraging Fake Honeypots for Enhanced Security
2014 - Apostolis Zarras
48th IEEE International Carnahan Conference on Security Technology (ICCST), Rome, Italy, October 2014 [PDF]Verfolgen und Abschwächen von Malicious Remote Control Networks
2010 - Thorsten Holz
Ausgezeichnete Informatikdissertationen 2009. LNI D-10, pages 101-110, May 2010 [Dagstuhl Seminar]Tracking and Mitigation of Malicious Remote Control Networks
2009 - Thorsten Holz
Universität Mannheim, pages 1-138, URN urn:nbn:de:bsz:180-madoc-23306, April 2009 [MADOC Link] [Persistent ID]Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients
2008 - Ali Ikinci, Thorsten Holz, Felix Freiling
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Saarbrücken, April 2008 - **Best Paper Award** [pdf]Collecting Autonomous Spreading Malware Using High-Interaction Honeypots
2007 - Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou
International Conference on Information and Communications Security (ICICS), LNCS 4861, Zhengzhou, China, December 2007 [pdf]Virtual Honeypots - From Botnet Tracking to Intrusion Detection
2007 - Niels Provos, Thorsten Holz
Addison-Wesley Professional; 1. edition, 440 pages [Link]Measurement and Analysis of Autonomous Spreading Malware in a University Environment
2007 - Thorsten Holz, Jan Goebel, Carsten Willems
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Lucerne, Switzerland, July 2007 [PDF]Advanced Honeypot-based Intrusion Detection
2006 - Jan Göbel, Jens Hektor, Thorsten Holz
USENIX ;login:, Volume 31, Issue 6, Pages 18-23, December 2006 [Link] [pdf]Design and Implementation of the Honey-DVD
2006 - Maximillian Dornseif, Felix Freiling, Nils Gedicke, Thorsten Holz
IEEE Information Assurance Workshop (IAW), West Point, NY, June 2006 [pdf]Effektives Sammeln von Malware mit Honeypots
2006 - Thorsten Holz, Georg Wicherski
DFN-CERT Workshop "Sicherheit in vernetzten Systemen", Hamburg, March 2006 [pdf]