Publications
The Art of False Alarms in the Game of Deception: Leveraging Fake Honeypots for Enhanced Security
2014 - Apostolis Zarras
48th IEEE International Carnahan Conference on Security Technology (ICCST), Rome, Italy, October 2014 [PDF]Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients
2008 - Ali Ikinci, Thorsten Holz, Felix Freiling
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Saarbrücken, April 2008 - **Best Paper Award** [pdf]Collecting Autonomous Spreading Malware Using High-Interaction Honeypots
2007 - Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou
International Conference on Information and Communications Security (ICICS), LNCS 4861, Zhengzhou, China, December 2007 [pdf]Measurement and Analysis of Autonomous Spreading Malware in a University Environment
2007 - Thorsten Holz, Jan Goebel, Carsten Willems
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Lucerne, Switzerland, July 2007 [PDF]Design and Implementation of the Honey-DVD
2006 - Maximillian Dornseif, Felix Freiling, Nils Gedicke, Thorsten Holz
IEEE Information Assurance Workshop (IAW), West Point, NY, June 2006 [pdf]Effektives Sammeln von Malware mit Honeypots
2006 - Thorsten Holz, Georg Wicherski
DFN-CERT Workshop "Sicherheit in vernetzten Systemen", Hamburg, March 2006 [pdf]Learning More About Attack Patterns With Honeypots
2006 - Thorsten Holz
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Magdeburg, February 2006 [pdf]A Pointillist Approach for Comparing Honeypots
2005 - Fabien Pouget, Thorsten Holz
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Vienna, Austria, July 2005 [pdf]Detecting Honeypots and Other Suspicious Environments
2005 - Thorsten Holz, Frederic Raynal
IEEE Information Assurance Workshop (IAW), West Point, NY, June 2005 [pdf]NoSEBrEaK - Attacking Honeynets
2004 - Maximillian Dornseif, Thorsten Holz, Christian N. Klein
IEEE Information Assurance Workshop (IAW), West Point, NY, June 2004 [pdf]