Publications
Trusted virtual domains - design, implementation and lessons learned.
2009 - Ahmad-Reza Sadeghi, Gianluca Ramunno, Dirk Kuhlmann, Konrad Eriksson, Luigi Catuogno, Alexandra Dmitrienko, Jing Zhan, Steffen Schulz, Marcel Winandy, Matthias Schunter
International Conference on Trusted Systems (INTRUST) 2009. [pdf] [bibtex]Dynamic Integrity Measurement and Attestation: Towards Defense Against Return-Oriented Programming Attacks.
2009 - Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
STC'09: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, p. 49-54, ACM, 2009. [pdf]TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
2009 - Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
STC'09: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, p. 19-28, ACM, 2009. [pdf]Software distribution as a malware infection vector
2009 - Felix Gröbert, Ahmad-Reza Sadeghi, Marcel Winandy
International Conference for Internet Technology and Secured Transactions (ICITST 2009) [Bibtex]Walowdac - Analysis of a Peer-to-Peer Botnet
2009 - Ben Stock, Jan Göbel, Markus Engelberth, Felix Freiling, Thorsten Holz
European Conference on Computer Network Defense (EC2ND), Milan, Italy, November 2009 [pdf]Transparent Mobile Storage Protection in Trusted Virtual Domains
2009 - Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy
23rd Large Installation System Administration Conference (LISA '09), p. 159--172, USENIX Association, 2009. [pdf]Visual Analysis of Malware Behavior (Short paper)
2009 - Philipp Trinius, Thorsten Holz, Jan Göbel, Felix Freiling
Workshop on Visualization for Cyber Security (VizSec), Atlantic City, NJ, USA, October 2009 [pdf]Automatically Generating Models for Botnet Detection
2009 - Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Göbel, Christopher Kruegel, Engin Kirda
European Symposium on Research in Computer Security (ESORICS), Saint Malo, France, September 2009 [pdf]Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones
2009 - Thorsten Holz, Markus Engelberth, Felix Freiling
European Symposium on Research in Computer Security (ESORICS), Saint Malo, France, September 2009 [pdf]A Pattern for Secure Graphical User Interface Systems.
2009 - Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
3rd International Workshop on Secure systems methodologies using patterns (SPattern 2009), in DEXA '09: Proceedings of the 20th International Workshop on Database and Expert Systems Application, p.186-190, IEEE Computer Society, 2009. [pdf] [bibtex]Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms
2009 - Ralf Hund, Thorsten Holz, Felix Freiling
USENIX Security Symposium, Montreal, Canada, August 2009 [PDF]Towards Proactive Spam Filtering (Extended Abstract)
2009 - Jan Göbel, Thorsten Holz, Philipp Trinius
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Milan, Italy, July 2009 [pdf]Einsatz von Sicherheitskernen und Trusted Computing.
2009 - Ahmad-Reza Sadeghi, Marcel Winandy,
D-A-CH Security 2009, Bochum, Germany. [pdf]Frühe Warnung durch Beobachten und Verfolgen von bösartiger Software im Deutschen Internet: Das Internet-Malware-Analyse System (InMAS)
2009 - Markus Engelberth, Felix Freiling, Jan Goebel, Christian Gorecki, Thorsten Holz, Philipp Trinius, Carsten Willems
11. Deutscher IT-Sicherheitskongress des Bundesamtes für Sicherheit in der Informationstechnik (BSI), Bonn, May 2009 [PDF]Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
2009 - Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy
TRUST 2009: Proceedings of the 2nd International Conference on Trusted Computing, LNCS 5471, p. 45-62 Springer, 2009. [pdf]Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
2009 - Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy
Proceedings of 5th Information Security Practice and Experience Conference (ISPEC'09), LNCS 5451, p. 396-407, Springer, 2009. [pdf]MalOffice - Detecting malicious documents with combined static and dynamic analysis
2009 - Markus Engelberth, Carsten Willems, Thorsten Holz
Virus Bulletin Conference, Geneva, Switzerland, September 2009 [Presentation]