Veröffentlichungen
Control-Flow Restrictor: Compiler-based CFI for iOS
2013 - Jannik Pewny, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, December 2013 [PDF]k-subscription: Privacy-Preserving Microblogging Browsing through Obfuscation
2013 - Panagiotis Papadopoulos, Antonis Papadogiannakis, Michalis Polychronakis, Apostolis Zarras, Thorsten Holz, Evangelos P. Markatos
29th Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, December 2013 [PDF]PRIME: Private RSA Infrastructure for Memory-less Encryption
2013 - Behrad Garmany, Tilo Müller
Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, December 2013 - **Best Paper Award** [PDF]Mit Sicherheit Mobil: Die Nutzung mobiler Geräte stellt Herausforderungen an Datenschutz und -sicherheit im Klinikalltag
2013 - Agnes Gawlik, Marcel Winandy
E-HEALTH-COM, 06/2013, S. 38-39.Towards Reducing the Attack Surface of Software Backdoors
2013 - Felix Schuster, Thorsten Holz
20th ACM Conference on Computer and Communications Security (CCS), Berlin, November 2013 [PDF]Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns
2013 - Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, Thorsten Holz
ACM Conference on Computer and Communications Security (CCS), Berlin, November 2013 [PDF]mXSS Attacks: Attacking well-secured Web-Applications by using innerHTML Mutations
2013 - Mario Heiderich, Jörg Schwenk, Tilman Frosch, Jonas Magazinius, Edward Z. Yang
20th ACM Conference on Computer and Communications Security (CCS), Berlin, Germany, November 2013 [PDF]An Experimental Security Analysis of Two Satphone Standards
2013 - Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz
ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 3, Article 10, Publication date: November 2013 [PDF]Mobile Malware Detection Based on Energy Fingerprints - A Dead End?
2013 - Johannes Hoffmann, Stephan Neumann, Thorsten Holz
Research in Attacks, Intrusions and Defenses (RAID) Symposium, St. Lucia, October 2013 [PDF]On the Usability of Secure GUIs
2013 - Atanas Filyanov, Aysegül Nas, Melanie Volkamer, Marcel Winandy
Technical Report TR-HGI-2013-002 [Paper]