Publications
Technical Report: Paint it Black: Evaluating the Effectiveness of Malware Blacklists
2014 - Marc Kührer, Christian Rossow, Thorsten Holz
TR-HGI-2014-002, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), June 2014 [PDF]Technical Report: Evaluating the Effectiveness of Current Anti-ROP Defenses
2014 - Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz
TR-HGI-2014-001, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), May 2014 [PDF]Scriptless attacks: Stealing more pie without touching the sill
2014 - Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk
Journal of Computer Security, Volume 22, Number 4 / 2014, Web Application Security – Web @ 25 [URL]Communication Reduced Interaction Protocol between Customer, Charging Station, and Charging Station Management System
2014 - Karl-Heinz Krempels, Christoph Terwelp, Stefan Wüller, Tilman Frosch, Sevket Gökay
3rd International Conference on Smart Grids and Green IT Systems (SMARTGREENS 2014), Barcelona, Spain, April 2014Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior
2014 - Hugo Gascon, Sebastian Uellenbeck, Christopher Wolf, Konrad Rieck
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Vienna, Austria, March 2014 [PDF]GraphNeighbors: Hampering Shoulder-Surfing Attacks on Smartphones
2014 - Irfan Altiok, Sebastian Uellenbeck, Thorsten Holz
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Vienna, Austria, March 2014 [PDF]Simulation of Built-in PHP features for Precise Static Code Analysis
2014 - Johannes Dahse, Thorsten Holz
Annual Network & Distributed System Security Symposium (NDSS), San Diego, February 2014 [PDF]A Trusted Versioning File System for Passive Mobile Storage Devices
2014 - Luigi Catuogno, Hans Löhr, Marcel Winandy, Ahmad-Reza Sadeghi
Journal of Network and Computer Applications, Vol. 38, February 2014, pp. 65-75. http://dx.doi.org/10.1016/j.jnca.2013.05.006 [doi]Profiling, Prediction und Privatheit: Über das Verhältnis eines liberalen Privatheitbegriffs zu neueren Techniken der Verhaltensvorhersage
2014 - Martin Degeling
In Medien und Privatheit, edited by Simon Garnett, Stefan Halft, Matthias Herz, and Julia Maria Mönig, 69–92. Medien, Texte, Semiotik 7. Passau: Verlag Karl Stutz. [pdf]Control-Flow Restrictor: Compiler-based CFI for iOS
2013 - Jannik Pewny, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, December 2013 [PDF]