Veröffentlichungen
Property-Based TPM Virtualization
2008 - Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
Technical Report HGI-TR-2008-001, Horst Görtz Institute for IT-Security, Ruhr-University Bochum, 2008. [PDF]Rishi: Identifizierung von Bots durch Auswerten der IRC Nicknamen
2008 - Jan Göbel, Thorsten Holz
DFN-CERT Workshop "Sicherheit in vernetzten Systemen", Hamburg, February 2008 [pdf]Measuring and Detecting Fast-Flux Service Networks
2008 - Thorsten Holz, Christian Gorecki, Konrad Rieck, Felix Freiling
Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2008 [pdf]Collecting Autonomous Spreading Malware Using High-Interaction Honeypots
2007 - Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou
International Conference on Information and Communications Security (ICICS), LNCS 4861, Zhengzhou, China, December 2007 [pdf]Virtual Honeypots - From Botnet Tracking to Intrusion Detection
2007 - Niels Provos, Thorsten Holz
Addison-Wesley Professional; 1. edition, 440 pages [Link]Measurement and Analysis of Autonomous Spreading Malware in a University Environment
2007 - Thorsten Holz, Jan Goebel, Carsten Willems
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Lucerne, Switzerland, July 2007 [PDF]Trusted User-Aware Web Authentication
2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Marcel Winandy,
Presented at the Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07), Stanford, USA, June 22, 2007. [PDF]Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing
2007 - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
In Proceedings of the The Second International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria, April 10-13, 2007, pages 120-127. IEEE Computer Society, 2007. [pdf]Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation
2007 - Jan Göbel, Thorsten Holz
USENIX Workshop on Hot Topics in Understanding Botnets (HotBots), Cambridge, MA, April 2007 [pdf]Toward Automated Dynamic Malware Analysis Using CWSandbox
2007 - Carsten Willems, Thorsten Holz, Felix C. Freiling
IEEE Security & Privacy, Volume 5, Number 2, Pages 32-39, March/April 2007 [PDF]