Veröffentlichungen
Predentifier: Detecting Botnet C&C Domains From Passive DNS Data
2013 - Tilman Frosch, Marc Kührer, Thorsten Holz
Advances in IT Early Warning, Fraunhofer Verlag, February 2013. ISBN: 978-3-8396-0474-8 [Book Website] [PDF]Jackstraws: Picking Command and Control Connections from Bot Traffic
2011 - Gregoire Jacob, Ralf Hund, Christopher Kruegel, Thorsten Holz
USENIX Security Symposium, San Francisco, CA, August 2011 [PDF]Verfolgen und Abschwächen von Malicious Remote Control Networks
2010 - Thorsten Holz
Ausgezeichnete Informatikdissertationen 2009. LNI D-10, pages 101-110, May 2010 [Dagstuhl Seminar]Botzilla: Detecting the "Phoning Home" of Malicious Software
2010 - Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorsten Holz, Pavel Laskov
ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 2010 [PDF]Automatically Generating Models for Botnet Detection
2009 - Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Göbel, Christopher Kruegel, Engin Kirda
European Symposium on Research in Computer Security (ESORICS), Saint Malo, France, September 2009 [pdf]Tracking and Mitigation of Malicious Remote Control Networks
2009 - Thorsten Holz
Universität Mannheim, pages 1-138, URN urn:nbn:de:bsz:180-madoc-23306, April 2009 [MADOC Link] [Persistent ID]Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
2008 - Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix C. Freiling
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Francisco, CA, April 2008 [pdf]