Publications
"Your Hashed IP Address: Ubuntu": Perspectives on Transparency Tools for Online Advertising
2019 - Tobias Urban, Martin Degeling, Thorsten Holz, Norbert Pohlmann
Annual Computer Security Applications Conference (ACSAC), Puerto Rico, USA, December 2019 [PDF]VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching
2019 - Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos
Annual Computer Security Applications Conference (ACSAC), Puerto Rico, USA, December 2019 [GitHub] [PDF]Below the Radar: Spotting DNS Tunnels in Newly Observed Hostnames in the Wild
2019 - Dennis Tatang, Florian Quinkert, Thorsten Holz
APWG Symposium on Electronic Crime Research (eCrime) 2019, Pittsburgh, PA, USA, November 2019 [PDF](Un)informed Consent: Studying GDPR Consent Notices in the Field
2019 - Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, Thorsten Holz
ACM Conference on Computer and Communications Security (CCS 2019), November 2019, London, UK [Techcrunch Report] [GitHub] [PDF] [Slides]Die DSVGO als internationales Vorbild?
2019 - Christine Utz, Stephan Koloßa, Thorsten Holz, Pierre Thielbörger
Datenschutz und Datensicherheit (DuD) 11/2019, S. 700-705 [DOI] [PDF]A Study on Subject Data Access in Online Advertising after the GDPR
2019 - Tobias Urban, Dennis Tatang, Martin Degeling, Thorsten Holz, Norbert Pohlmann
International Workshop on Data Privacy Management (DPM) 2019, co-located with ESORICS 2019 in Luxembourg, September 2019 [PDF]Study of DNS Rebinding Attacks on Smart Home Devices
2019 - Dennis Tatang, Tim Suurland, Thorsten Holz
International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) 2019, co-located with ESORICS 2019 in Luxembourg, September 2019 [PDF]Static Detection of Uninitialized Stack Variables in Binary Code
2019 - Behrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz
European Symposium on Research in Computer Security (ESORICS), Luxembourg, September 2019 [PDF]Towards Automated Application-Specific Software Stacks
2019 - Nicolai Davidsson, Andre Pawlowski, Thorsten Holz
European Symposium on Research in Computer Security (ESORICS), Luxembourg, September 2019 [Technical Report] [GitHub] [PDF]GDPiRated – Stealing Personal Information On-and Offline
2019 - Matteo Cagnazzo, Thorsten Holz, Norbert Pohlmann
European Symposium on Research in Computer Security (ESORICS), Luxembourg, September 2019 [PDF]Was bedeutet Process Mining für Datenschutz und Mitbestimmung im Unternehmen?
2019 - Martin Degeling
Informatik Spektrum, August 2019 [PDF]AntiFuzz: Impeding Fuzzing Audits of Binary Executables
2019 - Emre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz
USENIX Security Symposium, Santa Clara, CA, USA, August 2019 [GitHub] [pdf]GRIMOIRE: Synthesizing Structure while Fuzzing
2019 - Tim Blazytko, Cornelius Aschermann, Moritz Schlögel, Ali Abbasi, Sergej Schumilo, Simon Wörner, Thorsten Holz
USENIX Security Symposium, Santa Clara, CA, USA, August 2019 [GitHub] [Pdf]Intervention and End-User Development
2019 - Thomas Herrmann, Christopher Lentzsch, Martin Degeling
International Symposium on End User Development (IS-EUD) 2019 [Conference Link] [Springer Link]Large-scale Analysis of Infrastructure-leaking DNS Servers
2019 - Dennis Tatang, Carl Schneider, Thorsten Holz
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Gothenburg, Sweden, June 2019 [GitHub] [PDF]Challenges in Designing Exploit Mitigations for Deeply Embedded Systems
2019 - Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle
IEEE European Symposium on Security and Privacy (EuroS&P 2019), Stockholm, Sweden, June 2019 [PDF]Steroids for DOPed Applications: A Compiler for Automated Data-Oriented Programming
2019 - Jannik Pewny, Philipp Koppe, Thorsten Holz
IEEE European Symposium on Security and Privacy (EuroS&P 2019), Stockholm, Sweden, June 2019 [PDF]Analyzing leakage of personal information by malware
2019 - Tobias Urban, Dennis Tatang, Thorsten Holz, Norbert Pohlmann
Journal of Computer Security, 2019It's Not What It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains
2019 - Florian Quinkert, Tobias Lauinger, William Robertson, Engin Kirda, Thorsten Holz
IEEE Conference on Communications and Network Security (CNS), Washington, D.C., USA, June 2019 [PDF]Breaking LTE on Layer Two
2019 - David Rupprecht, Katharina Kohls, Christina Pöpper, Thorsten Holz
IEEE Symposium on Security & Privacy (Oakland), May 2019 [Website] [PDF]POSTER: Application-Layer Routing Attacks on Tor
2019 - Katharina Kohls, Christina Pöpper
IEEE Symposium on Security & Privacy (Oakland), May 2019 [Proposal] [Poster]Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two
2019 - Katharina Kohls, David Rupprecht, Thorsten Holz, Christina Pöpper
Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’19), May 15–17, 2019, Miami, FL, USA, ACM [PDF]LTE Security Disabled — Misconfiguration in Commercial Networks
2019 - Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper
Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’19), May 15–17, 2019, Miami, FL, USA, ACM [PDF]Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
2019 - Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa
Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [Demo] [PDF]Nautilus: Fishing for Deep Bugs with Grammars
2019 - Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, Daniel Teuchert
Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [GitHub] [PDF]On the Challenges of Geographical Avoidance for Tor
2019 - Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Pöpper
Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [PDF] [Slides]Redqueen: Fuzzing with Input-to-State Correspondence
2019 - Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz
Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [GitHub] [PDF]We Value Your Privacy - Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy
2019 - Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten Holz
Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [GitHub] [PDF]DorkPot: A Honeypot-based Analysis of Google Dorks
2019 - Florian Quinkert, Eduard Leonhardt, Thorsten Holz
Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb), San Diego, California, USA, February 2019 - ** Best Paper Award ** [PDF]A Study of Newly Observed Hostnames and DNS Tunneling in the Wild
2019 - Dennis Tatang, Florian Quinkert, Nico Dolecki, Thorsten Holz
Technical Report, arXiv:1902.08454, February 2019 [arXiv] [PDF]Redefining Data Transparency: A Multidimensional Approach
2019 - Elisa Bertino, Shawn Merrill, Alina Nesen, Christine Utz
IEEE Computer, Jan. 2019, pp. 16-26, vol. 52 [IEEE] [DOI]