Publications
Down to the Bare Metal: Using Processor Features for Binary Analysis
2012 - Carsten Willems, Ralf Hund, Amit Vasudevan, Andreas Fobian, Dennis Felsch, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2012 [pdf]Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis
2012 - Carsten Willems, Felix C. Freiling, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2012 [pdf]CXPInspector: Hypervisor-Based, Hardware-Assisted System Monitoring
2012 - Carsten Willems, Ralf Hund, Thorsten Holz
TR-HGI-2012-002, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), November 2012 [pdf]PermissionWatcher: Creating User Awareness of Application Permissions in Mobile Systems
2012 - Eric Struse, Julian Seifert, Sebastian Uellenbeck, Enrico Rukzio, Christopher Wolf
International Joint Conference on Ambient Intelligence (AmI), Pisa, Italy, November 2012 [pdf]Down to the Bare Metal: Using Processor Features for Binary Analysis
2012 - Carsten Willems, Ralf Hund, Dennis Felsch, Andreas Fobian, Thorsten Holz
TR-HGI-2012-001, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), November 2012 [pdf]Applying a Security Kernel Framework to Smart Meter Gateways
2012 - Michael Gröne, Marcel Winandy
ISSE 2012 Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2012 Conference, pp. 252-259, Springer Vieweg, 2012.Scriptless Attacks – Stealing the Pie Without Touching the Sill
2012 - Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk
19th ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, October 2012 [PDF]Requirements for Integrating End-to-End Security into Large-Scale EHR Systems
2012 - Agnes Gawlik, Lennart Köster, Hiva Mahmoodi, Marcel Winandy
Amsterdam Privacy Conference (APC 2012), Workshop on Engineering EHR Solutions (WEES), 2012, Available at SSRN: http://ssrn.com/abstract=2457987 [online] [PDF]B@bel: Leveraging Email Delivery for Spam Mitigation
2012 - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna
21st USENIX Security Symposium, Bellevue, WA, USA, August 2012 [PDF]On the Fragility and Limitations of Current Browser-provided Clickjacking Protection Schemes
2012 - Sebastian Lekies, Mario Heiderich, Dennis Appelt, Thorsten Holz, Martin Johns
6th USENIX Workshop on Offensive Technologies (WOOT), Bellevue, WA, August 2012 [PDF]SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines
2012 - Johannes Hoffmann, Sebastian Uellenbeck, Thorsten Holz
9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Heraklion, Greece, July 2012 [PDF]Informationssicherheit in der Arztpraxis: Aktuelle Herausforderungen und Lösungsansätze
2012 - Marcel Winandy
Datenschutz und Datensicherheit (DuD) 06/2012, S. 419 - 424 [SpringerLink]Don’t Trust Satellite Phones: A Security Analysis of Two Satphone Standards
2012 - Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz
IEEE Symposium on Security and Privacy ("Oakland"), San Francisco, CA, May 2012 - **Best Paper Award** [More Info] [PDF]Tracking DDoS Attacks: Insights into the Business of Disrupting the Web
2012 - Armin Büscher, Thorsten Holz
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Jose, CA, April 2012 [PDF]An Empirical Analysis of Malware Blacklists
2012 - Marc Kührer, Thorsten Holz
PIK - Praxis der Informationsverarbeitung und Kommunikation. Volume 35, Issue 1, Pages 11–16, April 2012 [pdf]Reverse Code Engineering - State of the Art and Countermeasures
2012 - Carsten Willems
it - Information Technology, Volume 54, Number 2, pages 53-63, March 2012 [Journal] [PDF]Analyse und Vergleich von BckR2D2-I und II
2012 - Andreas Dewald, Felix Freiling, Thomas Schreck, Michael Spreitzenbarth, Johannes Stüttgen, Stefan Vömel, Carsten Willems
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Darmstadt, Germany, März 2012 [Technical Report]Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis
2012 - Carsten Willems, Felix, Freiling
Technical Reports CS-2012,1 University of Erlangen, Department Informatik, February 2012 [OPUS Link]MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones
2012 - Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi
Annual Network & Distributed System Security Symposium (NDSS), San Diego, February 2012 [PDF]Flexible Patient-Controlled Security for Electronic Health Records
2012 - Thomas Hupperich, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
ACM SIGHIT International Symposium on Health Informatics (IHI), Miami, January 2012 [PDF]