Publications

"Your Hashed IP Address: Ubuntu": Perspectives on Transparency Tools for Online Advertising

2019 - Tobias Urban, Martin Degeling, Thorsten Holz, Norbert Pohlmann

Annual Computer Security Applications Conference (ACSAC), Puerto Rico, USA, December 2019 [PDF]

VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching

2019 - Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos

Annual Computer Security Applications Conference (ACSAC), Puerto Rico, USA, December 2019 [GitHub] [PDF]

Below the Radar: Spotting DNS Tunnels in Newly Observed Hostnames in the Wild

2019 - Dennis Tatang, Florian Quinkert, Thorsten Holz

APWG Symposium on Electronic Crime Research (eCrime) 2019, Pittsburgh, PA, USA, November 2019

(Un)informed Consent: Studying GDPR Consent Notices in the Field

2019 - Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, Thorsten Holz

ACM Conference on Computer and Communications Security (CCS 2019), November 2019, London, UK [Techcrunch Report] [GitHub] [PDF]

Die DSVGO als internationales Vorbild?

2019 - Christine Utz, Stephan Koloßa, Thorsten Holz, Pierre Thielbörger

Datenschutz und Datensicherheit (DuD) 11/2019, S. 700-705 [DOI] [PDF]

A Study on Subject Data Access in Online Advertising after the GDPR

2019 - Tobias Urban, Dennis Tatang, Martin Degeling, Thorsten Holz, Norbert Pohlmann

International Workshop on Data Privacy Management (DPM) 2019, co-located with ESORICS 2019 in Luxembourg, September 2019 [PDF]

Study of DNS Rebinding Attacks on Smart Home Devices

2019 - Dennis Tatang, Tim Suurland, Thorsten Holz

International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) 2019, co-located with ESORICS 2019 in Luxembourg, September 2019 [PDF]

Static Detection of Uninitialized Stack Variables in Binary Code

2019 - Behrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz

European Symposium on Research in Computer Security (ESORICS), Luxembourg, September 2019 [PDF]

Towards Automated Application-Specific Software Stacks

2019 - Nicolai Davidsson, Andre Pawlowski, Thorsten Holz

European Symposium on Research in Computer Security (ESORICS), Luxembourg, September 2019 [Technical Report] [GitHub] [PDF]

GDPiRated – Stealing Personal Information On-and Offline

2019 - Matteo Cagnazzo, Thorsten Holz, Norbert Pohlmann

European Symposium on Research in Computer Security (ESORICS), Luxembourg, September 2019 [PDF]

Was bedeutet Process Mining für Datenschutz und Mitbestimmung im Unternehmen?

2019 - Martin Degeling

Informatik Spektrum, August 2019 [PDF]

AntiFuzz: Impeding Fuzzing Audits of Binary Executables

2019 - Emre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz

USENIX Security Symposium, Santa Clara, CA, USA, August 2019 [GitHub] [pdf]

GRIMOIRE: Synthesizing Structure while Fuzzing

2019 - Tim Blazytko, Cornelius Aschermann, Moritz Schlögel, Ali Abbasi, Sergej Schumilo, Simon Wörner, Thorsten Holz

USENIX Security Symposium, Santa Clara, CA, USA, August 2019 [GitHub] [Pdf]

Intervention and End-User Development

2019 - Thomas Herrmann, Christopher Lentzsch, Martin Degeling

International Symposium on End User Development (IS-EUD) 2019 [Conference Link] [Springer Link]

Large-scale Analysis of Infrastructure-leaking DNS Servers

2019 - Dennis Tatang, Carl Schneider, Thorsten Holz

Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Gothenburg, Sweden, June 2019 [GitHub] [PDF]

Challenges in Designing Exploit Mitigations for Deeply Embedded Systems

2019 - Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle

IEEE European Symposium on Security and Privacy (EuroS&P 2019), Stockholm, Sweden, June 2019 [PDF]

Steroids for DOPed Applications: A Compiler for Automated Data-Oriented Programming

2019 - Jannik Pewny, Philipp Koppe, Thorsten Holz

IEEE European Symposium on Security and Privacy (EuroS&P 2019), Stockholm, Sweden, June 2019 [PDF]

Analyzing leakage of personal information by malware

2019 - Tobias Urban, Dennis Tatang, Thorsten Holz, Norbert Pohlmann

Journal of Computer Security, 2019

It's Not What It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains

2019 - Florian Quinkert, Tobias Lauinger, William Robertson, Engin Kirda, Thorsten Holz

IEEE Conference on Communications and Network Security (CNS), Washington, D.C., USA, June 2019 [PDF]

Breaking LTE on Layer Two

2019 - David Rupprecht, Katharina Kohls, Christina Pöpper, Thorsten Holz

IEEE Symposium on Security & Privacy (Oakland), May 2019 [Website] [PDF]

Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two

2019 - Katharina Kohls, David Rupprecht, Thorsten Holz, Christina Pöpper

Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’19), May 15–17, 2019, Miami, FL, USA, ACM [PDF]

LTE Security Disabled — Misconfiguration in Commercial Networks

2019 - Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper

Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’19), May 15–17, 2019, Miami, FL, USA, ACM [PDF]

Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding

2019 - Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Do­ro­thea Kolossa

Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [Demo] [PDF]

Nautilus: Fishing for Deep Bugs with Grammars

2019 - Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, Daniel Teuchert

Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [GitHub] [PDF]

On the Challenges of Geographical Avoidance for Tor

2019 - Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Pöpper

Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [PDF]

Redqueen: Fuzzing with Input-to-State Correspondence

2019 - Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz

Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [GitHub] [PDF]

We Value Your Privacy - Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy

2019 - Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten Holz

Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [GitHub] [PDF]

DorkPot: A Honeypot-based Analysis of Google Dorks

2019 - Florian Quinkert, Eduard Leonhardt, Thorsten Holz

Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb), San Diego, California, USA, February 2019 - ** Best Paper Award ** [PDF]

A Study of Newly Observed Hostnames and DNS Tunneling in the Wild

2019 - Dennis Tatang, Florian Quinkert, Nico Dolecki, Thorsten Holz

Technical Report, arXiv:1902.08454, February 2019 [arXiv] [PDF]

Redefining Data Transparency: A Multidimensional Approach

2019 - Elisa Bertino, Shawn Merrill, Alina Nesen, Christine Utz

IEEE Computer, Jan. 2019, pp. 16-26, vol. 52 [IEEE] [DOI]
Page: