Publications

Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.

2006 - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy

Workshop on Information and System Security (WISSEC'06), Antwerpen (Belgium), 2006 .

TCG Inside? - A Note on TPM Specification Compliance

2006 - Ahmad-Reza Sadeghi, Christian Wachsmann, Marcel Selhorst, Christian Stüble, Marcel Winandy

In Proceedings of the first ACM Workshop on Scalable Trusted Computing (ACMSTC), Alexandria, Virginia, USA, November 3, 2006, pages 47-56. ACM Press, 2006.

A Comparative Study of Teaching Forensics at a University Degree Level

2006 - Philip Anderson, Maximillian Dornseif, Felix Freiling, Thorsten Holz, Alastair Irons, Christopher Laing, Martin Mink

International Conference on IT Security Incident Management & IT Forensics (IMF), Stuttgart, Germany, October 2006 [pdf]

Security Architecture for Device Encryption and VPN

2006 - Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Ammar Alkassar, Michael Scheibel

Accepted for ISSE (Information Security Solution Europe) 2006 [Springer Link]

The Nepenthes Platform: An Efficient Approach to Collect Malware

2006 - Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix Freiling

9th International Symposium on Recent Advances in Intrusion Detection (RAID), Hamburg, Germany, September 2006 [pdf]

The Effect of Stock Spam on Financial Markets

2006 - Rainer Böhme, Thorsten Holz

Workshop on the Economics of Information Security (WEIS), University of Cambridge, June 2006 [SSRN Link]

Design and Implementation of the Honey-DVD

2006 - Maximillian Dornseif, Felix Freiling, Nils Gedicke, Thorsten Holz

IEEE In­for­ma­ti­on As­suran­ce Work­shop (IAW), West Point, NY, June 2006 [pdf]

Design and Implementation of a Secure Linux Device Encryption Architecture

2006 - Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Michael Scheibel

LinuxTag 2006. [pdf]

Safety, Liveness, and Information Flow: Dependability Revisited

2006 - Zinaida Benenson, Felix Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso

ARCS Workshop on Dependability and Fault-Tolerance, Frankfurt am Main, Germany, March 2006 [pdf]

Effektives Sammeln von Malware mit Honeypots

2006 - Thorsten Holz, Georg Wicherski

DFN-CERT Workshop "Sicherheit in vernetzten Systemen", Hamburg, March 2006 [pdf]

Learning More About Attack Patterns With Honeypots

2006 - Thorsten Holz

GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Magdeburg, February 2006 [pdf]

Multilateral Security Considerations for Adaptive Mobile Applications

2005 - Adrian Spalka, Armin B. Cremers, Marcel Winandy

Proceedings of the 2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005), pp. 133-137, INSTICC, 2005.

Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks

2005 - Felix Freiling, Thorsten Holz, Georg Wicherski

European Symposium on Research in Computer Security (ESORICS), Milan, Italy, September 2005 [pdf]

A Pointillist Approach for Comparing Honeypots

2005 - Fabien Pouget, Thorsten Holz

Con­fe­rence on De­tec­tion of In­tru­si­ons and Mal­wa­re & Vul­nerabi­li­ty As­sess­ment (DIMVA), Vienna, Austria, July 2005 [pdf]

Detecting Honeypots and Other Suspicious Environments

2005 - Thorsten Holz, Frederic Raynal

IEEE In­for­ma­ti­on As­suran­ce Work­shop (IAW), West Point, NY, June 2005 [pdf]

NoSEBrEaK - Attacking Honeynets

2004 - Maximillian Dornseif, Thorsten Holz, Christian N. Klein

IEEE Information Assurance Workshop (IAW), West Point, NY, June 2004 [pdf]

Ermittlung von Verwundbarkeiten mit elektronischen Ködern

2004 - Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz

Con­fe­rence on De­tec­tion of In­tru­si­ons and Mal­wa­re & Vul­nerabi­li­ty As­sess­ment (DIMVA), Dortmund, Germany, July 2004 [pdf]
Page: