Veröffentlichungen
Towards Next-Generation Botnets
2008 - Ralf Hund, Matthias Hamann, Thorsten Holz
European Conference on Computer Network Defense (EC2ND), Dublin, Ireland, December 2008 [PDF]Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains
2008 - Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Rani Husseiki, Yacine Gasmi, Patrick Stewin, Martin Unger
STC '08: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, p. 71-80, ACM, 2008. [pdf]As the Net Churns: Fast-Flux Botnet Observations
2008 - Jose Nazario, Thorsten Holz
International Conference on Malicious and Unwanted Software, October 2008 [pdf]Reconstructing Peoples Lives: A Case Study in Teaching Forensic Computing
2008 - Felix Freiling, Thorsten Holz, Martin Mink
International Conference on IT Security Incident Management & IT Forensics (IMF), Mannheim, Germany, September 2008 [pdf]Property-Based TPM Virtualization
2008 - Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
Information Security, 11th International Conference, ISC 2008, LNCS 5222, p. 1-16, Springer, 2008. [pdf] [bibtex]Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis
2008 - Yacine Gasmi, Christian Hessmann, Martin Pittenauer, Marcel Winandy
INFORMATIK 2008, Beherrschbare Systeme - dank Informatik, Band 1, Beiträge der 38. Jahrestagung der Gesellschaft für Informatik e.V. (GI), LNI 133, GI, 2008.Learning and Classification of Malware Behavior
2008 - Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Paris, France, July 2008 [PDF]Studying Malicious Websites and the Underground Economy on the Chinese Web
2008 - Jianwei Zhuge, Thorsten Holz, Chengyu Song, Jinpeng Guo, Xinhui Han, Wei Zou
Workshop on the Economics of Information Security (WEIS), Hanover, NH, USA, June 2008 [pdf]Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
2008 - Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix C. Freiling
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Francisco, CA, April 2008 [pdf]Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients
2008 - Ali Ikinci, Thorsten Holz, Felix Freiling
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Saarbrücken, April 2008 - **Best Paper Award** [pdf]