Publications
B@bel: Leveraging Email Delivery for Spam Mitigation
2012 - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna
21st USENIX Security Symposium, Bellevue, WA, USA, August 2012 [PDF]On the Fragility and Limitations of Current Browser-provided Clickjacking Protection Schemes
2012 - Sebastian Lekies, Mario Heiderich, Dennis Appelt, Thorsten Holz, Martin Johns
6th USENIX Workshop on Offensive Technologies (WOOT), Bellevue, WA, August 2012 [PDF]SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines
2012 - Johannes Hoffmann, Sebastian Uellenbeck, Thorsten Holz
9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Heraklion, Greece, July 2012 [PDF]Don’t Trust Satellite Phones: A Security Analysis of Two Satphone Standards
2012 - Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz
IEEE Symposium on Security and Privacy ("Oakland"), San Francisco, CA, May 2012 - **Best Paper Award** [More Info] [PDF]Tracking DDoS Attacks: Insights into the Business of Disrupting the Web
2012 - Armin Büscher, Thorsten Holz
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Jose, CA, April 2012 [PDF]Analyse und Vergleich von BckR2D2-I und II
2012 - Andreas Dewald, Felix Freiling, Thomas Schreck, Michael Spreitzenbarth, Johannes Stüttgen, Stefan Vömel, Carsten Willems
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Darmstadt, Germany, März 2012 [Technical Report]MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones
2012 - Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi
Annual Network & Distributed System Security Symposium (NDSS), San Diego, February 2012 [PDF]Flexible Patient-Controlled Security for Electronic Health Records
2012 - Thomas Hupperich, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
ACM SIGHIT International Symposium on Health Informatics (IHI), Miami, January 2012 [PDF]Understanding Fraudulent Activities in Online Ad Exchanges
2011 - Brett Stone-Gross, Ryan Stevens, Apostolis Zarras, Richard Kemmerer, Christopher Kruegel, Giovanni Vigna
11th ACM SIGCOMM Internet Measurement Conference (IMC), Berlin, Germany, November 2011 [PDF]Crouching Tiger - Hidden Payload: Security Risks of Scalable Vectors Graphics
2011 - Mario Heiderich, Tilman Frosch, Meiko Jensen, Thorsten Holz
18th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, October 2011 [PDF]