Publications

Abusing Social Networks for Automated User Profiling

2010 - Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel

13th International Symposium on Recent Advances in Intrusion Detection (RAID), Ottawa, Canada, September 2010 [PDF]

Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments

2010 - Hans Löhr, Thomas Pöppelmann, Johannes Rave, Martin Steegmanns, Marcel Winandy

Proceedings of 5th Annual Workshop on Scalable Trusted Computing (STC 2010), ACM 2010. [PDF]

Token-Based Cloud Computing -- Secure Outsourcing of Data and Arbitrary Computations with Lower Latency

2010 - Ahmad-Reza Sadeghi, Thomas Schneider, Marcel Winandy

3rd International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud, June 22, Berlin, Germany. [Trust2010.org] [PDF]

Is the Internet for Porn? An Insight Into the Online Adult Industry

2010 - Gilbert Wondracek, Thorsten Holz, Christian Platzer, Engin Kirda, Christopher Kruegel

Workshop on the Economics of Information Security (WEIS), Harvard University, USA, June 2010 [PDF]

A Practical Attack to De-Anonymize Social Network Users

2010 - Gilbert Wondracek, Thorsten Holz, Engin Kirda, Christopher Kruegel

IEEE Symposium on Security and Privacy ("Oakland"), Berkeley, CA, May 2010 [PDF]

Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries

2010 - Clemens Kolbitsch, Thorsten Holz, Christopher Kruegel, Engin Kirda

IEEE Symposium on Security and Privacy ("Oakland"), Berkeley, CA, May 2010 [PDF]

ADSandbox: Sandboxing JavaScript to Fight Malicious Websites

2010 - Andreas Dewald, Thorsten Holz, Felix C. Freiling

ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 2010 [PDF]

Botzilla: Detecting the "Phoning Home" of Malicious Software

2010 - Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorsten Holz, Pavel Laskov

ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 2010 [PDF]

Cooperation enablement for centralistic early warning systems

2010 - Ulrich Flegel, Johannes Hoffmann, Michael Meier

ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 2010 [PDF]

Pat­terns for Se­cu­re Boot and Se­cu­re Sto­r­a­ge in Com­pu­ter Sys­tems

2010 - Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy

4th In­ter­na­tio­nal Work­shop on Se­cu­re sys­tems me­tho­do­lo­gies using pat­terns (SPat­tern 2010), In Proceedings of ARES 2010: International Conference on Availability, Reliability and Security, pp.569-573, IEEE Computer Society, 2010 [pdf]
Page: