Veröffentlichungen
Einsatz von Sicherheitskernen und Trusted Computing.
2009 - Ahmad-Reza Sadeghi, Marcel Winandy,
D-A-CH Security 2009, Bochum, Germany. [pdf]Frühe Warnung durch Beobachten und Verfolgen von bösartiger Software im Deutschen Internet: Das Internet-Malware-Analyse System (InMAS)
2009 - Markus Engelberth, Felix Freiling, Jan Goebel, Christian Gorecki, Thorsten Holz, Philipp Trinius, Carsten Willems
11. Deutscher IT-Sicherheitskongress des Bundesamtes für Sicherheit in der Informationstechnik (BSI), Bonn, May 2009 [PDF]Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
2009 - Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy
TRUST 2009: Proceedings of the 2nd International Conference on Trusted Computing, LNCS 5471, p. 45-62 Springer, 2009. [pdf]Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
2009 - Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy
Proceedings of 5th Information Security Practice and Experience Conference (ISPEC'09), LNCS 5451, p. 396-407, Springer, 2009. [pdf]MalOffice - Detecting malicious documents with combined static and dynamic analysis
2009 - Markus Engelberth, Carsten Willems, Thorsten Holz
Virus Bulletin Conference, Geneva, Switzerland, September 2009 [Presentation]Towards Next-Generation Botnets
2008 - Ralf Hund, Matthias Hamann, Thorsten Holz
European Conference on Computer Network Defense (EC2ND), Dublin, Ireland, December 2008 [PDF]Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains
2008 - Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Rani Husseiki, Yacine Gasmi, Patrick Stewin, Martin Unger
STC '08: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, p. 71-80, ACM, 2008. [pdf]As the Net Churns: Fast-Flux Botnet Observations
2008 - Jose Nazario, Thorsten Holz
International Conference on Malicious and Unwanted Software, October 2008 [pdf]Reconstructing Peoples Lives: A Case Study in Teaching Forensic Computing
2008 - Felix Freiling, Thorsten Holz, Martin Mink
International Conference on IT Security Incident Management & IT Forensics (IMF), Mannheim, Germany, September 2008 [pdf]Property-Based TPM Virtualization
2008 - Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
Information Security, 11th International Conference, ISC 2008, LNCS 5222, p. 1-16, Springer, 2008. [pdf] [bibtex]