Publications
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms
2009 - Ralf Hund, Thorsten Holz, Felix Freiling
USENIX Security Symposium, Montreal, Canada, August 2009 [PDF]Towards Proactive Spam Filtering (Extended Abstract)
2009 - Jan Göbel, Thorsten Holz, Philipp Trinius
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Milan, Italy, July 2009 [pdf]Einsatz von Sicherheitskernen und Trusted Computing.
2009 - Ahmad-Reza Sadeghi, Marcel Winandy,
D-A-CH Security 2009, Bochum, Germany. [pdf]Frühe Warnung durch Beobachten und Verfolgen von bösartiger Software im Deutschen Internet: Das Internet-Malware-Analyse System (InMAS)
2009 - Markus Engelberth, Felix Freiling, Jan Goebel, Christian Gorecki, Thorsten Holz, Philipp Trinius, Carsten Willems
11. Deutscher IT-Sicherheitskongress des Bundesamtes für Sicherheit in der Informationstechnik (BSI), Bonn, May 2009 [PDF]Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
2009 - Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy
TRUST 2009: Proceedings of the 2nd International Conference on Trusted Computing, LNCS 5471, p. 45-62 Springer, 2009. [pdf]Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
2009 - Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy
Proceedings of 5th Information Security Practice and Experience Conference (ISPEC'09), LNCS 5451, p. 396-407, Springer, 2009. [pdf]MalOffice - Detecting malicious documents with combined static and dynamic analysis
2009 - Markus Engelberth, Carsten Willems, Thorsten Holz
Virus Bulletin Conference, Geneva, Switzerland, September 2009 [Presentation]