Publications
EvilCoder: Automated Bug Insertion
2016 - Jannik Pewny, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), Los Angeles, California, USA, December 2016 [GitHub] [PDF]Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation
2016 - Ali Abbasi, Majid Hashemi, Emmanuele Zambon, Sandro Etalle
11th International Conference on Critical Information Infrastructures Security, October 10-12, 2016, Paris, France. [PDF]Privacy by Socio-Technical Design - a collaborative approach for privacy friendly system design
2016 - Martin Degeling, Christopher Lentzsch, Alexander Nolte, Thomas Herrmann, Kai-Uwe Loser
2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016)Automated Multi-Architectural Discovery of CFI-Resistant Code Gadgets
2016 - Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin Kollenda, Thorsten Holz
European Symposium on Research in Computer Security (ESORICS), Heraklion, Greece, September 2016 [pdf]On the Feasibility of TTL-based Filtering for DRDoS Mitigation
2016 - Michael Backes, Thorsten Holz, Christian Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock
International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Evry, France, September 2016 [PDF]Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness
2016 - Thomas Hupperich, Kromholz Katharina, Thorsten Holz
9th International Conference on Trust & Trustworthy Computing (TRUST), Vienna, Austria, August 2016 [pdf]Undermining Entropy-based Information Hiding (And What to do About it)
2016 - Enes Göktas, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos
24th USENIX Security Symposium, Austin, TX, USA, August 2016 [PDF]Detile: Fine-Grained Information Leak Detection in Script Engines
2016 - Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Donostia-San Sebastián, Spain, July 2016 [PDF]Leveraging Sensor Fingerprinting for Mobile Device Authentication
2016 - Thomas Hupperich, Henry Hosseini, Thorsten Holz
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Donostia-San Sebastián, Spain, July 2016 [pdf]Probfuscation: An Obfuscation Approach using Probabilistic Control Flows
2016 - Andre Pawlowski, Moritz Contag, Thorsten Holz
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Donostia-San Sebastián, Spain, July 2016 [GitHub] [PDF]