Publications

A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level

2016 - Victor van der Veen, Enes Goktas, Moritz Contag, Andre Pawlowski, Xi Chen, Sanjay Rawat, Herbert Bos, Thorsten Holz, Elias Athanasopoulos, Cristiano Giuffrida

IEEE Symposium on Security and Privacy ("Oakland"), San Jose, CA, May 2016 [PDF]

No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells

2016 - Oleksii Starov, Johannes Dahse, Syed Sharique Ahmad, Thorsten Holz, Nick Nikiforakis

25th International World Wide Web Conference (WWW), Montreal, April 2016 [PDF]

SDN Malware: Problems of Current Protection Systems and Potential Countermeasures

2016 - Christian Röpke

GI Sicherheit, Bonn, Germany, 2016 (Best Paper Award)

Poster: Automated, Context-Sensitive Analysis of iOS Applications

2016 - Dennis Tatang

1st IEEE European Symposium on Security and Privacy (Euro S&P 2016), Saarbrücken, Germany

Poster: The Curious Case of NTP Monlist

2016 - Teemu Rytilahti, Thorsten Holz

1st IEEE European Symposium on Security and Privacy (Euro S&P 2016), Saarbrücken, Germany [pdf]

How Secure is TextSecure?

2016 - Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jörg Schwenk, Thorsten Holz

IEEE European Symposium on Security and Privacy (EuroS&P 2016) [PDF]

Neuralyzer: Flexible Expiration Times for the Revocation of Online Data

2016 - Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper

In Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2016 *** OUTSTANDING PAPER AWARD *** [PDF]

Poster: Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation

2016 - Johannes Hoffmann, Teemu Rytilahti, Marcel Winandy, Giorgio Giacinto, Thorsten Holz

Pro­cee­dings of the ACM Con­fe­rence on Data and Ap­p­li­ca­ti­on Se­cu­ri­ty and Pri­va­cy (ACM CO­DAS­PY) 2016

Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding

2016 - Robert Gawlik, Benjamin Kollenda, Philipp Koppe, Behrad Garmany, Thorsten Holz

An­nual Net­work & Di­stri­bu­ted Sys­tem Se­cu­ri­ty Sym­po­si­um (NDSS), San Diego, Fe­bru­ary 2016 [PDF]

On the Robustness of Mobile Device Fingerprinting

2015 - Thomas Hupperich, Marc Kührer, Thorsten Holz, Giorgio Giacinto

31th Annual Computer Security Applications Conference (ACSAC), Los Angeles, USA, December 2015 [PDF]

Security Analysis of PHP Bytecode Protection Mechanisms

2015 - Dario Weißer, Johannes Dahse, Thorsten Holz

Research in Attacks, Intrusions and Defenses (RAID) Symposium, Kyoto, Japan, November 2015 [PDF]

SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks

2015 - Christian Röpke, Thorsten Holz

Research in Attacks, Intrusions and Defenses (RAID) Symposium, Kyoto, Japan, November 2015 [PDF]

On The Vagueness Of Online Profiling

2015 - Martin Degeling

"Profile, Predict, Prevent" Blockchain Workshops [pdf]

Going Wild: Large-Scale Classification of Open DNS Resolvers

2015 - Marc Kührer, Thomas Hupperich, Jonas Bushart, Christian Rossow, Thorsten Holz

15th ACM In­ter­net Me­a­su­re­ment Con­fe­rence (IMC), Tokyo, Japan, Oc­to­ber 2015 [PDF]

Multi-Layer Access Control for SDN-based Telco Clouds

2015 - Bernd Jäger, Christian Röpke, Iris Adam, Thorsten Holz

Nordic Conference on Secure IT System (NordSec), Stockholm, Sweden, October 2015 [PDF]

It's a TRAP: Table Randomization and Protection against Function Reuse Attacks

2015 - Stephen Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, Michael Franz

22nd ACM Conference on Computer and Communications Security (CCS), Denver, October 2015 [PDF]

Revealing the Relationship Network Behind Link Spam

2015 - Apostolis Zarras, Antonis Papadogiannakis, Sotiris Ioannidis, Thorsten Holz

13th Annual Conference on Privacy, Security and Trust (PST), Izmir, Turkey, July 2015 [PDF]

Experience Report: An Empirical Study of PHP Security Mechanism Usage

2015 - Johannes Dahse, Thorsten Holz

International Symposium on Software Testing and Analysis (ISSTA) [PDF]

Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications

2015 - Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz

36th IEEE Symposium on Security and Privacy (Oakland), San Jose, May 2015 [PDF]

Cross-Architecture Bug Search in Binary Executables

2015 - Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz

36th IEEE Symposium on Security and Privacy (Oakland), San Jose, May 2015 [PDF]
Page: