Publications
Breaking LTE on Layer Two
2019 - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
IEEE Symposium on Security & Privacy (Oakland), May 2019 [Website] [PDF]POSTER: Application-Layer Routing Attacks on Tor
2019 - Katharina Kohls, Christina Pöpper
IEEE Symposium on Security & Privacy (Oakland), May 2019 [Proposal] [Poster]DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
2018 - Katharina Kohls, Christina Pöpper
European Symposium on Research in Computer Security 2018 (ESORICS '18), Barcelona, Spain, September, 2018 [Website] [PDF] [Slides]Towards Automated Discovery of Crash-Resistant Primitives in Binaries
2017 - Benjamin Kollenda, Enes Goktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, R.K. Konoth, Cristiano Giuffrida, Herbert Bo, Thorsten Holz
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) [PDF]Undermining Entropy-based Information Hiding (And What to do About it)
2016 - Enes Göktas, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos
24th USENIX Security Symposium, Austin, TX, USA, August 2016 [PDF]Subversive-C: Abusing and Protecting Dynamic Message Dispatch
2016 - Julian Lettner, Benjamin Kollenda, Andrei Homescu, Per Larsen, Felix Schuster, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Michael Franz
2016 USENIX Annual Technical Conference (USENIX ATC '16), Denver, USA, June 2016 [PDF]Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding
2016 - Robert Gawlik, Benjamin Kollenda, Philipp Koppe, Behrad Garmany, Thorsten Holz
Annual Network & Distributed System Security Symposium (NDSS), San Diego, February 2016 [PDF]Privilege Escalation Attacks on Android.
2010 - Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy
Information Security, 13th International Conference, ISC 2010, LNCS 6531/2011, pp. 346-360, Springer 2011. [Bibtex] [PDF]