Publications
Jackstraws: Picking Command and Control Connections from Bot Traffic
2011 - Gregoire Jacob, Ralf Hund, Christopher Kruegel, Thorsten Holz
USENIX Security Symposium, San Francisco, CA, August 2011 [PDF]Botzilla: Detecting the "Phoning Home" of Malicious Software
2010 - Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorsten Holz, Pavel Laskov
ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 2010 [PDF]Automatically Generating Models for Botnet Detection
2009 - Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Göbel, Christopher Kruegel, Engin Kirda
European Symposium on Research in Computer Security (ESORICS), Saint Malo, France, September 2009 [pdf]Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
2008 - Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix C. Freiling
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Francisco, CA, April 2008 [pdf]