Publications
Down to the Bare Metal: Using Processor Features for Binary Analysis
2012 - Carsten Willems, Ralf Hund, Amit Vasudevan, Andreas Fobian, Dennis Felsch, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2012 [pdf]Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis
2012 - Carsten Willems, Felix C. Freiling, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2012 [pdf]PermissionWatcher: Creating User Awareness of Application Permissions in Mobile Systems
2012 - Eric Struse, Julian Seifert, Sebastian Uellenbeck, Enrico Rukzio, Christopher Wolf
International Joint Conference on Ambient Intelligence (AmI), Pisa, Italy, November 2012 [pdf]Applying a Security Kernel Framework to Smart Meter Gateways
2012 - Michael Gröne, Marcel Winandy
ISSE 2012 Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2012 Conference, pp. 252-259, Springer Vieweg, 2012.Scriptless Attacks – Stealing the Pie Without Touching the Sill
2012 - Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk
19th ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, October 2012 [PDF]Requirements for Integrating End-to-End Security into Large-Scale EHR Systems
2012 - Agnes Gawlik, Lennart Köster, Hiva Mahmoodi, Marcel Winandy
Amsterdam Privacy Conference (APC 2012), Workshop on Engineering EHR Solutions (WEES), 2012, Available at SSRN: http://ssrn.com/abstract=2457987 [online] [PDF]B@bel: Leveraging Email Delivery for Spam Mitigation
2012 - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna
21st USENIX Security Symposium, Bellevue, WA, USA, August 2012 [PDF]On the Fragility and Limitations of Current Browser-provided Clickjacking Protection Schemes
2012 - Sebastian Lekies, Mario Heiderich, Dennis Appelt, Thorsten Holz, Martin Johns
6th USENIX Workshop on Offensive Technologies (WOOT), Bellevue, WA, August 2012 [PDF]SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines
2012 - Johannes Hoffmann, Sebastian Uellenbeck, Thorsten Holz
9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Heraklion, Greece, July 2012 [PDF]Don’t Trust Satellite Phones: A Security Analysis of Two Satphone Standards
2012 - Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz
IEEE Symposium on Security and Privacy ("Oakland"), San Francisco, CA, May 2012 - **Best Paper Award** [More Info] [PDF]Tracking DDoS Attacks: Insights into the Business of Disrupting the Web
2012 - Armin Büscher, Thorsten Holz
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Jose, CA, April 2012 [PDF]Analyse und Vergleich von BckR2D2-I und II
2012 - Andreas Dewald, Felix Freiling, Thomas Schreck, Michael Spreitzenbarth, Johannes Stüttgen, Stefan Vömel, Carsten Willems
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Darmstadt, Germany, März 2012 [Technical Report]MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones
2012 - Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi
Annual Network & Distributed System Security Symposium (NDSS), San Diego, February 2012 [PDF]Flexible Patient-Controlled Security for Electronic Health Records
2012 - Thomas Hupperich, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
ACM SIGHIT International Symposium on Health Informatics (IHI), Miami, January 2012 [PDF]