Publications
EvilCoder: Automated Bug Insertion
2016 - Jannik Pewny, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), Los Angeles, California, USA, December 2016 [GitHub] [PDF]Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation
2016 - Ali Abbasi, Majid Hashemi, Emmanuele Zambon, Sandro Etalle
11th International Conference on Critical Information Infrastructures Security, October 10-12, 2016, Paris, France. [PDF]Privacy by Socio-Technical Design - a collaborative approach for privacy friendly system design
2016 - Martin Degeling, Christopher Lentzsch, Alexander Nolte, Thomas Herrmann, Kai-Uwe Loser
2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016)Automated Multi-Architectural Discovery of CFI-Resistant Code Gadgets
2016 - Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin Kollenda, Thorsten Holz
European Symposium on Research in Computer Security (ESORICS), Heraklion, Greece, September 2016 [pdf]On the Feasibility of TTL-based Filtering for DRDoS Mitigation
2016 - Michael Backes, Thorsten Holz, Christian Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock
International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Evry, France, September 2016 [PDF]Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness
2016 - Thomas Hupperich, Kromholz Katharina, Thorsten Holz
9th International Conference on Trust & Trustworthy Computing (TRUST), Vienna, Austria, August 2016 [pdf]Undermining Entropy-based Information Hiding (And What to do About it)
2016 - Enes Göktas, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos
24th USENIX Security Symposium, Austin, TX, USA, August 2016 [PDF]Detile: Fine-Grained Information Leak Detection in Script Engines
2016 - Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Donostia-San Sebastián, Spain, July 2016 [PDF]Leveraging Sensor Fingerprinting for Mobile Device Authentication
2016 - Thomas Hupperich, Henry Hosseini, Thorsten Holz
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Donostia-San Sebastián, Spain, July 2016 [pdf]Probfuscation: An Obfuscation Approach using Probabilistic Control Flows
2016 - Andre Pawlowski, Moritz Contag, Thorsten Holz
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Donostia-San Sebastián, Spain, July 2016 [GitHub] [PDF]Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices
2016 - Katharina Krombholz, Thomas Hupperich, Thorsten Holz
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), Denver, USA, June 2016 [PDF]Subversive-C: Abusing and Protecting Dynamic Message Dispatch
2016 - Julian Lettner, Benjamin Kollenda, Andrei Homescu, Per Larsen, Felix Schuster, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Michael Franz
2016 USENIX Annual Technical Conference (USENIX ATC '16), Denver, USA, June 2016 [PDF]SkypeLine: Robust Hidden Data Transmission for VoIP
2016 - Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS), Xi'an, May 2016 [PDF]A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level
2016 - Victor van der Veen, Enes Goktas, Moritz Contag, Andre Pawlowski, Xi Chen, Sanjay Rawat, Herbert Bos, Thorsten Holz, Elias Athanasopoulos, Cristiano Giuffrida
IEEE Symposium on Security and Privacy ("Oakland"), San Jose, CA, May 2016 [PDF]No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells
2016 - Oleksii Starov, Johannes Dahse, Syed Sharique Ahmad, Thorsten Holz, Nick Nikiforakis
25th International World Wide Web Conference (WWW), Montreal, April 2016 [PDF]SDN Malware: Problems of Current Protection Systems and Potential Countermeasures
2016 - Christian Röpke
GI Sicherheit, Bonn, Germany, 2016 (Best Paper Award)Poster: Automated, Context-Sensitive Analysis of iOS Applications
2016 - Dennis Tatang
1st IEEE European Symposium on Security and Privacy (Euro S&P 2016), Saarbrücken, GermanyPoster: The Curious Case of NTP Monlist
2016 - Teemu Rytilahti, Thorsten Holz
1st IEEE European Symposium on Security and Privacy (Euro S&P 2016), Saarbrücken, Germany [pdf]How Secure is TextSecure?
2016 - Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jörg Schwenk, Thorsten Holz
IEEE European Symposium on Security and Privacy (EuroS&P 2016) [PDF]Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
2016 - Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper
In Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2016 *** OUTSTANDING PAPER AWARD *** [PDF]Poster: Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation
2016 - Johannes Hoffmann, Teemu Rytilahti, Marcel Winandy, Giorgio Giacinto, Thorsten Holz
Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2016Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding
2016 - Robert Gawlik, Benjamin Kollenda, Philipp Koppe, Behrad Garmany, Thorsten Holz
Annual Network & Distributed System Security Symposium (NDSS), San Diego, February 2016 [PDF]