Publications
MobileSandbox: Ein Analyseframework für Android Applikationen
2013 - Michael Spreitzenbarth, Johannes Hoffmann, Hanno Lemoine, Thomas Schreck, Florian Echtler
Proceedings of the 13th Deutscher IT-Sicherheitskongress, Bonn, Germany, 2013 [PDF]Down to the Bare Metal: Using Processor Features for Binary Analysis
2012 - Carsten Willems, Ralf Hund, Amit Vasudevan, Andreas Fobian, Dennis Felsch, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2012 [pdf]Tracking DDoS Attacks: Insights into the Business of Disrupting the Web
2012 - Armin Büscher, Thorsten Holz
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Jose, CA, April 2012 [PDF]Understanding Fraudulent Activities in Online Ad Exchanges
2011 - Brett Stone-Gross, Ryan Stevens, Apostolis Zarras, Richard Kemmerer, Christopher Kruegel, Giovanni Vigna
11th ACM SIGCOMM Internet Measurement Conference (IMC), Berlin, Germany, November 2011 [PDF]TrumanBox: Improving Dynamic Malware Analysis by Emulating the Internet
2011 - Christian Gorecki, Felix C. Freiling, Marc Kührer, Thorsten Holz
13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), Grenoble, France, October 2011 [PDF]IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM
2011 - Mario Heiderich, Tilman Frosch, Thorsten Holz
14th International Symposium on Recent Advances in Intrusion Detection (RAID), Menlo Park, CA, September 2011 [PDF]A Malware Instruction Set for Behavior-Based Analysis
2010 - Philipp Trinius, Carsten Willems, Thorsten Holz, Konrad Rieck
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Berlin, Germany, October 2010 [PDF]Return-Oriented Programming without Returns
2010 - Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy
17th ACM Conference on Computer and Communications Security (CCS 2010) [PDF]Botzilla: Detecting the "Phoning Home" of Malicious Software
2010 - Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorsten Holz, Pavel Laskov
ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 2010 [PDF]Software distribution as a malware infection vector
2009 - Felix Gröbert, Ahmad-Reza Sadeghi, Marcel Winandy
International Conference for Internet Technology and Secured Transactions (ICITST 2009) [Bibtex]