Publications
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
2018 - Katharina Kohls, Christina Pöpper
European Symposium on Research in Computer Security 2018 (ESORICS '18), Barcelona, Spain, September, 2018 [Website] [PDF] [Slides]How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles
2017 - Moritz Contag, Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz, Stefan Savage
IEEE Symposium on Security and Privacy ("Oakland"), San Jose, CA, May 2017 [PDF]Cross-Architecture Bug Search in Binary Executables
2015 - Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz
36th IEEE Symposium on Security and Privacy (Oakland), San Jose, May 2015 [PDF]Leveraging Semantic Signatures for Bug Search in Binary Programs
2014 - Jannik Pewny, Felix Schuster, Lukas Bernhard, Christian Rossow, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, December 2014 [PDF]Down to the Bare Metal: Using Processor Features for Binary Analysis
2012 - Carsten Willems, Ralf Hund, Amit Vasudevan, Andreas Fobian, Dennis Felsch, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2012 [pdf]TrumanBox: Improving Dynamic Malware Analysis by Emulating the Internet
2011 - Christian Gorecki, Felix C. Freiling, Marc Kührer, Thorsten Holz
13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), Grenoble, France, October 2011 [PDF]MalOffice - Detecting malicious documents with combined static and dynamic analysis
2009 - Markus Engelberth, Carsten Willems, Thorsten Holz
Virus Bulletin Conference, Geneva, Switzerland, September 2009 [Presentation]