Publications
Mobile-Sandbox: Looking Deeper into Android Applications
2013 - Michael Spreitzenbarth, Florian Echtler, Thomas Schreck, Felix C. Freiling, Johannes Hoffmann
28th International ACM Symposium on Applied Computing (SAC), Coimbra, Portugal, March 2013 [pdf]Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis
2012 - Carsten Willems, Felix C. Freiling, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2012 [pdf]Analyse und Vergleich von BckR2D2-I und II
2012 - Andreas Dewald, Felix Freiling, Thomas Schreck, Michael Spreitzenbarth, Johannes Stüttgen, Stefan Vömel, Carsten Willems
GI Sicherheit - Schutz und Zuverlässigkeit, Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik, Darmstadt, Germany, März 2012 [Technical Report]Automated Identification of Cryptographic Primitives in Binary Programs
2011 - Felix Gröbert, Carsten Willems, Thorsten Holz
14th International Symposium on Recent Advances in Intrusion Detection (RAID), Menlo Park, CA, September 2011 [PDF]Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
2010 - Clemens Kolbitsch, Thorsten Holz, Christopher Kruegel, Engin Kirda
IEEE Symposium on Security and Privacy ("Oakland"), Berkeley, CA, May 2010 [PDF]ADSandbox: Sandboxing JavaScript to Fight Malicious Websites
2010 - Andreas Dewald, Thorsten Holz, Felix C. Freiling
ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 2010 [PDF]