Publications
Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices
2016 - Katharina Krombholz, Thomas Hupperich, Thorsten Holz
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), Denver, USA, June 2016 [PDF]No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells
2016 - Oleksii Starov, Johannes Dahse, Syed Sharique Ahmad, Thorsten Holz, Nick Nikiforakis
25th International World Wide Web Conference (WWW), Montreal, April 2016 [PDF]Multi-Layer Access Control for SDN-based Telco Clouds
2015 - Bernd Jäger, Christian Röpke, Iris Adam, Thorsten Holz
Nordic Conference on Secure IT System (NordSec), Stockholm, Sweden, October 2015 [PDF]Using Automatic Speech Recognition for Attacking Acoustic CAPTCHAs: The Trade-off between Usability and Security
2014 - Hendrik Meutzner, Viet Hung Nguyen, Thorsten Holz, Dorothea Kolossa
Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, December 2014 - ** Outstanding Paper Award ** [PDF]The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements
2014 - Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, Giovanni Vigna
14th ACM SIGCOMM Internet Measurement Conference (IMC), Vancouver, Canada, November 2014 [PDF]Mobile Malware Detection Based on Energy Fingerprints - A Dead End?
2013 - Johannes Hoffmann, Stephan Neumann, Thorsten Holz
Research in Attacks, Intrusions and Defenses (RAID) Symposium, St. Lucia, October 2013 [PDF]Standardorientierte Speicherung von verschlüsselten Dokumenten in einem XDS-Repository
2013 - Lennart Köster, Fatih Korkmaz, Marcel Winandy
Proceedings of the eHealth2013, May 23-24, Vienna, Austria, OCG, 2013.Requirements for Integrating End-to-End Security into Large-Scale EHR Systems
2012 - Agnes Gawlik, Lennart Köster, Hiva Mahmoodi, Marcel Winandy
Amsterdam Privacy Conference (APC 2012), Workshop on Engineering EHR Solutions (WEES), 2012, Available at SSRN: http://ssrn.com/abstract=2457987 [online] [PDF]On the Fragility and Limitations of Current Browser-provided Clickjacking Protection Schemes
2012 - Sebastian Lekies, Mario Heiderich, Dennis Appelt, Thorsten Holz, Martin Johns
6th USENIX Workshop on Offensive Technologies (WOOT), Bellevue, WA, August 2012 [PDF]SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines
2012 - Johannes Hoffmann, Sebastian Uellenbeck, Thorsten Holz
9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Heraklion, Greece, July 2012 [PDF]