Publications
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots
2007 - Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou
International Conference on Information and Communications Security (ICICS), LNCS 4861, Zhengzhou, China, December 2007 [pdf]Measurement and Analysis of Autonomous Spreading Malware in a University Environment
2007 - Thorsten Holz, Jan Goebel, Carsten Willems
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Lucerne, Switzerland, July 2007 [PDF]Trusted User-Aware Web Authentication
2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Marcel Winandy,
Presented at the Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07), Stanford, USA, June 22, 2007. [PDF]Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing
2007 - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
In Proceedings of the The Second International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria, April 10-13, 2007, pages 120-127. IEEE Computer Society, 2007. [pdf]Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation
2007 - Jan Göbel, Thorsten Holz
USENIX Workshop on Hot Topics in Understanding Botnets (HotBots), Cambridge, MA, April 2007 [pdf]