Publications

Toward Automated Dynamic Malware Analysis Using CWSandbox

2007 - Carsten Willems, Thorsten Holz, Felix C. Freiling

IEEE Security & Privacy, Volume 5, Number 2, Pages 32-39, March/April 2007 [PDF]

Advanced Honeypot-based Intrusion Detection

2006 - Jan Göbel, Jens Hektor, Thorsten Holz

USE­NIX ;login:, Vo­lu­me 31, Issue 6, Pages 18-23, De­cem­ber 2006 [Link] [pdf]

New Threats and Attacks on the World Wide Web

2006 - Thorsten Holz, Simon Marechal, Frédéric Raynal

IEEE Security & Privacy Volume 4, Issue 2, Pages 72-75, March 2006 [pdf]

Spying With Bots

2005 - Thorsten Holz

USENIX ;login:, Volume 30, Issue 6, Pages 18-23, December 2005 [Link] [pdf]

A Short Visit to the Bot Zoo

2005 - Thorsten Holz

IEEE Security & Privacy, Volume 3, Issue 3, Pages 76-79, May 2005 [pdf]

New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy

2005 - Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Marcel Selhorst, Oska Senft

DuD Heft 9-05, Trusted Computing News.

Vulnerability Assessment using Honeypots

2004 - Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz

PIK - Praxis der Informationsverarbeitung und Kommunikation, Volume 27, Issue 4, Pages 195-201, December 2004 [pdf]
Page: