Publications

Die DSVGO als internationales Vorbild?

2019 - Christine Utz, Stephan Koloßa, Thorsten Holz, Pierre Thielbörger

Datenschutz und Datensicherheit (DuD) 11/2019, S. 700-705 [DOI]

Was bedeutet Process Mining für Datenschutz und Mitbestimmung im Unternehmen?

2019 - Martin Degeling

Informatik Spektrum, August 2019 [PDF]

Analyzing leakage of personal information by malware

2019 - Tobias Urban, Dennis Tatang, Thorsten Holz, Norbert Pohlmann

Journal of Computer Security, 2019

Redefining Data Transparency: A Multidimensional Approach

2019 - Elisa Bertino, Shawn Merrill, Alina Nesen, Christine Utz

IEEE Computer, Jan. 2019, pp. 16-26, vol. 52 [IEEE] [DOI]

Personal Privacy Assistants for the Internet of Things

2018 - Anupam Das, Martin Degeling, Daniel Smullen, Norman Sadeh

IEEE Pervasive Computing ( Volume: 17 , Issue: 3 , Jul.-Sep. 2018 ) [pdf] [DOI] [IEEE]

On Security Research Towards Future Mobile Network Generations

2018 - David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper

IEEE Communications Surveys and Tutorials, Volume: 20, Issue:3, 2018 [arXiv] [IEEE Xplore]

Toward Improved Audio CAPTCHAs Based on Auditory Perception and Language Understanding

2017 - Hendrik Meutzner, Santosh Gupta, Viet-Hung Nguyen, Thorsten Holz, Do­ro­thea Kolossa

ACM Transactions on Privacy and Security (TOPS), Volume 19, Issue 4, February 2017

May the Force be with You: The Future of Force-Sensitive Authentication

2017 - Katharina Krombholz, Thomas Hupperich, Thorsten Holz

Journal of Internet Computing, Special Issue of Usable Security and Privacy, 2017 [pdf]

Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive

2016 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Chris­tof Paar

Journal of Cryptographic Engineering, Springer, June 2016. [DOI] [pdf]

On Network Operating System Security

2016 - Christian Röpke, Thorsten Holz

International Journal of Network Management (IJNM) - Special Issue on Software-Defined Networking and Network Function Virtualization for Flexible Network Management, 2016

FPGA Trojans through Detecting and Weakening of Cryptographic Primitives

2015 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Chris­tof Paar

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Volume PP Issue 99, February 2015. [DOI] [pdf]

A Trusted Versioning File System for Passive Mobile Storage Devices

2014 - Luigi Catuogno, Hans Löhr, Marcel Winandy, Ahmad-Reza Sadeghi

Journal of Network and Computer Applications, Vol. 38, February 2014, pp. 65-75. http://dx.doi.org/10.1016/j.jnca.2013.05.006 [doi]

An Experimental Security Analysis of Two Satphone Standards

2013 - Benedikt Driessen, Ralf Hund, Carsten Willems, Chris­tof Paar, Thorsten Holz

ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 3, Article 10, Publication date: November 2013 [PDF]

A Security Layer for Smartphone-to-Vehicle Communication over Bluetooth

2013 - Andrea Dardanelli, Federico Maggi, Mara Tanelli, Stefano Zanero, Sergio M. Savaresi, Roman Kochanek, Thorsten Holz

IEEE Embedded Systems Letters, Volume: 5, Issue: 3 [PDF]

Informationssicherheit in der Arztpraxis: Aktuelle Herausforderungen und Lösungsansätze

2012 - Marcel Winandy

Datenschutz und Datensicherheit (DuD) 06/2012, S. 419 - 424 [SpringerLink]

An Empirical Analysis of Malware Blacklists

2012 - Marc Kührer, Thorsten Holz

PIK - Praxis der Informationsverarbeitung und Kommunikation. Volume 35, Issue 1, Pages 11–16, April 2012 [pdf]

Reverse Code Engineering - State of the Art and Countermeasures

2012 - Carsten Willems

it - Information Technology, Volume 54, Number 2, pages 53-63, March 2012 [Journal] [PDF]

Automatic Analysis of Malware Behavior using Machine Learning

2011 - Konrad Rieck, Philipp Trinius, Carsten Willems, Thorsten Holz

Journal of Computer Security, Vol. 19, No. 4, pages 639-668, 2011 [JCS] [PDF]

Das Internet-Malware-Analyse-System (InMAS)

2011 - Markus Engelberth, Felix C. Freiling, Jan Goebel, Christian Gorecki, Thorsten Holz, Ralf Hund, Philipp Trinius, Carsten Willems

Datenschutz und Datensicherheit (DuD), Volume 35, Number 4, pp. 247-252 [SpringerLink]

Trusted Virtual Domains: Color Your Network

2010 - Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy

Datenschutz und Datensicherheit (DuD) 5/2010, p. 289-298. [SpringerLink] [PDF]

Toward Automated Dynamic Malware Analysis Using CWSandbox

2007 - Carsten Willems, Thorsten Holz, Felix C. Freiling

IEEE Security & Privacy, Volume 5, Number 2, Pages 32-39, March/April 2007 [PDF]

Advanced Honeypot-based Intrusion Detection

2006 - Jan Göbel, Jens Hektor, Thorsten Holz

USE­NIX ;login:, Vo­lu­me 31, Issue 6, Pages 18-23, De­cem­ber 2006 [Link] [pdf]

New Threats and Attacks on the World Wide Web

2006 - Thorsten Holz, Simon Marechal, Frédéric Raynal

IEEE Security & Privacy Volume 4, Issue 2, Pages 72-75, March 2006 [pdf]

Spying With Bots

2005 - Thorsten Holz

USENIX ;login:, Volume 30, Issue 6, Pages 18-23, December 2005 [Link] [pdf]

A Short Visit to the Bot Zoo

2005 - Thorsten Holz

IEEE Security & Privacy, Volume 3, Issue 3, Pages 76-79, May 2005 [pdf]

New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy

2005 - Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Marcel Selhorst, Oska Senft

DuD Heft 9-05, Trusted Computing News.

Vulnerability Assessment using Honeypots

2004 - Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz

PIK - Praxis der Informationsverarbeitung und Kommunikation, Volume 27, Issue 4, Pages 195-201, December 2004 [pdf]
Page: