Publications
Exploring User Perceptions of Deletion in Mobile Instant Messaging Applications
2020 - Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth
Journal of Cybersecurity, Special Issue on Usable Security and Privacy, (to appear)Die DSVGO als internationales Vorbild?
2019 - Christine Utz, Stephan Koloßa, Thorsten Holz, Pierre Thielbörger
Datenschutz und Datensicherheit (DuD) 11/2019, S. 700-705 [DOI] [PDF]Was bedeutet Process Mining für Datenschutz und Mitbestimmung im Unternehmen?
2019 - Martin Degeling
Informatik Spektrum, August 2019 [PDF]Analyzing leakage of personal information by malware
2019 - Tobias Urban, Dennis Tatang, Thorsten Holz, Norbert Pohlmann
Journal of Computer Security, 2019Redefining Data Transparency: A Multidimensional Approach
2019 - Elisa Bertino, Shawn Merrill, Alina Nesen, Christine Utz
IEEE Computer, Jan. 2019, pp. 16-26, vol. 52 [IEEE] [DOI]Personal Privacy Assistants for the Internet of Things
2018 - Anupam Das, Martin Degeling, Daniel Smullen, Norman Sadeh
IEEE Pervasive Computing ( Volume: 17 , Issue: 3 , Jul.-Sep. 2018 ) [pdf] [DOI] [IEEE]On Security Research Towards Future Mobile Network Generations
2018 - David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper
IEEE Communications Surveys and Tutorials, Volume: 20, Issue:3, 2018 [arXiv] [IEEE Xplore]What is wrong about Robocops as consultants? A technology-centric critique of predictive policing
2017 - Martin Degeling, Bettina Berendt
AI & SOCIETY, August 2018 [pdf] [DOI]Toward Improved Audio CAPTCHAs Based on Auditory Perception and Language Understanding
2017 - Hendrik Meutzner, Santosh Gupta, Viet-Hung Nguyen, Thorsten Holz, Dorothea Kolossa
ACM Transactions on Privacy and Security (TOPS), Volume 19, Issue 4, February 2017May the Force be with You: The Future of Force-Sensitive Authentication
2017 - Katharina Krombholz, Thomas Hupperich, Thorsten Holz
Journal of Internet Computing, Special Issue of Usable Security and Privacy, 2017 [pdf]Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive
2016 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar
Journal of Cryptographic Engineering, Springer, June 2016. [DOI] [pdf]On Network Operating System Security
2016 - Christian Röpke, Thorsten Holz
International Journal of Network Management (IJNM) - Special Issue on Software-Defined Networking and Network Function Virtualization for Flexible Network Management, 2016FPGA Trojans through Detecting and Weakening of Cryptographic Primitives
2015 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Christof Paar
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Volume PP Issue 99, February 2015. [DOI] [pdf]A Trusted Versioning File System for Passive Mobile Storage Devices
2014 - Luigi Catuogno, Hans Löhr, Marcel Winandy, Ahmad-Reza Sadeghi
Journal of Network and Computer Applications, Vol. 38, February 2014, pp. 65-75. http://dx.doi.org/10.1016/j.jnca.2013.05.006 [doi]Mit Sicherheit Mobil: Die Nutzung mobiler Geräte stellt Herausforderungen an Datenschutz und -sicherheit im Klinikalltag
2013 - Agnes Gawlik, Marcel Winandy
E-HEALTH-COM, 06/2013, S. 38-39.An Experimental Security Analysis of Two Satphone Standards
2013 - Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz
ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 3, Article 10, Publication date: November 2013 [PDF]A Security Layer for Smartphone-to-Vehicle Communication over Bluetooth
2013 - Andrea Dardanelli, Federico Maggi, Mara Tanelli, Stefano Zanero, Sergio M. Savaresi, Roman Kochanek, Thorsten Holz
IEEE Embedded Systems Letters, Volume: 5, Issue: 3 [PDF]Informationssicherheit in der Arztpraxis: Aktuelle Herausforderungen und Lösungsansätze
2012 - Marcel Winandy
Datenschutz und Datensicherheit (DuD) 06/2012, S. 419 - 424 [SpringerLink]An Empirical Analysis of Malware Blacklists
2012 - Marc Kührer, Thorsten Holz
PIK - Praxis der Informationsverarbeitung und Kommunikation. Volume 35, Issue 1, Pages 11–16, April 2012 [pdf]Reverse Code Engineering - State of the Art and Countermeasures
2012 - Carsten Willems
it - Information Technology, Volume 54, Number 2, pages 53-63, March 2012 [Journal] [PDF]Automatic Analysis of Malware Behavior using Machine Learning
2011 - Konrad Rieck, Philipp Trinius, Carsten Willems, Thorsten Holz
Journal of Computer Security, Vol. 19, No. 4, pages 639-668, 2011 [JCS] [PDF]Das Internet-Malware-Analyse-System (InMAS)
2011 - Markus Engelberth, Felix C. Freiling, Jan Goebel, Christian Gorecki, Thorsten Holz, Ralf Hund, Philipp Trinius, Carsten Willems
Datenschutz und Datensicherheit (DuD), Volume 35, Number 4, pp. 247-252 [SpringerLink]Trusted Virtual Domains: Color Your Network
2010 - Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
Datenschutz und Datensicherheit (DuD) 5/2010, p. 289-298. [SpringerLink] [PDF]Toward Automated Dynamic Malware Analysis Using CWSandbox
2007 - Carsten Willems, Thorsten Holz, Felix C. Freiling
IEEE Security & Privacy, Volume 5, Number 2, Pages 32-39, March/April 2007 [PDF]Advanced Honeypot-based Intrusion Detection
2006 - Jan Göbel, Jens Hektor, Thorsten Holz
USENIX ;login:, Volume 31, Issue 6, Pages 18-23, December 2006 [Link] [pdf]New Threats and Attacks on the World Wide Web
2006 - Thorsten Holz, Simon Marechal, Frédéric Raynal
IEEE Security & Privacy Volume 4, Issue 2, Pages 72-75, March 2006 [pdf]Spying With Bots
2005 - Thorsten Holz
USENIX ;login:, Volume 30, Issue 6, Pages 18-23, December 2005 [Link] [pdf]A Short Visit to the Bot Zoo
2005 - Thorsten Holz
IEEE Security & Privacy, Volume 3, Issue 3, Pages 76-79, May 2005 [pdf]New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy
2005 - Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Marcel Selhorst, Oska Senft
DuD Heft 9-05, Trusted Computing News.Vulnerability Assessment using Honeypots
2004 - Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz
PIK - Praxis der Informationsverarbeitung und Kommunikation, Volume 27, Issue 4, Pages 195-201, December 2004 [pdf]