Publications
VC3: Trustworthy Data Analytics in the Cloud
2014 - Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich
MSR-TR-2014-39, Microsoft Research, December 2014 [Microsoft Research]Technical Report: Towards Automated Integrity Protection of C++ Virtual Function Tables in Binary Programs
2014 - Robert Gawlik, Thorsten Holz
TR-HGI-2014-004, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), December 2014 [PDF]How Secure is TextSecure?
2014 - Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jörg Schwenk, Thorsten Holz
Cryptology ePrint Archive, Report 2014/904, 31 Oct 2014 [pdf]Tactile One-Time Pad. Smartphone Authentification. Resilient Against Shoulder Surfing
2014 - Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, Thorsten Holz
TR-HGI-2014-003, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), September 2014 [PDF]Malicious Code and Access Control in Software-Defined-Networks
2014 - Christian Röpke
9. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), 2014 [PDF]Technical Report: Paint it Black: Evaluating the Effectiveness of Malware Blacklists
2014 - Marc Kührer, Christian Rossow, Thorsten Holz
TR-HGI-2014-002, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), June 2014 [PDF]Technical Report: Evaluating the Effectiveness of Current Anti-ROP Defenses
2014 - Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz
TR-HGI-2014-001, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), May 2014 [PDF]