Publications
A Study of Newly Observed Hostnames and DNS Tunneling in the Wild
2019 - Dennis Tatang, Florian Quinkert, Nico Dolecki, Thorsten Holz
Technical Report, arXiv:1902.08454, February 2019 [arXiv] [PDF]The Unwanted Sharing Economy: An Analysis of Cookie Syncing and User Transparency under GDPR
2018 - Tobias Urban, Dennis Tatang, Martin Degeling, Thorsten Holz, Norbert Pohlmann
Technical Report, arXiv:1811.08660, November 2018 [arXiv]An Empirical Study on Price Differentiation Based on System Fingerprints
2017 - Thomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz
Technical Report, arXiv:1712.03031, December 2017 [arXiv] [PDF]On Security Research towards Future Mobile Network Generations
2017 - David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper
arXiv:1710.08932, November 2017 [arXiv] [PDF]Technical Report: Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation
2016 - Johannes Hoffmann, Teemu Rytilahti, Marcel Winandy, Giorgio Giacinto, Thorsten Holz
TR-HGI-2016-003, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), August 2016 [pdf]Technical Report: Detile: Fine-Grained Information Leak Detection in Script Engines
2016 - Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz
TR-HGI-2016-004, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), July 2016 [PDF]Technical Report: Probfuscation: An Obfuscation Approach using Probabilistic Control Flows
2016 - Andre Pawlowski, Moritz Contag, Thorsten Holz
TR-HGI-2016-002, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), July 2016 [PDF]Technical Report: SkypeLine Robust Hidden Data Transmission for VoIP
2016 - Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
TR-HGI-2016-001, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), February 2016 [PDF]Your interests according to google-a profile-centered analysis for obfuscation of online tracking profiles
2016 - Martin Degeling, Thomas Herrmann
arXiv preprint arXiv:1601.06371 [pdf]Technical Report: On the Effectiveness of Fingerprinting Mobile Devices
2015 - Thomas Hupperich, Marc Kührer, Thorsten Holz, Giorgio Giacinto
TR-HGI-2015-002, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), December 2015 [PDF]VC3: Trustworthy Data Analytics in the Cloud
2014 - Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich
MSR-TR-2014-39, Microsoft Research, December 2014 [Microsoft Research]Technical Report: Towards Automated Integrity Protection of C++ Virtual Function Tables in Binary Programs
2014 - Robert Gawlik, Thorsten Holz
TR-HGI-2014-004, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), December 2014 [PDF]How Secure is TextSecure?
2014 - Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jörg Schwenk, Thorsten Holz
Cryptology ePrint Archive, Report 2014/904, 31 Oct 2014 [pdf]Tactile One-Time Pad. Smartphone Authentification. Resilient Against Shoulder Surfing
2014 - Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, Thorsten Holz
TR-HGI-2014-003, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), September 2014 [PDF]Malicious Code and Access Control in Software-Defined-Networks
2014 - Christian Röpke
9. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING), 2014 [PDF]Technical Report: Paint it Black: Evaluating the Effectiveness of Malware Blacklists
2014 - Marc Kührer, Christian Rossow, Thorsten Holz
TR-HGI-2014-002, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), June 2014 [PDF]Technical Report: Evaluating the Effectiveness of Current Anti-ROP Defenses
2014 - Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz
TR-HGI-2014-001, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), May 2014 [PDF]On the Usability of Secure GUIs
2013 - Atanas Filyanov, Aysegül Nas, Melanie Volkamer, Marcel Winandy
Technical Report TR-HGI-2013-002 [Paper]Improving Location Privacy for the Electric Vehicle Masses
2013 - Tilman Frosch, Sven Schäge, Martin Goll, Thorsten Holz
TR-HGI-2013-001, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), June 2013 [pdf]CXPInspector: Hypervisor-Based, Hardware-Assisted System Monitoring
2012 - Carsten Willems, Ralf Hund, Thorsten Holz
TR-HGI-2012-002, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), November 2012 [pdf]Down to the Bare Metal: Using Processor Features for Binary Analysis
2012 - Carsten Willems, Ralf Hund, Dennis Felsch, Andreas Fobian, Thorsten Holz
TR-HGI-2012-001, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), November 2012 [pdf]Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis
2012 - Carsten Willems, Felix, Freiling
Technical Reports CS-2012,1 University of Erlangen, Department Informatik, February 2012 [OPUS Link]Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis
2011 - Carsten Willems, Felix Freiling
Technical Report TR-2011-002, University of Mannheim, Department of Computer Science, May 2011 [MADOC Link]Internals of Windows Memory Management (not only) for Malware Analysis
2011 - Carsten Willems
Technical Report TR-2011-001, University of Mannheim, Department of Computer Science, April 2011 [MADOC Link]Return-Oriented Programming without Returns on ARM
2010 - Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy
Technical Report HGI-TR-2010-002 [PDF]ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks
2010 - Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
Technical Report HGI-TR-2010-001 [PDF]A Malware Instruction Set for Behavior-Based Analysis
2009 - Philipp Trinius, Carsten Willems, Thorsten Holz, Konrad Rieck
Technical Report TR-2009-007, University of Mannheim, December 2009 [MADOC Link] [PDF]Automatic Analysis of Malware Behavior using Machine Learning
2009 - Philipp Trinius, Carsten Willems, Thorsten Holz, Konrad Rieck
Berlin Institute of Technology, Technical Report 18-2009 [PDF]Kernel-Level Interception and Applications on Mobile Devices
2008 - Michael Becher, Ralf Hund
Technical Report TR-2008-003, Universität Mannheim, May 2008 [PDF]Property-Based TPM Virtualization
2008 - Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
Technical Report HGI-TR-2008-001, Horst Görtz Institute for IT-Security, Ruhr-University Bochum, 2008. [PDF]Compartmented Security for Browsers
2007 - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
Technical Report HGI-TR-2007-001, Horst Görtz Institute for IT Security, Ruhr-University Bochum, 2007. [pdf]