Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Thorsten Holz
@inproceedings{DBLP:conf/visigrapp/RickerDHF24, author = {Jonas Ricker and Simon Damm and Thorsten Holz and Asja Fischer}, editor = {Petia Radeva and Antonino Furnari and Kadi Bouatouch and A. Augusto de Sousa}, title = {Towards the Detection of Diffusion Model Deepfakes}, booktitle = {Proceedings of the 19th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, {VISIGRAPP} 2024, Volume 4: VISAPP, Rome, Italy, February 27-29, 2024}, pages = {446--457}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012422000003660}, doi = {10.5220/0012422000003660}, timestamp = {Mon, 08 Apr 2024 14:22:28 +0200}, biburl = {https://dblp.org/rec/conf/visigrapp/RickerDHF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-09824, author = {Bhupendra Acharya and Muhammad Saad and Antonio Emanuele Cin{\`{a}} and Lea Sch{\"{o}}nherr and Hoang Dai Nguyen and Adam Oest and Phani Vadrevu and Thorsten Holz}, title = {Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams}, journal = {CoRR}, volume = {abs/2401.09824}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.09824}, doi = {10.48550/ARXIV.2401.09824}, eprinttype = {arXiv}, eprint = {2401.09824}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-09824.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/UtzADHFS23, author = {Christine Utz and Sabrina Amft and Martin Degeling and Thorsten Holz and Sascha Fahl and Florian Schaub}, title = {Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {1}, pages = {5--28}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0002}, doi = {10.56553/POPETS-2023-0002}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/UtzADHFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AbdelnabiGMEHF23, author = {Sahar Abdelnabi and Kai Greshake and Shailesh Mishra and Christoph Endres and Thorsten Holz and Mario Fritz}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Not What You've Signed Up For: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {79--90}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623985}, doi = {10.1145/3605764.3623985}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AbdelnabiGMEHF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/RodlerPLBHKD23, author = {Michael Rodler and David Paa{\ss}en and Wenting Li and Lukas Bernhard and Thorsten Holz and Ghassan Karame and Lucas Davi}, title = {EF{\unicode{8623}}CF: High Performance Smart Contract Fuzzing for Exploit Generation}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {449--471}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00034}, doi = {10.1109/EUROSP57164.2023.00034}, timestamp = {Mon, 07 Aug 2023 15:56:23 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/RodlerPLBHKD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fuzzing/SchillerXBBSH23, author = {Nico Schiller and Xinyi Xu and Lukas Bernhard and Nils Bars and Moritz Schloegel and Thorsten Holz}, editor = {Marcel B{\"{o}}hme and Yannic Noller and Baishakhi Ray and L{\'{a}}szl{\'{o}} Szekeres}, title = {Novelty Not Found: Adaptive Fuzzer Restarts to Improve Input Space Coverage (Registered Report)}, booktitle = {Proceedings of the 2nd International Fuzzing Workshop, {FUZZING} 2023, Seattle, WA, USA, 17 July 2023}, pages = {12--20}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605157.3605171}, doi = {10.1145/3605157.3605171}, timestamp = {Mon, 17 Jul 2023 14:52:13 +0200}, biburl = {https://dblp.org/rec/conf/fuzzing/SchillerXBBSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fuzzing/CrumpZAMFHB23, author = {Addison Crump and Dongjia Zhang and Syeda Mahnur Asif and Dominik Christian Maier and Andrea Fioraldi and Thorsten Holz and Davide Balzarotti}, editor = {Marcel B{\"{o}}hme and Yannic Noller and Baishakhi Ray and L{\'{a}}szl{\'{o}} Szekeres}, title = {CrabSandwich: Fuzzing Rust with Rust (Registered Report)}, booktitle = {Proceedings of the 2nd International Fuzzing Workshop, {FUZZING} 2023, Seattle, WA, USA, 17 July 2023}, pages = {39--46}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605157.3605176}, doi = {10.1145/3605157.3605176}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fuzzing/CrumpZAMFHB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/DemirHGUPHW23, author = {Nurullah Demir and Jan H{\"{o}}rnemann and Matteo Gro{\ss}e{-}Kampmann and Tobias Urban and Norbert Pohlmann and Thorsten Holz and Christian Wressnegger}, editor = {Marie{-}Jos{\'{e}} Montpetit and Aris Leivadeas and Steve Uhlig and Mobin Javed}, title = {On the Similarity of Web Measurements Under Different Experimental Setups}, booktitle = {Proceedings of the 2023 {ACM} on Internet Measurement Conference, {IMC} 2023, Montreal, QC, Canada, October 24-26, 2023}, pages = {356--369}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3618257.3624795}, doi = {10.1145/3618257.3624795}, timestamp = {Wed, 25 Oct 2023 17:17:16 +0200}, biburl = {https://dblp.org/rec/conf/imc/DemirHGUPHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GrossKBHJ23, author = {Samuel Gro{\ss} and Simon Koch and Lukas Bernhard and Thorsten Holz and Martin Johns}, title = {{FUZZILLI:} Fuzzing for JavaScript {JIT} Compiler Vulnerabilities}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/fuzzilli-fuzzing-for-javascript-jit-compiler-vulnerabilities/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/GrossKBHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SchillerCSBESDS23, author = {Nico Schiller and Merlin Chlosta and Moritz Schloegel and Nils Bars and Thorsten Eisenhofer and Tobias Scharnowski and Felix Domke and Lea Sch{\"{o}}nherr and Thorsten Holz}, title = {Drone Security and the Mysterious Case of DJI's DroneID}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/drone-security-and-the-mysterious-case-of-djis-droneid/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/SchillerCSBESDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SpahnHHKV23, author = {Noah Spahn and Nils Hanke and Thorsten Holz and Christopher Kruegel and Giovanni Vigna}, title = {Container Orchestration Honeypot: Observing Attacks in the Wild}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {381--396}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607205}, doi = {10.1145/3607199.3607205}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SpahnHHKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WillboldSVGH023, author = {Johannes Willbold and Moritz Schloegel and Manuel V{\"{o}}gele and Maximilian Gerhardt and Thorsten Holz and Ali Abbasi}, title = {Space Odyssey: An Experimental Software Security Analysis of Satellites}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1--19}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00131}, doi = {10.1109/SP46215.2023.00131}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/WillboldSVGH023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spacesec/ScharnowskiBWH23, author = {Tobias Scharnowski and Felix Buchmann and Simon W{\"{o}}rner and Thorsten Holz}, title = {A Case Study on Fuzzing Satellite Firmware}, booktitle = {1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, San Diego, California, USA, Feburary, 27, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://doi.org/10.14722/spacesec.2023.230707}, doi = {10.14722/SPACESEC.2023.230707}, timestamp = {Tue, 19 Dec 2023 16:39:16 +0100}, biburl = {https://dblp.org/rec/conf/spacesec/ScharnowskiBWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BarsSSSH23, author = {Nils Bars and Moritz Schloegel and Tobias Scharnowski and Nico Schiller and Thorsten Holz}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {1847--1864}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/bars}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BarsSSSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ScharnowskiWBBS23, author = {Tobias Scharnowski and Simon W{\"{o}}rner and Felix Buchmann and Nils Bars and Moritz Schloegel and Thorsten Holz}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {2885--2902}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/scharnowski}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ScharnowskiWBBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GorzMHGHZG23, author = {Philipp G{\"{o}}rz and Bj{\"{o}}rn Mathis and Keno Hassler and Emre G{\"{u}}ler and Thorsten Holz and Andreas Zeller and Rahul Gopinath}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Systematic Assessment of Fuzzers using Mutation Analysis}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4535--4552}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/gorz}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GorzMHGHZG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/EisenhoferQMRHR23, author = {Thorsten Eisenhofer and Erwin Quiring and Jonas M{\"{o}}ller and Doreen Riepel and Thorsten Holz and Konrad Rieck}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {No more Reviewer {\#}2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5109--5126}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/eisenhofer}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/EisenhoferQMRHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-04012, author = {Hossein Hajipour and Thorsten Holz and Lea Sch{\"{o}}nherr and Mario Fritz}, title = {Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models}, journal = {CoRR}, volume = {abs/2302.04012}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.04012}, doi = {10.48550/ARXIV.2302.04012}, eprinttype = {arXiv}, eprint = {2302.04012}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-04012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-12173, author = {Kai Greshake and Sahar Abdelnabi and Shailesh Mishra and Christoph Endres and Thorsten Holz and Mario Fritz}, title = {More than you've asked for: {A} Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models}, journal = {CoRR}, volume = {abs/2302.12173}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.12173}, doi = {10.48550/ARXIV.2302.12173}, eprinttype = {arXiv}, eprint = {2302.12173}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-12173.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-14443, author = {Thorsten Eisenhofer and Erwin Quiring and Jonas M{\"{o}}ller and Doreen Riepel and Thorsten Holz and Konrad Rieck}, title = {No more Reviewer {\#}2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning}, journal = {CoRR}, volume = {abs/2303.14443}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.14443}, doi = {10.48550/ARXIV.2303.14443}, eprinttype = {arXiv}, eprint = {2303.14443}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-14443.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-06341, author = {Michael Rodler and David Paa{\ss}en and Wenting Li and Lukas Bernhard and Thorsten Holz and Ghassan Karame and Lucas Davi}, title = {{EF/CF:} High Performance Smart Contract Fuzzing for Exploit Generation}, journal = {CoRR}, volume = {abs/2304.06341}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.06341}, doi = {10.48550/ARXIV.2304.06341}, eprinttype = {arXiv}, eprint = {2304.06341}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-06341.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-05976, author = {Joel Frank and Franziska Herbert and Jonas Ricker and Lea Sch{\"{o}}nherr and Thorsten Eisenhofer and Asja Fischer and Markus D{\"{u}}rmuth and Thorsten Holz}, title = {A Representative Study on Human Detection of Artificially Generated Media Across Countries}, journal = {CoRR}, volume = {abs/2312.05976}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.05976}, doi = {10.48550/ARXIV.2312.05976}, eprinttype = {arXiv}, eprint = {2312.05976}, timestamp = {Wed, 03 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-05976.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csl/SchonherrGEWKH22, author = {Lea Sch{\"{o}}nherr and Maximilian Golla and Thorsten Eisenhofer and Jan Wiele and Dorothea Kolossa and Thorsten Holz}, title = {Exploring accidental triggers of smart speakers}, journal = {Comput. Speech Lang.}, volume = {73}, pages = {101328}, year = {2022}, url = {https://doi.org/10.1016/j.csl.2021.101328}, doi = {10.1016/J.CSL.2021.101328}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csl/SchonherrGEWKH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BenzelH22, author = {Terry Benzel and Thorsten Holz}, title = {Selected Papers From the 2021 {IEEE} Symposium on Security and Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {2}, pages = {8--9}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2022.3142463}, doi = {10.1109/MSEC.2022.3142463}, timestamp = {Thu, 31 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BenzelH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BernhardSSBH22, author = {Lukas Bernhard and Tobias Scharnowski and Moritz Schloegel and Tim Blazytko and Thorsten Holz}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {JIT-Picking: Differential Fuzzing of JavaScript Engines}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {351--364}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560624}, doi = {10.1145/3548606.3560624}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BernhardSSBH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BernhardRHD22, author = {Lukas Bernhard and Michael Rodler and Thorsten Holz and Lucas Davi}, title = {xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64}, booktitle = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022, Genoa, Italy, June 6-10, 2022}, pages = {502--519}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSP53844.2022.00038}, doi = {10.1109/EUROSP53844.2022.00038}, timestamp = {Tue, 26 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BernhardRHD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/SchumiloAJ0H22, author = {Sergej Schumilo and Cornelius Aschermann and Andrea Jemmett and Ali Abbasi and Thorsten Holz}, editor = {Y{\'{e}}rom{-}David Bromberg and Anne{-}Marie Kermarrec and Christos Kozyrakis}, title = {Nyx-net: network fuzzing with incremental snapshots}, booktitle = {EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5 - 8, 2022}, pages = {166--180}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3492321.3519591}, doi = {10.1145/3492321.3519591}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/SchumiloAJ0H22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ScharnowskiBSGM22, author = {Tobias Scharnowski and Nils Bars and Moritz Schloegel and Eric Gustafson and Marius Muench and Giovanni Vigna and Christopher Kruegel and Thorsten Holz and Ali Abbasi}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Fuzzware: Using Precise {MMIO} Modeling for Effective Firmware Fuzzing}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1239--1256}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/scharnowski}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ScharnowskiBSGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SchlogelBCABH022, author = {Moritz Schloegel and Tim Blazytko and Moritz Contag and Cornelius Aschermann and Julius Basler and Thorsten Holz and Ali Abbasi}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Loki: Hardening Code Obfuscation Against Automated Attacks}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3055--3073}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/schloegel}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SchlogelBCABH022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CloostersWHD22, author = {Tobias Cloosters and Johannes Willbold and Thorsten Holz and Lucas Davi}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {SGXFuzz: Efficiently Synthesizing Nested Structures for {SGX} Enclave Fuzzing}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3147--3164}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/cloosters}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/CloostersWHD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/DemirGUWHP22, author = {Nurullah Demir and Matteo Gro{\ss}e{-}Kampmann and Tobias Urban and Christian Wressnegger and Thorsten Holz and Norbert Pohlmann}, editor = {Fr{\'{e}}d{\'{e}}rique Laforest and Rapha{\"{e}}l Troncy and Elena Simperl and Deepak Agarwal and Aristides Gionis and Ivan Herman and Lionel M{\'{e}}dini}, title = {Reproducibility and Replicability of Web Measurement Studies}, booktitle = {{WWW} '22: The {ACM} Web Conference 2022, Virtual Event, Lyon, France, April 25 - 29, 2022}, pages = {533--544}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3485447.3512214}, doi = {10.1145/3485447.3512214}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/DemirGUWHP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-04117, author = {Lukas Bernhard and Michael Rodler and Thorsten Holz and Lucas Davi}, title = {xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64}, journal = {CoRR}, volume = {abs/2203.04117}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.04117}, doi = {10.48550/ARXIV.2203.04117}, eprinttype = {arXiv}, eprint = {2203.04117}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-04117.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-11387, author = {Christine Utz and Sabrina Amft and Martin Degeling and Thorsten Holz and Sascha Fahl and Florian Schaub}, title = {Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites}, journal = {CoRR}, volume = {abs/2203.11387}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.11387}, doi = {10.48550/ARXIV.2203.11387}, eprinttype = {arXiv}, eprint = {2203.11387}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-11387.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-14571, author = {Jonas Ricker and Simon Damm and Thorsten Holz and Asja Fischer}, title = {Towards the Detection of Diffusion Model Deepfakes}, journal = {CoRR}, volume = {abs/2210.14571}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.14571}, doi = {10.48550/ARXIV.2210.14571}, eprinttype = {arXiv}, eprint = {2210.14571}, timestamp = {Mon, 31 Oct 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-14571.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-03075, author = {Philipp G{\"{o}}rz and Bj{\"{o}}rn Mathis and Keno Hassler and Emre G{\"{u}}ler and Thorsten Holz and Andreas Zeller and Rahul Gopinath}, title = {How to Compare Fuzzers}, journal = {CoRR}, volume = {abs/2212.03075}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.03075}, doi = {10.48550/ARXIV.2212.03075}, eprinttype = {arXiv}, eprint = {2212.03075}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-03075.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/QuinkertTH21, author = {Florian Quinkert and Dennis Tatang and Thorsten Holz}, editor = {Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves}, title = {Digging Deeper: An Analysis of Domain Impersonation in the Lower {DNS} Hierarchy}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, {DIMVA} 2021, Virtual Event, July 14-16, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12756}, pages = {68--87}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-80825-9\_4}, doi = {10.1007/978-3-030-80825-9\_4}, timestamp = {Tue, 13 Jul 2021 16:53:38 +0200}, biburl = {https://dblp.org/rec/conf/dimva/QuinkertTH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/QuinkertDH21, author = {Florian Quinkert and Martin Degeling and Thorsten Holz}, editor = {Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves}, title = {Spotlight on Phishing: {A} Longitudinal Study on Phishing Awareness Trainings}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, {DIMVA} 2021, Virtual Event, July 14-16, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12756}, pages = {341--360}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-80825-9\_17}, doi = {10.1007/978-3-030-80825-9\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/QuinkertDH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/TatangFH21, author = {Dennis Tatang and Robin Flume and Thorsten Holz}, editor = {Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves}, title = {Extended Abstract: {A} First Large-Scale Analysis on Usage of {MTA-STS}}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, {DIMVA} 2021, Virtual Event, July 14-16, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12756}, pages = {361--370}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-80825-9\_18}, doi = {10.1007/978-3-030-80825-9\_18}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/TatangFH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SchlogelBBHH21, author = {Moritz Schloegel and Tim Blazytko and Julius Basler and Fabian Hemmer and Thorsten Holz}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12972}, pages = {218--239}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88418-5\_11}, doi = {10.1007/978-3-030-88418-5\_11}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SchlogelBBHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/OsterlundGJGGHG21, author = {Sebastian {\"{O}}sterlund and Elia Geretto and Andrea Jemmett and Emre G{\"{u}}ler and Philipp G{\"{o}}rz and Thorsten Holz and Cristiano Giuffrida and Herbert Bos}, title = {CollabFuzz: {A} Framework for Collaborative Fuzzing}, booktitle = {EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, Virtual Event / Edinburgh, Scotland, UK, April 26, 2021}, pages = {1--7}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3447852.3458720}, doi = {10.1145/3447852.3458720}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosec/OsterlundGJGGHG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/TatangKSQDH21, author = {Dennis Tatang and Philip Krei{\ss}el and Michael Sehring and Florian Quinkert and Martin Degeling and Thorsten Holz}, editor = {Oana Balalau and Katherine Ognyanova and Daniel M. Romero}, title = {Likes are not Likes {A} Crowdworking Platform Analysis}, booktitle = {Workshop Proceedings of the 15th International {AAAI} Conference on Web and Social Media, {ICWSM} 2021 Workshops, [virtual], June 7, 2021}, year = {2021}, url = {https://doi.org/10.36190/2021.12}, doi = {10.36190/2021.12}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icwsm/TatangKSQDH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TatangZH21, author = {Dennis Tatang and Florian Zettl and Thorsten Holz}, editor = {Leyla Bilge and Tudor Dumitras}, title = {The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding Flaws}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {354--369}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471842}, doi = {10.1145/3471621.3471842}, timestamp = {Fri, 08 Oct 2021 09:46:25 +0200}, biburl = {https://dblp.org/rec/conf/raid/TatangZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/EisenhoferSFSKH21, author = {Thorsten Eisenhofer and Lea Sch{\"{o}}nherr and Joel Frank and Lars Speckemeier and Dorothea Kolossa and Thorsten Holz}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Dompteur: Taming Audio Adversarial Examples}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2309--2326}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/eisenhofer}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/EisenhoferSFSKH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SchumiloA0WH21, author = {Sergej Schumilo and Cornelius Aschermann and Ali Abbasi and Simon W{\"{o}}rner and Thorsten Holz}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2597--2614}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/schumilo}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SchumiloA0WH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChlostaRH21, author = {Merlin Chlosta and David Rupprecht and Thorsten Holz}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {On the challenges of automata reconstruction in {LTE} networks}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {164--174}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3469133}, doi = {10.1145/3448300.3469133}, timestamp = {Mon, 28 Jun 2021 17:39:52 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ChlostaRH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChlostaRPH21, author = {Merlin Chlosta and David Rupprecht and Christina P{\"{o}}pper and Thorsten Holz}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {5G SUCI-catchers: still catching them all?}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {359--364}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467826}, doi = {10.1145/3448300.3467826}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ChlostaRPH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-05431, author = {Thorsten Eisenhofer and Lea Sch{\"{o}}nherr and Joel Frank and Lars Speckemeier and Dorothea Kolossa and Thorsten Holz}, title = {Dompteur: Taming Audio Adversarial Examples}, journal = {CoRR}, volume = {abs/2102.05431}, year = {2021}, url = {https://arxiv.org/abs/2102.05431}, eprinttype = {arXiv}, eprint = {2102.05431}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-05431.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-02984, author = {Joel Frank and Thorsten Holz}, title = {{[RE]} CNN-generated images are surprisingly easy to spot...for now}, journal = {CoRR}, volume = {abs/2104.02984}, year = {2021}, url = {https://arxiv.org/abs/2104.02984}, eprinttype = {arXiv}, eprint = {2104.02984}, timestamp = {Tue, 13 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-02984.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-08913, author = {Moritz Schloegel and Tim Blazytko and Moritz Contag and Cornelius Aschermann and Julius Basler and Thorsten Holz and Ali Abbasi}, title = {Loki: Hardening Code Obfuscation Against Automated Attacks}, journal = {CoRR}, volume = {abs/2106.08913}, year = {2021}, url = {https://arxiv.org/abs/2106.08913}, eprinttype = {arXiv}, eprint = {2106.08913}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-08913.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-03013, author = {Sergej Schumilo and Cornelius Aschermann and Andrea Jemmett and Ali Abbasi and Thorsten Holz}, title = {Nyx-Net: Network Fuzzing with Incremental Snapshots}, journal = {CoRR}, volume = {abs/2111.03013}, year = {2021}, url = {https://arxiv.org/abs/2111.03013}, eprinttype = {arXiv}, eprint = {2111.03013}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-03013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GulerGGJOBGH20, author = {Emre G{\"{u}}ler and Philipp G{\"{o}}rz and Elia Geretto and Andrea Jemmett and Sebastian {\"{O}}sterlund and Herbert Bos and Cristiano Giuffrida and Thorsten Holz}, title = {Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {360--372}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427266}, doi = {10.1145/3427228.3427266}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GulerGGJOBGH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchonherrEZHK20, author = {Lea Sch{\"{o}}nherr and Thorsten Eisenhofer and Steffen Zeiler and Thorsten Holz and Dorothea Kolossa}, title = {Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {843--855}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427276}, doi = {10.1145/3427228.3427276}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchonherrEZHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/UrbanTDHP20, author = {Tobias Urban and Dennis Tatang and Martin Degeling and Thorsten Holz and Norbert Pohlmann}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Measuring the Impact of the {GDPR} on Data Sharing in Ad Networks}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {222--235}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3372194}, doi = {10.1145/3320269.3372194}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/UrbanTDHP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/QuinkertDBH20, author = {Florian Quinkert and Martin Degeling and Jim Blythe and Thorsten Holz}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Be the Phisher - Understanding Users' Perception of Malicious Domains}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {263--276}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384765}, doi = {10.1145/3320269.3384765}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/QuinkertDBH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DresenIPKHS20, author = {Christian Dresen and Fabian Ising and Damian Poddebniak and Tobias Kappert and Thorsten Holz and Sebastian Schinzel}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {{CORSICA:} Cross-Origin Web Service Identification}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {409--419}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3372196}, doi = {10.1145/3320269.3372196}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DresenIPKHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/UrbanGTHP20, author = {Tobias Urban and Matteo Gro{\ss}e{-}Kampmann and Dennis Tatang and Thorsten Holz and Norbert Pohlmann}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12309}, pages = {272--291}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59013-0\_14}, doi = {10.1007/978-3-030-59013-0\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/UrbanGTHP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/FrankESFKH20, author = {Joel Frank and Thorsten Eisenhofer and Lea Sch{\"{o}}nherr and Asja Fischer and Dorothea Kolossa and Thorsten Holz}, title = {Leveraging Frequency Analysis for Deep Fake Image Recognition}, booktitle = {Proceedings of the 37th International Conference on Machine Learning, {ICML} 2020, 13-18 July 2020, Virtual Event}, series = {Proceedings of Machine Learning Research}, volume = {119}, pages = {3247--3258}, publisher = {{PMLR}}, year = {2020}, url = {http://proceedings.mlr.press/v119/frank20a.html}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icml/FrankESFKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/RupprechtKHP20, author = {David Rupprecht and Katharina Kohls and Thorsten Holz and Christina P{\"{o}}pper}, title = {{IMP4GT:} IMPersonation Attacks in 4G NeTworks}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/imp4gt-impersonation-attacks-in-4g-networks/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/RupprechtKHP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/RytilahtiH20, author = {Teemu Rytilahti and Thorsten Holz}, title = {On Using Application-Layer Middlebox Protocols for Peeking Behind {NAT} Gateways}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/on-using-application-layer-middlebox-protocols-for-peeking-behind-nat-gateways/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/RytilahtiH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SchumiloAAWH20, author = {Sergej Schumilo and Cornelius Aschermann and Ali Abbasi and Simon W{\"{o}}rner and Thorsten Holz}, title = {{HYPER-CUBE:} High-Dimensional Hypervisor Fuzzing}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/hyper-cube-high-dimensional-hypervisor-fuzzing/}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/SchumiloAAWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AschermannSAH20, author = {Cornelius Aschermann and Sergej Schumilo and Ali Abbasi and Thorsten Holz}, title = {Ijon: Exploring Deep State Spaces via Fuzzing}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1597--1612}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00117}, doi = {10.1109/SP40000.2020.00117}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/AschermannSAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RupprechtKHP20, author = {David Rupprecht and Katharina Kohls and Thorsten Holz and Christina P{\"{o}}pper}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Call Me Maybe: Eavesdropping Encrypted {LTE} Calls With ReVoLTE}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {73--88}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/rupprecht}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/RupprechtKHP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BlazytkoSAAFWH20, author = {Tim Blazytko and Moritz Schl{\"{o}}gel and Cornelius Aschermann and Ali Abbasi and Joel Frank and Simon W{\"{o}}rner and Thorsten Holz}, editor = {Srdjan Capkun and Franziska Roesner}, title = {{AURORA:} Statistical Crash Analysis for Automated Root Cause Explanation}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {235--252}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/blazytko}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BlazytkoSAAFWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FrankAH20, author = {Joel Frank and Cornelius Aschermann and Thorsten Holz}, editor = {Srdjan Capkun and Franziska Roesner}, title = {{ETHBMC:} {A} Bounded Model Checker for Smart Contracts}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2757--2774}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/frank}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/FrankAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/UrbanDHP20, author = {Tobias Urban and Martin Degeling and Thorsten Holz and Norbert Pohlmann}, editor = {Yennun Huang and Irwin King and Tie{-}Yan Liu and Maarten van Steen}, title = {Beyond the Front Page: Measuring Third Party Dynamics in the Field}, booktitle = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020}, pages = {1275--1286}, publisher = {{ACM} / {IW3C2}}, year = {2020}, url = {https://doi.org/10.1145/3366423.3380203}, doi = {10.1145/3366423.3380203}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/UrbanDHP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-10248, author = {Tobias Urban and Martin Degeling and Thorsten Holz and Norbert Pohlmann}, title = {Beyond the Front Page: Measuring Third Party Dynamics in the Field}, journal = {CoRR}, volume = {abs/2001.10248}, year = {2020}, url = {https://arxiv.org/abs/2001.10248}, eprinttype = {arXiv}, eprint = {2001.10248}, timestamp = {Thu, 30 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-10248.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-08685, author = {Joel Frank and Thorsten Eisenhofer and Lea Sch{\"{o}}nherr and Asja Fischer and Dorothea Kolossa and Thorsten Holz}, title = {Leveraging Frequency Analysis for Deep Fake Image Recognition}, journal = {CoRR}, volume = {abs/2003.08685}, year = {2020}, url = {https://arxiv.org/abs/2003.08685}, eprinttype = {arXiv}, eprint = {2003.08685}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-08685.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-00939, author = {Christian Dresen and Fabian Ising and Damian Poddebniak and Tobias Kappert and Thorsten Holz and Sebastian Schinzel}, title = {{CORSICA:} Cross-Origin Web Service Identification}, journal = {CoRR}, volume = {abs/2004.00939}, year = {2020}, url = {https://arxiv.org/abs/2004.00939}, eprinttype = {arXiv}, eprint = {2004.00939}, timestamp = {Wed, 08 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-00939.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-02307, author = {Ali Abbasi and Jos Wetzels and Thorsten Holz and Sandro Etalle}, title = {Challenges in Designing Exploit Mitigations for Deeply Embedded Systems}, journal = {CoRR}, volume = {abs/2007.02307}, year = {2020}, url = {https://arxiv.org/abs/2007.02307}, eprinttype = {arXiv}, eprint = {2007.02307}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-02307.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-02308, author = {Jannik Pewny and Philipp Koppe and Thorsten Holz}, title = {Steroids for DOPed Applications: {A} Compiler for Automated Data-Oriented Programming}, journal = {CoRR}, volume = {abs/2007.02308}, year = {2020}, url = {https://arxiv.org/abs/2007.02308}, eprinttype = {arXiv}, eprint = {2007.02308}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-02308.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-02314, author = {Behrad Garmany and Martin Stoffel and Robert Gawlik and Thorsten Holz}, title = {Static Detection of Uninitialized Stack Variables in Binary Code}, journal = {CoRR}, volume = {abs/2007.02314}, year = {2020}, url = {https://arxiv.org/abs/2007.02314}, eprinttype = {arXiv}, eprint = {2007.02314}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-02314.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-02326, author = {Jannik Pewny and Thorsten Holz}, title = {EvilCoder: Automated Bug Insertion}, journal = {CoRR}, volume = {abs/2007.02326}, year = {2020}, url = {https://arxiv.org/abs/2007.02326}, eprinttype = {arXiv}, eprint = {2007.02326}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-02326.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-03302, author = {Andre Pawlowski and Victor van der Veen and Dennis Andriesse and Erik van der Kouwe and Thorsten Holz and Cristiano Giuffrida and Herbert Bos}, title = {{VPS:} Excavating High-Level {C++} Constructs from Low-Level Binaries to Protect Dynamic Dispatching}, journal = {CoRR}, volume = {abs/2007.03302}, year = {2020}, url = {https://arxiv.org/abs/2007.03302}, eprinttype = {arXiv}, eprint = {2007.03302}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-03302.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-03548, author = {Jannik Pewny and Philipp Koppe and Lucas Davi and Thorsten Holz}, title = {Breaking and Fixing Destructive Code Read Defenses}, journal = {CoRR}, volume = {abs/2007.03548}, year = {2020}, url = {https://arxiv.org/abs/2007.03548}, eprinttype = {arXiv}, eprint = {2007.03548}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-03548.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-03549, author = {Benjamin Kollenda and Philipp Koppe and Marc Fyrbiak and Christian Kison and Christof Paar and Thorsten Holz}, title = {An Exploratory Analysis of Microcode as a Building Block for System Defenses}, journal = {CoRR}, volume = {abs/2007.03549}, year = {2020}, url = {https://arxiv.org/abs/2007.03549}, eprinttype = {arXiv}, eprint = {2007.03549}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-03549.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-03550, author = {Robert Gawlik and Philipp Koppe and Benjamin Kollenda and Andre Pawlowski and Behrad Garmany and Thorsten Holz}, title = {Detile: Fine-Grained Information Leak Detection in Script Engines}, journal = {CoRR}, volume = {abs/2007.03550}, year = {2020}, url = {https://arxiv.org/abs/2007.03550}, eprinttype = {arXiv}, eprint = {2007.03550}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-03550.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-04116, author = {Patrick Wollgast and Robert Gawlik and Behrad Garmany and Benjamin Kollenda and Thorsten Holz}, title = {Automated Multi-Architectural Discovery of CFI-Resistant Code Gadgets}, journal = {CoRR}, volume = {abs/2007.04116}, year = {2020}, url = {https://arxiv.org/abs/2007.04116}, eprinttype = {arXiv}, eprint = {2007.04116}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-04116.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-00508, author = {Lea Sch{\"{o}}nherr and Maximilian Golla and Thorsten Eisenhofer and Jan Wiele and Dorothea Kolossa and Thorsten Holz}, title = {Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers}, journal = {CoRR}, volume = {abs/2008.00508}, year = {2020}, url = {https://arxiv.org/abs/2008.00508}, eprinttype = {arXiv}, eprint = {2008.00508}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-00508.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-10682, author = {Hojjat Aghakhani and Thorsten Eisenhofer and Lea Sch{\"{o}}nherr and Dorothea Kolossa and Thorsten Holz and Christopher Kruegel and Giovanni Vigna}, title = {{VENOMAVE:} Clean-Label Poisoning Against Speech Recognition}, journal = {CoRR}, volume = {abs/2010.10682}, year = {2020}, url = {https://arxiv.org/abs/2010.10682}, eprinttype = {arXiv}, eprint = {2010.10682}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-10682.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/UtzKHT19, author = {Christine Utz and Stephan Kolo{\ss}a and Thorsten Holz and Pierre Thielb{\"{o}}rger}, title = {Die {DSGVO} als internationales Vorbild?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {11}, pages = {700--705}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1192-5}, doi = {10.1007/S11623-019-1192-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/UtzKHT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/insk/DegelingULHSH19, author = {Martin Degeling and Christine Utz and Christopher Lentzsch and Henry Hosseini and Florian Schaub and Thorsten Holz}, title = {We Value Your Privacy ... Now Take Some Cookies - Measuring the GDPR's Impact on Web Privacy}, journal = {Inform. Spektrum}, volume = {42}, number = {5}, pages = {345--346}, year = {2019}, url = {https://doi.org/10.1007/s00287-019-01201-1}, doi = {10.1007/S00287-019-01201-1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/insk/DegelingULHSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/UrbanTHP19, author = {Tobias Urban and Dennis Tatang and Thorsten Holz and Norbert Pohlmann}, title = {Analyzing leakage of personal information by malware}, journal = {J. Comput. Secur.}, volume = {27}, number = {4}, pages = {459--481}, year = {2019}, url = {https://doi.org/10.3233/JCS-191287}, doi = {10.3233/JCS-191287}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/UrbanTHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PawlowskiVAKHGB19, author = {Andre Pawlowski and Victor van der Veen and Dennis Andriesse and Erik van der Kouwe and Thorsten Holz and Cristiano Giuffrida and Herbert Bos}, editor = {David Balenson}, title = {{VPS:} excavating high-level {C++} constructs from low-level binaries to protect dynamic dispatching}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {97--112}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359797}, doi = {10.1145/3359789.3359797}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PawlowskiVAKHGB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/UrbanDHP19, author = {Tobias Urban and Martin Degeling and Thorsten Holz and Norbert Pohlmann}, editor = {David Balenson}, title = {"\emph{Your hashed {IP} address: Ubuntu.}": perspectives on transparency tools for online advertising}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {702--717}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359798}, doi = {10.1145/3359789.3359798}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/UrbanDHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/UtzDFSH19, author = {Christine Utz and Martin Degeling and Sascha Fahl and Florian Schaub and Thorsten Holz}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {(Un)informed Consent: Studying {GDPR} Consent Notices in the Field}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {973--990}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354212}, doi = {10.1145/3319535.3354212}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/UtzDFSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/QuinkertLRKH19, author = {Florian Quinkert and Tobias Lauinger and William K. Robertson and Engin Kirda and Thorsten Holz}, title = {It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {259--267}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802671}, doi = {10.1109/CNS.2019.8802671}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/QuinkertLRKH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/TatangSH19, author = {Dennis Tatang and Carl Richard Theodor Schneider and Thorsten Holz}, editor = {Roberto Perdisci and Cl{\'{e}}mentine Maurice and Giorgio Giacinto and Magnus Almgren}, title = {Large-Scale Analysis of Infrastructure-Leaking {DNS} Servers}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11543}, pages = {353--373}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22038-9\_17}, doi = {10.1007/978-3-030-22038-9\_17}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/TatangSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/TatangQH19, author = {Dennis Tatang and Florian Quinkert and Thorsten Holz}, title = {Below the Radar: Spotting {DNS} Tunnels in Newly Observed Hostnames in the Wild}, booktitle = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019}, pages = {1--15}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eCrime47957.2019.9037595}, doi = {10.1109/ECRIME47957.2019.9037595}, timestamp = {Mon, 23 Mar 2020 18:24:06 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/TatangQH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrts/PaverdVBSASVSH19, author = {Andrew Paverd and Marcus V{\"{o}}lp and Ferdinand Brasser and Matthias Schunter and N. Asokan and Ahmad{-}Reza Sadeghi and Paulo Jorge Esteves Ver{\'{\i}}ssimo and Andreas Steininger and Thorsten Holz}, editor = {Mikael Asplund and Michael Paulitsch}, title = {Sustainable Security {\&} Safety: Challenges and Opportunities}, booktitle = {4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, CERTS@ECRTS 2019, July 9, 2019, Stuttgart, Germany}, series = {OASIcs}, volume = {73}, pages = {4:1--4:13}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2019}, url = {https://doi.org/10.4230/OASIcs.CERTS.2019.4}, doi = {10.4230/OASICS.CERTS.2019.4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrts/PaverdVBSASVSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/UrbanTDHP19, author = {Tobias Urban and Dennis Tatang and Martin Degeling and Thorsten Holz and Norbert Pohlmann}, editor = {Cristina P{\'{e}}rez{-}Sol{\`{a}} and Guillermo Navarro{-}Arribas and Alex Biryukov and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {A Study on Subject Data Access in Online Advertising After the {GDPR}}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2019 International Workshops, {DPM} 2019 and {CBT} 2019, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11737}, pages = {61--79}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31500-9\_5}, doi = {10.1007/978-3-030-31500-9\_5}, timestamp = {Mon, 05 Feb 2024 20:29:40 +0100}, biburl = {https://dblp.org/rec/conf/esorics/UrbanTDHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GarmanySGH19, author = {Behrad Garmany and Martin Stoffel and Robert Gawlik and Thorsten Holz}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Static Detection of Uninitialized Stack Variables in Binary Code}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, pages = {68--87}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0\_4}, doi = {10.1007/978-3-030-29962-0\_4}, timestamp = {Mon, 05 Feb 2024 20:29:41 +0100}, biburl = {https://dblp.org/rec/conf/esorics/GarmanySGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DavidssonPH19, author = {Nicolai Davidsson and Andre Pawlowski and Thorsten Holz}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Towards Automated Application-Specific Software Stacks}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, pages = {88--109}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0\_5}, doi = {10.1007/978-3-030-29962-0\_5}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DavidssonPH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CagnazzoHP19, author = {Matteo Cagnazzo and Thorsten Holz and Norbert Pohlmann}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {GDPiRated - Stealing Personal Information On- and Offline}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, pages = {367--386}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0\_18}, doi = {10.1007/978-3-030-29962-0\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CagnazzoHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/TatangSH19, author = {Dennis Tatang and Tim Suurland and Thorsten Holz}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Weizhi Meng and Steven Furnell and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Study of {DNS} Rebinding Attacks on Smart Home Devices}, booktitle = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11980}, pages = {391--401}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42048-2\_25}, doi = {10.1007/978-3-030-42048-2\_25}, timestamp = {Thu, 18 Feb 2021 13:46:45 +0100}, biburl = {https://dblp.org/rec/conf/esorics/TatangSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/AbbasiWHE19, author = {Ali Abbasi and Jos Wetzels and Thorsten Holz and Sandro Etalle}, title = {Challenges in Designing Exploit Mitigations for Deeply Embedded Systems}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {31--46}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00013}, doi = {10.1109/EUROSP.2019.00013}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/AbbasiWHE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/PewnyKH19, author = {Jannik Pewny and Philipp Koppe and Thorsten Holz}, title = {{STEROIDS} for DOPed Applications: {A} Compiler for Automated Data-Oriented Programming}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {111--126}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00018}, doi = {10.1109/EUROSP.2019.00018}, timestamp = {Tue, 27 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/PewnyKH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AschermannFHJST19, author = {Cornelius Aschermann and Tommaso Frassetto and Thorsten Holz and Patrick Jauernig and Ahmad{-}Reza Sadeghi and Daniel Teuchert}, title = {{NAUTILUS:} Fishing for Deep Bugs with Grammars}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/nautilus-fishing-for-deep-bugs-with-grammars/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AschermannFHJST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AschermannSBGH19, author = {Cornelius Aschermann and Sergej Schumilo and Tim Blazytko and Robert Gawlik and Thorsten Holz}, title = {{REDQUEEN:} Fuzzing with Input-to-State Correspondence}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/redqueen-fuzzing-with-input-to-state-correspondence/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AschermannSBGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DegelingULHSH19, author = {Martin Degeling and Christine Utz and Christopher Lentzsch and Henry Hosseini and Florian Schaub and Thorsten Holz}, title = {We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/we-value-your-privacy-now-take-some-cookies-measuring-the-gdprs-impact-on-web-privacy/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/DegelingULHSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KohlsJRHP19, author = {Katharina Kohls and Kai Jansen and David Rupprecht and Thorsten Holz and Christina P{\"{o}}pper}, title = {On the Challenges of Geographical Avoidance for Tor}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/on-the-challenges-of-geographical-avoidance-for-tor/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/KohlsJRHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SchonherrKZHK19, author = {Lea Sch{\"{o}}nherr and Katharina Kohls and Steffen Zeiler and Thorsten Holz and Dorothea Kolossa}, title = {Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/adversarial-attacks-against-automatic-speech-recognition-systems-via-psychoacoustic-hiding/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SchonherrKZHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RupprechtKHP19, author = {David Rupprecht and Katharina Kohls and Thorsten Holz and Christina P{\"{o}}pper}, title = {Breaking {LTE} on Layer Two}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {1121--1136}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00006}, doi = {10.1109/SP.2019.00006}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/RupprechtKHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GulerAAH19, author = {Emre G{\"{u}}ler and Cornelius Aschermann and Ali Abbasi and Thorsten Holz}, editor = {Nadia Heninger and Patrick Traynor}, title = {AntiFuzz: Impeding Fuzzing Audits of Binary Executables}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1931--1947}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/guler}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GulerAAH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BlazytkoASASWH19, author = {Tim Blazytko and Cornelius Aschermann and Moritz Schl{\"{o}}gel and Ali Abbasi and Sergej Schumilo and Simon W{\"{o}}rner and Thorsten Holz}, editor = {Nadia Heninger and Patrick Traynor}, title = {{GRIMOIRE:} Synthesizing Structure while Fuzzing}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1985--2002}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/blazytko}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BlazytkoASASWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KohlsRHP19, author = {Katharina Kohls and David Rupprecht and Thorsten Holz and Christina P{\"{o}}pper}, title = {Lost traffic encryption: fingerprinting {LTE/4G} traffic on layer two}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {249--260}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323416}, doi = {10.1145/3317549.3323416}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/KohlsRHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChlostaRHP19, author = {Merlin Chlosta and David Rupprecht and Thorsten Holz and Christina P{\"{o}}pper}, title = {{LTE} security disabled: misconfiguration in commercial networks}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {261--266}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3324927}, doi = {10.1145/3317549.3324927}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ChlostaRHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2019cpsspc, editor = {Lorenzo Cavallaro and Johannes Kinder and Thorsten Holz}, title = {Proceedings of the {ACM} Workshop on Cyber-Physical Systems Security {\&} Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338499}, doi = {10.1145/3338499}, isbn = {978-1-4503-6831-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2019cpsspc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-08454, author = {Dennis Tatang and Florian Quinkert and Nico Dolecki and Thorsten Holz}, title = {A Study of Newly Observed Hostnames and {DNS} Tunneling in the Wild}, journal = {CoRR}, volume = {abs/1902.08454}, year = {2019}, url = {http://arxiv.org/abs/1902.08454}, eprinttype = {arXiv}, eprint = {1902.08454}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-08454.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-01933, author = {Nicolai Davidsson and Andre Pawlowski and Thorsten Holz}, title = {Towards Automated Application-Specific Software Stacks}, journal = {CoRR}, volume = {abs/1907.01933}, year = {2019}, url = {http://arxiv.org/abs/1907.01933}, eprinttype = {arXiv}, eprint = {1907.01933}, timestamp = {Mon, 08 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-01933.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-01551, author = {Lea Sch{\"{o}}nherr and Steffen Zeiler and Thorsten Holz and Dorothea Kolossa}, title = {Robust Over-the-Air Adversarial Examples Against Automatic Speech Recognition Systems}, journal = {CoRR}, volume = {abs/1908.01551}, year = {2019}, url = {http://arxiv.org/abs/1908.01551}, eprinttype = {arXiv}, eprint = {1908.01551}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-01551.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-02638, author = {Christine Utz and Martin Degeling and Sascha Fahl and Florian Schaub and Thorsten Holz}, title = {(Un)informed Consent: Studying {GDPR} Consent Notices in the Field}, journal = {CoRR}, volume = {abs/1909.02638}, year = {2019}, url = {http://arxiv.org/abs/1909.02638}, eprinttype = {arXiv}, eprint = {1909.02638}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-02638.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00948, author = {Philipp Koppe and Benjamin Kollenda and Marc Fyrbiak and Christian Kison and Robert Gawlik and Christof Paar and Thorsten Holz}, title = {Reverse Engineering x86 Processor Microcode}, journal = {CoRR}, volume = {abs/1910.00948}, year = {2019}, url = {http://arxiv.org/abs/1910.00948}, eprinttype = {arXiv}, eprint = {1910.00948}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00948.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/RupprechtDHWP18, author = {David Rupprecht and Adrian Dabrowski and Thorsten Holz and Edgar R. Weippl and Christina P{\"{o}}pper}, title = {On Security Research Towards Future Mobile Network Generations}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {20}, number = {3}, pages = {2518--2542}, year = {2018}, url = {https://doi.org/10.1109/COMST.2018.2820728}, doi = {10.1109/COMST.2018.2820728}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/RupprechtDHWP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GarmanySGKBH18, author = {Behrad Garmany and Martin Stoffel and Robert Gawlik and Philipp Koppe and Tim Blazytko and Thorsten Holz}, title = {Towards Automated Generation of Exploitation Primitives for Web Browsers}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {300--312}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274723}, doi = {10.1145/3274694.3274723}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GarmanySGKBH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KollendaKFKPH18, author = {Benjamin Kollenda and Philipp Koppe and Marc Fyrbiak and Christian Kison and Christof Paar and Thorsten Holz}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {An Exploratory Analysis of Microcode as a Building Block for System Defenses}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1649--1666}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243861}, doi = {10.1145/3243734.3243861}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KollendaKFKPH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/HupperichTWH18, author = {Thomas Hupperich and Dennis Tatang and Nicolai Wilkop and Thorsten Holz}, editor = {Ziming Zhao and Gail{-}Joon Ahn and Ram Krishnan and Gabriel Ghinita}, title = {An Empirical Study on Online Price Differentiation}, booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {76--83}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3176258.3176338}, doi = {10.1145/3176258.3176338}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/HupperichTWH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/ContagGPH18, author = {Moritz Contag and Robert Gawlik and Andre Pawlowski and Thorsten Holz}, editor = {Cristiano Giuffrida and S{\'{e}}bastien Bardin and Gregory Blanc}, title = {On the Weaknesses of Function Table Randomization}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, {DIMVA} 2018, Saclay, France, June 28-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10885}, pages = {185--207}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93411-2\_9}, doi = {10.1007/978-3-319-93411-2\_9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/ContagGPH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/UrbanTHP18, author = {Tobias Urban and Dennis Tatang and Thorsten Holz and Norbert Pohlmann}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {449--469}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_22}, doi = {10.1007/978-3-319-99073-6\_22}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/UrbanTHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/RytilahtiTKH18, author = {Teemu Rytilahti and Dennis Tatang and Janosch Kopper and Thorsten Holz}, title = {Masters of Time: An Overview of the {NTP} Ecosystem}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {122--136}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00017}, doi = {10.1109/EUROSP.2018.00017}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/RytilahtiTKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/GoktasKKBPHBG18, author = {Enes G{\"{o}}ktas and Benjamin Kollenda and Philipp Koppe and Erik Bosman and Georgios Portokalidis and Thorsten Holz and Herbert Bos and Cristiano Giuffrida}, title = {Position-Independent Code Reuse: On the Effectiveness of {ASLR} in the Absence of Information Disclosure}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {227--242}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00024}, doi = {10.1109/EUROSP.2018.00024}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/GoktasKKBPHBG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/RopkeH18, author = {Christian R{\"{o}}pke and Thorsten Holz}, title = {Preventing Malicious {SDN} Applications From Hiding Adverse Network Manipulations}, booktitle = {Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, SecSoN@SIGCOMM 2018, Budapest, Hungary, August 24, 2018}, pages = {40--45}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3229616.3229620}, doi = {10.1145/3229616.3229620}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/RopkeH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/CagnazzoHHP18, author = {Matteo Cagnazzo and Markus Hertlein and Thorsten Holz and Norbert Pohlmann}, title = {Threat modeling for mobile health systems}, booktitle = {2018 {IEEE} Wireless Communications and Networking Conference Workshops, {WCNC} 2018 Workshops, Barcelona, Spain, April 15-18, 2018}, pages = {314--319}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/WCNCW.2018.8369033}, doi = {10.1109/WCNCW.2018.8369033}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/CagnazzoHHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/GawlikH18, author = {Robert Gawlik and Thorsten Holz}, editor = {Christian Rossow and Yves Younan}, title = {SoK: Make JIT-Spray Great Again}, booktitle = {12th {USENIX} Workshop on Offensive Technologies, {WOOT} 2018, Baltimore, MD, USA, August 13-14, 2018}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/woot18/presentation/gawlik}, timestamp = {Mon, 01 Feb 2021 08:41:54 +0100}, biburl = {https://dblp.org/rec/conf/woot/GawlikH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/mc/18/SchusterH18, author = {Felix Schuster and Thorsten Holz}, editor = {Per Larsen and Ahmad{-}Reza Sadeghi}, title = {Attacking dynamic code}, booktitle = {The Continuing Arms Race: Code-Reuse Attacks and Defenses}, pages = {139--180}, publisher = {{ACM} / Morgan {\&} Claypool}, year = {2018}, url = {https://doi.org/10.1145/3129743.3129750}, doi = {10.1145/3129743.3129750}, timestamp = {Thu, 27 Jun 2019 20:19:31 +0200}, biburl = {https://dblp.org/rec/books/mc/18/SchusterH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2018, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5}, doi = {10.1007/978-3-030-00470-5}, isbn = {978-3-030-00469-9}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-01598, author = {Florian Quinkert and Thorsten Holz and K. S. M. Tozammel Hossain and Emilio Ferrara and Kristina Lerman}, title = {{RAPTOR:} Ransomware Attack PredicTOR}, journal = {CoRR}, volume = {abs/1803.01598}, year = {2018}, url = {http://arxiv.org/abs/1803.01598}, eprinttype = {arXiv}, eprint = {1803.01598}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-01598.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-05096, author = {Martin Degeling and Christine Utz and Christopher Lentzsch and Henry Hosseini and Florian Schaub and Thorsten Holz}, title = {We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy}, journal = {CoRR}, volume = {abs/1808.05096}, year = {2018}, url = {http://arxiv.org/abs/1808.05096}, eprinttype = {arXiv}, eprint = {1808.05096}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-05096.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-05665, author = {Lea Sch{\"{o}}nherr and Katharina Kohls and Steffen Zeiler and Thorsten Holz and Dorothea Kolossa}, title = {Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding}, journal = {CoRR}, volume = {abs/1808.05665}, year = {2018}, url = {http://arxiv.org/abs/1808.05665}, eprinttype = {arXiv}, eprint = {1808.05665}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-05665.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-08660, author = {Tobias Urban and Dennis Tatang and Martin Degeling and Thorsten Holz and Norbert Pohlmann}, title = {The Unwanted Sharing Economy: An Analysis of Cookie Syncing and User Transparency under {GDPR}}, journal = {CoRR}, volume = {abs/1811.08660}, year = {2018}, url = {http://arxiv.org/abs/1811.08660}, eprinttype = {arXiv}, eprint = {1811.08660}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-08660.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/KrombholzHH17, author = {Katharina Krombholz and Thomas Hupperich and Thorsten Holz}, title = {May the Force Be with You: The Future of Force-Sensitive Authentication}, journal = {{IEEE} Internet Comput.}, volume = {21}, number = {3}, pages = {64--69}, year = {2017}, url = {https://doi.org/10.1109/MIC.2017.78}, doi = {10.1109/MIC.2017.78}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/KrombholzHH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/PewnyGGRH17, author = {Jannik Pewny and Behrad Garmany and Robert Gawlik and Christian Rossow and Thorsten Holz}, title = {Cross-architecture bug search in binary executables}, journal = {it Inf. Technol.}, volume = {59}, number = {2}, pages = {83}, year = {2017}, url = {https://doi.org/10.1515/itit-2016-0040}, doi = {10.1515/ITIT-2016-0040}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/PewnyGGRH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MeutznerGNHK17, author = {Hendrik Meutzner and Santosh Gupta and Viet{-}Hung Nguyen and Thorsten Holz and Dorothea Kolossa}, title = {Toward Improved Audio CAPTCHAs Based on Auditory Perception and Language Understanding}, journal = {{ACM} Trans. Priv. Secur.}, volume = {19}, number = {4}, pages = {10:1--10:31}, year = {2017}, url = {https://doi.org/10.1145/2856820}, doi = {10.1145/2856820}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MeutznerGNHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PewnyKDH17, author = {Jannik Pewny and Philipp Koppe and Lucas Davi and Thorsten Holz}, title = {Breaking and Fixing Destructive Code Read Defenses}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {55--67}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134626}, doi = {10.1145/3134600.3134626}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PewnyKDH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AbbasiHZE17, author = {Ali Abbasi and Thorsten Holz and Emmanuele Zambon and Sandro Etalle}, title = {{ECFI:} Asynchronous Control Flow Integrity for Programmable Logic Controllers}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {437--448}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134618}, doi = {10.1145/3134600.3134618}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AbbasiHZE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/KollendaGBKGKGB17, author = {Benjamin Kollenda and Enes G{\"{o}}ktas and Tim Blazytko and Philipp Koppe and Robert Gawlik and Radhesh Krishnan Konoth and Cristiano Giuffrida and Herbert Bos and Thorsten Holz}, title = {Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables}, booktitle = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017}, pages = {189--200}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSN.2017.58}, doi = {10.1109/DSN.2017.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/KollendaGBKGKGB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PawlowskiCVOHBA17, author = {Andre Pawlowski and Moritz Contag and Victor van der Veen and Chris Ouwehand and Thorsten Holz and Herbert Bos and Elias Athanasopoulos and Cristiano Giuffrida}, title = {{MARX:} Uncovering Class Hierarchies in {C++} Programs}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/marx-uncovering-class-hierarchies-c-programs/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PawlowskiCVOHBA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nfvsdn/TatangQFRH17, author = {Dennis Tatang and Florian Quinkert and Joel Frank and Christian R{\"{o}}pke and Thorsten Holz}, title = {SDN-Guard: Protecting {SDN} controllers against {SDN} rootkits}, booktitle = {2017 {IEEE} Conference on Network Function Virtualization and Software Defined Networks, {NFV-SDN} 2017, Berlin, Germany, November 6-8, 2017}, pages = {297--302}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/NFV-SDN.2017.8169856}, doi = {10.1109/NFV-SDN.2017.8169856}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/nfvsdn/TatangQFRH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ContagLPDLHS17, author = {Moritz Contag and Vector Guo Li and Andre Pawlowski and Felix Domke and Kirill Levchenko and Thorsten Holz and Stefan Savage}, title = {How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {231--250}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.66}, doi = {10.1109/SP.2017.66}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ContagLPDLHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SchumiloAGSH17, author = {Sergej Schumilo and Cornelius Aschermann and Robert Gawlik and Sebastian Schinzel and Thorsten Holz}, editor = {Engin Kirda and Thomas Ristenpart}, title = {kAFL: Hardware-Assisted Feedback Fuzzing for {OS} Kernels}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {167--182}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/schumilo}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/SchumiloAGSH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BlazytkoCAH17, author = {Tim Blazytko and Moritz Contag and Cornelius Aschermann and Thorsten Holz}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Syntia: Synthesizing the Semantics of Obfuscated Code}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {643--659}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/blazytko}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BlazytkoCAH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KoppeKFKGPH17, author = {Philipp Koppe and Benjamin Kollenda and Marc Fyrbiak and Christian Kison and Robert Gawlik and Christof Paar and Thorsten Holz}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Reverse Engineering x86 Processor Microcode}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1163--1180}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/koppe}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KoppeKFKGPH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-08932, author = {David Rupprecht and Adrian Dabrowski and Thorsten Holz and Edgar R. Weippl and Christina P{\"{o}}pper}, title = {On Security Research towards Future Mobile Network Generations}, journal = {CoRR}, volume = {abs/1710.08932}, year = {2017}, url = {http://arxiv.org/abs/1710.08932}, eprinttype = {arXiv}, eprint = {1710.08932}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-08932.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-03031, author = {Thomas Hupperich and Dennis Tatang and Nicolai Wilkop and Thorsten Holz}, title = {An Empirical Study on Price Differentiation Based on System Fingerprints}, journal = {CoRR}, volume = {abs/1712.03031}, year = {2017}, url = {http://arxiv.org/abs/1712.03031}, eprinttype = {arXiv}, eprint = {1712.03031}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-03031.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/RopkeH16, author = {Christian R{\"{o}}pke and Thorsten Holz}, title = {On network operating system security}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {1}, pages = {6--24}, year = {2016}, url = {https://doi.org/10.1002/nem.1918}, doi = {10.1002/NEM.1918}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/RopkeH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PewnyH16, author = {Jannik Pewny and Thorsten Holz}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {EvilCoder: automated bug insertion}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {214--225}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991103}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PewnyH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KohlsHKP16, author = {Katharina Kohls and Thorsten Holz and Dorothea Kolossa and Christina P{\"{o}}pper}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {SkypeLine: Robust Hidden Data Transmission for VoIP}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {877--888}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897913}, doi = {10.1145/2897845.2897913}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KohlsHKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/HoffmannRMWGH16, author = {Johannes Hoffmann and Teemu Rytilahti and Davide Maiorca and Marcel Winandy and Giorgio Giacinto and Thorsten Holz}, editor = {Elisa Bertino and Ravi S. Sandhu and Alexander Pretschner}, title = {Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation}, booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March 9-11, 2016}, pages = {139--141}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2857705.2857737}, doi = {10.1145/2857705.2857737}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/HoffmannRMWGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/PawlowskiCH16, author = {Andre Pawlowski and Moritz Contag and Thorsten Holz}, editor = {Juan Caballero and Urko Zurutuza and Ricardo J. Rodr{\'{\i}}guez}, title = {Probfuscation: An Obfuscation Approach Using Probabilistic Control Flows}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n, Spain, July 7-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9721}, pages = {165--185}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40667-1\_9}, doi = {10.1007/978-3-319-40667-1\_9}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/PawlowskiCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/GawlikKKPGH16, author = {Robert Gawlik and Philipp Koppe and Benjamin Kollenda and Andre Pawlowski and Behrad Garmany and Thorsten Holz}, editor = {Juan Caballero and Urko Zurutuza and Ricardo J. Rodr{\'{\i}}guez}, title = {Detile: Fine-Grained Information Leak Detection in Script Engines}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n, Spain, July 7-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9721}, pages = {322--342}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40667-1\_16}, doi = {10.1007/978-3-319-40667-1\_16}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/GawlikKKPGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/HupperichHH16, author = {Thomas Hupperich and Henry Hosseini and Thorsten Holz}, editor = {Juan Caballero and Urko Zurutuza and Ricardo J. Rodr{\'{\i}}guez}, title = {Leveraging Sensor Fingerprinting for Mobile Device Authentication}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n, Spain, July 7-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9721}, pages = {377--396}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40667-1\_19}, doi = {10.1007/978-3-319-40667-1\_19}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/HupperichHH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WollgastGGKH16, author = {Patrick Wollgast and Robert Gawlik and Behrad Garmany and Benjamin Kollenda and Thorsten Holz}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9878}, pages = {602--620}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45744-4\_30}, doi = {10.1007/978-3-319-45744-4\_30}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WollgastGGKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/FroschMBBSH16, author = {Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and J{\"{o}}rg Schwenk and Thorsten Holz}, title = {How Secure is TextSecure?}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {457--472}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EuroSP.2016.41}, doi = {10.1109/EUROSP.2016.41}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/FroschMBBSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GawlikKKGH16, author = {Robert Gawlik and Benjamin Kollenda and Philipp Koppe and Behrad Garmany and Thorsten Holz}, title = {Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/enabling-client-side-crash-resistance-overcome-diversification-information-hiding.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/GawlikKKGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/0001HRRSS16, author = {Michael Backes and Thorsten Holz and Christian Rossow and Teemu Rytilahti and Milivoj Simeonovski and Ben Stock}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {On the Feasibility of TTL-Based Filtering for DRDoS Mitigation}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {303--322}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_14}, doi = {10.1007/978-3-319-45719-2\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/0001HRRSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/KrombholzHH16, author = {Katharina Krombholz and Thomas Hupperich and Thorsten Holz}, title = {Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices}, booktitle = {Twelfth Symposium on Usable Privacy and Security, {SOUPS} 2016, Denver, CO, USA, June 22-24, 2016}, pages = {207--219}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/soups2016/technical-sessions/presentation/krombholz}, timestamp = {Thu, 04 Aug 2016 15:59:03 +0200}, biburl = {https://dblp.org/rec/conf/soups/KrombholzHH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/VeenGCPCRBHAG16, author = {Victor van der Veen and Enes G{\"{o}}ktas and Moritz Contag and Andre Pawlowski and Xi Chen and Sanjay Rawat and Herbert Bos and Thorsten Holz and Elias Athanasopoulos and Cristiano Giuffrida}, title = {A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {934--953}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.60}, doi = {10.1109/SP.2016.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/VeenGCPCRBHAG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/HupperichKH16, author = {Thomas Hupperich and Katharina Krombholz and Thorsten Holz}, editor = {Michael Franz and Panos Papadimitratos}, title = {Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness}, booktitle = {Trust and Trustworthy Computing - 9th International Conference, {TRUST} 2016, Vienna, Austria, August 29-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9824}, pages = {40--59}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45572-3\_3}, doi = {10.1007/978-3-319-45572-3\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/HupperichKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/LettnerKHLSDSHF16, author = {Julian Lettner and Benjamin Kollenda and Andrei Homescu and Per Larsen and Felix Schuster and Lucas Davi and Ahmad{-}Reza Sadeghi and Thorsten Holz and Michael Franz}, editor = {Ajay Gulati and Hakim Weatherspoon}, title = {Subversive-C: Abusing and Protecting Dynamic Message Dispatch}, booktitle = {2016 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2016, Denver, CO, USA, June 22-24, 2016}, pages = {209--221}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/atc16/technical-sessions/presentation/lettner}, timestamp = {Mon, 01 Feb 2021 17:03:06 +0100}, biburl = {https://dblp.org/rec/conf/usenix/LettnerKHLSDSHF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/StarovDAHN16, author = {Oleksii Starov and Johannes Dahse and Syed Sharique Ahmad and Thorsten Holz and Nick Nikiforakis}, editor = {Jacqueline Bourdeau and Jim Hendler and Roger Nkambou and Ian Horrocks and Ben Y. Zhao}, title = {No Honor Among Thieves: {A} Large-Scale Analysis of Malicious Web Shells}, booktitle = {Proceedings of the 25th International Conference on World Wide Web, {WWW} 2016, Montreal, Canada, April 11 - 15, 2016}, pages = {1021--1032}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2872427.2882992}, doi = {10.1145/2872427.2882992}, timestamp = {Tue, 12 Apr 2022 14:46:29 +0200}, biburl = {https://dblp.org/rec/conf/www/StarovDAHN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2016, editor = {Thorsten Holz and Stefan Savage}, title = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HupperichMKHG15, author = {Thomas Hupperich and Davide Maiorca and Marc K{\"{u}}hrer and Thorsten Holz and Giorgio Giacinto}, title = {On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {191--200}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818032}, doi = {10.1145/2818000.2818032}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HupperichMKHG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CraneVSLLDSHSF15, author = {Stephen J. Crane and Stijn Volckaert and Felix Schuster and Christopher Liebchen and Per Larsen and Lucas Davi and Ahmad{-}Reza Sadeghi and Thorsten Holz and Bjorn De Sutter and Michael Franz}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {243--255}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813682}, doi = {10.1145/2810103.2813682}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CraneVSLLDSHSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/UellenbeckHWH15, author = {Sebastian Uellenbeck and Thomas Hupperich and Christopher Wolf and Thorsten Holz}, editor = {Rainer B{\"{o}}hme and Tatsuaki Okamoto}, title = {Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones}, booktitle = {Financial Cryptography and Data Security - 19th International Conference, {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8975}, pages = {237--253}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47854-7\_15}, doi = {10.1007/978-3-662-47854-7\_15}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/UellenbeckHWH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KuhrerHBRH15, author = {Marc K{\"{u}}hrer and Thomas Hupperich and Jonas Bushart and Christian Rossow and Thorsten Holz}, editor = {Kenjiro Cho and Kensuke Fukuda and Vivek S. Pai and Neil Spring}, title = {Going Wild: Large-Scale Classification of Open {DNS} Resolvers}, booktitle = {Proceedings of the 2015 {ACM} Internet Measurement Conference, {IMC} 2015, Tokyo, Japan, October 28-30, 2015}, pages = {355--368}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2815675.2815683}, doi = {10.1145/2815675.2815683}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/KuhrerHBRH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/DahseH15, author = {Johannes Dahse and Thorsten Holz}, editor = {Michal Young and Tao Xie}, title = {Experience report: an empirical study of {PHP} security mechanism usage}, booktitle = {Proceedings of the 2015 International Symposium on Software Testing and Analysis, {ISSTA} 2015, Baltimore, MD, USA, July 12-17, 2015}, pages = {60--70}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2771783.2771787}, doi = {10.1145/2771783.2771787}, timestamp = {Fri, 05 Nov 2021 10:54:23 +0100}, biburl = {https://dblp.org/rec/conf/issta/DahseH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kivs/RopkeH15, author = {Christian R{\"{o}}pke and Thorsten Holz}, title = {Retaining control over {SDN} network services}, booktitle = {2015 International Conference and Workshops on Networked Systems, NetSys 2015, Cottbus, Germany, March 9-12, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/NetSys.2015.7089082}, doi = {10.1109/NETSYS.2015.7089082}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kivs/RopkeH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/JagerRAH15, author = {Bernd J{\"{a}}ger and Christian R{\"{o}}pke and Iris Adam and Thorsten Holz}, editor = {Sonja Buchegger and Mads Dam}, title = {Multi-layer Access Control for SDN-Based Telco Clouds}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {197--204}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_14}, doi = {10.1007/978-3-319-26502-5\_14}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/JagerRAH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ZarrasPIH15, author = {Apostolis Zarras and Antonis Papadogiannakis and Sotiris Ioannidis and Thorsten Holz}, editor = {Ali A. Ghorbani and Vicen{\c{c}} Torra and H{\"{u}}seyin Hisil and Ali Miri and Ahmet Koltuksuz and Jie Zhang and Murat Sensoy and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Ibrahim Zincir}, title = {Revealing the relationship network behind link spam}, booktitle = {13th Annual Conference on Privacy, Security and Trust, {PST} 2015, Izmir, Turkey, July 21-23, 2015}, pages = {101--108}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/PST.2015.7232960}, doi = {10.1109/PST.2015.7232960}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/ZarrasPIH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RopkeH15, author = {Christian R{\"{o}}pke and Thorsten Holz}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {{SDN} Rootkits: Subverting Network Operating Systems of Software-Defined Networks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {339--356}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_16}, doi = {10.1007/978-3-319-26362-5\_16}, timestamp = {Sun, 25 Oct 2020 22:56:09 +0100}, biburl = {https://dblp.org/rec/conf/raid/RopkeH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WeisserDH15, author = {Dario Wei{\ss}er and Johannes Dahse and Thorsten Holz}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Security Analysis of {PHP} Bytecode Protection Mechanisms}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {493--514}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_23}, doi = {10.1007/978-3-319-26362-5\_23}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WeisserDH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PewnyGGRH15, author = {Jannik Pewny and Behrad Garmany and Robert Gawlik and Christian Rossow and Thorsten Holz}, title = {Cross-Architecture Bug Search in Binary Executables}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {709--724}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.49}, doi = {10.1109/SP.2015.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/PewnyGGRH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SchusterTLDSH15, author = {Felix Schuster and Thomas Tendyck and Christopher Liebchen and Lucas Davi and Ahmad{-}Reza Sadeghi and Thorsten Holz}, title = {Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in {C++} Applications}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {745--762}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.51}, doi = {10.1109/SP.2015.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SchusterTLDSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2015, editor = {Jaeyeon Jung and Thorsten Holz}, title = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HeiderichNSHS14, author = {Mario Heiderich and Marcus Niemietz and Felix Schuster and Thorsten Holz and J{\"{o}}rg Schwenk}, title = {Scriptless attacks: Stealing more pie without touching the sill}, journal = {J. Comput. Secur.}, volume = {22}, number = {4}, pages = {567--599}, year = {2014}, url = {https://doi.org/10.3233/JCS-130494}, doi = {10.3233/JCS-130494}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HeiderichNSHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MeutznerNHK14, author = {Hendrik Meutzner and Viet{-}Hung Nguyen and Thorsten Holz and Dorothea Kolossa}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Using automatic speech recognition for attacking acoustic CAPTCHAs: the trade-off between usability and security}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {276--285}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664262}, doi = {10.1145/2664243.2664262}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MeutznerNHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GawlikH14, author = {Robert Gawlik and Thorsten Holz}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Towards automated integrity protection of {C++} virtual function tables in binary programs}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {396--405}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664249}, doi = {10.1145/2664243.2664249}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GawlikH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PewnySBHR14, author = {Jannik Pewny and Felix Schuster and Lukas Bernhard and Thorsten Holz and Christian Rossow}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Leveraging semantic signatures for bug search in binary programs}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {406--415}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664269}, doi = {10.1145/2664243.2664269}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PewnySBHR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DahseKH14, author = {Johannes Dahse and Nikolai Krein and Thorsten Holz}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Code Reuse Attacks in {PHP:} Automated {POP} Chain Generation}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {42--53}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660363}, doi = {10.1145/2660267.2660363}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DahseKH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesHKKNP14, author = {Michael Backes and Thorsten Holz and Benjamin Kollenda and Philipp Koppe and Stefan N{\"{u}}rnberger and Jannik Pewny}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1342--1353}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660378}, doi = {10.1145/2660267.2660378}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesHKKNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/ZarrasKSHKV14, author = {Apostolis Zarras and Alexandros Kapravelos and Gianluca Stringhini and Thorsten Holz and Christopher Kruegel and Giovanni Vigna}, editor = {Carey Williamson and Aditya Akella and Nina Taft}, title = {The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements}, booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014, Vancouver, BC, Canada, November 5-7, 2014}, pages = {373--380}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663716.2663719}, doi = {10.1145/2663716.2663719}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/ZarrasKSHKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DahseH14, author = {Johannes Dahse and Thorsten Holz}, title = {Simulation of Built-in {PHP} Features for Precise Static Code Analysis}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/simulation-built-php-features-precise-static-code-analysis}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/DahseH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ZarrasPGH14, author = {Apostolis Zarras and Antonis Papadogiannakis and Robert Gawlik and Thorsten Holz}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Automated generation of models for fast and precise detection of HTTP-based malware}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {249--256}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890946}, doi = {10.1109/PST.2014.6890946}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/ZarrasPGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KuhrerRH14, author = {Marc K{\"{u}}hrer and Christian Rossow and Thorsten Holz}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Paint It Black: Evaluating the Effectiveness of Malware Blacklists}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {1--21}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_1}, doi = {10.1007/978-3-319-11379-1\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KuhrerRH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SchusterTPMSCH14, author = {Felix Schuster and Thomas Tendyck and Jannik Pewny and Andreas Maa{\ss} and Martin Steegmanns and Moritz Contag and Thorsten Holz}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Evaluating the Effectiveness of Current Anti-ROP Defenses}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {88--108}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_5}, doi = {10.1007/978-3-319-11379-1\_5}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SchusterTPMSCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/AltiokUH14, author = {Irfan Altiok and Sebastian Uellenbeck and Thorsten Holz}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {GraphNeighbors: Hampering Shoulder-Surfing Attacks on Smartphones}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {25--35}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20057}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/AltiokUH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/KuhrerHH14, author = {Marc K{\"{u}}hrer and Johannes Hoffmann and Thorsten Holz}, editor = {Pascal Felber and Vijay K. Garg}, title = {CloudSylla: Detecting Suspicious System Calls in the Cloud}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 16th International Symposium, {SSS} 2014, Paderborn, Germany, September 28 - October 1, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8756}, pages = {63--77}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11764-5\_5}, doi = {10.1007/978-3-319-11764-5\_5}, timestamp = {Mon, 15 Jun 2020 17:02:54 +0200}, biburl = {https://dblp.org/rec/conf/sss/KuhrerHH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KuhrerHRH14, author = {Marc K{\"{u}}hrer and Thomas Hupperich and Christian Rossow and Thorsten Holz}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Exit from Hell? Reducing the Impact of Amplification DDoS Attacks}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {111--125}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kuhrer}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/KuhrerHRH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/VoglGGKPEH14, author = {Sebastian Vogl and Robert Gawlik and Behrad Garmany and Thomas Kittel and Jonas Pfoh and Claudia Eckert and Thorsten Holz}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {813--828}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/vogl}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/VoglGGKPEH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DahseH14, author = {Johannes Dahse and Thorsten Holz}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Static Detection of Second-Order Vulnerabilities in Web Applications}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {989--1003}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/dahse}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DahseH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/KuhrerHRH14, author = {Marc K{\"{u}}hrer and Thomas Hupperich and Christian Rossow and Thorsten Holz}, editor = {Sergey Bratus and Felix "FX" Lindner}, title = {Hell of a Handshake: Abusing {TCP} for Reflective Amplification DDoS Attacks}, booktitle = {8th {USENIX} Workshop on Offensive Technologies, {WOOT} '14, San Diego, CA, USA, August 19, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/woot14/workshop-program/presentation/kuhrer}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/woot/KuhrerHRH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2014, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7}, doi = {10.1007/978-3-319-08593-7}, isbn = {978-3-319-08592-0}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FroschMBBSH14, author = {Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and J{\"{o}}rg Schwenk and Thorsten Holz}, title = {How Secure is TextSecure?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {904}, year = {2014}, url = {http://eprint.iacr.org/2014/904}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FroschMBBSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/esl/DardanelliMTZSKH13, author = {Andrea Dardanelli and Federico Maggi and Mara Tanelli and Stefano Zanero and Sergio M. Savaresi and R. Kochanek and Thorsten Holz}, title = {A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth}, journal = {{IEEE} Embed. Syst. Lett.}, volume = {5}, number = {3}, pages = {34--37}, year = {2013}, url = {https://doi.org/10.1109/LES.2013.2264594}, doi = {10.1109/LES.2013.2264594}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/esl/DardanelliMTZSKH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DriessenHWPH13, author = {Benedikt Driessen and Ralf Hund and Carsten Willems and Christof Paar and Thorsten Holz}, title = {An experimental security analysis of two satphone standards}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {3}, pages = {10}, year = {2013}, url = {https://doi.org/10.1145/2535522}, doi = {10.1145/2535522}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DriessenHWPH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PapadopoulosPPZHM13, author = {Panagiotis Papadopoulos and Antonis Papadogiannakis and Michalis Polychronakis and Apostolis Zarras and Thorsten Holz and Evangelos P. Markatos}, editor = {Charles N. Payne Jr.}, title = {k-subscription: privacy-preserving microblogging browsing through obfuscation}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {49--58}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523671}, doi = {10.1145/2523649.2523671}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PapadopoulosPPZHM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PewnyH13, author = {Jannik Pewny and Thorsten Holz}, editor = {Charles N. Payne Jr.}, title = {Control-flow restrictor: compiler-based {CFI} for iOS}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {309--318}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523674}, doi = {10.1145/2523649.2523674}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PewnyH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WerthmannHDSH13, author = {Tim Werthmann and Ralf Hund and Lucas Davi and Ahmad{-}Reza Sadeghi and Thorsten Holz}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {PSiOS: bring your own privacy {\&} security to iOS devices}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {13--24}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484316}, doi = {10.1145/2484313.2484316}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WerthmannHDSH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/UellenbeckDWH13, author = {Sebastian Uellenbeck and Markus D{\"{u}}rmuth and Christopher Wolf and Thorsten Holz}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Quantifying the security of graphical passwords: the case of android unlock patterns}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {161--172}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516700}, doi = {10.1145/2508859.2516700}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/UellenbeckDWH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchusterH13, author = {Felix Schuster and Thorsten Holz}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Towards reducing the attack surface of software backdoors}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {851--862}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516716}, doi = {10.1145/2508859.2516716}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchusterH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/SchusterRH13, author = {Felix Schuster and Stefan R{\"{u}}ster and Thorsten Holz}, editor = {Konrad Rieck and Patrick Stewin and Jean{-}Pierre Seifert}, title = {Preventing Backdoors in Server Applications with a Separated Software Architecture - (Short Paper)}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, {DIMVA} 2013, Berlin, Germany, July 18-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7967}, pages = {197--206}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39235-1\_12}, doi = {10.1007/978-3-642-39235-1\_12}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/SchusterRH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HundWH13, author = {Ralf Hund and Carsten Willems and Thorsten Holz}, title = {Practical Timing Side Channel Attacks Against Kernel Space {ASLR}}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/practical-timing-side-channel-attacks-against-kernel-space-aslr}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/HundWH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HoffmannNH13, author = {Johannes Hoffmann and Stephan Neumann and Thorsten Holz}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Mobile Malware Detection Based on Energy Fingerprints - {A} Dead End?}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {348--368}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_18}, doi = {10.1007/978-3-642-41284-4\_18}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HoffmannNH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/HoffmannUHS13, author = {Johannes Hoffmann and Martin Ussath and Thorsten Holz and Michael Spreitzenbarth}, editor = {Sung Y. Shin and Jos{\'{e}} Carlos Maldonado}, title = {Slicing droids: program slicing for smali code}, booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing, {SAC} '13, Coimbra, Portugal, March 18-22, 2013}, pages = {1844--1851}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2480362.2480706}, doi = {10.1145/2480362.2480706}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/HoffmannUHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HundWH13, author = {Ralf Hund and Carsten Willems and Thorsten Holz}, title = {Practical Timing Side Channel Attacks against Kernel Space {ASLR}}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {191--205}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.23}, doi = {10.1109/SP.2013.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/HundWH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/KuhrerH12, author = {Marc K{\"{u}}hrer and Thorsten Holz}, title = {An Empirical Analysis of Malware Blacklists}, journal = {Prax. Inf.verarb. Kommun.}, volume = {35}, number = {1}, pages = {11--16}, year = {2012}, url = {https://doi.org/10.1515/pik-2012-0003}, doi = {10.1515/PIK-2012-0003}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/KuhrerH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WillemsFH12, author = {Carsten Willems and Felix C. Freiling and Thorsten Holz}, editor = {Robert H'obbes' Zakon}, title = {Using memory management to detect and extract illegitimate code for malware analysis}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {179--188}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420979}, doi = {10.1145/2420950.2420979}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WillemsFH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WillemsHFFHV12, author = {Carsten Willems and Ralf Hund and Andreas Fobian and Dennis Felsch and Thorsten Holz and Amit Vasudevan}, editor = {Robert H'obbes' Zakon}, title = {Down to the bare metal: using processor features for binary analysis}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {189--198}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420980}, doi = {10.1145/2420950.2420980}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WillemsHFFHV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeiderichNSHS12, author = {Mario Heiderich and Marcus Niemietz and Felix Schuster and Thorsten Holz and J{\"{o}}rg Schwenk}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Scriptless attacks: stealing the pie without touching the sill}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {760--771}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382276}, doi = {10.1145/2382196.2382276}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HeiderichNSHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/HoffmannUH12, author = {Johannes Hoffmann and Sebastian Uellenbeck and Thorsten Holz}, editor = {Ulrich Flegel and Evangelos P. Markatos and William K. Robertson}, title = {SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7591}, pages = {184--203}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37300-8\_11}, doi = {10.1007/978-3-642-37300-8\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/HoffmannUH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/BuscherH12, author = {Armin B{\"{u}}scher and Thorsten Holz}, editor = {Engin Kirda}, title = {Tracking DDoS Attacks: Insights into the Business of Disrupting the Web}, booktitle = {5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '12, San Jose, CA, USA, April 24, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/leet12/workshop-program/presentation/buscher}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/leet/BuscherH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DaviDEFHHNS12, author = {Lucas Davi and Alexandra Dmitrienko and Manuel Egele and Thomas Fischer and Thorsten Holz and Ralf Hund and Stefan N{\"{u}}rnberger and Ahmad{-}Reza Sadeghi}, title = {MoCFI: {A} Framework to Mitigate Control-Flow Attacks on Smartphones}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/mocfi-framework-mitigate-control-flow-attacks-smartphones\#overlay-context=mocfi-framework-mitigate-control-flow-attacks-smartphones}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/DaviDEFHHNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DriessenHWPH12, author = {Benedikt Driessen and Ralf Hund and Carsten Willems and Christof Paar and Thorsten Holz}, title = {Don't Trust Satellite Phones: {A} Security Analysis of Two Satphone Standards}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {128--142}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.18}, doi = {10.1109/SP.2012.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/DriessenHWPH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StringhiniEZHKV12, author = {Gianluca Stringhini and Manuel Egele and Apostolis Zarras and Thorsten Holz and Christopher Kruegel and Giovanni Vigna}, editor = {Tadayoshi Kohno}, title = {B@bel: Leveraging Email Delivery for Spam Mitigation}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {16--32}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/stringhini}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/StringhiniEZHKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EngelberthFGGHHTW11, author = {Markus Engelberth and Felix C. Freiling and Jan G{\"{o}}bel and Christian Gorecki and Thorsten Holz and Ralf Hund and Philipp Trinius and Carsten Willems}, title = {Das Internet-Malware-Analyse-System (InMAS) - Ein System zur gro{\ss}fl{\"{a}}chigen Sammlung und Analyse von Schadsoftware im Internet}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {247--252}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0061-7}, doi = {10.1007/S11623-011-0061-7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EngelberthFGGHHTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/RieckTWH11, author = {Konrad Rieck and Philipp Trinius and Carsten Willems and Thorsten Holz}, title = {Automatic analysis of malware behavior using machine learning}, journal = {J. Comput. Secur.}, volume = {19}, number = {4}, pages = {639--668}, year = {2011}, url = {https://doi.org/10.3233/JCS-2010-0410}, doi = {10.3233/JCS-2010-0410}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/RieckTWH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeiderichFJH11, author = {Mario Heiderich and Tilman Frosch and Meiko Jensen and Thorsten Holz}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Crouching tiger - hidden payload: security risks of scalable vectors graphics}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {239--250}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046735}, doi = {10.1145/2046707.2046735}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HeiderichFJH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DaviDEFHHNS11, author = {Lucas Davi and Alexandra Dmitrienko and Manuel Egele and Thomas Fischer and Thorsten Holz and Ralf Hund and Stefan N{\"{u}}rnberger and Ahmad{-}Reza Sadeghi}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: control-flow integrity for smartphones}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {749--752}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093484}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DaviDEFHHNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/Holz11, author = {Thorsten Holz}, title = {Systems Security Research at Ruhr-University Bochum}, booktitle = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands, July 6, 2011}, pages = {131--134}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.19}, doi = {10.1109/SYSSEC.2011.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/Holz11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/Stone-GrossHSV11, author = {Brett Stone{-}Gross and Thorsten Holz and Gianluca Stringhini and Giovanni Vigna}, editor = {Christopher Kruegel}, title = {The Underground Economy of Spam: {A} Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns}, booktitle = {4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '11, Boston, MA, USA, March 29, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/leet11/underground-economy-spam-botmasters-perspective-coordinating-large-scale-spam}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/leet/Stone-GrossHSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GrobertWH11, author = {Felix Gr{\"{o}}bert and Carsten Willems and Thorsten Holz}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Automated Identification of Cryptographic Primitives in Binary Programs}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {41--60}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_3}, doi = {10.1007/978-3-642-23644-0\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GrobertWH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HeiderichFH11, author = {Mario Heiderich and Tilman Frosch and Thorsten Holz}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {IceShield: Detection and Mitigation of Malicious Websites with a Frozen {DOM}}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {281--300}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_15}, doi = {10.1007/978-3-642-23644-0\_15}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HeiderichFH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BecherFHHUW11, author = {Michael Becher and Felix C. Freiling and Johannes Hoffmann and Thorsten Holz and Sebastian Uellenbeck and Christopher Wolf}, title = {Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {96--111}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.29}, doi = {10.1109/SP.2011.29}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/BecherFHHUW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/GoreckiFKH11, author = {Christian Gorecki and Felix C. Freiling and Marc K{\"{u}}hrer and Thorsten Holz}, editor = {Xavier D{\'{e}}fago and Franck Petit and Vincent Villain}, title = {TrumanBox: Improving Dynamic Malware Analysis by Emulating the Internet}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 13th International Symposium, {SSS} 2011, Grenoble, France, October 10-12, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6976}, pages = {208--222}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24550-3\_17}, doi = {10.1007/978-3-642-24550-3\_17}, timestamp = {Sun, 25 Oct 2020 22:45:03 +0100}, biburl = {https://dblp.org/rec/conf/sss/GoreckiFKH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JacobHKH11, author = {Gr{\'{e}}goire Jacob and Ralf Hund and Christopher Kruegel and Thorsten Holz}, title = {{JACKSTRAWS:} Picking Command and Control Connections from Bot Traffic}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Jacob.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/JacobHKH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StringhiniHSKV11, author = {Gianluca Stringhini and Thorsten Holz and Brett Stone{-}Gross and Christopher Kruegel and Giovanni Vigna}, title = {{BOTMAGNIFIER:} Locating Spambots on the Internet}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Stringhini.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/StringhiniHSKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/badgers/2011, editor = {Engin Kirda and Thorsten Holz}, title = {Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@EuroSys 2011, Salzburg, Austria, April 10, 2011}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978672}, doi = {10.1145/1978672}, isbn = {978-1-4503-0768-0}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/badgers/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dimva/2011, editor = {Thorsten Holz and Herbert Bos}, title = {Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6739}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22424-9}, doi = {10.1007/978-3-642-22424-9}, isbn = {978-3-642-22423-2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/LuftH10, author = {Matthias Luft and Thorsten Holz}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {A Small Leak will Sink a Great Ship: An Empirical Study of {DLP} Solutions}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {354--364}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_34}, doi = {10.1007/978-3-8348-9788-6\_34}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/LuftH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BalduzziPHKBK10, author = {Marco Balduzzi and Christian Platzer and Thorsten Holz and Engin Kirda and Davide Balzarotti and Christopher Kruegel}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Abusing Social Networks for Automated User Profiling}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {422--441}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_22}, doi = {10.1007/978-3-642-15512-3\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BalduzziPHKBK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/DewaldHF10, author = {Andreas Dewald and Thorsten Holz and Felix C. Freiling}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {ADSandbox: sandboxing JavaScript to fight malicious websites}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {1859--1864}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774482}, doi = {10.1145/1774088.1774482}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/DewaldHF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/RieckSLHL10, author = {Konrad Rieck and Guido Schwenk and Tobias Limmer and Thorsten Holz and Pavel Laskov}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Botzilla: detecting the "phoning home" of malicious software}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {1978--1984}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774506}, doi = {10.1145/1774088.1774506}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/RieckSLHL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SpreitzenbarthH10, author = {Michael Spreitzenbarth and Thorsten Holz}, editor = {Felix C. Freiling}, title = {Towards Secure Deletion on Smartphones}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {165--176}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19779}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SpreitzenbarthH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/TriniusWHR10, author = {Philipp Trinius and Carsten Willems and Thorsten Holz and Konrad Rieck}, editor = {Felix C. Freiling}, title = {A Malware Instruction Set for Behavior-Based Analysis}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {205--216}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19782}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/TriniusWHR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KolbitschHKK10, author = {Clemens Kolbitsch and Thorsten Holz and Christopher Kruegel and Engin Kirda}, title = {Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {29--44}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.10}, doi = {10.1109/SP.2010.10}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/KolbitschHKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WondracekHKK10, author = {Gilbert Wondracek and Thorsten Holz and Engin Kirda and Christopher Kruegel}, title = {A Practical Attack to De-anonymize Social Network Users}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {223--238}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.21}, doi = {10.1109/SP.2010.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/WondracekHKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/WondracekHPKK10, author = {Gilbert Wondracek and Thorsten Holz and Christian Platzer and Engin Kirda and Christopher Kruegel}, title = {Is the Internet for Porn? An Insight Into the Online Adult Industry}, booktitle = {9th Annual Workshop on the Economics of Information Security, {WEIS} 2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010}, year = {2010}, url = {http://weis2010.econinfosec.org/papers/session2/weis2010\_wondracek.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:46 +0200}, biburl = {https://dblp.org/rec/conf/weis/WondracekHPKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:books/daglib/0024647, author = {Thorsten Holz}, title = {Tracking and Mitigation of Malicious Remote Control Networks}, school = {University of Mannheim, Germany}, year = {2009}, url = {http://madoc.bib.uni-mannheim.de/madoc/volltexte/2009/2330/pdf/dissertation-holz.pdf}, urn = {urn:nbn:de:bsz:180-madoc-23306}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0024647.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/GobelHT09, author = {Jan G{\"{o}}bel and Thorsten Holz and Philipp Trinius}, editor = {Ulrich Flegel and Danilo Bruschi}, title = {Towards Proactive Spam Filtering (Extended Abstract)}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5587}, pages = {38--47}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02918-9\_3}, doi = {10.1007/978-3-642-02918-9\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/GobelHT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HolzEF09, author = {Thorsten Holz and Markus Engelberth and Felix C. Freiling}, editor = {Michael Backes and Peng Ning}, title = {Learning More about the Underground Economy: {A} Case-Study of Keyloggers and Dropzones}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {1--18}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_1}, doi = {10.1007/978-3-642-04444-1\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HolzEF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WurzingerBHGKK09, author = {Peter Wurzinger and Leyla Bilge and Thorsten Holz and Jan Goebel and Christopher Kruegel and Engin Kirda}, editor = {Michael Backes and Peng Ning}, title = {Automatically Generating Models for Botnet Detection}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {232--249}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_15}, doi = {10.1007/978-3-642-04444-1\_15}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WurzingerBHGKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/HolzEF09, author = {Thorsten Holz and Markus Engelberth and Felix C. Freiling}, editor = {Stefan Fischer and Erik Maehle and R{\"{u}}diger Reischuk}, title = {Eine Analyse von 33 Gigabyte gestohlener Keylogger-Daten}, booktitle = {39. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Im Focus das Leben, {INFORMATIK} 2009, L{\"{u}}beck, Germany, September 28 - October 2, 2009, Proceedings}, series = {{LNI}}, volume = {{P-154}}, pages = {193}, publisher = {{GI}}, year = {2009}, url = {https://dl.gi.de/handle/20.500.12116/31136}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/HolzEF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HundHF09, author = {Ralf Hund and Thorsten Holz and Felix C. Freiling}, editor = {Fabian Monrose}, title = {Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms}, booktitle = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings}, pages = {383--398}, publisher = {{USENIX} Association}, year = {2009}, url = {http://www.usenix.org/events/sec09/tech/full\_papers/hund.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/HundHF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/TriniusHGF09, author = {Philipp Trinius and Thorsten Holz and Jan G{\"{o}}bel and Felix C. Freiling}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visual analysis of malware behavior using treemaps and thread graphs}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {33--38}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375540}, doi = {10.1109/VIZSEC.2009.5375540}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/TriniusHGF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/09/ZhugeHSGHZ09, author = {Jianwei Zhuge and Thorsten Holz and Chengyu Song and Jinpeng Guo and Xinhui Han and Wei Zou}, editor = {M. Eric Johnson}, title = {Studying Malicious Websites and the Underground Economy on the Chinese Web}, booktitle = {Managing Information Risk and the Economics of Security}, pages = {225--244}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-09762-6\_11}, doi = {10.1007/978-0-387-09762-6\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/09/ZhugeHSGHZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/gi/Holz09, author = {Thorsten Holz}, editor = {Abraham Bernstein and Steffen H{\"{o}}lldobler and G{\"{u}}nter Hotz and Klaus{-}Peter L{\"{o}}hr and Paul Molitor and Gustaf Neumann and R{\"{u}}diger Reischuk and Dietmar Saupe and Myra Spiliopoulou and Harald St{\"{o}}rrle and Dorothea Wagner}, title = {Verfolgen und Abschw{\"{a}}chen von Malicious Remote Control Networks}, booktitle = {Ausgezeichnete Informatikdissertationen 2009}, series = {{LNI}}, volume = {{D-10}}, pages = {101--110}, publisher = {{GI}}, year = {2009}, url = {https://dl.gi.de/handle/20.500.12116/33659}, timestamp = {Tue, 04 Jul 2023 17:43:57 +0200}, biburl = {https://dblp.org/rec/conf/gi/Holz09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0022130, author = {Niels Provos and Thorsten Holz}, title = {Virtual Honeypots - From Botnet Tracking to Intrusion Detection}, publisher = {Addison-Wesley}, year = {2008}, isbn = {978-0-321-33632-3}, timestamp = {Wed, 16 Mar 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0022130.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/RieckHWDL08, author = {Konrad Rieck and Thorsten Holz and Carsten Willems and Patrick D{\"{u}}ssel and Pavel Laskov}, editor = {Diego Zamboni}, title = {Learning and Classification of Malware Behavior}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, {DIMVA} 2008, Paris, France, July 10-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5137}, pages = {108--125}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70542-0\_6}, doi = {10.1007/978-3-540-70542-0\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/RieckHWDL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/FreilingHM08, author = {Felix C. Freiling and Thorsten Holz and Martin Mink}, editor = {Oliver G{\"{o}}bel and Sandra Frings and Detlef G{\"{u}}nther and Jens Nedon and Dirk Schadt}, title = {Reconstructing People's Lives: {A} Case Study in Teaching Forensic Computing}, booktitle = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2008, Conference Proceedings, September 23-25, 2008, Mannheim, Germany}, series = {{LNI}}, volume = {{P-140}}, pages = {125--141}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/23588}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imf/FreilingHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/NazarioH08, author = {Jose Nazario and Thorsten Holz}, title = {As the net churns: Fast-flux botnet observations}, booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE} 2008, Alexandria, Virginia, USA, October 7-8, 2008}, pages = {24--31}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MALWARE.2008.4690854}, doi = {10.1109/MALWARE.2008.4690854}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/NazarioH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HolzGRF08, author = {Thorsten Holz and Christian Gorecki and Konrad Rieck and Felix C. Freiling}, title = {Measuring and Detecting Fast-Flux Service Networks}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/measuring-and-detecting-fast-flux-service-networks/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/HolzGRF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/HolzSDBF08, author = {Thorsten Holz and Moritz Steiner and Frederic Dahl and Ernst W. Biersack and Felix C. Freiling}, editor = {Fabian Monrose}, title = {Measurements and Mitigation of Peer-to-Peer-based Botnets: {A} Case Study on Storm Worm}, booktitle = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/leet08/tech/full\_papers/holz/holz.pdf}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsdi/HolzSDBF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/IkinciHF08, author = {Ali Ikinci and Thorsten Holz and Felix C. Freiling}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {407--421}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21494}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/IkinciHF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/ZhugeHSGHZ08, author = {Jianwei Zhuge and Thorsten Holz and Chengyu Song and Jinpeng Guo and Xinhui Han and Wei Zou}, title = {Studying Malicious Websites and the Underground Economy on the Chinese Web}, booktitle = {7th Annual Workshop on the Economics of Information Security, {WEIS} 2008, Dartmouth College, Hanover, NH, USA, June 25-28, 2008}, year = {2008}, url = {http://weis2008.econinfosec.org/papers/Holz.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:45 +0200}, biburl = {https://dblp.org/rec/conf/weis/ZhugeHSGHZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BraunDHKKKLRS08, author = {Lothar Braun and Falko Dressler and Thorsten Holz and Engin Kirda and Jan Kohlrausch and Christopher Kruegel and Tobias Limmer and Konrad Rieck and James P. G. Sterbenz}, editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K{\"{o}}nig and Christopher Kruegel}, title = {08102 Working Group -- Requirements for Network Monitoring from an {IDS} Perspective}, booktitle = {Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08102}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1497}, timestamp = {Thu, 10 Jun 2021 13:02:08 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BraunDHKKKLRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/DacierDHKKKRS08, author = {Marc Dacier and Herv{\'{e}} Debar and Thorsten Holz and Engin Kirda and Jan Kohlrausch and Christopher Kruegel and Konrad Rieck and James P. G. Sterbenz}, editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K{\"{o}}nig and Christopher Kruegel}, title = {8102 Working Group -- Attack Taxonomy}, booktitle = {Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08102}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1495}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/DacierDHKKKRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/WillemsHF07, author = {Carsten Willems and Thorsten Holz and Felix C. Freiling}, title = {Toward Automated Dynamic Malware Analysis Using CWSandbox}, journal = {{IEEE} Secur. Priv.}, volume = {5}, number = {2}, pages = {32--39}, year = {2007}, url = {https://doi.org/10.1109/MSP.2007.45}, doi = {10.1109/MSP.2007.45}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/WillemsHF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/GoebelHW07, author = {Jan Goebel and Thorsten Holz and Carsten Willems}, editor = {Bernhard M. H{\"{a}}mmerli and Robin Sommer}, title = {Measurement and Analysis of Autonomous Spreading Malware in a University Environment}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, {DIMVA} 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4579}, pages = {109--128}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73614-1\_7}, doi = {10.1007/978-3-540-73614-1\_7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/GoebelHW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhugeHHSZ07, author = {Jianwei Zhuge and Thorsten Holz and Xinhui Han and Chengyu Song and Wei Zou}, editor = {Sihan Qing and Hideki Imai and Guilin Wang}, title = {Collecting Autonomous Spreading Malware Using High-Interaction Honeypots}, booktitle = {Information and Communications Security, 9th International Conference, {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4861}, pages = {438--451}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77048-0\_34}, doi = {10.1007/978-3-540-77048-0\_34}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ZhugeHHSZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/GoebelH07, author = {Jan Goebel and Thorsten Holz}, editor = {Niels Provos}, title = {Rishi: Identify Bot Contaminated Hosts by {IRC} Nickname Evaluation}, booktitle = {First Workshop on Hot Topics in Understanding Botnets, HotBots'07, Cambridge, MA, USA, April 10, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/hotbots-07/rishi-identify-bot-contaminated-hosts-irc-nickname-evaluation}, timestamp = {Thu, 12 Aug 2021 18:19:16 +0200}, biburl = {https://dblp.org/rec/conf/nsdi/GoebelH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HolzMR06, author = {Thorsten Holz and Simon Marechal and Fr{\'{e}}d{\'{e}}ric Raynal}, title = {New Threats and Attacks on the World Wide Web}, journal = {{IEEE} Secur. Priv.}, volume = {4}, number = {2}, pages = {72--75}, year = {2006}, url = {https://doi.org/10.1109/MSP.2006.46}, doi = {10.1109/MSP.2006.46}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/HolzMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GobelHH06, author = {Jan G{\"{o}}bel and Jens Hektor and Thorsten Holz}, title = {Advanced Honeypot-Based Intrusion Detection}, journal = {login Usenix Mag.}, volume = {31}, number = {6}, year = {2006}, url = {https://www.usenix.org/publications/login/december-2006-volume-31-number-6/advanced-honeypot-based-intrusion-detection}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GobelHH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arcs/BenesonFHKP06, author = {Zinaida Benenson and Felix C. Freiling and Thorsten Holz and Dogan Kesdogan and Lucia Draque Penso}, editor = {Wolfgang Karl and J{\"{u}}rgen Becker and Karl{-}Erwin Gro{\ss}pietsch and Christian Hochberger and Erik Maehle}, title = {Safety, Liveness, and Information Flow: Dependability Revisited}, booktitle = {{ARCS} 2006 - 19th International Conference on Architecture of Computing Systems, Workshops Proceedings, March 16, 2006, Frankfurt am Main, Germany}, series = {{LNI}}, volume = {{P-81}}, pages = {56--65}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/29437}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arcs/BenesonFHKP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/AndersonDFHILM06, author = {Philip Anderson and Maximillian Dornseif and Felix C. Freiling and Thorsten Holz and Alastair Irons and Christopher Laing and Martin Mink}, editor = {Oliver G{\"{o}}bel and Dirk Schadt and Sandra Frings and Hardo Hase and Detlef G{\"{u}}nther and Jens Nedon}, title = {A Comparative Study of Teaching Forensics at a University Degree Level}, booktitle = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2006, Conference Proceedings, October, 18th-19th, 2006, Stuttgart}, series = {{LNI}}, volume = {{P-97}}, pages = {116--127}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/23454}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imf/AndersonDFHILM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BaecherKHDF06, author = {Paul Baecher and Markus Koetter and Thorsten Holz and Maximillian Dornseif and Felix C. Freiling}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {The Nepenthes Platform: An Efficient Approach to Collect Malware}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {165--184}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_9}, doi = {10.1007/11856214\_9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BaecherKHDF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Holz06, author = {Thorsten Holz}, editor = {Jana Dittmann}, title = {Learning More About Attack Patterns With Honeypots}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {30--41}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24800}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Holz06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/BohmeH06, author = {Rainer B{\"{o}}hme and Thorsten Holz}, title = {The Effect of Stock Spam on Financial Markets}, booktitle = {5th Annual Workshop on the Economics of Information Security, {WEIS} 2006, Robinson College, University of Cambridge, England, UK, June 26-28, 2006}, year = {2006}, url = {https://doi.org/10.2139/ssrn.897431}, doi = {10.2139/SSRN.897431}, timestamp = {Sat, 31 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/weis/BohmeH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Holz05, author = {Thorsten Holz}, title = {A Short Visit to the Bot Zoo}, journal = {{IEEE} Secur. Priv.}, volume = {3}, number = {3}, pages = {76--79}, year = {2005}, url = {https://doi.org/10.1109/MSP.2005.58}, doi = {10.1109/MSP.2005.58}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Holz05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Holz05, author = {Thorsten Holz}, title = {Spying with Bots}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/spying-bots}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Holz05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/Holz05, author = {Thorsten Holz}, editor = {Irene Eusgeld and Felix C. Freiling and Ralf H. Reussner}, title = {Security Measurements and Metrics for Networks}, booktitle = {Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 - November 1, 2005]}, series = {Lecture Notes in Computer Science}, volume = {4909}, pages = {157--165}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-68947-8\_13}, doi = {10.1007/978-3-540-68947-8\_13}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/Holz05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfn/DornseifHM05, author = {Maximillian Dornseif and Thorsten Holz and Sven M{\"{u}}ller}, editor = {Jan von Knop and Wilhelm Haverkamp and Eike Jessen}, title = {Honeypots and Limitations of Deception}, booktitle = {"Heute schon das Morgen sehen", 19. DFN-Arbeitstagung {\"{u}}ber Kommunikationsnetze, D{\"{u}}sseldorf, 2004}, series = {{LNI}}, volume = {{P-73}}, pages = {235--252}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28613}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dfn/DornseifHM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/PougetH05, author = {Fabien Pouget and Thorsten Holz}, editor = {Klaus Julisch and Christopher Kr{\"{u}}gel}, title = {A Pointillist Approach for Comparing Honeypots}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, {DIMVA} 2005, Vienna, Austria, July 7-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3548}, pages = {51--68}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506881\_4}, doi = {10.1007/11506881\_4}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/PougetH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FreilingHW05, author = {Felix C. Freiling and Thorsten Holz and Georg Wicherski}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {319--335}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_19}, doi = {10.1007/11555827\_19}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/FreilingHW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/DornseifGH04, author = {Maximillian Dornseif and Felix C. G{\"{a}}rtner and Thorsten Holz}, title = {Vulnerability Assessment using Honeypots}, journal = {Prax. Inf.verarb. Kommun.}, volume = {27}, number = {4}, pages = {195--201}, year = {2004}, url = {https://doi.org/10.1515/PIKO.2004.195}, doi = {10.1515/PIKO.2004.195}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/DornseifGH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/DornseifGH04, author = {Maximillian Dornseif and Felix C. G{\"{a}}rtner and Thorsten Holz}, editor = {Ulrich Flegel and Michael Meier}, title = {Ermittlung von Verwundbarkeiten mit elektronischen K{\"{o}}dern}, booktitle = {Detection of Intrusions and Malware {\&} Vulnerability Assessment, {GI} {SIG} {SIDAR} Workshop, {DIMVA} 2004, Dortmund, Germany, July 6.7, 2004, Proceedings}, series = {{LNI}}, volume = {{P-46}}, pages = {129--141}, publisher = {{GI}}, year = {2004}, url = {https://dl.gi.de/handle/20.500.12116/29211}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/DornseifGH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0406052, author = {Maximillian Dornseif and Thorsten Holz and Christian N. Klein}, title = {NoSEBrEaK - Attacking Honeynets}, journal = {CoRR}, volume = {cs.CR/0406052}, year = {2004}, url = {http://arxiv.org/abs/cs/0406052}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0406052.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0406059, author = {Maximillian Dornseif and Felix C. G{\"{a}}rtner and Thorsten Holz}, title = {Ermittlung von Verwundbarkeiten mit elektronischen Koedern}, journal = {CoRR}, volume = {cs.CR/0406059}, year = {2004}, url = {http://arxiv.org/abs/cs/0406059}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0406059.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.