BibTeX records: Thorsten Holz

download as .bib file

@inproceedings{DBLP:conf/visigrapp/RickerDHF24,
  author       = {Jonas Ricker and
                  Simon Damm and
                  Thorsten Holz and
                  Asja Fischer},
  editor       = {Petia Radeva and
                  Antonino Furnari and
                  Kadi Bouatouch and
                  A. Augusto de Sousa},
  title        = {Towards the Detection of Diffusion Model Deepfakes},
  booktitle    = {Proceedings of the 19th International Joint Conference on Computer
                  Vision, Imaging and Computer Graphics Theory and Applications, {VISIGRAPP}
                  2024, Volume 4: VISAPP, Rome, Italy, February 27-29, 2024},
  pages        = {446--457},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012422000003660},
  doi          = {10.5220/0012422000003660},
  timestamp    = {Mon, 08 Apr 2024 14:22:28 +0200},
  biburl       = {https://dblp.org/rec/conf/visigrapp/RickerDHF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-09824,
  author       = {Bhupendra Acharya and
                  Muhammad Saad and
                  Antonio Emanuele Cin{\`{a}} and
                  Lea Sch{\"{o}}nherr and
                  Hoang Dai Nguyen and
                  Adam Oest and
                  Phani Vadrevu and
                  Thorsten Holz},
  title        = {Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based
                  Technical Support Scams},
  journal      = {CoRR},
  volume       = {abs/2401.09824},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.09824},
  doi          = {10.48550/ARXIV.2401.09824},
  eprinttype    = {arXiv},
  eprint       = {2401.09824},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-09824.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/UtzADHFS23,
  author       = {Christine Utz and
                  Sabrina Amft and
                  Martin Degeling and
                  Thorsten Holz and
                  Sascha Fahl and
                  Florian Schaub},
  title        = {Privacy Rarely Considered: Exploring Considerations in the Adoption
                  of Third-Party Services by Websites},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {1},
  pages        = {5--28},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0002},
  doi          = {10.56553/POPETS-2023-0002},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/UtzADHFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AbdelnabiGMEHF23,
  author       = {Sahar Abdelnabi and
                  Kai Greshake and
                  Shailesh Mishra and
                  Christoph Endres and
                  Thorsten Holz and
                  Mario Fritz},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Not What You've Signed Up For: Compromising Real-World LLM-Integrated
                  Applications with Indirect Prompt Injection},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {79--90},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623985},
  doi          = {10.1145/3605764.3623985},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AbdelnabiGMEHF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/RodlerPLBHKD23,
  author       = {Michael Rodler and
                  David Paa{\ss}en and
                  Wenting Li and
                  Lukas Bernhard and
                  Thorsten Holz and
                  Ghassan Karame and
                  Lucas Davi},
  title        = {EF{\unicode{8623}}CF: High Performance Smart Contract Fuzzing for
                  Exploit Generation},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {449--471},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00034},
  doi          = {10.1109/EUROSP57164.2023.00034},
  timestamp    = {Mon, 07 Aug 2023 15:56:23 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/RodlerPLBHKD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fuzzing/SchillerXBBSH23,
  author       = {Nico Schiller and
                  Xinyi Xu and
                  Lukas Bernhard and
                  Nils Bars and
                  Moritz Schloegel and
                  Thorsten Holz},
  editor       = {Marcel B{\"{o}}hme and
                  Yannic Noller and
                  Baishakhi Ray and
                  L{\'{a}}szl{\'{o}} Szekeres},
  title        = {Novelty Not Found: Adaptive Fuzzer Restarts to Improve Input Space
                  Coverage (Registered Report)},
  booktitle    = {Proceedings of the 2nd International Fuzzing Workshop, {FUZZING} 2023,
                  Seattle, WA, USA, 17 July 2023},
  pages        = {12--20},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605157.3605171},
  doi          = {10.1145/3605157.3605171},
  timestamp    = {Mon, 17 Jul 2023 14:52:13 +0200},
  biburl       = {https://dblp.org/rec/conf/fuzzing/SchillerXBBSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fuzzing/CrumpZAMFHB23,
  author       = {Addison Crump and
                  Dongjia Zhang and
                  Syeda Mahnur Asif and
                  Dominik Christian Maier and
                  Andrea Fioraldi and
                  Thorsten Holz and
                  Davide Balzarotti},
  editor       = {Marcel B{\"{o}}hme and
                  Yannic Noller and
                  Baishakhi Ray and
                  L{\'{a}}szl{\'{o}} Szekeres},
  title        = {CrabSandwich: Fuzzing Rust with Rust (Registered Report)},
  booktitle    = {Proceedings of the 2nd International Fuzzing Workshop, {FUZZING} 2023,
                  Seattle, WA, USA, 17 July 2023},
  pages        = {39--46},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605157.3605176},
  doi          = {10.1145/3605157.3605176},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fuzzing/CrumpZAMFHB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/DemirHGUPHW23,
  author       = {Nurullah Demir and
                  Jan H{\"{o}}rnemann and
                  Matteo Gro{\ss}e{-}Kampmann and
                  Tobias Urban and
                  Norbert Pohlmann and
                  Thorsten Holz and
                  Christian Wressnegger},
  editor       = {Marie{-}Jos{\'{e}} Montpetit and
                  Aris Leivadeas and
                  Steve Uhlig and
                  Mobin Javed},
  title        = {On the Similarity of Web Measurements Under Different Experimental
                  Setups},
  booktitle    = {Proceedings of the 2023 {ACM} on Internet Measurement Conference,
                  {IMC} 2023, Montreal, QC, Canada, October 24-26, 2023},
  pages        = {356--369},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3618257.3624795},
  doi          = {10.1145/3618257.3624795},
  timestamp    = {Wed, 25 Oct 2023 17:17:16 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/DemirHGUPHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GrossKBHJ23,
  author       = {Samuel Gro{\ss} and
                  Simon Koch and
                  Lukas Bernhard and
                  Thorsten Holz and
                  Martin Johns},
  title        = {{FUZZILLI:} Fuzzing for JavaScript {JIT} Compiler Vulnerabilities},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/fuzzilli-fuzzing-for-javascript-jit-compiler-vulnerabilities/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/GrossKBHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SchillerCSBESDS23,
  author       = {Nico Schiller and
                  Merlin Chlosta and
                  Moritz Schloegel and
                  Nils Bars and
                  Thorsten Eisenhofer and
                  Tobias Scharnowski and
                  Felix Domke and
                  Lea Sch{\"{o}}nherr and
                  Thorsten Holz},
  title        = {Drone Security and the Mysterious Case of DJI's DroneID},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/drone-security-and-the-mysterious-case-of-djis-droneid/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/SchillerCSBESDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SpahnHHKV23,
  author       = {Noah Spahn and
                  Nils Hanke and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Container Orchestration Honeypot: Observing Attacks in the Wild},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {381--396},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607205},
  doi          = {10.1145/3607199.3607205},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SpahnHHKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WillboldSVGH023,
  author       = {Johannes Willbold and
                  Moritz Schloegel and
                  Manuel V{\"{o}}gele and
                  Maximilian Gerhardt and
                  Thorsten Holz and
                  Ali Abbasi},
  title        = {Space Odyssey: An Experimental Software Security Analysis of Satellites},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1--19},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00131},
  doi          = {10.1109/SP46215.2023.00131},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WillboldSVGH023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spacesec/ScharnowskiBWH23,
  author       = {Tobias Scharnowski and
                  Felix Buchmann and
                  Simon W{\"{o}}rner and
                  Thorsten Holz},
  title        = {A Case Study on Fuzzing Satellite Firmware},
  booktitle    = {1st Workshop on Security of Space and Satellite Systems, SpaceSec
                  2023, San Diego, California, USA, Feburary, 27, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://doi.org/10.14722/spacesec.2023.230707},
  doi          = {10.14722/SPACESEC.2023.230707},
  timestamp    = {Tue, 19 Dec 2023 16:39:16 +0100},
  biburl       = {https://dblp.org/rec/conf/spacesec/ScharnowskiBWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BarsSSSH23,
  author       = {Nils Bars and
                  Moritz Schloegel and
                  Tobias Scharnowski and
                  Nico Schiller and
                  Thorsten Holz},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit
                  Domain Knowledge},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {1847--1864},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/bars},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BarsSSSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ScharnowskiWBBS23,
  author       = {Tobias Scharnowski and
                  Simon W{\"{o}}rner and
                  Felix Buchmann and
                  Nils Bars and
                  Moritz Schloegel and
                  Thorsten Holz},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {2885--2902},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/scharnowski},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ScharnowskiWBBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GorzMHGHZG23,
  author       = {Philipp G{\"{o}}rz and
                  Bj{\"{o}}rn Mathis and
                  Keno Hassler and
                  Emre G{\"{u}}ler and
                  Thorsten Holz and
                  Andreas Zeller and
                  Rahul Gopinath},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Systematic Assessment of Fuzzers using Mutation Analysis},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4535--4552},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/gorz},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GorzMHGHZG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/EisenhoferQMRHR23,
  author       = {Thorsten Eisenhofer and
                  Erwin Quiring and
                  Jonas M{\"{o}}ller and
                  Doreen Riepel and
                  Thorsten Holz and
                  Konrad Rieck},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {No more Reviewer {\#}2: Subverting Automatic Paper-Reviewer Assignment
                  using Adversarial Learning},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5109--5126},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/eisenhofer},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/EisenhoferQMRHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-04012,
  author       = {Hossein Hajipour and
                  Thorsten Holz and
                  Lea Sch{\"{o}}nherr and
                  Mario Fritz},
  title        = {Systematically Finding Security Vulnerabilities in Black-Box Code
                  Generation Models},
  journal      = {CoRR},
  volume       = {abs/2302.04012},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.04012},
  doi          = {10.48550/ARXIV.2302.04012},
  eprinttype    = {arXiv},
  eprint       = {2302.04012},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-04012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-12173,
  author       = {Kai Greshake and
                  Sahar Abdelnabi and
                  Shailesh Mishra and
                  Christoph Endres and
                  Thorsten Holz and
                  Mario Fritz},
  title        = {More than you've asked for: {A} Comprehensive Analysis of Novel Prompt
                  Injection Threats to Application-Integrated Large Language Models},
  journal      = {CoRR},
  volume       = {abs/2302.12173},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.12173},
  doi          = {10.48550/ARXIV.2302.12173},
  eprinttype    = {arXiv},
  eprint       = {2302.12173},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-12173.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-14443,
  author       = {Thorsten Eisenhofer and
                  Erwin Quiring and
                  Jonas M{\"{o}}ller and
                  Doreen Riepel and
                  Thorsten Holz and
                  Konrad Rieck},
  title        = {No more Reviewer {\#}2: Subverting Automatic Paper-Reviewer Assignment
                  using Adversarial Learning},
  journal      = {CoRR},
  volume       = {abs/2303.14443},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.14443},
  doi          = {10.48550/ARXIV.2303.14443},
  eprinttype    = {arXiv},
  eprint       = {2303.14443},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-14443.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-06341,
  author       = {Michael Rodler and
                  David Paa{\ss}en and
                  Wenting Li and
                  Lukas Bernhard and
                  Thorsten Holz and
                  Ghassan Karame and
                  Lucas Davi},
  title        = {{EF/CF:} High Performance Smart Contract Fuzzing for Exploit Generation},
  journal      = {CoRR},
  volume       = {abs/2304.06341},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.06341},
  doi          = {10.48550/ARXIV.2304.06341},
  eprinttype    = {arXiv},
  eprint       = {2304.06341},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-06341.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-05976,
  author       = {Joel Frank and
                  Franziska Herbert and
                  Jonas Ricker and
                  Lea Sch{\"{o}}nherr and
                  Thorsten Eisenhofer and
                  Asja Fischer and
                  Markus D{\"{u}}rmuth and
                  Thorsten Holz},
  title        = {A Representative Study on Human Detection of Artificially Generated
                  Media Across Countries},
  journal      = {CoRR},
  volume       = {abs/2312.05976},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.05976},
  doi          = {10.48550/ARXIV.2312.05976},
  eprinttype    = {arXiv},
  eprint       = {2312.05976},
  timestamp    = {Wed, 03 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-05976.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csl/SchonherrGEWKH22,
  author       = {Lea Sch{\"{o}}nherr and
                  Maximilian Golla and
                  Thorsten Eisenhofer and
                  Jan Wiele and
                  Dorothea Kolossa and
                  Thorsten Holz},
  title        = {Exploring accidental triggers of smart speakers},
  journal      = {Comput. Speech Lang.},
  volume       = {73},
  pages        = {101328},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.csl.2021.101328},
  doi          = {10.1016/J.CSL.2021.101328},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csl/SchonherrGEWKH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BenzelH22,
  author       = {Terry Benzel and
                  Thorsten Holz},
  title        = {Selected Papers From the 2021 {IEEE} Symposium on Security and Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {2},
  pages        = {8--9},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2022.3142463},
  doi          = {10.1109/MSEC.2022.3142463},
  timestamp    = {Thu, 31 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BenzelH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BernhardSSBH22,
  author       = {Lukas Bernhard and
                  Tobias Scharnowski and
                  Moritz Schloegel and
                  Tim Blazytko and
                  Thorsten Holz},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {JIT-Picking: Differential Fuzzing of JavaScript Engines},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {351--364},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560624},
  doi          = {10.1145/3548606.3560624},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BernhardSSBH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BernhardRHD22,
  author       = {Lukas Bernhard and
                  Michael Rodler and
                  Thorsten Holz and
                  Lucas Davi},
  title        = {xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based
                  Pointer Tagging on Intel x86-64},
  booktitle    = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2022, Genoa, Italy, June 6-10, 2022},
  pages        = {502--519},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/EuroSP53844.2022.00038},
  doi          = {10.1109/EUROSP53844.2022.00038},
  timestamp    = {Tue, 26 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BernhardRHD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/SchumiloAJ0H22,
  author       = {Sergej Schumilo and
                  Cornelius Aschermann and
                  Andrea Jemmett and
                  Ali Abbasi and
                  Thorsten Holz},
  editor       = {Y{\'{e}}rom{-}David Bromberg and
                  Anne{-}Marie Kermarrec and
                  Christos Kozyrakis},
  title        = {Nyx-net: network fuzzing with incremental snapshots},
  booktitle    = {EuroSys '22: Seventeenth European Conference on Computer Systems,
                  Rennes, France, April 5 - 8, 2022},
  pages        = {166--180},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3492321.3519591},
  doi          = {10.1145/3492321.3519591},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/SchumiloAJ0H22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ScharnowskiBSGM22,
  author       = {Tobias Scharnowski and
                  Nils Bars and
                  Moritz Schloegel and
                  Eric Gustafson and
                  Marius Muench and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Thorsten Holz and
                  Ali Abbasi},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Fuzzware: Using Precise {MMIO} Modeling for Effective Firmware Fuzzing},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1239--1256},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/scharnowski},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ScharnowskiBSGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SchlogelBCABH022,
  author       = {Moritz Schloegel and
                  Tim Blazytko and
                  Moritz Contag and
                  Cornelius Aschermann and
                  Julius Basler and
                  Thorsten Holz and
                  Ali Abbasi},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Loki: Hardening Code Obfuscation Against Automated Attacks},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3055--3073},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/schloegel},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SchlogelBCABH022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CloostersWHD22,
  author       = {Tobias Cloosters and
                  Johannes Willbold and
                  Thorsten Holz and
                  Lucas Davi},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {SGXFuzz: Efficiently Synthesizing Nested Structures for {SGX} Enclave
                  Fuzzing},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3147--3164},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/cloosters},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/CloostersWHD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/DemirGUWHP22,
  author       = {Nurullah Demir and
                  Matteo Gro{\ss}e{-}Kampmann and
                  Tobias Urban and
                  Christian Wressnegger and
                  Thorsten Holz and
                  Norbert Pohlmann},
  editor       = {Fr{\'{e}}d{\'{e}}rique Laforest and
                  Rapha{\"{e}}l Troncy and
                  Elena Simperl and
                  Deepak Agarwal and
                  Aristides Gionis and
                  Ivan Herman and
                  Lionel M{\'{e}}dini},
  title        = {Reproducibility and Replicability of Web Measurement Studies},
  booktitle    = {{WWW} '22: The {ACM} Web Conference 2022, Virtual Event, Lyon, France,
                  April 25 - 29, 2022},
  pages        = {533--544},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3485447.3512214},
  doi          = {10.1145/3485447.3512214},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/DemirGUWHP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-04117,
  author       = {Lukas Bernhard and
                  Michael Rodler and
                  Thorsten Holz and
                  Lucas Davi},
  title        = {xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based
                  Pointer Tagging on Intel x86-64},
  journal      = {CoRR},
  volume       = {abs/2203.04117},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.04117},
  doi          = {10.48550/ARXIV.2203.04117},
  eprinttype    = {arXiv},
  eprint       = {2203.04117},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-04117.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-11387,
  author       = {Christine Utz and
                  Sabrina Amft and
                  Martin Degeling and
                  Thorsten Holz and
                  Sascha Fahl and
                  Florian Schaub},
  title        = {Privacy Rarely Considered: Exploring Considerations in the Adoption
                  of Third-Party Services by Websites},
  journal      = {CoRR},
  volume       = {abs/2203.11387},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.11387},
  doi          = {10.48550/ARXIV.2203.11387},
  eprinttype    = {arXiv},
  eprint       = {2203.11387},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-11387.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-14571,
  author       = {Jonas Ricker and
                  Simon Damm and
                  Thorsten Holz and
                  Asja Fischer},
  title        = {Towards the Detection of Diffusion Model Deepfakes},
  journal      = {CoRR},
  volume       = {abs/2210.14571},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.14571},
  doi          = {10.48550/ARXIV.2210.14571},
  eprinttype    = {arXiv},
  eprint       = {2210.14571},
  timestamp    = {Mon, 31 Oct 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-14571.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-03075,
  author       = {Philipp G{\"{o}}rz and
                  Bj{\"{o}}rn Mathis and
                  Keno Hassler and
                  Emre G{\"{u}}ler and
                  Thorsten Holz and
                  Andreas Zeller and
                  Rahul Gopinath},
  title        = {How to Compare Fuzzers},
  journal      = {CoRR},
  volume       = {abs/2212.03075},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.03075},
  doi          = {10.48550/ARXIV.2212.03075},
  eprinttype    = {arXiv},
  eprint       = {2212.03075},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-03075.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/QuinkertTH21,
  author       = {Florian Quinkert and
                  Dennis Tatang and
                  Thorsten Holz},
  editor       = {Leyla Bilge and
                  Lorenzo Cavallaro and
                  Giancarlo Pellegrino and
                  Nuno Neves},
  title        = {Digging Deeper: An Analysis of Domain Impersonation in the Lower {DNS}
                  Hierarchy},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 18th International Conference, {DIMVA} 2021, Virtual Event, July
                  14-16, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12756},
  pages        = {68--87},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-80825-9\_4},
  doi          = {10.1007/978-3-030-80825-9\_4},
  timestamp    = {Tue, 13 Jul 2021 16:53:38 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/QuinkertTH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/QuinkertDH21,
  author       = {Florian Quinkert and
                  Martin Degeling and
                  Thorsten Holz},
  editor       = {Leyla Bilge and
                  Lorenzo Cavallaro and
                  Giancarlo Pellegrino and
                  Nuno Neves},
  title        = {Spotlight on Phishing: {A} Longitudinal Study on Phishing Awareness
                  Trainings},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 18th International Conference, {DIMVA} 2021, Virtual Event, July
                  14-16, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12756},
  pages        = {341--360},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-80825-9\_17},
  doi          = {10.1007/978-3-030-80825-9\_17},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/QuinkertDH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/TatangFH21,
  author       = {Dennis Tatang and
                  Robin Flume and
                  Thorsten Holz},
  editor       = {Leyla Bilge and
                  Lorenzo Cavallaro and
                  Giancarlo Pellegrino and
                  Nuno Neves},
  title        = {Extended Abstract: {A} First Large-Scale Analysis on Usage of {MTA-STS}},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 18th International Conference, {DIMVA} 2021, Virtual Event, July
                  14-16, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12756},
  pages        = {361--370},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-80825-9\_18},
  doi          = {10.1007/978-3-030-80825-9\_18},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/TatangFH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SchlogelBBHH21,
  author       = {Moritz Schloegel and
                  Tim Blazytko and
                  Julius Basler and
                  Fabian Hemmer and
                  Thorsten Holz},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12972},
  pages        = {218--239},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88418-5\_11},
  doi          = {10.1007/978-3-030-88418-5\_11},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SchlogelBBHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/OsterlundGJGGHG21,
  author       = {Sebastian {\"{O}}sterlund and
                  Elia Geretto and
                  Andrea Jemmett and
                  Emre G{\"{u}}ler and
                  Philipp G{\"{o}}rz and
                  Thorsten Holz and
                  Cristiano Giuffrida and
                  Herbert Bos},
  title        = {CollabFuzz: {A} Framework for Collaborative Fuzzing},
  booktitle    = {EuroSec '21: Proceedings of the 14th European Workshop on Systems
                  Security, Virtual Event / Edinburgh, Scotland, UK, April 26, 2021},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3447852.3458720},
  doi          = {10.1145/3447852.3458720},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosec/OsterlundGJGGHG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/TatangKSQDH21,
  author       = {Dennis Tatang and
                  Philip Krei{\ss}el and
                  Michael Sehring and
                  Florian Quinkert and
                  Martin Degeling and
                  Thorsten Holz},
  editor       = {Oana Balalau and
                  Katherine Ognyanova and
                  Daniel M. Romero},
  title        = {Likes are not Likes {A} Crowdworking Platform Analysis},
  booktitle    = {Workshop Proceedings of the 15th International {AAAI} Conference on
                  Web and Social Media, {ICWSM} 2021 Workshops, [virtual], June 7, 2021},
  year         = {2021},
  url          = {https://doi.org/10.36190/2021.12},
  doi          = {10.36190/2021.12},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icwsm/TatangKSQDH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TatangZH21,
  author       = {Dennis Tatang and
                  Florian Zettl and
                  Thorsten Holz},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {The Evolution of DNS-based Email Authentication: Measuring Adoption
                  and Finding Flaws},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {354--369},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471842},
  doi          = {10.1145/3471621.3471842},
  timestamp    = {Fri, 08 Oct 2021 09:46:25 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TatangZH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/EisenhoferSFSKH21,
  author       = {Thorsten Eisenhofer and
                  Lea Sch{\"{o}}nherr and
                  Joel Frank and
                  Lars Speckemeier and
                  Dorothea Kolossa and
                  Thorsten Holz},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Dompteur: Taming Audio Adversarial Examples},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2309--2326},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/eisenhofer},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/EisenhoferSFSKH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SchumiloA0WH21,
  author       = {Sergej Schumilo and
                  Cornelius Aschermann and
                  Ali Abbasi and
                  Simon W{\"{o}}rner and
                  Thorsten Holz},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2597--2614},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/schumilo},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SchumiloA0WH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChlostaRH21,
  author       = {Merlin Chlosta and
                  David Rupprecht and
                  Thorsten Holz},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {On the challenges of automata reconstruction in {LTE} networks},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {164--174},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3469133},
  doi          = {10.1145/3448300.3469133},
  timestamp    = {Mon, 28 Jun 2021 17:39:52 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ChlostaRH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChlostaRPH21,
  author       = {Merlin Chlosta and
                  David Rupprecht and
                  Christina P{\"{o}}pper and
                  Thorsten Holz},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {5G SUCI-catchers: still catching them all?},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {359--364},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467826},
  doi          = {10.1145/3448300.3467826},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ChlostaRPH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-05431,
  author       = {Thorsten Eisenhofer and
                  Lea Sch{\"{o}}nherr and
                  Joel Frank and
                  Lars Speckemeier and
                  Dorothea Kolossa and
                  Thorsten Holz},
  title        = {Dompteur: Taming Audio Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/2102.05431},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.05431},
  eprinttype    = {arXiv},
  eprint       = {2102.05431},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-05431.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-02984,
  author       = {Joel Frank and
                  Thorsten Holz},
  title        = {{[RE]} CNN-generated images are surprisingly easy to spot...for now},
  journal      = {CoRR},
  volume       = {abs/2104.02984},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.02984},
  eprinttype    = {arXiv},
  eprint       = {2104.02984},
  timestamp    = {Tue, 13 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-02984.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-08913,
  author       = {Moritz Schloegel and
                  Tim Blazytko and
                  Moritz Contag and
                  Cornelius Aschermann and
                  Julius Basler and
                  Thorsten Holz and
                  Ali Abbasi},
  title        = {Loki: Hardening Code Obfuscation Against Automated Attacks},
  journal      = {CoRR},
  volume       = {abs/2106.08913},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.08913},
  eprinttype    = {arXiv},
  eprint       = {2106.08913},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-08913.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-03013,
  author       = {Sergej Schumilo and
                  Cornelius Aschermann and
                  Andrea Jemmett and
                  Ali Abbasi and
                  Thorsten Holz},
  title        = {Nyx-Net: Network Fuzzing with Incremental Snapshots},
  journal      = {CoRR},
  volume       = {abs/2111.03013},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.03013},
  eprinttype    = {arXiv},
  eprint       = {2111.03013},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-03013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GulerGGJOBGH20,
  author       = {Emre G{\"{u}}ler and
                  Philipp G{\"{o}}rz and
                  Elia Geretto and
                  Andrea Jemmett and
                  Sebastian {\"{O}}sterlund and
                  Herbert Bos and
                  Cristiano Giuffrida and
                  Thorsten Holz},
  title        = {Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {360--372},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427266},
  doi          = {10.1145/3427228.3427266},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GulerGGJOBGH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchonherrEZHK20,
  author       = {Lea Sch{\"{o}}nherr and
                  Thorsten Eisenhofer and
                  Steffen Zeiler and
                  Thorsten Holz and
                  Dorothea Kolossa},
  title        = {Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech
                  Recognition Systems},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {843--855},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427276},
  doi          = {10.1145/3427228.3427276},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchonherrEZHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/UrbanTDHP20,
  author       = {Tobias Urban and
                  Dennis Tatang and
                  Martin Degeling and
                  Thorsten Holz and
                  Norbert Pohlmann},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {Measuring the Impact of the {GDPR} on Data Sharing in Ad Networks},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {222--235},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3372194},
  doi          = {10.1145/3320269.3372194},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/UrbanTDHP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/QuinkertDBH20,
  author       = {Florian Quinkert and
                  Martin Degeling and
                  Jim Blythe and
                  Thorsten Holz},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {Be the Phisher - Understanding Users' Perception of Malicious Domains},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {263--276},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384765},
  doi          = {10.1145/3320269.3384765},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/QuinkertDBH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DresenIPKHS20,
  author       = {Christian Dresen and
                  Fabian Ising and
                  Damian Poddebniak and
                  Tobias Kappert and
                  Thorsten Holz and
                  Sebastian Schinzel},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {{CORSICA:} Cross-Origin Web Service Identification},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {409--419},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3372196},
  doi          = {10.1145/3320269.3372196},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DresenIPKHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/UrbanGTHP20,
  author       = {Tobias Urban and
                  Matteo Gro{\ss}e{-}Kampmann and
                  Dennis Tatang and
                  Thorsten Holz and
                  Norbert Pohlmann},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12309},
  pages        = {272--291},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59013-0\_14},
  doi          = {10.1007/978-3-030-59013-0\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/UrbanGTHP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/FrankESFKH20,
  author       = {Joel Frank and
                  Thorsten Eisenhofer and
                  Lea Sch{\"{o}}nherr and
                  Asja Fischer and
                  Dorothea Kolossa and
                  Thorsten Holz},
  title        = {Leveraging Frequency Analysis for Deep Fake Image Recognition},
  booktitle    = {Proceedings of the 37th International Conference on Machine Learning,
                  {ICML} 2020, 13-18 July 2020, Virtual Event},
  series       = {Proceedings of Machine Learning Research},
  volume       = {119},
  pages        = {3247--3258},
  publisher    = {{PMLR}},
  year         = {2020},
  url          = {http://proceedings.mlr.press/v119/frank20a.html},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icml/FrankESFKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/RupprechtKHP20,
  author       = {David Rupprecht and
                  Katharina Kohls and
                  Thorsten Holz and
                  Christina P{\"{o}}pper},
  title        = {{IMP4GT:} IMPersonation Attacks in 4G NeTworks},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/imp4gt-impersonation-attacks-in-4g-networks/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/RupprechtKHP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/RytilahtiH20,
  author       = {Teemu Rytilahti and
                  Thorsten Holz},
  title        = {On Using Application-Layer Middlebox Protocols for Peeking Behind
                  {NAT} Gateways},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/on-using-application-layer-middlebox-protocols-for-peeking-behind-nat-gateways/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/RytilahtiH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SchumiloAAWH20,
  author       = {Sergej Schumilo and
                  Cornelius Aschermann and
                  Ali Abbasi and
                  Simon W{\"{o}}rner and
                  Thorsten Holz},
  title        = {{HYPER-CUBE:} High-Dimensional Hypervisor Fuzzing},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/hyper-cube-high-dimensional-hypervisor-fuzzing/},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/SchumiloAAWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AschermannSAH20,
  author       = {Cornelius Aschermann and
                  Sergej Schumilo and
                  Ali Abbasi and
                  Thorsten Holz},
  title        = {Ijon: Exploring Deep State Spaces via Fuzzing},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1597--1612},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00117},
  doi          = {10.1109/SP40000.2020.00117},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AschermannSAH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RupprechtKHP20,
  author       = {David Rupprecht and
                  Katharina Kohls and
                  Thorsten Holz and
                  Christina P{\"{o}}pper},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Call Me Maybe: Eavesdropping Encrypted {LTE} Calls With ReVoLTE},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {73--88},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/rupprecht},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RupprechtKHP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BlazytkoSAAFWH20,
  author       = {Tim Blazytko and
                  Moritz Schl{\"{o}}gel and
                  Cornelius Aschermann and
                  Ali Abbasi and
                  Joel Frank and
                  Simon W{\"{o}}rner and
                  Thorsten Holz},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {{AURORA:} Statistical Crash Analysis for Automated Root Cause Explanation},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {235--252},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/blazytko},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BlazytkoSAAFWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FrankAH20,
  author       = {Joel Frank and
                  Cornelius Aschermann and
                  Thorsten Holz},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {{ETHBMC:} {A} Bounded Model Checker for Smart Contracts},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2757--2774},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/frank},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FrankAH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/UrbanDHP20,
  author       = {Tobias Urban and
                  Martin Degeling and
                  Thorsten Holz and
                  Norbert Pohlmann},
  editor       = {Yennun Huang and
                  Irwin King and
                  Tie{-}Yan Liu and
                  Maarten van Steen},
  title        = {Beyond the Front Page: Measuring Third Party Dynamics in the Field},
  booktitle    = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020},
  pages        = {1275--1286},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3366423.3380203},
  doi          = {10.1145/3366423.3380203},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/UrbanDHP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-10248,
  author       = {Tobias Urban and
                  Martin Degeling and
                  Thorsten Holz and
                  Norbert Pohlmann},
  title        = {Beyond the Front Page: Measuring Third Party Dynamics in the Field},
  journal      = {CoRR},
  volume       = {abs/2001.10248},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.10248},
  eprinttype    = {arXiv},
  eprint       = {2001.10248},
  timestamp    = {Thu, 30 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-10248.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-08685,
  author       = {Joel Frank and
                  Thorsten Eisenhofer and
                  Lea Sch{\"{o}}nherr and
                  Asja Fischer and
                  Dorothea Kolossa and
                  Thorsten Holz},
  title        = {Leveraging Frequency Analysis for Deep Fake Image Recognition},
  journal      = {CoRR},
  volume       = {abs/2003.08685},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.08685},
  eprinttype    = {arXiv},
  eprint       = {2003.08685},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-08685.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-00939,
  author       = {Christian Dresen and
                  Fabian Ising and
                  Damian Poddebniak and
                  Tobias Kappert and
                  Thorsten Holz and
                  Sebastian Schinzel},
  title        = {{CORSICA:} Cross-Origin Web Service Identification},
  journal      = {CoRR},
  volume       = {abs/2004.00939},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.00939},
  eprinttype    = {arXiv},
  eprint       = {2004.00939},
  timestamp    = {Wed, 08 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-00939.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-02307,
  author       = {Ali Abbasi and
                  Jos Wetzels and
                  Thorsten Holz and
                  Sandro Etalle},
  title        = {Challenges in Designing Exploit Mitigations for Deeply Embedded Systems},
  journal      = {CoRR},
  volume       = {abs/2007.02307},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.02307},
  eprinttype    = {arXiv},
  eprint       = {2007.02307},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-02307.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-02308,
  author       = {Jannik Pewny and
                  Philipp Koppe and
                  Thorsten Holz},
  title        = {Steroids for DOPed Applications: {A} Compiler for Automated Data-Oriented
                  Programming},
  journal      = {CoRR},
  volume       = {abs/2007.02308},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.02308},
  eprinttype    = {arXiv},
  eprint       = {2007.02308},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-02308.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-02314,
  author       = {Behrad Garmany and
                  Martin Stoffel and
                  Robert Gawlik and
                  Thorsten Holz},
  title        = {Static Detection of Uninitialized Stack Variables in Binary Code},
  journal      = {CoRR},
  volume       = {abs/2007.02314},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.02314},
  eprinttype    = {arXiv},
  eprint       = {2007.02314},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-02314.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-02326,
  author       = {Jannik Pewny and
                  Thorsten Holz},
  title        = {EvilCoder: Automated Bug Insertion},
  journal      = {CoRR},
  volume       = {abs/2007.02326},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.02326},
  eprinttype    = {arXiv},
  eprint       = {2007.02326},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-02326.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-03302,
  author       = {Andre Pawlowski and
                  Victor van der Veen and
                  Dennis Andriesse and
                  Erik van der Kouwe and
                  Thorsten Holz and
                  Cristiano Giuffrida and
                  Herbert Bos},
  title        = {{VPS:} Excavating High-Level {C++} Constructs from Low-Level Binaries
                  to Protect Dynamic Dispatching},
  journal      = {CoRR},
  volume       = {abs/2007.03302},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.03302},
  eprinttype    = {arXiv},
  eprint       = {2007.03302},
  timestamp    = {Mon, 20 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-03302.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-03548,
  author       = {Jannik Pewny and
                  Philipp Koppe and
                  Lucas Davi and
                  Thorsten Holz},
  title        = {Breaking and Fixing Destructive Code Read Defenses},
  journal      = {CoRR},
  volume       = {abs/2007.03548},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.03548},
  eprinttype    = {arXiv},
  eprint       = {2007.03548},
  timestamp    = {Mon, 20 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-03548.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-03549,
  author       = {Benjamin Kollenda and
                  Philipp Koppe and
                  Marc Fyrbiak and
                  Christian Kison and
                  Christof Paar and
                  Thorsten Holz},
  title        = {An Exploratory Analysis of Microcode as a Building Block for System
                  Defenses},
  journal      = {CoRR},
  volume       = {abs/2007.03549},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.03549},
  eprinttype    = {arXiv},
  eprint       = {2007.03549},
  timestamp    = {Mon, 20 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-03549.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-03550,
  author       = {Robert Gawlik and
                  Philipp Koppe and
                  Benjamin Kollenda and
                  Andre Pawlowski and
                  Behrad Garmany and
                  Thorsten Holz},
  title        = {Detile: Fine-Grained Information Leak Detection in Script Engines},
  journal      = {CoRR},
  volume       = {abs/2007.03550},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.03550},
  eprinttype    = {arXiv},
  eprint       = {2007.03550},
  timestamp    = {Mon, 20 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-03550.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-04116,
  author       = {Patrick Wollgast and
                  Robert Gawlik and
                  Behrad Garmany and
                  Benjamin Kollenda and
                  Thorsten Holz},
  title        = {Automated Multi-Architectural Discovery of CFI-Resistant Code Gadgets},
  journal      = {CoRR},
  volume       = {abs/2007.04116},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.04116},
  eprinttype    = {arXiv},
  eprint       = {2007.04116},
  timestamp    = {Mon, 20 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-04116.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-00508,
  author       = {Lea Sch{\"{o}}nherr and
                  Maximilian Golla and
                  Thorsten Eisenhofer and
                  Jan Wiele and
                  Dorothea Kolossa and
                  Thorsten Holz},
  title        = {Unacceptable, where is my privacy? Exploring Accidental Triggers of
                  Smart Speakers},
  journal      = {CoRR},
  volume       = {abs/2008.00508},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.00508},
  eprinttype    = {arXiv},
  eprint       = {2008.00508},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-00508.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-10682,
  author       = {Hojjat Aghakhani and
                  Thorsten Eisenhofer and
                  Lea Sch{\"{o}}nherr and
                  Dorothea Kolossa and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{VENOMAVE:} Clean-Label Poisoning Against Speech Recognition},
  journal      = {CoRR},
  volume       = {abs/2010.10682},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.10682},
  eprinttype    = {arXiv},
  eprint       = {2010.10682},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-10682.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/UtzKHT19,
  author       = {Christine Utz and
                  Stephan Kolo{\ss}a and
                  Thorsten Holz and
                  Pierre Thielb{\"{o}}rger},
  title        = {Die {DSGVO} als internationales Vorbild?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {11},
  pages        = {700--705},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1192-5},
  doi          = {10.1007/S11623-019-1192-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/UtzKHT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/insk/DegelingULHSH19,
  author       = {Martin Degeling and
                  Christine Utz and
                  Christopher Lentzsch and
                  Henry Hosseini and
                  Florian Schaub and
                  Thorsten Holz},
  title        = {We Value Your Privacy ... Now Take Some Cookies - Measuring the GDPR's
                  Impact on Web Privacy},
  journal      = {Inform. Spektrum},
  volume       = {42},
  number       = {5},
  pages        = {345--346},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00287-019-01201-1},
  doi          = {10.1007/S00287-019-01201-1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/insk/DegelingULHSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/UrbanTHP19,
  author       = {Tobias Urban and
                  Dennis Tatang and
                  Thorsten Holz and
                  Norbert Pohlmann},
  title        = {Analyzing leakage of personal information by malware},
  journal      = {J. Comput. Secur.},
  volume       = {27},
  number       = {4},
  pages        = {459--481},
  year         = {2019},
  url          = {https://doi.org/10.3233/JCS-191287},
  doi          = {10.3233/JCS-191287},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/UrbanTHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PawlowskiVAKHGB19,
  author       = {Andre Pawlowski and
                  Victor van der Veen and
                  Dennis Andriesse and
                  Erik van der Kouwe and
                  Thorsten Holz and
                  Cristiano Giuffrida and
                  Herbert Bos},
  editor       = {David Balenson},
  title        = {{VPS:} excavating high-level {C++} constructs from low-level binaries
                  to protect dynamic dispatching},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {97--112},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359797},
  doi          = {10.1145/3359789.3359797},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PawlowskiVAKHGB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/UrbanDHP19,
  author       = {Tobias Urban and
                  Martin Degeling and
                  Thorsten Holz and
                  Norbert Pohlmann},
  editor       = {David Balenson},
  title        = {"\emph{Your hashed {IP} address: Ubuntu.}": perspectives
                  on transparency tools for online advertising},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {702--717},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359798},
  doi          = {10.1145/3359789.3359798},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/UrbanDHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/UtzDFSH19,
  author       = {Christine Utz and
                  Martin Degeling and
                  Sascha Fahl and
                  Florian Schaub and
                  Thorsten Holz},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {(Un)informed Consent: Studying {GDPR} Consent Notices in the Field},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {973--990},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354212},
  doi          = {10.1145/3319535.3354212},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/UtzDFSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/QuinkertLRKH19,
  author       = {Florian Quinkert and
                  Tobias Lauinger and
                  William K. Robertson and
                  Engin Kirda and
                  Thorsten Holz},
  title        = {It's Not what It Looks Like: Measuring Attacks and Defensive Registrations
                  of Homograph Domains},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {259--267},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802671},
  doi          = {10.1109/CNS.2019.8802671},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/QuinkertLRKH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/TatangSH19,
  author       = {Dennis Tatang and
                  Carl Richard Theodor Schneider and
                  Thorsten Holz},
  editor       = {Roberto Perdisci and
                  Cl{\'{e}}mentine Maurice and
                  Giorgio Giacinto and
                  Magnus Almgren},
  title        = {Large-Scale Analysis of Infrastructure-Leaking {DNS} Servers},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden,
                  June 19-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11543},
  pages        = {353--373},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22038-9\_17},
  doi          = {10.1007/978-3-030-22038-9\_17},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/TatangSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/TatangQH19,
  author       = {Dennis Tatang and
                  Florian Quinkert and
                  Thorsten Holz},
  title        = {Below the Radar: Spotting {DNS} Tunnels in Newly Observed Hostnames
                  in the Wild},
  booktitle    = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh,
                  PA, USA, November 13-15, 2019},
  pages        = {1--15},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eCrime47957.2019.9037595},
  doi          = {10.1109/ECRIME47957.2019.9037595},
  timestamp    = {Mon, 23 Mar 2020 18:24:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/TatangQH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrts/PaverdVBSASVSH19,
  author       = {Andrew Paverd and
                  Marcus V{\"{o}}lp and
                  Ferdinand Brasser and
                  Matthias Schunter and
                  N. Asokan and
                  Ahmad{-}Reza Sadeghi and
                  Paulo Jorge Esteves Ver{\'{\i}}ssimo and
                  Andreas Steininger and
                  Thorsten Holz},
  editor       = {Mikael Asplund and
                  Michael Paulitsch},
  title        = {Sustainable Security {\&} Safety: Challenges and Opportunities},
  booktitle    = {4th International Workshop on Security and Dependability of Critical
                  Embedded Real-Time Systems, CERTS@ECRTS 2019, July 9, 2019, Stuttgart,
                  Germany},
  series       = {OASIcs},
  volume       = {73},
  pages        = {4:1--4:13},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2019},
  url          = {https://doi.org/10.4230/OASIcs.CERTS.2019.4},
  doi          = {10.4230/OASICS.CERTS.2019.4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrts/PaverdVBSASVSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/UrbanTDHP19,
  author       = {Tobias Urban and
                  Dennis Tatang and
                  Martin Degeling and
                  Thorsten Holz and
                  Norbert Pohlmann},
  editor       = {Cristina P{\'{e}}rez{-}Sol{\`{a}} and
                  Guillermo Navarro{-}Arribas and
                  Alex Biryukov and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {A Study on Subject Data Access in Online Advertising After the {GDPR}},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2019 International Workshops, {DPM} 2019 and {CBT} 2019,
                  Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11737},
  pages        = {61--79},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31500-9\_5},
  doi          = {10.1007/978-3-030-31500-9\_5},
  timestamp    = {Mon, 05 Feb 2024 20:29:40 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/UrbanTDHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GarmanySGH19,
  author       = {Behrad Garmany and
                  Martin Stoffel and
                  Robert Gawlik and
                  Thorsten Holz},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Static Detection of Uninitialized Stack Variables in Binary Code},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  pages        = {68--87},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0\_4},
  doi          = {10.1007/978-3-030-29962-0\_4},
  timestamp    = {Mon, 05 Feb 2024 20:29:41 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/GarmanySGH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DavidssonPH19,
  author       = {Nicolai Davidsson and
                  Andre Pawlowski and
                  Thorsten Holz},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Towards Automated Application-Specific Software Stacks},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  pages        = {88--109},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0\_5},
  doi          = {10.1007/978-3-030-29962-0\_5},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DavidssonPH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CagnazzoHP19,
  author       = {Matteo Cagnazzo and
                  Thorsten Holz and
                  Norbert Pohlmann},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {GDPiRated - Stealing Personal Information On- and Offline},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  pages        = {367--386},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0\_18},
  doi          = {10.1007/978-3-030-29962-0\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CagnazzoHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/TatangSH19,
  author       = {Dennis Tatang and
                  Tim Suurland and
                  Thorsten Holz},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Weizhi Meng and
                  Steven Furnell and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Study of {DNS} Rebinding Attacks on Smart Home Devices},
  booktitle    = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS,
                  SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27,
                  2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11980},
  pages        = {391--401},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42048-2\_25},
  doi          = {10.1007/978-3-030-42048-2\_25},
  timestamp    = {Thu, 18 Feb 2021 13:46:45 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/TatangSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/AbbasiWHE19,
  author       = {Ali Abbasi and
                  Jos Wetzels and
                  Thorsten Holz and
                  Sandro Etalle},
  title        = {Challenges in Designing Exploit Mitigations for Deeply Embedded Systems},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {31--46},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00013},
  doi          = {10.1109/EUROSP.2019.00013},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/AbbasiWHE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/PewnyKH19,
  author       = {Jannik Pewny and
                  Philipp Koppe and
                  Thorsten Holz},
  title        = {{STEROIDS} for DOPed Applications: {A} Compiler for Automated Data-Oriented
                  Programming},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {111--126},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00018},
  doi          = {10.1109/EUROSP.2019.00018},
  timestamp    = {Tue, 27 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/PewnyKH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AschermannFHJST19,
  author       = {Cornelius Aschermann and
                  Tommaso Frassetto and
                  Thorsten Holz and
                  Patrick Jauernig and
                  Ahmad{-}Reza Sadeghi and
                  Daniel Teuchert},
  title        = {{NAUTILUS:} Fishing for Deep Bugs with Grammars},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/nautilus-fishing-for-deep-bugs-with-grammars/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AschermannFHJST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AschermannSBGH19,
  author       = {Cornelius Aschermann and
                  Sergej Schumilo and
                  Tim Blazytko and
                  Robert Gawlik and
                  Thorsten Holz},
  title        = {{REDQUEEN:} Fuzzing with Input-to-State Correspondence},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/redqueen-fuzzing-with-input-to-state-correspondence/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AschermannSBGH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DegelingULHSH19,
  author       = {Martin Degeling and
                  Christine Utz and
                  Christopher Lentzsch and
                  Henry Hosseini and
                  Florian Schaub and
                  Thorsten Holz},
  title        = {We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's
                  Impact on Web Privacy},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/we-value-your-privacy-now-take-some-cookies-measuring-the-gdprs-impact-on-web-privacy/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/DegelingULHSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KohlsJRHP19,
  author       = {Katharina Kohls and
                  Kai Jansen and
                  David Rupprecht and
                  Thorsten Holz and
                  Christina P{\"{o}}pper},
  title        = {On the Challenges of Geographical Avoidance for Tor},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/on-the-challenges-of-geographical-avoidance-for-tor/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/KohlsJRHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SchonherrKZHK19,
  author       = {Lea Sch{\"{o}}nherr and
                  Katharina Kohls and
                  Steffen Zeiler and
                  Thorsten Holz and
                  Dorothea Kolossa},
  title        = {Adversarial Attacks Against Automatic Speech Recognition Systems via
                  Psychoacoustic Hiding},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/adversarial-attacks-against-automatic-speech-recognition-systems-via-psychoacoustic-hiding/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SchonherrKZHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RupprechtKHP19,
  author       = {David Rupprecht and
                  Katharina Kohls and
                  Thorsten Holz and
                  Christina P{\"{o}}pper},
  title        = {Breaking {LTE} on Layer Two},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {1121--1136},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00006},
  doi          = {10.1109/SP.2019.00006},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RupprechtKHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GulerAAH19,
  author       = {Emre G{\"{u}}ler and
                  Cornelius Aschermann and
                  Ali Abbasi and
                  Thorsten Holz},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {AntiFuzz: Impeding Fuzzing Audits of Binary Executables},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1931--1947},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/guler},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GulerAAH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BlazytkoASASWH19,
  author       = {Tim Blazytko and
                  Cornelius Aschermann and
                  Moritz Schl{\"{o}}gel and
                  Ali Abbasi and
                  Sergej Schumilo and
                  Simon W{\"{o}}rner and
                  Thorsten Holz},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {{GRIMOIRE:} Synthesizing Structure while Fuzzing},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1985--2002},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/blazytko},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BlazytkoASASWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KohlsRHP19,
  author       = {Katharina Kohls and
                  David Rupprecht and
                  Thorsten Holz and
                  Christina P{\"{o}}pper},
  title        = {Lost traffic encryption: fingerprinting {LTE/4G} traffic on layer
                  two},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {249--260},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323416},
  doi          = {10.1145/3317549.3323416},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/KohlsRHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChlostaRHP19,
  author       = {Merlin Chlosta and
                  David Rupprecht and
                  Thorsten Holz and
                  Christina P{\"{o}}pper},
  title        = {{LTE} security disabled: misconfiguration in commercial networks},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {261--266},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3324927},
  doi          = {10.1145/3317549.3324927},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ChlostaRHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2019cpsspc,
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Thorsten Holz},
  title        = {Proceedings of the {ACM} Workshop on Cyber-Physical Systems Security
                  {\&} Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338499},
  doi          = {10.1145/3338499},
  isbn         = {978-1-4503-6831-5},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2019cpsspc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-08454,
  author       = {Dennis Tatang and
                  Florian Quinkert and
                  Nico Dolecki and
                  Thorsten Holz},
  title        = {A Study of Newly Observed Hostnames and {DNS} Tunneling in the Wild},
  journal      = {CoRR},
  volume       = {abs/1902.08454},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.08454},
  eprinttype    = {arXiv},
  eprint       = {1902.08454},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-08454.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-01933,
  author       = {Nicolai Davidsson and
                  Andre Pawlowski and
                  Thorsten Holz},
  title        = {Towards Automated Application-Specific Software Stacks},
  journal      = {CoRR},
  volume       = {abs/1907.01933},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.01933},
  eprinttype    = {arXiv},
  eprint       = {1907.01933},
  timestamp    = {Mon, 08 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-01933.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-01551,
  author       = {Lea Sch{\"{o}}nherr and
                  Steffen Zeiler and
                  Thorsten Holz and
                  Dorothea Kolossa},
  title        = {Robust Over-the-Air Adversarial Examples Against Automatic Speech
                  Recognition Systems},
  journal      = {CoRR},
  volume       = {abs/1908.01551},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.01551},
  eprinttype    = {arXiv},
  eprint       = {1908.01551},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-01551.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-02638,
  author       = {Christine Utz and
                  Martin Degeling and
                  Sascha Fahl and
                  Florian Schaub and
                  Thorsten Holz},
  title        = {(Un)informed Consent: Studying {GDPR} Consent Notices in the Field},
  journal      = {CoRR},
  volume       = {abs/1909.02638},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.02638},
  eprinttype    = {arXiv},
  eprint       = {1909.02638},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-02638.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00948,
  author       = {Philipp Koppe and
                  Benjamin Kollenda and
                  Marc Fyrbiak and
                  Christian Kison and
                  Robert Gawlik and
                  Christof Paar and
                  Thorsten Holz},
  title        = {Reverse Engineering x86 Processor Microcode},
  journal      = {CoRR},
  volume       = {abs/1910.00948},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00948},
  eprinttype    = {arXiv},
  eprint       = {1910.00948},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00948.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/RupprechtDHWP18,
  author       = {David Rupprecht and
                  Adrian Dabrowski and
                  Thorsten Holz and
                  Edgar R. Weippl and
                  Christina P{\"{o}}pper},
  title        = {On Security Research Towards Future Mobile Network Generations},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {20},
  number       = {3},
  pages        = {2518--2542},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMST.2018.2820728},
  doi          = {10.1109/COMST.2018.2820728},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/RupprechtDHWP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GarmanySGKBH18,
  author       = {Behrad Garmany and
                  Martin Stoffel and
                  Robert Gawlik and
                  Philipp Koppe and
                  Tim Blazytko and
                  Thorsten Holz},
  title        = {Towards Automated Generation of Exploitation Primitives for Web Browsers},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {300--312},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274723},
  doi          = {10.1145/3274694.3274723},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GarmanySGKBH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KollendaKFKPH18,
  author       = {Benjamin Kollenda and
                  Philipp Koppe and
                  Marc Fyrbiak and
                  Christian Kison and
                  Christof Paar and
                  Thorsten Holz},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {An Exploratory Analysis of Microcode as a Building Block for System
                  Defenses},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1649--1666},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243861},
  doi          = {10.1145/3243734.3243861},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KollendaKFKPH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/HupperichTWH18,
  author       = {Thomas Hupperich and
                  Dennis Tatang and
                  Nicolai Wilkop and
                  Thorsten Holz},
  editor       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Ram Krishnan and
                  Gabriel Ghinita},
  title        = {An Empirical Study on Online Price Differentiation},
  booktitle    = {Proceedings of the Eighth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {76--83},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3176258.3176338},
  doi          = {10.1145/3176258.3176338},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/HupperichTWH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/ContagGPH18,
  author       = {Moritz Contag and
                  Robert Gawlik and
                  Andre Pawlowski and
                  Thorsten Holz},
  editor       = {Cristiano Giuffrida and
                  S{\'{e}}bastien Bardin and
                  Gregory Blanc},
  title        = {On the Weaknesses of Function Table Randomization},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 15th International Conference, {DIMVA} 2018, Saclay, France, June
                  28-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10885},
  pages        = {185--207},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93411-2\_9},
  doi          = {10.1007/978-3-319-93411-2\_9},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/ContagGPH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/UrbanTHP18,
  author       = {Tobias Urban and
                  Dennis Tatang and
                  Thorsten Holz and
                  Norbert Pohlmann},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Towards Understanding Privacy Implications of Adware and Potentially
                  Unwanted Programs},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {449--469},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_22},
  doi          = {10.1007/978-3-319-99073-6\_22},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/UrbanTHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/RytilahtiTKH18,
  author       = {Teemu Rytilahti and
                  Dennis Tatang and
                  Janosch Kopper and
                  Thorsten Holz},
  title        = {Masters of Time: An Overview of the {NTP} Ecosystem},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {122--136},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00017},
  doi          = {10.1109/EUROSP.2018.00017},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/RytilahtiTKH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/GoktasKKBPHBG18,
  author       = {Enes G{\"{o}}ktas and
                  Benjamin Kollenda and
                  Philipp Koppe and
                  Erik Bosman and
                  Georgios Portokalidis and
                  Thorsten Holz and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {Position-Independent Code Reuse: On the Effectiveness of {ASLR} in
                  the Absence of Information Disclosure},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {227--242},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00024},
  doi          = {10.1109/EUROSP.2018.00024},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/GoktasKKBPHBG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/RopkeH18,
  author       = {Christian R{\"{o}}pke and
                  Thorsten Holz},
  title        = {Preventing Malicious {SDN} Applications From Hiding Adverse Network
                  Manipulations},
  booktitle    = {Proceedings of the 2018 Workshop on Security in Softwarized Networks:
                  Prospects and Challenges, SecSoN@SIGCOMM 2018, Budapest, Hungary,
                  August 24, 2018},
  pages        = {40--45},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3229616.3229620},
  doi          = {10.1145/3229616.3229620},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/RopkeH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/CagnazzoHHP18,
  author       = {Matteo Cagnazzo and
                  Markus Hertlein and
                  Thorsten Holz and
                  Norbert Pohlmann},
  title        = {Threat modeling for mobile health systems},
  booktitle    = {2018 {IEEE} Wireless Communications and Networking Conference Workshops,
                  {WCNC} 2018 Workshops, Barcelona, Spain, April 15-18, 2018},
  pages        = {314--319},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WCNCW.2018.8369033},
  doi          = {10.1109/WCNCW.2018.8369033},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/CagnazzoHHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/GawlikH18,
  author       = {Robert Gawlik and
                  Thorsten Holz},
  editor       = {Christian Rossow and
                  Yves Younan},
  title        = {SoK: Make JIT-Spray Great Again},
  booktitle    = {12th {USENIX} Workshop on Offensive Technologies, {WOOT} 2018, Baltimore,
                  MD, USA, August 13-14, 2018},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/woot18/presentation/gawlik},
  timestamp    = {Mon, 01 Feb 2021 08:41:54 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/GawlikH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/mc/18/SchusterH18,
  author       = {Felix Schuster and
                  Thorsten Holz},
  editor       = {Per Larsen and
                  Ahmad{-}Reza Sadeghi},
  title        = {Attacking dynamic code},
  booktitle    = {The Continuing Arms Race: Code-Reuse Attacks and Defenses},
  pages        = {139--180},
  publisher    = {{ACM} / Morgan {\&} Claypool},
  year         = {2018},
  url          = {https://doi.org/10.1145/3129743.3129750},
  doi          = {10.1145/3129743.3129750},
  timestamp    = {Thu, 27 Jun 2019 20:19:31 +0200},
  biburl       = {https://dblp.org/rec/books/mc/18/SchusterH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2018,
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5},
  doi          = {10.1007/978-3-030-00470-5},
  isbn         = {978-3-030-00469-9},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-01598,
  author       = {Florian Quinkert and
                  Thorsten Holz and
                  K. S. M. Tozammel Hossain and
                  Emilio Ferrara and
                  Kristina Lerman},
  title        = {{RAPTOR:} Ransomware Attack PredicTOR},
  journal      = {CoRR},
  volume       = {abs/1803.01598},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.01598},
  eprinttype    = {arXiv},
  eprint       = {1803.01598},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-01598.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-05096,
  author       = {Martin Degeling and
                  Christine Utz and
                  Christopher Lentzsch and
                  Henry Hosseini and
                  Florian Schaub and
                  Thorsten Holz},
  title        = {We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's
                  Impact on Web Privacy},
  journal      = {CoRR},
  volume       = {abs/1808.05096},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.05096},
  eprinttype    = {arXiv},
  eprint       = {1808.05096},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-05096.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-05665,
  author       = {Lea Sch{\"{o}}nherr and
                  Katharina Kohls and
                  Steffen Zeiler and
                  Thorsten Holz and
                  Dorothea Kolossa},
  title        = {Adversarial Attacks Against Automatic Speech Recognition Systems via
                  Psychoacoustic Hiding},
  journal      = {CoRR},
  volume       = {abs/1808.05665},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.05665},
  eprinttype    = {arXiv},
  eprint       = {1808.05665},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-05665.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-08660,
  author       = {Tobias Urban and
                  Dennis Tatang and
                  Martin Degeling and
                  Thorsten Holz and
                  Norbert Pohlmann},
  title        = {The Unwanted Sharing Economy: An Analysis of Cookie Syncing and User
                  Transparency under {GDPR}},
  journal      = {CoRR},
  volume       = {abs/1811.08660},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.08660},
  eprinttype    = {arXiv},
  eprint       = {1811.08660},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-08660.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/KrombholzHH17,
  author       = {Katharina Krombholz and
                  Thomas Hupperich and
                  Thorsten Holz},
  title        = {May the Force Be with You: The Future of Force-Sensitive Authentication},
  journal      = {{IEEE} Internet Comput.},
  volume       = {21},
  number       = {3},
  pages        = {64--69},
  year         = {2017},
  url          = {https://doi.org/10.1109/MIC.2017.78},
  doi          = {10.1109/MIC.2017.78},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/internet/KrombholzHH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/PewnyGGRH17,
  author       = {Jannik Pewny and
                  Behrad Garmany and
                  Robert Gawlik and
                  Christian Rossow and
                  Thorsten Holz},
  title        = {Cross-architecture bug search in binary executables},
  journal      = {it Inf. Technol.},
  volume       = {59},
  number       = {2},
  pages        = {83},
  year         = {2017},
  url          = {https://doi.org/10.1515/itit-2016-0040},
  doi          = {10.1515/ITIT-2016-0040},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/it/PewnyGGRH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MeutznerGNHK17,
  author       = {Hendrik Meutzner and
                  Santosh Gupta and
                  Viet{-}Hung Nguyen and
                  Thorsten Holz and
                  Dorothea Kolossa},
  title        = {Toward Improved Audio CAPTCHAs Based on Auditory Perception and Language
                  Understanding},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {10:1--10:31},
  year         = {2017},
  url          = {https://doi.org/10.1145/2856820},
  doi          = {10.1145/2856820},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MeutznerGNHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PewnyKDH17,
  author       = {Jannik Pewny and
                  Philipp Koppe and
                  Lucas Davi and
                  Thorsten Holz},
  title        = {Breaking and Fixing Destructive Code Read Defenses},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {55--67},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134626},
  doi          = {10.1145/3134600.3134626},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PewnyKDH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AbbasiHZE17,
  author       = {Ali Abbasi and
                  Thorsten Holz and
                  Emmanuele Zambon and
                  Sandro Etalle},
  title        = {{ECFI:} Asynchronous Control Flow Integrity for Programmable Logic
                  Controllers},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {437--448},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134618},
  doi          = {10.1145/3134600.3134618},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AbbasiHZE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/KollendaGBKGKGB17,
  author       = {Benjamin Kollenda and
                  Enes G{\"{o}}ktas and
                  Tim Blazytko and
                  Philipp Koppe and
                  Robert Gawlik and
                  Radhesh Krishnan Konoth and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Thorsten Holz},
  title        = {Towards Automated Discovery of Crash-Resistant Primitives in Binary
                  Executables},
  booktitle    = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017},
  pages        = {189--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSN.2017.58},
  doi          = {10.1109/DSN.2017.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/KollendaGBKGKGB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PawlowskiCVOHBA17,
  author       = {Andre Pawlowski and
                  Moritz Contag and
                  Victor van der Veen and
                  Chris Ouwehand and
                  Thorsten Holz and
                  Herbert Bos and
                  Elias Athanasopoulos and
                  Cristiano Giuffrida},
  title        = {{MARX:} Uncovering Class Hierarchies in {C++} Programs},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/marx-uncovering-class-hierarchies-c-programs/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/PawlowskiCVOHBA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfvsdn/TatangQFRH17,
  author       = {Dennis Tatang and
                  Florian Quinkert and
                  Joel Frank and
                  Christian R{\"{o}}pke and
                  Thorsten Holz},
  title        = {SDN-Guard: Protecting {SDN} controllers against {SDN} rootkits},
  booktitle    = {2017 {IEEE} Conference on Network Function Virtualization and Software
                  Defined Networks, {NFV-SDN} 2017, Berlin, Germany, November 6-8, 2017},
  pages        = {297--302},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/NFV-SDN.2017.8169856},
  doi          = {10.1109/NFV-SDN.2017.8169856},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/nfvsdn/TatangQFRH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ContagLPDLHS17,
  author       = {Moritz Contag and
                  Vector Guo Li and
                  Andre Pawlowski and
                  Felix Domke and
                  Kirill Levchenko and
                  Thorsten Holz and
                  Stefan Savage},
  title        = {How They Did It: An Analysis of Emission Defeat Devices in Modern
                  Automobiles},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {231--250},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.66},
  doi          = {10.1109/SP.2017.66},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ContagLPDLHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SchumiloAGSH17,
  author       = {Sergej Schumilo and
                  Cornelius Aschermann and
                  Robert Gawlik and
                  Sebastian Schinzel and
                  Thorsten Holz},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {kAFL: Hardware-Assisted Feedback Fuzzing for {OS} Kernels},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {167--182},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/schumilo},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SchumiloAGSH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BlazytkoCAH17,
  author       = {Tim Blazytko and
                  Moritz Contag and
                  Cornelius Aschermann and
                  Thorsten Holz},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Syntia: Synthesizing the Semantics of Obfuscated Code},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {643--659},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/blazytko},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BlazytkoCAH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KoppeKFKGPH17,
  author       = {Philipp Koppe and
                  Benjamin Kollenda and
                  Marc Fyrbiak and
                  Christian Kison and
                  Robert Gawlik and
                  Christof Paar and
                  Thorsten Holz},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Reverse Engineering x86 Processor Microcode},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1163--1180},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/koppe},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KoppeKFKGPH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-08932,
  author       = {David Rupprecht and
                  Adrian Dabrowski and
                  Thorsten Holz and
                  Edgar R. Weippl and
                  Christina P{\"{o}}pper},
  title        = {On Security Research towards Future Mobile Network Generations},
  journal      = {CoRR},
  volume       = {abs/1710.08932},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.08932},
  eprinttype    = {arXiv},
  eprint       = {1710.08932},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-08932.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-03031,
  author       = {Thomas Hupperich and
                  Dennis Tatang and
                  Nicolai Wilkop and
                  Thorsten Holz},
  title        = {An Empirical Study on Price Differentiation Based on System Fingerprints},
  journal      = {CoRR},
  volume       = {abs/1712.03031},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.03031},
  eprinttype    = {arXiv},
  eprint       = {1712.03031},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-03031.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/RopkeH16,
  author       = {Christian R{\"{o}}pke and
                  Thorsten Holz},
  title        = {On network operating system security},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {1},
  pages        = {6--24},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1918},
  doi          = {10.1002/NEM.1918},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/RopkeH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PewnyH16,
  author       = {Jannik Pewny and
                  Thorsten Holz},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {EvilCoder: automated bug insertion},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {214--225},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991103},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PewnyH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KohlsHKP16,
  author       = {Katharina Kohls and
                  Thorsten Holz and
                  Dorothea Kolossa and
                  Christina P{\"{o}}pper},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {SkypeLine: Robust Hidden Data Transmission for VoIP},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {877--888},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897913},
  doi          = {10.1145/2897845.2897913},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KohlsHKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/HoffmannRMWGH16,
  author       = {Johannes Hoffmann and
                  Teemu Rytilahti and
                  Davide Maiorca and
                  Marcel Winandy and
                  Giorgio Giacinto and
                  Thorsten Holz},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Evaluating Analysis Tools for Android Apps: Status Quo and Robustness
                  Against Obfuscation},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {139--141},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857737},
  doi          = {10.1145/2857705.2857737},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/HoffmannRMWGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/PawlowskiCH16,
  author       = {Andre Pawlowski and
                  Moritz Contag and
                  Thorsten Holz},
  editor       = {Juan Caballero and
                  Urko Zurutuza and
                  Ricardo J. Rodr{\'{\i}}guez},
  title        = {Probfuscation: An Obfuscation Approach Using Probabilistic Control
                  Flows},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n,
                  Spain, July 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9721},
  pages        = {165--185},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40667-1\_9},
  doi          = {10.1007/978-3-319-40667-1\_9},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/PawlowskiCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/GawlikKKPGH16,
  author       = {Robert Gawlik and
                  Philipp Koppe and
                  Benjamin Kollenda and
                  Andre Pawlowski and
                  Behrad Garmany and
                  Thorsten Holz},
  editor       = {Juan Caballero and
                  Urko Zurutuza and
                  Ricardo J. Rodr{\'{\i}}guez},
  title        = {Detile: Fine-Grained Information Leak Detection in Script Engines},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n,
                  Spain, July 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9721},
  pages        = {322--342},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40667-1\_16},
  doi          = {10.1007/978-3-319-40667-1\_16},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/GawlikKKPGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/HupperichHH16,
  author       = {Thomas Hupperich and
                  Henry Hosseini and
                  Thorsten Holz},
  editor       = {Juan Caballero and
                  Urko Zurutuza and
                  Ricardo J. Rodr{\'{\i}}guez},
  title        = {Leveraging Sensor Fingerprinting for Mobile Device Authentication},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n,
                  Spain, July 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9721},
  pages        = {377--396},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40667-1\_19},
  doi          = {10.1007/978-3-319-40667-1\_19},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/HupperichHH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WollgastGGKH16,
  author       = {Patrick Wollgast and
                  Robert Gawlik and
                  Behrad Garmany and
                  Benjamin Kollenda and
                  Thorsten Holz},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9878},
  pages        = {602--620},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45744-4\_30},
  doi          = {10.1007/978-3-319-45744-4\_30},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WollgastGGKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/FroschMBBSH16,
  author       = {Tilman Frosch and
                  Christian Mainka and
                  Christoph Bader and
                  Florian Bergsma and
                  J{\"{o}}rg Schwenk and
                  Thorsten Holz},
  title        = {How Secure is TextSecure?},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages        = {457--472},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EuroSP.2016.41},
  doi          = {10.1109/EUROSP.2016.41},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/FroschMBBSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GawlikKKGH16,
  author       = {Robert Gawlik and
                  Benjamin Kollenda and
                  Philipp Koppe and
                  Behrad Garmany and
                  Thorsten Holz},
  title        = {Enabling Client-Side Crash-Resistance to Overcome Diversification
                  and Information Hiding},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/enabling-client-side-crash-resistance-overcome-diversification-information-hiding.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/GawlikKKGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/0001HRRSS16,
  author       = {Michael Backes and
                  Thorsten Holz and
                  Christian Rossow and
                  Teemu Rytilahti and
                  Milivoj Simeonovski and
                  Ben Stock},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {On the Feasibility of TTL-Based Filtering for DRDoS Mitigation},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {303--322},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_14},
  doi          = {10.1007/978-3-319-45719-2\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/0001HRRSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/KrombholzHH16,
  author       = {Katharina Krombholz and
                  Thomas Hupperich and
                  Thorsten Holz},
  title        = {Use the Force: Evaluating Force-Sensitive Authentication for Mobile
                  Devices},
  booktitle    = {Twelfth Symposium on Usable Privacy and Security, {SOUPS} 2016, Denver,
                  CO, USA, June 22-24, 2016},
  pages        = {207--219},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/soups2016/technical-sessions/presentation/krombholz},
  timestamp    = {Thu, 04 Aug 2016 15:59:03 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/KrombholzHH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/VeenGCPCRBHAG16,
  author       = {Victor van der Veen and
                  Enes G{\"{o}}ktas and
                  Moritz Contag and
                  Andre Pawlowski and
                  Xi Chen and
                  Sanjay Rawat and
                  Herbert Bos and
                  Thorsten Holz and
                  Elias Athanasopoulos and
                  Cristiano Giuffrida},
  title        = {A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary
                  Level},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {934--953},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.60},
  doi          = {10.1109/SP.2016.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/VeenGCPCRBHAG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/HupperichKH16,
  author       = {Thomas Hupperich and
                  Katharina Krombholz and
                  Thorsten Holz},
  editor       = {Michael Franz and
                  Panos Papadimitratos},
  title        = {Sensor Captchas: On the Usability of Instrumenting Hardware Sensors
                  to Prove Liveliness},
  booktitle    = {Trust and Trustworthy Computing - 9th International Conference, {TRUST}
                  2016, Vienna, Austria, August 29-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9824},
  pages        = {40--59},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45572-3\_3},
  doi          = {10.1007/978-3-319-45572-3\_3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/HupperichKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/LettnerKHLSDSHF16,
  author       = {Julian Lettner and
                  Benjamin Kollenda and
                  Andrei Homescu and
                  Per Larsen and
                  Felix Schuster and
                  Lucas Davi and
                  Ahmad{-}Reza Sadeghi and
                  Thorsten Holz and
                  Michael Franz},
  editor       = {Ajay Gulati and
                  Hakim Weatherspoon},
  title        = {Subversive-C: Abusing and Protecting Dynamic Message Dispatch},
  booktitle    = {2016 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2016, Denver,
                  CO, USA, June 22-24, 2016},
  pages        = {209--221},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/atc16/technical-sessions/presentation/lettner},
  timestamp    = {Mon, 01 Feb 2021 17:03:06 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/LettnerKHLSDSHF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/StarovDAHN16,
  author       = {Oleksii Starov and
                  Johannes Dahse and
                  Syed Sharique Ahmad and
                  Thorsten Holz and
                  Nick Nikiforakis},
  editor       = {Jacqueline Bourdeau and
                  Jim Hendler and
                  Roger Nkambou and
                  Ian Horrocks and
                  Ben Y. Zhao},
  title        = {No Honor Among Thieves: {A} Large-Scale Analysis of Malicious Web
                  Shells},
  booktitle    = {Proceedings of the 25th International Conference on World Wide Web,
                  {WWW} 2016, Montreal, Canada, April 11 - 15, 2016},
  pages        = {1021--1032},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2872427.2882992},
  doi          = {10.1145/2872427.2882992},
  timestamp    = {Tue, 12 Apr 2022 14:46:29 +0200},
  biburl       = {https://dblp.org/rec/conf/www/StarovDAHN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2016,
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HupperichMKHG15,
  author       = {Thomas Hupperich and
                  Davide Maiorca and
                  Marc K{\"{u}}hrer and
                  Thorsten Holz and
                  Giorgio Giacinto},
  title        = {On the Robustness of Mobile Device Fingerprinting: Can Mobile Users
                  Escape Modern Web-Tracking Mechanisms?},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {191--200},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818032},
  doi          = {10.1145/2818000.2818032},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HupperichMKHG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CraneVSLLDSHSF15,
  author       = {Stephen J. Crane and
                  Stijn Volckaert and
                  Felix Schuster and
                  Christopher Liebchen and
                  Per Larsen and
                  Lucas Davi and
                  Ahmad{-}Reza Sadeghi and
                  Thorsten Holz and
                  Bjorn De Sutter and
                  Michael Franz},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {It's a TRaP: Table Randomization and Protection against Function-Reuse
                  Attacks},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {243--255},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813682},
  doi          = {10.1145/2810103.2813682},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CraneVSLLDSHSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/UellenbeckHWH15,
  author       = {Sebastian Uellenbeck and
                  Thomas Hupperich and
                  Christopher Wolf and
                  Thorsten Holz},
  editor       = {Rainer B{\"{o}}hme and
                  Tatsuaki Okamoto},
  title        = {Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones},
  booktitle    = {Financial Cryptography and Data Security - 19th International Conference,
                  {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8975},
  pages        = {237--253},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47854-7\_15},
  doi          = {10.1007/978-3-662-47854-7\_15},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/UellenbeckHWH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KuhrerHBRH15,
  author       = {Marc K{\"{u}}hrer and
                  Thomas Hupperich and
                  Jonas Bushart and
                  Christian Rossow and
                  Thorsten Holz},
  editor       = {Kenjiro Cho and
                  Kensuke Fukuda and
                  Vivek S. Pai and
                  Neil Spring},
  title        = {Going Wild: Large-Scale Classification of Open {DNS} Resolvers},
  booktitle    = {Proceedings of the 2015 {ACM} Internet Measurement Conference, {IMC}
                  2015, Tokyo, Japan, October 28-30, 2015},
  pages        = {355--368},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2815675.2815683},
  doi          = {10.1145/2815675.2815683},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/KuhrerHBRH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/DahseH15,
  author       = {Johannes Dahse and
                  Thorsten Holz},
  editor       = {Michal Young and
                  Tao Xie},
  title        = {Experience report: an empirical study of {PHP} security mechanism
                  usage},
  booktitle    = {Proceedings of the 2015 International Symposium on Software Testing
                  and Analysis, {ISSTA} 2015, Baltimore, MD, USA, July 12-17, 2015},
  pages        = {60--70},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2771783.2771787},
  doi          = {10.1145/2771783.2771787},
  timestamp    = {Fri, 05 Nov 2021 10:54:23 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/DahseH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kivs/RopkeH15,
  author       = {Christian R{\"{o}}pke and
                  Thorsten Holz},
  title        = {Retaining control over {SDN} network services},
  booktitle    = {2015 International Conference and Workshops on Networked Systems,
                  NetSys 2015, Cottbus, Germany, March 9-12, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/NetSys.2015.7089082},
  doi          = {10.1109/NETSYS.2015.7089082},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kivs/RopkeH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/JagerRAH15,
  author       = {Bernd J{\"{a}}ger and
                  Christian R{\"{o}}pke and
                  Iris Adam and
                  Thorsten Holz},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {Multi-layer Access Control for SDN-Based Telco Clouds},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {197--204},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_14},
  doi          = {10.1007/978-3-319-26502-5\_14},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/JagerRAH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ZarrasPIH15,
  author       = {Apostolis Zarras and
                  Antonis Papadogiannakis and
                  Sotiris Ioannidis and
                  Thorsten Holz},
  editor       = {Ali A. Ghorbani and
                  Vicen{\c{c}} Torra and
                  H{\"{u}}seyin Hisil and
                  Ali Miri and
                  Ahmet Koltuksuz and
                  Jie Zhang and
                  Murat Sensoy and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Ibrahim Zincir},
  title        = {Revealing the relationship network behind link spam},
  booktitle    = {13th Annual Conference on Privacy, Security and Trust, {PST} 2015,
                  Izmir, Turkey, July 21-23, 2015},
  pages        = {101--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/PST.2015.7232960},
  doi          = {10.1109/PST.2015.7232960},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ZarrasPIH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RopkeH15,
  author       = {Christian R{\"{o}}pke and
                  Thorsten Holz},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {{SDN} Rootkits: Subverting Network Operating Systems of Software-Defined
                  Networks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {339--356},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_16},
  doi          = {10.1007/978-3-319-26362-5\_16},
  timestamp    = {Sun, 25 Oct 2020 22:56:09 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/RopkeH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WeisserDH15,
  author       = {Dario Wei{\ss}er and
                  Johannes Dahse and
                  Thorsten Holz},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Security Analysis of {PHP} Bytecode Protection Mechanisms},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {493--514},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_23},
  doi          = {10.1007/978-3-319-26362-5\_23},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WeisserDH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PewnyGGRH15,
  author       = {Jannik Pewny and
                  Behrad Garmany and
                  Robert Gawlik and
                  Christian Rossow and
                  Thorsten Holz},
  title        = {Cross-Architecture Bug Search in Binary Executables},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {709--724},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.49},
  doi          = {10.1109/SP.2015.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/PewnyGGRH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SchusterTLDSH15,
  author       = {Felix Schuster and
                  Thomas Tendyck and
                  Christopher Liebchen and
                  Lucas Davi and
                  Ahmad{-}Reza Sadeghi and
                  Thorsten Holz},
  title        = {Counterfeit Object-oriented Programming: On the Difficulty of Preventing
                  Code Reuse Attacks in {C++} Applications},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {745--762},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.51},
  doi          = {10.1109/SP.2015.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SchusterTLDSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2015,
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HeiderichNSHS14,
  author       = {Mario Heiderich and
                  Marcus Niemietz and
                  Felix Schuster and
                  Thorsten Holz and
                  J{\"{o}}rg Schwenk},
  title        = {Scriptless attacks: Stealing more pie without touching the sill},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {567--599},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-130494},
  doi          = {10.3233/JCS-130494},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HeiderichNSHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MeutznerNHK14,
  author       = {Hendrik Meutzner and
                  Viet{-}Hung Nguyen and
                  Thorsten Holz and
                  Dorothea Kolossa},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Using automatic speech recognition for attacking acoustic CAPTCHAs:
                  the trade-off between usability and security},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {276--285},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664262},
  doi          = {10.1145/2664243.2664262},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MeutznerNHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GawlikH14,
  author       = {Robert Gawlik and
                  Thorsten Holz},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Towards automated integrity protection of {C++} virtual function tables
                  in binary programs},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {396--405},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664249},
  doi          = {10.1145/2664243.2664249},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GawlikH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PewnySBHR14,
  author       = {Jannik Pewny and
                  Felix Schuster and
                  Lukas Bernhard and
                  Thorsten Holz and
                  Christian Rossow},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Leveraging semantic signatures for bug search in binary programs},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {406--415},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664269},
  doi          = {10.1145/2664243.2664269},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PewnySBHR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DahseKH14,
  author       = {Johannes Dahse and
                  Nikolai Krein and
                  Thorsten Holz},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Code Reuse Attacks in {PHP:} Automated {POP} Chain Generation},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {42--53},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660363},
  doi          = {10.1145/2660267.2660363},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DahseKH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesHKKNP14,
  author       = {Michael Backes and
                  Thorsten Holz and
                  Benjamin Kollenda and
                  Philipp Koppe and
                  Stefan N{\"{u}}rnberger and
                  Jannik Pewny},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {You Can Run but You Can't Read: Preventing Disclosure Exploits in
                  Executable Code},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1342--1353},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660378},
  doi          = {10.1145/2660267.2660378},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesHKKNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/ZarrasKSHKV14,
  author       = {Apostolis Zarras and
                  Alexandros Kapravelos and
                  Gianluca Stringhini and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Carey Williamson and
                  Aditya Akella and
                  Nina Taft},
  title        = {The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements},
  booktitle    = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
                  Vancouver, BC, Canada, November 5-7, 2014},
  pages        = {373--380},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663716.2663719},
  doi          = {10.1145/2663716.2663719},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/ZarrasKSHKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DahseH14,
  author       = {Johannes Dahse and
                  Thorsten Holz},
  title        = {Simulation of Built-in {PHP} Features for Precise Static Code Analysis},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/simulation-built-php-features-precise-static-code-analysis},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/DahseH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ZarrasPGH14,
  author       = {Apostolis Zarras and
                  Antonis Papadogiannakis and
                  Robert Gawlik and
                  Thorsten Holz},
  editor       = {Ali Miri and
                  Urs Hengartner and
                  Nen{-}Fu Huang and
                  Audun J{\o}sang and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Automated generation of models for fast and precise detection of HTTP-based
                  malware},
  booktitle    = {2014 Twelfth Annual International Conference on Privacy, Security
                  and Trust, Toronto, ON, Canada, July 23-24, 2014},
  pages        = {249--256},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PST.2014.6890946},
  doi          = {10.1109/PST.2014.6890946},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ZarrasPGH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KuhrerRH14,
  author       = {Marc K{\"{u}}hrer and
                  Christian Rossow and
                  Thorsten Holz},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Paint It Black: Evaluating the Effectiveness of Malware Blacklists},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_1},
  doi          = {10.1007/978-3-319-11379-1\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KuhrerRH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SchusterTPMSCH14,
  author       = {Felix Schuster and
                  Thomas Tendyck and
                  Jannik Pewny and
                  Andreas Maa{\ss} and
                  Martin Steegmanns and
                  Moritz Contag and
                  Thorsten Holz},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Evaluating the Effectiveness of Current Anti-ROP Defenses},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {88--108},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_5},
  doi          = {10.1007/978-3-319-11379-1\_5},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SchusterTPMSCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/AltiokUH14,
  author       = {Irfan Altiok and
                  Sebastian Uellenbeck and
                  Thorsten Holz},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {GraphNeighbors: Hampering Shoulder-Surfing Attacks on Smartphones},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {25--35},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20057},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/AltiokUH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/KuhrerHH14,
  author       = {Marc K{\"{u}}hrer and
                  Johannes Hoffmann and
                  Thorsten Holz},
  editor       = {Pascal Felber and
                  Vijay K. Garg},
  title        = {CloudSylla: Detecting Suspicious System Calls in the Cloud},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems - 16th
                  International Symposium, {SSS} 2014, Paderborn, Germany, September
                  28 - October 1, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8756},
  pages        = {63--77},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11764-5\_5},
  doi          = {10.1007/978-3-319-11764-5\_5},
  timestamp    = {Mon, 15 Jun 2020 17:02:54 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/KuhrerHH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KuhrerHRH14,
  author       = {Marc K{\"{u}}hrer and
                  Thomas Hupperich and
                  Christian Rossow and
                  Thorsten Holz},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Exit from Hell? Reducing the Impact of Amplification DDoS Attacks},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {111--125},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kuhrer},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KuhrerHRH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/VoglGGKPEH14,
  author       = {Sebastian Vogl and
                  Robert Gawlik and
                  Behrad Garmany and
                  Thomas Kittel and
                  Jonas Pfoh and
                  Claudia Eckert and
                  Thorsten Holz},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {813--828},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/vogl},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/VoglGGKPEH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DahseH14,
  author       = {Johannes Dahse and
                  Thorsten Holz},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Static Detection of Second-Order Vulnerabilities in Web Applications},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {989--1003},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/dahse},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DahseH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/KuhrerHRH14,
  author       = {Marc K{\"{u}}hrer and
                  Thomas Hupperich and
                  Christian Rossow and
                  Thorsten Holz},
  editor       = {Sergey Bratus and
                  Felix "FX" Lindner},
  title        = {Hell of a Handshake: Abusing {TCP} for Reflective Amplification DDoS
                  Attacks},
  booktitle    = {8th {USENIX} Workshop on Offensive Technologies, {WOOT} '14, San Diego,
                  CA, USA, August 19, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/woot14/workshop-program/presentation/kuhrer},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/KuhrerHRH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2014,
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7},
  doi          = {10.1007/978-3-319-08593-7},
  isbn         = {978-3-319-08592-0},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FroschMBBSH14,
  author       = {Tilman Frosch and
                  Christian Mainka and
                  Christoph Bader and
                  Florian Bergsma and
                  J{\"{o}}rg Schwenk and
                  Thorsten Holz},
  title        = {How Secure is TextSecure?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {904},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/904},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FroschMBBSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/esl/DardanelliMTZSKH13,
  author       = {Andrea Dardanelli and
                  Federico Maggi and
                  Mara Tanelli and
                  Stefano Zanero and
                  Sergio M. Savaresi and
                  R. Kochanek and
                  Thorsten Holz},
  title        = {A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth},
  journal      = {{IEEE} Embed. Syst. Lett.},
  volume       = {5},
  number       = {3},
  pages        = {34--37},
  year         = {2013},
  url          = {https://doi.org/10.1109/LES.2013.2264594},
  doi          = {10.1109/LES.2013.2264594},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/esl/DardanelliMTZSKH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DriessenHWPH13,
  author       = {Benedikt Driessen and
                  Ralf Hund and
                  Carsten Willems and
                  Christof Paar and
                  Thorsten Holz},
  title        = {An experimental security analysis of two satphone standards},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {10},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535522},
  doi          = {10.1145/2535522},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DriessenHWPH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PapadopoulosPPZHM13,
  author       = {Panagiotis Papadopoulos and
                  Antonis Papadogiannakis and
                  Michalis Polychronakis and
                  Apostolis Zarras and
                  Thorsten Holz and
                  Evangelos P. Markatos},
  editor       = {Charles N. Payne Jr.},
  title        = {k-subscription: privacy-preserving microblogging browsing through
                  obfuscation},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {49--58},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523671},
  doi          = {10.1145/2523649.2523671},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PapadopoulosPPZHM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PewnyH13,
  author       = {Jannik Pewny and
                  Thorsten Holz},
  editor       = {Charles N. Payne Jr.},
  title        = {Control-flow restrictor: compiler-based {CFI} for iOS},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {309--318},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523674},
  doi          = {10.1145/2523649.2523674},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PewnyH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WerthmannHDSH13,
  author       = {Tim Werthmann and
                  Ralf Hund and
                  Lucas Davi and
                  Ahmad{-}Reza Sadeghi and
                  Thorsten Holz},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {PSiOS: bring your own privacy {\&} security to iOS devices},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484316},
  doi          = {10.1145/2484313.2484316},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WerthmannHDSH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/UellenbeckDWH13,
  author       = {Sebastian Uellenbeck and
                  Markus D{\"{u}}rmuth and
                  Christopher Wolf and
                  Thorsten Holz},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Quantifying the security of graphical passwords: the case of android
                  unlock patterns},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {161--172},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516700},
  doi          = {10.1145/2508859.2516700},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/UellenbeckDWH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchusterH13,
  author       = {Felix Schuster and
                  Thorsten Holz},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Towards reducing the attack surface of software backdoors},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {851--862},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516716},
  doi          = {10.1145/2508859.2516716},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchusterH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/SchusterRH13,
  author       = {Felix Schuster and
                  Stefan R{\"{u}}ster and
                  Thorsten Holz},
  editor       = {Konrad Rieck and
                  Patrick Stewin and
                  Jean{-}Pierre Seifert},
  title        = {Preventing Backdoors in Server Applications with a Separated Software
                  Architecture - (Short Paper)},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 10th International Conference, {DIMVA} 2013, Berlin, Germany, July
                  18-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7967},
  pages        = {197--206},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39235-1\_12},
  doi          = {10.1007/978-3-642-39235-1\_12},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/SchusterRH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HundWH13,
  author       = {Ralf Hund and
                  Carsten Willems and
                  Thorsten Holz},
  title        = {Practical Timing Side Channel Attacks Against Kernel Space {ASLR}},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/practical-timing-side-channel-attacks-against-kernel-space-aslr},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/HundWH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HoffmannNH13,
  author       = {Johannes Hoffmann and
                  Stephan Neumann and
                  Thorsten Holz},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Mobile Malware Detection Based on Energy Fingerprints - {A} Dead End?},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {348--368},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_18},
  doi          = {10.1007/978-3-642-41284-4\_18},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HoffmannNH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/HoffmannUHS13,
  author       = {Johannes Hoffmann and
                  Martin Ussath and
                  Thorsten Holz and
                  Michael Spreitzenbarth},
  editor       = {Sung Y. Shin and
                  Jos{\'{e}} Carlos Maldonado},
  title        = {Slicing droids: program slicing for smali code},
  booktitle    = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing,
                  {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
  pages        = {1844--1851},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480362.2480706},
  doi          = {10.1145/2480362.2480706},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/HoffmannUHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HundWH13,
  author       = {Ralf Hund and
                  Carsten Willems and
                  Thorsten Holz},
  title        = {Practical Timing Side Channel Attacks against Kernel Space {ASLR}},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {191--205},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.23},
  doi          = {10.1109/SP.2013.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HundWH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/KuhrerH12,
  author       = {Marc K{\"{u}}hrer and
                  Thorsten Holz},
  title        = {An Empirical Analysis of Malware Blacklists},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {35},
  number       = {1},
  pages        = {11--16},
  year         = {2012},
  url          = {https://doi.org/10.1515/pik-2012-0003},
  doi          = {10.1515/PIK-2012-0003},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/KuhrerH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WillemsFH12,
  author       = {Carsten Willems and
                  Felix C. Freiling and
                  Thorsten Holz},
  editor       = {Robert H'obbes' Zakon},
  title        = {Using memory management to detect and extract illegitimate code for
                  malware analysis},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {179--188},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420979},
  doi          = {10.1145/2420950.2420979},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WillemsFH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WillemsHFFHV12,
  author       = {Carsten Willems and
                  Ralf Hund and
                  Andreas Fobian and
                  Dennis Felsch and
                  Thorsten Holz and
                  Amit Vasudevan},
  editor       = {Robert H'obbes' Zakon},
  title        = {Down to the bare metal: using processor features for binary analysis},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {189--198},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420980},
  doi          = {10.1145/2420950.2420980},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WillemsHFFHV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HeiderichNSHS12,
  author       = {Mario Heiderich and
                  Marcus Niemietz and
                  Felix Schuster and
                  Thorsten Holz and
                  J{\"{o}}rg Schwenk},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Scriptless attacks: stealing the pie without touching the sill},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {760--771},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382276},
  doi          = {10.1145/2382196.2382276},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HeiderichNSHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/HoffmannUH12,
  author       = {Johannes Hoffmann and
                  Sebastian Uellenbeck and
                  Thorsten Holz},
  editor       = {Ulrich Flegel and
                  Evangelos P. Markatos and
                  William K. Robertson},
  title        = {SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece,
                  July 26-27, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7591},
  pages        = {184--203},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37300-8\_11},
  doi          = {10.1007/978-3-642-37300-8\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/HoffmannUH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/BuscherH12,
  author       = {Armin B{\"{u}}scher and
                  Thorsten Holz},
  editor       = {Engin Kirda},
  title        = {Tracking DDoS Attacks: Insights into the Business of Disrupting the
                  Web},
  booktitle    = {5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '12, San Jose, CA, USA, April 24, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/leet12/workshop-program/presentation/buscher},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/BuscherH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DaviDEFHHNS12,
  author       = {Lucas Davi and
                  Alexandra Dmitrienko and
                  Manuel Egele and
                  Thomas Fischer and
                  Thorsten Holz and
                  Ralf Hund and
                  Stefan N{\"{u}}rnberger and
                  Ahmad{-}Reza Sadeghi},
  title        = {MoCFI: {A} Framework to Mitigate Control-Flow Attacks on Smartphones},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/mocfi-framework-mitigate-control-flow-attacks-smartphones\#overlay-context=mocfi-framework-mitigate-control-flow-attacks-smartphones},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/DaviDEFHHNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DriessenHWPH12,
  author       = {Benedikt Driessen and
                  Ralf Hund and
                  Carsten Willems and
                  Christof Paar and
                  Thorsten Holz},
  title        = {Don't Trust Satellite Phones: {A} Security Analysis of Two Satphone
                  Standards},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {128--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.18},
  doi          = {10.1109/SP.2012.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/DriessenHWPH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StringhiniEZHKV12,
  author       = {Gianluca Stringhini and
                  Manuel Egele and
                  Apostolis Zarras and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Tadayoshi Kohno},
  title        = {B@bel: Leveraging Email Delivery for Spam Mitigation},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {16--32},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/stringhini},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StringhiniEZHKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EngelberthFGGHHTW11,
  author       = {Markus Engelberth and
                  Felix C. Freiling and
                  Jan G{\"{o}}bel and
                  Christian Gorecki and
                  Thorsten Holz and
                  Ralf Hund and
                  Philipp Trinius and
                  Carsten Willems},
  title        = {Das Internet-Malware-Analyse-System (InMAS) - Ein System zur gro{\ss}fl{\"{a}}chigen
                  Sammlung und Analyse von Schadsoftware im Internet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {247--252},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0061-7},
  doi          = {10.1007/S11623-011-0061-7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EngelberthFGGHHTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/RieckTWH11,
  author       = {Konrad Rieck and
                  Philipp Trinius and
                  Carsten Willems and
                  Thorsten Holz},
  title        = {Automatic analysis of malware behavior using machine learning},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {639--668},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2010-0410},
  doi          = {10.3233/JCS-2010-0410},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/RieckTWH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HeiderichFJH11,
  author       = {Mario Heiderich and
                  Tilman Frosch and
                  Meiko Jensen and
                  Thorsten Holz},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Crouching tiger - hidden payload: security risks of scalable vectors
                  graphics},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {239--250},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046735},
  doi          = {10.1145/2046707.2046735},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HeiderichFJH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DaviDEFHHNS11,
  author       = {Lucas Davi and
                  Alexandra Dmitrienko and
                  Manuel Egele and
                  Thomas Fischer and
                  Thorsten Holz and
                  Ralf Hund and
                  Stefan N{\"{u}}rnberger and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: control-flow integrity for smartphones},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {749--752},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093484},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DaviDEFHHNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/Holz11,
  author       = {Thorsten Holz},
  title        = {Systems Security Research at Ruhr-University Bochum},
  booktitle    = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands,
                  July 6, 2011},
  pages        = {131--134},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.19},
  doi          = {10.1109/SYSSEC.2011.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/Holz11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/Stone-GrossHSV11,
  author       = {Brett Stone{-}Gross and
                  Thorsten Holz and
                  Gianluca Stringhini and
                  Giovanni Vigna},
  editor       = {Christopher Kruegel},
  title        = {The Underground Economy of Spam: {A} Botmaster's Perspective of Coordinating
                  Large-Scale Spam Campaigns},
  booktitle    = {4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '11, Boston, MA, USA, March 29, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/leet11/underground-economy-spam-botmasters-perspective-coordinating-large-scale-spam},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/Stone-GrossHSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GrobertWH11,
  author       = {Felix Gr{\"{o}}bert and
                  Carsten Willems and
                  Thorsten Holz},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Automated Identification of Cryptographic Primitives in Binary Programs},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {41--60},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_3},
  doi          = {10.1007/978-3-642-23644-0\_3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GrobertWH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HeiderichFH11,
  author       = {Mario Heiderich and
                  Tilman Frosch and
                  Thorsten Holz},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {IceShield: Detection and Mitigation of Malicious Websites with a Frozen
                  {DOM}},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {281--300},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_15},
  doi          = {10.1007/978-3-642-23644-0\_15},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HeiderichFH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BecherFHHUW11,
  author       = {Michael Becher and
                  Felix C. Freiling and
                  Johannes Hoffmann and
                  Thorsten Holz and
                  Sebastian Uellenbeck and
                  Christopher Wolf},
  title        = {Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security
                  of Mobile Devices},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {96--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.29},
  doi          = {10.1109/SP.2011.29},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BecherFHHUW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/GoreckiFKH11,
  author       = {Christian Gorecki and
                  Felix C. Freiling and
                  Marc K{\"{u}}hrer and
                  Thorsten Holz},
  editor       = {Xavier D{\'{e}}fago and
                  Franck Petit and
                  Vincent Villain},
  title        = {TrumanBox: Improving Dynamic Malware Analysis by Emulating the Internet},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems - 13th
                  International Symposium, {SSS} 2011, Grenoble, France, October 10-12,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6976},
  pages        = {208--222},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24550-3\_17},
  doi          = {10.1007/978-3-642-24550-3\_17},
  timestamp    = {Sun, 25 Oct 2020 22:45:03 +0100},
  biburl       = {https://dblp.org/rec/conf/sss/GoreckiFKH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JacobHKH11,
  author       = {Gr{\'{e}}goire Jacob and
                  Ralf Hund and
                  Christopher Kruegel and
                  Thorsten Holz},
  title        = {{JACKSTRAWS:} Picking Command and Control Connections from Bot Traffic},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Jacob.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JacobHKH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StringhiniHSKV11,
  author       = {Gianluca Stringhini and
                  Thorsten Holz and
                  Brett Stone{-}Gross and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{BOTMAGNIFIER:} Locating Spambots on the Internet},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Stringhini.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StringhiniHSKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/badgers/2011,
  editor       = {Engin Kirda and
                  Thorsten Holz},
  title        = {Proceedings of the First Workshop on Building Analysis Datasets and
                  Gathering Experience Returns for Security, BADGERS@EuroSys 2011, Salzburg,
                  Austria, April 10, 2011},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978672},
  doi          = {10.1145/1978672},
  isbn         = {978-1-4503-0768-0},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/badgers/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2011,
  editor       = {Thorsten Holz and
                  Herbert Bos},
  title        = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands,
                  July 7-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6739},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22424-9},
  doi          = {10.1007/978-3-642-22424-9},
  isbn         = {978-3-642-22423-2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/LuftH10,
  author       = {Matthias Luft and
                  Thorsten Holz},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {A Small Leak will Sink a Great Ship: An Empirical Study of {DLP} Solutions},
  booktitle    = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2010 Conference, Berlin,
                  Germany, October 5-7, 2010},
  pages        = {354--364},
  publisher    = {Vieweg+Teubner},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-8348-9788-6\_34},
  doi          = {10.1007/978-3-8348-9788-6\_34},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/LuftH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BalduzziPHKBK10,
  author       = {Marco Balduzzi and
                  Christian Platzer and
                  Thorsten Holz and
                  Engin Kirda and
                  Davide Balzarotti and
                  Christopher Kruegel},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Abusing Social Networks for Automated User Profiling},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {422--441},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_22},
  doi          = {10.1007/978-3-642-15512-3\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BalduzziPHKBK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/DewaldHF10,
  author       = {Andreas Dewald and
                  Thorsten Holz and
                  Felix C. Freiling},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {ADSandbox: sandboxing JavaScript to fight malicious websites},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {1859--1864},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774482},
  doi          = {10.1145/1774088.1774482},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/DewaldHF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/RieckSLHL10,
  author       = {Konrad Rieck and
                  Guido Schwenk and
                  Tobias Limmer and
                  Thorsten Holz and
                  Pavel Laskov},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Botzilla: detecting the "phoning home" of malicious software},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {1978--1984},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774506},
  doi          = {10.1145/1774088.1774506},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/RieckSLHL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SpreitzenbarthH10,
  author       = {Michael Spreitzenbarth and
                  Thorsten Holz},
  editor       = {Felix C. Freiling},
  title        = {Towards Secure Deletion on Smartphones},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {165--176},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19779},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SpreitzenbarthH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/TriniusWHR10,
  author       = {Philipp Trinius and
                  Carsten Willems and
                  Thorsten Holz and
                  Konrad Rieck},
  editor       = {Felix C. Freiling},
  title        = {A Malware Instruction Set for Behavior-Based Analysis},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {205--216},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19782},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/TriniusWHR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KolbitschHKK10,
  author       = {Clemens Kolbitsch and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Engin Kirda},
  title        = {Inspector Gadget: Automated Extraction of Proprietary Gadgets from
                  Malware Binaries},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {29--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.10},
  doi          = {10.1109/SP.2010.10},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KolbitschHKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WondracekHKK10,
  author       = {Gilbert Wondracek and
                  Thorsten Holz and
                  Engin Kirda and
                  Christopher Kruegel},
  title        = {A Practical Attack to De-anonymize Social Network Users},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {223--238},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.21},
  doi          = {10.1109/SP.2010.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WondracekHKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/WondracekHPKK10,
  author       = {Gilbert Wondracek and
                  Thorsten Holz and
                  Christian Platzer and
                  Engin Kirda and
                  Christopher Kruegel},
  title        = {Is the Internet for Porn? An Insight Into the Online Adult Industry},
  booktitle    = {9th Annual Workshop on the Economics of Information Security, {WEIS}
                  2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010},
  year         = {2010},
  url          = {http://weis2010.econinfosec.org/papers/session2/weis2010\_wondracek.pdf},
  timestamp    = {Thu, 22 Jul 2021 16:15:46 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/WondracekHPKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:books/daglib/0024647,
  author       = {Thorsten Holz},
  title        = {Tracking and Mitigation of Malicious Remote Control Networks},
  school       = {University of Mannheim, Germany},
  year         = {2009},
  url          = {http://madoc.bib.uni-mannheim.de/madoc/volltexte/2009/2330/pdf/dissertation-holz.pdf},
  urn          = {urn:nbn:de:bsz:180-madoc-23306},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0024647.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/GobelHT09,
  author       = {Jan G{\"{o}}bel and
                  Thorsten Holz and
                  Philipp Trinius},
  editor       = {Ulrich Flegel and
                  Danilo Bruschi},
  title        = {Towards Proactive Spam Filtering (Extended Abstract)},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5587},
  pages        = {38--47},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02918-9\_3},
  doi          = {10.1007/978-3-642-02918-9\_3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/GobelHT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HolzEF09,
  author       = {Thorsten Holz and
                  Markus Engelberth and
                  Felix C. Freiling},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Learning More about the Underground Economy: {A} Case-Study of Keyloggers
                  and Dropzones},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_1},
  doi          = {10.1007/978-3-642-04444-1\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HolzEF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WurzingerBHGKK09,
  author       = {Peter Wurzinger and
                  Leyla Bilge and
                  Thorsten Holz and
                  Jan Goebel and
                  Christopher Kruegel and
                  Engin Kirda},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Automatically Generating Models for Botnet Detection},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {232--249},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_15},
  doi          = {10.1007/978-3-642-04444-1\_15},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WurzingerBHGKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/HolzEF09,
  author       = {Thorsten Holz and
                  Markus Engelberth and
                  Felix C. Freiling},
  editor       = {Stefan Fischer and
                  Erik Maehle and
                  R{\"{u}}diger Reischuk},
  title        = {Eine Analyse von 33 Gigabyte gestohlener Keylogger-Daten},
  booktitle    = {39. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Im Focus
                  das Leben, {INFORMATIK} 2009, L{\"{u}}beck, Germany, September
                  28 - October 2, 2009, Proceedings},
  series       = {{LNI}},
  volume       = {{P-154}},
  pages        = {193},
  publisher    = {{GI}},
  year         = {2009},
  url          = {https://dl.gi.de/handle/20.500.12116/31136},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/HolzEF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HundHF09,
  author       = {Ralf Hund and
                  Thorsten Holz and
                  Felix C. Freiling},
  editor       = {Fabian Monrose},
  title        = {Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection
                  Mechanisms},
  booktitle    = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14,
                  2009, Proceedings},
  pages        = {383--398},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/sec09/tech/full\_papers/hund.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HundHF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/TriniusHGF09,
  author       = {Philipp Trinius and
                  Thorsten Holz and
                  Jan G{\"{o}}bel and
                  Felix C. Freiling},
  editor       = {Deborah A. Frincke and
                  Carrie Gates and
                  John R. Goodall and
                  Robert F. Erbacher},
  title        = {Visual analysis of malware behavior using treemaps and thread graphs},
  booktitle    = {6th International Workshop on Visualization for Cyber Security, VizSec
                  2009, Atlantic City, NJ, USA, October 11, 2009},
  pages        = {33--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/VIZSEC.2009.5375540},
  doi          = {10.1109/VIZSEC.2009.5375540},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/TriniusHGF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/09/ZhugeHSGHZ09,
  author       = {Jianwei Zhuge and
                  Thorsten Holz and
                  Chengyu Song and
                  Jinpeng Guo and
                  Xinhui Han and
                  Wei Zou},
  editor       = {M. Eric Johnson},
  title        = {Studying Malicious Websites and the Underground Economy on the Chinese
                  Web},
  booktitle    = {Managing Information Risk and the Economics of Security},
  pages        = {225--244},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-09762-6\_11},
  doi          = {10.1007/978-0-387-09762-6\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/09/ZhugeHSGHZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/gi/Holz09,
  author       = {Thorsten Holz},
  editor       = {Abraham Bernstein and
                  Steffen H{\"{o}}lldobler and
                  G{\"{u}}nter Hotz and
                  Klaus{-}Peter L{\"{o}}hr and
                  Paul Molitor and
                  Gustaf Neumann and
                  R{\"{u}}diger Reischuk and
                  Dietmar Saupe and
                  Myra Spiliopoulou and
                  Harald St{\"{o}}rrle and
                  Dorothea Wagner},
  title        = {Verfolgen und Abschw{\"{a}}chen von Malicious Remote Control
                  Networks},
  booktitle    = {Ausgezeichnete Informatikdissertationen 2009},
  series       = {{LNI}},
  volume       = {{D-10}},
  pages        = {101--110},
  publisher    = {{GI}},
  year         = {2009},
  url          = {https://dl.gi.de/handle/20.500.12116/33659},
  timestamp    = {Tue, 04 Jul 2023 17:43:57 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/Holz09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0022130,
  author       = {Niels Provos and
                  Thorsten Holz},
  title        = {Virtual Honeypots - From Botnet Tracking to Intrusion Detection},
  publisher    = {Addison-Wesley},
  year         = {2008},
  isbn         = {978-0-321-33632-3},
  timestamp    = {Wed, 16 Mar 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0022130.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/RieckHWDL08,
  author       = {Konrad Rieck and
                  Thorsten Holz and
                  Carsten Willems and
                  Patrick D{\"{u}}ssel and
                  Pavel Laskov},
  editor       = {Diego Zamboni},
  title        = {Learning and Classification of Malware Behavior},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  5th International Conference, {DIMVA} 2008, Paris, France, July 10-11,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5137},
  pages        = {108--125},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70542-0\_6},
  doi          = {10.1007/978-3-540-70542-0\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/RieckHWDL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/FreilingHM08,
  author       = {Felix C. Freiling and
                  Thorsten Holz and
                  Martin Mink},
  editor       = {Oliver G{\"{o}}bel and
                  Sandra Frings and
                  Detlef G{\"{u}}nther and
                  Jens Nedon and
                  Dirk Schadt},
  title        = {Reconstructing People's Lives: {A} Case Study in Teaching Forensic
                  Computing},
  booktitle    = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2008, Conference
                  Proceedings, September 23-25, 2008, Mannheim, Germany},
  series       = {{LNI}},
  volume       = {{P-140}},
  pages        = {125--141},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/23588},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imf/FreilingHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/NazarioH08,
  author       = {Jose Nazario and
                  Thorsten Holz},
  title        = {As the net churns: Fast-flux botnet observations},
  booktitle    = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
                  2008, Alexandria, Virginia, USA, October 7-8, 2008},
  pages        = {24--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MALWARE.2008.4690854},
  doi          = {10.1109/MALWARE.2008.4690854},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/NazarioH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HolzGRF08,
  author       = {Thorsten Holz and
                  Christian Gorecki and
                  Konrad Rieck and
                  Felix C. Freiling},
  title        = {Measuring and Detecting Fast-Flux Service Networks},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/measuring-and-detecting-fast-flux-service-networks/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/HolzGRF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/HolzSDBF08,
  author       = {Thorsten Holz and
                  Moritz Steiner and
                  Frederic Dahl and
                  Ernst W. Biersack and
                  Felix C. Freiling},
  editor       = {Fabian Monrose},
  title        = {Measurements and Mitigation of Peer-to-Peer-based Botnets: {A} Case
                  Study on Storm Worm},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/holz/holz.pdf},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/HolzSDBF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/IkinciHF08,
  author       = {Ali Ikinci and
                  Thorsten Holz and
                  Felix C. Freiling},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {407--421},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21494},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/IkinciHF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/ZhugeHSGHZ08,
  author       = {Jianwei Zhuge and
                  Thorsten Holz and
                  Chengyu Song and
                  Jinpeng Guo and
                  Xinhui Han and
                  Wei Zou},
  title        = {Studying Malicious Websites and the Underground Economy on the Chinese
                  Web},
  booktitle    = {7th Annual Workshop on the Economics of Information Security, {WEIS}
                  2008, Dartmouth College, Hanover, NH, USA, June 25-28, 2008},
  year         = {2008},
  url          = {http://weis2008.econinfosec.org/papers/Holz.pdf},
  timestamp    = {Thu, 22 Jul 2021 16:15:45 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/ZhugeHSGHZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BraunDHKKKLRS08,
  author       = {Lothar Braun and
                  Falko Dressler and
                  Thorsten Holz and
                  Engin Kirda and
                  Jan Kohlrausch and
                  Christopher Kruegel and
                  Tobias Limmer and
                  Konrad Rieck and
                  James P. G. Sterbenz},
  editor       = {Georg Carle and
                  Falko Dressler and
                  Richard A. Kemmerer and
                  Hartmut K{\"{o}}nig and
                  Christopher Kruegel},
  title        = {08102 Working Group -- Requirements for Network Monitoring from an
                  {IDS} Perspective},
  booktitle    = {Perspectives Workshop: Network Attack Detection and Defense, 2.3.
                  - 6.3.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08102},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1497},
  timestamp    = {Thu, 10 Jun 2021 13:02:08 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BraunDHKKKLRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/DacierDHKKKRS08,
  author       = {Marc Dacier and
                  Herv{\'{e}} Debar and
                  Thorsten Holz and
                  Engin Kirda and
                  Jan Kohlrausch and
                  Christopher Kruegel and
                  Konrad Rieck and
                  James P. G. Sterbenz},
  editor       = {Georg Carle and
                  Falko Dressler and
                  Richard A. Kemmerer and
                  Hartmut K{\"{o}}nig and
                  Christopher Kruegel},
  title        = {8102 Working Group -- Attack Taxonomy},
  booktitle    = {Perspectives Workshop: Network Attack Detection and Defense, 2.3.
                  - 6.3.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08102},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1495},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/DacierDHKKKRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/WillemsHF07,
  author       = {Carsten Willems and
                  Thorsten Holz and
                  Felix C. Freiling},
  title        = {Toward Automated Dynamic Malware Analysis Using CWSandbox},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {5},
  number       = {2},
  pages        = {32--39},
  year         = {2007},
  url          = {https://doi.org/10.1109/MSP.2007.45},
  doi          = {10.1109/MSP.2007.45},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/WillemsHF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/GoebelHW07,
  author       = {Jan Goebel and
                  Thorsten Holz and
                  Carsten Willems},
  editor       = {Bernhard M. H{\"{a}}mmerli and
                  Robin Sommer},
  title        = {Measurement and Analysis of Autonomous Spreading Malware in a University
                  Environment},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  4th International Conference, {DIMVA} 2007, Lucerne, Switzerland,
                  July 12-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4579},
  pages        = {109--128},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73614-1\_7},
  doi          = {10.1007/978-3-540-73614-1\_7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/GoebelHW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhugeHHSZ07,
  author       = {Jianwei Zhuge and
                  Thorsten Holz and
                  Xinhui Han and
                  Chengyu Song and
                  Wei Zou},
  editor       = {Sihan Qing and
                  Hideki Imai and
                  Guilin Wang},
  title        = {Collecting Autonomous Spreading Malware Using High-Interaction Honeypots},
  booktitle    = {Information and Communications Security, 9th International Conference,
                  {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4861},
  pages        = {438--451},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77048-0\_34},
  doi          = {10.1007/978-3-540-77048-0\_34},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ZhugeHHSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/GoebelH07,
  author       = {Jan Goebel and
                  Thorsten Holz},
  editor       = {Niels Provos},
  title        = {Rishi: Identify Bot Contaminated Hosts by {IRC} Nickname Evaluation},
  booktitle    = {First Workshop on Hot Topics in Understanding Botnets, HotBots'07,
                  Cambridge, MA, USA, April 10, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/hotbots-07/rishi-identify-bot-contaminated-hosts-irc-nickname-evaluation},
  timestamp    = {Thu, 12 Aug 2021 18:19:16 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/GoebelH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HolzMR06,
  author       = {Thorsten Holz and
                  Simon Marechal and
                  Fr{\'{e}}d{\'{e}}ric Raynal},
  title        = {New Threats and Attacks on the World Wide Web},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {4},
  number       = {2},
  pages        = {72--75},
  year         = {2006},
  url          = {https://doi.org/10.1109/MSP.2006.46},
  doi          = {10.1109/MSP.2006.46},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HolzMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/GobelHH06,
  author       = {Jan G{\"{o}}bel and
                  Jens Hektor and
                  Thorsten Holz},
  title        = {Advanced Honeypot-Based Intrusion Detection},
  journal      = {login Usenix Mag.},
  volume       = {31},
  number       = {6},
  year         = {2006},
  url          = {https://www.usenix.org/publications/login/december-2006-volume-31-number-6/advanced-honeypot-based-intrusion-detection},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/GobelHH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arcs/BenesonFHKP06,
  author       = {Zinaida Benenson and
                  Felix C. Freiling and
                  Thorsten Holz and
                  Dogan Kesdogan and
                  Lucia Draque Penso},
  editor       = {Wolfgang Karl and
                  J{\"{u}}rgen Becker and
                  Karl{-}Erwin Gro{\ss}pietsch and
                  Christian Hochberger and
                  Erik Maehle},
  title        = {Safety, Liveness, and Information Flow: Dependability Revisited},
  booktitle    = {{ARCS} 2006 - 19th International Conference on Architecture of Computing
                  Systems, Workshops Proceedings, March 16, 2006, Frankfurt am Main,
                  Germany},
  series       = {{LNI}},
  volume       = {{P-81}},
  pages        = {56--65},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/29437},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arcs/BenesonFHKP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/AndersonDFHILM06,
  author       = {Philip Anderson and
                  Maximillian Dornseif and
                  Felix C. Freiling and
                  Thorsten Holz and
                  Alastair Irons and
                  Christopher Laing and
                  Martin Mink},
  editor       = {Oliver G{\"{o}}bel and
                  Dirk Schadt and
                  Sandra Frings and
                  Hardo Hase and
                  Detlef G{\"{u}}nther and
                  Jens Nedon},
  title        = {A Comparative Study of Teaching Forensics at a University Degree Level},
  booktitle    = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2006, Conference
                  Proceedings, October, 18th-19th, 2006, Stuttgart},
  series       = {{LNI}},
  volume       = {{P-97}},
  pages        = {116--127},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/23454},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imf/AndersonDFHILM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BaecherKHDF06,
  author       = {Paul Baecher and
                  Markus Koetter and
                  Thorsten Holz and
                  Maximillian Dornseif and
                  Felix C. Freiling},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {The Nepenthes Platform: An Efficient Approach to Collect Malware},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {165--184},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_9},
  doi          = {10.1007/11856214\_9},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BaecherKHDF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Holz06,
  author       = {Thorsten Holz},
  editor       = {Jana Dittmann},
  title        = {Learning More About Attack Patterns With Honeypots},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {30--41},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24800},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Holz06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/BohmeH06,
  author       = {Rainer B{\"{o}}hme and
                  Thorsten Holz},
  title        = {The Effect of Stock Spam on Financial Markets},
  booktitle    = {5th Annual Workshop on the Economics of Information Security, {WEIS}
                  2006, Robinson College, University of Cambridge, England, UK, June
                  26-28, 2006},
  year         = {2006},
  url          = {https://doi.org/10.2139/ssrn.897431},
  doi          = {10.2139/SSRN.897431},
  timestamp    = {Sat, 31 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/BohmeH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Holz05,
  author       = {Thorsten Holz},
  title        = {A Short Visit to the Bot Zoo},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {76--79},
  year         = {2005},
  url          = {https://doi.org/10.1109/MSP.2005.58},
  doi          = {10.1109/MSP.2005.58},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Holz05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Holz05,
  author       = {Thorsten Holz},
  title        = {Spying with Bots},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/spying-bots},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Holz05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/Holz05,
  author       = {Thorsten Holz},
  editor       = {Irene Eusgeld and
                  Felix C. Freiling and
                  Ralf H. Reussner},
  title        = {Security Measurements and Metrics for Networks},
  booktitle    = {Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar,
                  October 30 - November 1, 2005]},
  series       = {Lecture Notes in Computer Science},
  volume       = {4909},
  pages        = {157--165},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-68947-8\_13},
  doi          = {10.1007/978-3-540-68947-8\_13},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/Holz05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfn/DornseifHM05,
  author       = {Maximillian Dornseif and
                  Thorsten Holz and
                  Sven M{\"{u}}ller},
  editor       = {Jan von Knop and
                  Wilhelm Haverkamp and
                  Eike Jessen},
  title        = {Honeypots and Limitations of Deception},
  booktitle    = {"Heute schon das Morgen sehen", 19. DFN-Arbeitstagung {\"{u}}ber
                  Kommunikationsnetze, D{\"{u}}sseldorf, 2004},
  series       = {{LNI}},
  volume       = {{P-73}},
  pages        = {235--252},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28613},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dfn/DornseifHM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/PougetH05,
  author       = {Fabien Pouget and
                  Thorsten Holz},
  editor       = {Klaus Julisch and
                  Christopher Kr{\"{u}}gel},
  title        = {A Pointillist Approach for Comparing Honeypots},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  Second International Conference, {DIMVA} 2005, Vienna, Austria, July
                  7-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3548},
  pages        = {51--68},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506881\_4},
  doi          = {10.1007/11506881\_4},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/PougetH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FreilingHW05,
  author       = {Felix C. Freiling and
                  Thorsten Holz and
                  Georg Wicherski},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed
                  Denial-of-Service Attacks},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {319--335},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_19},
  doi          = {10.1007/11555827\_19},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/FreilingHW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/DornseifGH04,
  author       = {Maximillian Dornseif and
                  Felix C. G{\"{a}}rtner and
                  Thorsten Holz},
  title        = {Vulnerability Assessment using Honeypots},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {27},
  number       = {4},
  pages        = {195--201},
  year         = {2004},
  url          = {https://doi.org/10.1515/PIKO.2004.195},
  doi          = {10.1515/PIKO.2004.195},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/DornseifGH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/DornseifGH04,
  author       = {Maximillian Dornseif and
                  Felix C. G{\"{a}}rtner and
                  Thorsten Holz},
  editor       = {Ulrich Flegel and
                  Michael Meier},
  title        = {Ermittlung von Verwundbarkeiten mit elektronischen K{\"{o}}dern},
  booktitle    = {Detection of Intrusions and Malware {\&} Vulnerability Assessment,
                  {GI} {SIG} {SIDAR} Workshop, {DIMVA} 2004, Dortmund, Germany, July
                  6.7, 2004, Proceedings},
  series       = {{LNI}},
  volume       = {{P-46}},
  pages        = {129--141},
  publisher    = {{GI}},
  year         = {2004},
  url          = {https://dl.gi.de/handle/20.500.12116/29211},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/DornseifGH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0406052,
  author       = {Maximillian Dornseif and
                  Thorsten Holz and
                  Christian N. Klein},
  title        = {NoSEBrEaK - Attacking Honeynets},
  journal      = {CoRR},
  volume       = {cs.CR/0406052},
  year         = {2004},
  url          = {http://arxiv.org/abs/cs/0406052},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0406052.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0406059,
  author       = {Maximillian Dornseif and
                  Felix C. G{\"{a}}rtner and
                  Thorsten Holz},
  title        = {Ermittlung von Verwundbarkeiten mit elektronischen Koedern},
  journal      = {CoRR},
  volume       = {cs.CR/0406059},
  year         = {2004},
  url          = {http://arxiv.org/abs/cs/0406059},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0406059.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics