What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Thorsten Holz
Google Scholar
130
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
Understanding Regional Filter Lists: Efficacy and Impact.
Christian Böttger
Nurullah Demir
Jan Hörnemann
Bhupendra Acharya
Norbert Pohlmann
Thorsten Holz
Matteo Große-Kampmann
Tobias Urban
2025
conf/sp
Space RADSIM: Binary-Agnostic Fault Injection to Evaluate Cosmic Radiation Impact on Exploit Mitigation Techniques in Space.
Johannes Willbold
Tobias Cloosters
Simon Wörner
Felix Buchmann
Moritz Schloegel
Lucas Davi
Thorsten Holz
2025
conf/ndss
TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks.
Matteo Leonelli
Addison Crump
Meng Wang
Florian Bauckholt
Keno Hassler
Ali Abbasi
Thorsten Holz
2025
conf/ndss
A Comprehensive Memory Safety Analysis of Bootloaders.
Jianqiang Wang
Meng Wang
Qinying Wang
Nils Langius
Li Shi
Ali Abbasi
Thorsten Holz
2025
conf/uss
AidFuzzer: Adaptive Interrupt-Driven Firmware Fuzzing via Run-Time State Recognition.
Jianqiang Wang
Qinying Wang
Tobias Scharnowski
Li Shi
Simon Wörner
Thorsten Holz
2025
conf/uss
Confusing Value with Enumeration: Studying the Use of CVEs in Academia.
Moritz Schloegel
Daniel Klischies
Simon Koch
David Klein
Lukas Gerlach
Malte Wessels
Leon Trampert
Martin Johns
Mathy Vanhoef
Michael Schwarz
Thorsten Holz
Jo Van Bulck
2025
conf/uss
GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays.
Tobias Scharnowski
Simeon Hoffmann
Moritz Bley
Simon Wörner
Daniel Klischies
Felix Buchmann
Nils Ole Tippenhauer
Thorsten Holz
Marius Muench
2024
conf/ccs
No Peer, no Cry: Network Application Fuzzing via Fault Injection.
Nils Bars
Moritz Schloegel
Nico Schiller
Lukas Bernhard
Thorsten Holz
2024
conf/ccs
DarthShader: Fuzzing WebGPU Shader Translators & Compilers.
Lukas Bernhard
Nico Schiller
Moritz Schloegel
Nils Bars
Thorsten Holz
2024
conf/uss
Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities.
Emre Güler
Sergej Schumilo
Moritz Schloegel
Nils Bars
Philipp Görz
Xinyi Xu
Cemal Kaygusuz
Thorsten Holz
2024
conf/uss
The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms.
Bhupendra Acharya
Dario Lazzaro
Efrén López-Morales
Adam Oest
Muhammad Saad
Antonio Emanuele Cinà
Lea Schönherr
Thorsten Holz
2024
conf/uss
A Binary-level Thread Sanitizer or Why Sanitizing on the Binary Level is Hard.
Joschua Schilling
Andreas Wendler
Philipp Görz
Nils Bars
Moritz Schloegel
Thorsten Holz
2024
conf/sp
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams.
Bhupendra Acharya
Muhammad Saad
Antonio Emanuele Cinà
Lea Schönherr
Hoang Dai Nguyen
Adam Oest
Phani Vadrevu
Thorsten Holz
2024
conf/sp
SoK: Prudent Evaluation Practices for Fuzzing.
Moritz Schloegel
Nils Bars
Nico Schiller
Lukas Bernhard
Tobias Scharnowski
Addison Crump
Arash Ale Ebrahim
Nicolai Bissantz
Marius Muench
Thorsten Holz
2024
conf/sp
A Representative Study on Human Detection of Artificially Generated Media Across Countries.
Joel Frank
Franziska Herbert
Jonas Ricker
Lea Schönherr
Thorsten Eisenhofer
Asja Fischer
Markus Dürmuth
Thorsten Holz
2024
conf/wisec
VSAsTer: Uncovering Inherent Security Issues in Current VSAT System Practices.
Johannes Willbold
Moritz Schloegel
Robin Bisping
Martin Strohmeier
Thorsten Holz
Vincent Lenders
2023
journals/popets
Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites.
Christine Utz
Sabrina Amft
Martin Degeling
Thorsten Holz
Sascha Fahl
Florian Schaub
2023
conf/ccs
Not What You've Signed Up For: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection.
Sahar Abdelnabi
Kai Greshake
Shailesh Mishra
Christoph Endres
Thorsten Holz
Mario Fritz
2023
conf/uss
Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs.
Tobias Scharnowski
Simon Wörner
Felix Buchmann
Nils Bars
Moritz Schloegel
Thorsten Holz
2023
conf/uss
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning.
Thorsten Eisenhofer
Erwin Quiring
Jonas Möller
Doreen Riepel
Thorsten Holz
Konrad Rieck
2023
conf/uss
Systematic Assessment of Fuzzers using Mutation Analysis.
Philipp Görz
Björn Mathis
Keno Hassler
Emre Güler
Thorsten Holz
Andreas Zeller
Rahul Gopinath
2023
conf/uss
Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge.
Nils Bars
Moritz Schloegel
Tobias Scharnowski
Nico Schiller
Thorsten Holz
2023
conf/sp
Space Odyssey: An Experimental Software Security Analysis of Satellites.
Johannes Willbold
Moritz Schloegel
Manuel Vögele
Maximilian Gerhardt
Thorsten Holz
Ali Abbasi
2023
conf/eurosp
EF↯CF: High Performance Smart Contract Fuzzing for Exploit Generation.
Michael Rodler
David Paaßen
Wenting Li
Lukas Bernhard
Thorsten Holz
Ghassan Karame
Lucas Davi
2023
conf/ndss
Drone Security and the Mysterious Case of DJI's DroneID.
Nico Schiller
Merlin Chlosta
Moritz Schloegel
Nils Bars
Thorsten Eisenhofer
Tobias Scharnowski
Felix Domke
Lea Schönherr
Thorsten Holz
2023
conf/ndss
FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities.
Samuel Groß
Simon Koch
Lukas Bernhard
Thorsten Holz
Martin Johns
2022
conf/ccs
JIT-Picking: Differential Fuzzing of JavaScript Engines.
Lukas Bernhard
Tobias Scharnowski
Moritz Schloegel
Tim Blazytko
Thorsten Holz
2022
conf/uss
SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.
Tobias Cloosters
Johannes Willbold
Thorsten Holz
Lucas Davi
2022
conf/uss
Loki: Hardening Code Obfuscation Against Automated Attacks.
Moritz Schloegel
Tim Blazytko
Moritz Contag
Cornelius Aschermann
Julius Basler
Thorsten Holz
Ali Abbasi
2022
conf/uss
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing.
Tobias Scharnowski
Nils Bars
Moritz Schloegel
Eric Gustafson
Marius Muench
Giovanni Vigna
Christopher Kruegel
Thorsten Holz
Ali Abbasi
2022
conf/eurosp
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64.
Lukas Bernhard
Michael Rodler
Thorsten Holz
Lucas Davi
2021
conf/uss
Dompteur: Taming Audio Adversarial Examples.
Thorsten Eisenhofer
Lea Schönherr
Joel Frank
Lars Speckemeier
Dorothea Kolossa
Thorsten Holz
2021
conf/uss
Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.
Sergej Schumilo
Cornelius Aschermann
Ali Abbasi
Simon Wörner
Thorsten Holz
2021
conf/esorics
Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains.
Moritz Schloegel
Tim Blazytko
Julius Basler
Fabian Hemmer
Thorsten Holz
2021
conf/wisec
5G SUCI-catchers: still catching them all?
Merlin Chlosta
David Rupprecht
Christina Pöpper
Thorsten Holz
2021
conf/wisec
On the challenges of automata reconstruction in LTE networks.
Merlin Chlosta
David Rupprecht
Thorsten Holz
2020
conf/ccs
Be the Phisher - Understanding Users' Perception of Malicious Domains.
Florian Quinkert
Martin Degeling
Jim Blythe
Thorsten Holz
2020
conf/ccs
CORSICA: Cross-Origin Web Service Identification.
Christian Dresen
Fabian Ising
Damian Poddebniak
Tobias Kappert
Thorsten Holz
Sebastian Schinzel
2020
conf/ccs
Measuring the Impact of the GDPR on Data Sharing in Ad Networks.
Tobias Urban
Dennis Tatang
Martin Degeling
Thorsten Holz
Norbert Pohlmann
2020
conf/uss
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation.
Tim Blazytko
Moritz Schlögel
Cornelius Aschermann
Ali Abbasi
Joel Frank
Simon Wörner
Thorsten Holz
2020
conf/uss
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE.
David Rupprecht
Katharina Kohls
Thorsten Holz
Christina Pöpper
2020
conf/uss
ETHBMC: A Bounded Model Checker for Smart Contracts.
Joel Frank
Cornelius Aschermann
Thorsten Holz
2020
conf/sp
Ijon: Exploring Deep State Spaces via Fuzzing.
Cornelius Aschermann
Sergej Schumilo
Ali Abbasi
Thorsten Holz
2020
conf/esorics
Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces.
Tobias Urban
Matteo Große-Kampmann
Dennis Tatang
Thorsten Holz
Norbert Pohlmann
2020
conf/ndss
On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways.
Teemu Rytilahti
Thorsten Holz
2020
conf/ndss
HYPER-CUBE: High-Dimensional Hypervisor Fuzzing.
Sergej Schumilo
Cornelius Aschermann
Ali Abbasi
Simon Wörner
Thorsten Holz
2020
conf/ndss
IMP4GT: IMPersonation Attacks in 4G NeTworks.
David Rupprecht
Katharina Kohls
Thorsten Holz
Christina Pöpper
2020
conf/acsac
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems.
Lea Schönherr
Thorsten Eisenhofer
Steffen Zeiler
Thorsten Holz
Dorothea Kolossa
2020
conf/acsac
Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing.
Emre Güler
Philipp Görz
Elia Geretto
Andrea Jemmett
Sebastian Österlund
Herbert Bos
Cristiano Giuffrida
Thorsten Holz
2019
conf/ccs
(Un)informed Consent: Studying GDPR Consent Notices in the Field.
Christine Utz
Martin Degeling
Sascha Fahl
Florian Schaub
Thorsten Holz
2019
conf/uss
AntiFuzz: Impeding Fuzzing Audits of Binary Executables.
Emre Güler
Cornelius Aschermann
Ali Abbasi
Thorsten Holz
2019
conf/uss
GRIMOIRE: Synthesizing Structure while Fuzzing.
Tim Blazytko
Cornelius Aschermann
Moritz Schlögel
Ali Abbasi
Sergej Schumilo
Simon Wörner
Thorsten Holz
2019
conf/sp
Breaking LTE on Layer Two.
David Rupprecht
Katharina Kohls
Thorsten Holz
Christina Pöpper
2019
conf/eurosp
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems.
Ali Abbasi
Jos Wetzels
Thorsten Holz
Sandro Etalle
2019
conf/eurosp
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming.
Jannik Pewny
Philipp Koppe
Thorsten Holz
2019
conf/esorics
A Study on Subject Data Access in Online Advertising After the GDPR.
Tobias Urban
Dennis Tatang
Martin Degeling
Thorsten Holz
Norbert Pohlmann
2019
conf/esorics
Study of DNS Rebinding Attacks on Smart Home Devices.
Dennis Tatang
Tim Suurland
Thorsten Holz
2019
conf/esorics
Static Detection of Uninitialized Stack Variables in Binary Code.
Behrad Garmany
Martin Stoffel
Robert Gawlik
Thorsten Holz
2019
conf/esorics
GDPiRated - Stealing Personal Information On- and Offline.
Matteo Cagnazzo
Thorsten Holz
Norbert Pohlmann
2019
conf/esorics
Towards Automated Application-Specific Software Stacks.
Nicolai Davidsson
Andre Pawlowski
Thorsten Holz
2019
conf/cns
It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains.
Florian Quinkert
Tobias Lauinger
William K. Robertson
Engin Kirda
Thorsten Holz
2019
conf/ndss
REDQUEEN: Fuzzing with Input-to-State Correspondence.
Cornelius Aschermann
Sergej Schumilo
Tim Blazytko
Robert Gawlik
Thorsten Holz
2019
conf/ndss
On the Challenges of Geographical Avoidance for Tor.
Katharina Kohls
Kai Jansen
David Rupprecht
Thorsten Holz
Christina Pöpper
2019
conf/ndss
NAUTILUS: Fishing for Deep Bugs with Grammars.
Cornelius Aschermann
Tommaso Frassetto
Thorsten Holz
Patrick Jauernig
Ahmad-Reza Sadeghi
Daniel Teuchert
2019
conf/ndss
We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy.
Martin Degeling
Christine Utz
Christopher Lentzsch
Henry Hosseini
Florian Schaub
Thorsten Holz
2019
conf/ndss
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding.
Lea Schönherr
Katharina Kohls
Steffen Zeiler
Thorsten Holz
Dorothea Kolossa
2019
conf/acsac
": perspectives on transparency tools for online advertising.
Tobias Urban
Martin Degeling
Thorsten Holz
Norbert Pohlmann
2019
conf/acsac
VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching.
Andre Pawlowski
Victor van der Veen
Dennis Andriesse
Erik van der Kouwe
Thorsten Holz
Cristiano Giuffrida
Herbert Bos
2019
conf/wisec
LTE security disabled: misconfiguration in commercial networks.
Merlin Chlosta
David Rupprecht
Thorsten Holz
Christina Pöpper
2019
conf/wisec
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two.
Katharina Kohls
David Rupprecht
Thorsten Holz
Christina Pöpper
2018
conf/ccs
An Exploratory Analysis of Microcode as a Building Block for System Defenses.
Benjamin Kollenda
Philipp Koppe
Marc Fyrbiak
Christian Kison
Christof Paar
Thorsten Holz
2018
conf/eurosp
Masters of Time: An Overview of the NTP Ecosystem.
Teemu Rytilahti
Dennis Tatang
Janosch Kopper
Thorsten Holz
2018
conf/eurosp
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure.
Enes Göktas
Benjamin Kollenda
Philipp Koppe
Erik Bosman
Georgios Portokalidis
Thorsten Holz
Herbert Bos
Cristiano Giuffrida
2018
conf/esorics
Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs.
Tobias Urban
Dennis Tatang
Thorsten Holz
Norbert Pohlmann
2018
conf/acsac
Towards Automated Generation of Exploitation Primitives for Web Browsers.
Behrad Garmany
Martin Stoffel
Robert Gawlik
Philipp Koppe
Tim Blazytko
Thorsten Holz
2017
conf/uss
kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels.
Sergej Schumilo
Cornelius Aschermann
Robert Gawlik
Sebastian Schinzel
Thorsten Holz
2017
conf/uss
Reverse Engineering x86 Processor Microcode.
Philipp Koppe
Benjamin Kollenda
Marc Fyrbiak
Christian Kison
Robert Gawlik
Christof Paar
Thorsten Holz
2017
conf/uss
Syntia: Synthesizing the Semantics of Obfuscated Code.
Tim Blazytko
Moritz Contag
Cornelius Aschermann
Thorsten Holz
2017
conf/sp
How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles.
Moritz Contag
Vector Guo Li
Andre Pawlowski
Felix Domke
Kirill Levchenko
Thorsten Holz
Stefan Savage
2017
conf/ndss
MARX: Uncovering Class Hierarchies in C++ Programs.
Andre Pawlowski
Moritz Contag
Victor van der Veen
Chris Ouwehand
Thorsten Holz
Herbert Bos
Elias Athanasopoulos
Cristiano Giuffrida
2017
conf/dsn
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables.
Benjamin Kollenda
Enes Göktas
Tim Blazytko
Philipp Koppe
Robert Gawlik
Radhesh Krishnan Konoth
Cristiano Giuffrida
Herbert Bos
Thorsten Holz
2017
conf/acsac
ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers.
Ali Abbasi
Thorsten Holz
Emmanuele Zambon
Sandro Etalle
2017
conf/acsac
Breaking and Fixing Destructive Code Read Defenses.
Jannik Pewny
Philipp Koppe
Lucas Davi
Thorsten Holz
2016
conf/ccs
SkypeLine: Robust Hidden Data Transmission for VoIP.
Katharina Kohls
Thorsten Holz
Dorothea Kolossa
Christina Pöpper
2016
conf/sp
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level.
Victor van der Veen
Enes Göktas
Moritz Contag
Andre Pawlowski
Xi Chen
Sanjay Rawat
Herbert Bos
Thorsten Holz
Elias Athanasopoulos
Cristiano Giuffrida
2016
conf/soups
Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices.
Katharina Krombholz
Thomas Hupperich
Thorsten Holz
2016
conf/eurosp
How Secure is TextSecure?
Tilman Frosch
Christian Mainka
Christoph Bader
Florian Bergsma
Jörg Schwenk
Thorsten Holz
2016
conf/esorics
Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets.
Patrick Wollgast
Robert Gawlik
Behrad Garmany
Benjamin Kollenda
Thorsten Holz
2016
conf/ndss
Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding.
Robert Gawlik
Benjamin Kollenda
Philipp Koppe
Behrad Garmany
Thorsten Holz
2016
conf/acsac
EvilCoder: automated bug insertion.
Jannik Pewny
Thorsten Holz
2015
conf/ccs
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks.
Stephen J. Crane
Stijn Volckaert
Felix Schuster
Christopher Liebchen
Per Larsen
Lucas Davi
Ahmad-Reza Sadeghi
Thorsten Holz
Bjorn De Sutter
Michael Franz
2015
conf/fc
Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones.
Sebastian Uellenbeck
Thomas Hupperich
Christopher Wolf
Thorsten Holz
2015
conf/sp
Cross-Architecture Bug Search in Binary Executables.
Jannik Pewny
Behrad Garmany
Robert Gawlik
Christian Rossow
Thorsten Holz
2015
conf/sp
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
Felix Schuster
Thomas Tendyck
Christopher Liebchen
Lucas Davi
Ahmad-Reza Sadeghi
Thorsten Holz
2015
conf/acsac
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?
Thomas Hupperich
Davide Maiorca
Marc Kührer
Thorsten Holz
Giorgio Giacinto
2014
conf/ccs
Code Reuse Attacks in PHP: Automated POP Chain Generation.
Johannes Dahse
Nikolai Krein
Thorsten Holz
2014
conf/ccs
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
Michael Backes
Thorsten Holz
Benjamin Kollenda
Philipp Koppe
Stefan Nürnberger
Jannik Pewny
2014
conf/uss
Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data.
Sebastian Vogl
Robert Gawlik
Behrad Garmany
Thomas Kittel
Jonas Pfoh
Claudia Eckert
Thorsten Holz
2014
conf/uss
Static Detection of Second-Order Vulnerabilities in Web Applications.
Johannes Dahse
Thorsten Holz
2014
conf/uss
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
Marc Kührer
Thomas Hupperich
Christian Rossow
Thorsten Holz
2014
conf/ndss
Simulation of Built-in PHP Features for Precise Static Code Analysis.
Johannes Dahse
Thorsten Holz
2014
conf/acsac
Leveraging semantic signatures for bug search in binary programs.
Jannik Pewny
Felix Schuster
Lukas Bernhard
Thorsten Holz
Christian Rossow
2014
conf/acsac
Towards automated integrity protection of C++ virtual function tables in binary programs.
Robert Gawlik
Thorsten Holz
2014
conf/acsac
Using automatic speech recognition for attacking acoustic CAPTCHAs: the trade-off between usability and security.
Hendrik Meutzner
Viet-Hung Nguyen
Thorsten Holz
Dorothea Kolossa
2013
conf/ccs
PSiOS: bring your own privacy & security to iOS devices.
Tim Werthmann
Ralf Hund
Lucas Davi
Ahmad-Reza Sadeghi
Thorsten Holz
2013
conf/ccs
Towards reducing the attack surface of software backdoors.
Felix Schuster
Thorsten Holz
2013
conf/ccs
Quantifying the security of graphical passwords: the case of android unlock patterns.
Sebastian Uellenbeck
Markus Dürmuth
Christopher Wolf
Thorsten Holz
2013
conf/sp
Practical Timing Side Channel Attacks against Kernel Space ASLR.
Ralf Hund
Carsten Willems
Thorsten Holz
2013
conf/ndss
Practical Timing Side Channel Attacks Against Kernel Space ASLR.
Ralf Hund
Carsten Willems
Thorsten Holz
2013
conf/acsac
k-subscription: privacy-preserving microblogging browsing through obfuscation.
Panagiotis Papadopoulos
Antonis Papadogiannakis
Michalis Polychronakis
Apostolis Zarras
Thorsten Holz
Evangelos P. Markatos
2013
conf/acsac
Control-flow restrictor: compiler-based CFI for iOS.
Jannik Pewny
Thorsten Holz
2012
conf/ccs
Scriptless attacks: stealing the pie without touching the sill.
Mario Heiderich
Marcus Niemietz
Felix Schuster
Thorsten Holz
Jörg Schwenk
2012
conf/uss
B@bel: Leveraging Email Delivery for Spam Mitigation.
Gianluca Stringhini
Manuel Egele
Apostolis Zarras
Thorsten Holz
Christopher Kruegel
Giovanni Vigna
2012
conf/sp
Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards.
Benedikt Driessen
Ralf Hund
Carsten Willems
Christof Paar
Thorsten Holz
2012
conf/ndss
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Lucas Davi
Alexandra Dmitrienko
Manuel Egele
Thomas Fischer
Thorsten Holz
Ralf Hund
Stefan Nürnberger
Ahmad-Reza Sadeghi
2012
conf/acsac
Down to the bare metal: using processor features for binary analysis.
Carsten Willems
Ralf Hund
Andreas Fobian
Dennis Felsch
Thorsten Holz
Amit Vasudevan
2012
conf/acsac
Using memory management to detect and extract illegitimate code for malware analysis.
Carsten Willems
Felix C. Freiling
Thorsten Holz
2011
conf/ccs
Crouching tiger - hidden payload: security risks of scalable vectors graphics.
Mario Heiderich
Tilman Frosch
Meiko Jensen
Thorsten Holz
2011
conf/ccs
Poster: control-flow integrity for smartphones.
Lucas Davi
Alexandra Dmitrienko
Manuel Egele
Thomas Fischer
Thorsten Holz
Ralf Hund
Stefan Nürnberger
Ahmad-Reza Sadeghi
2011
conf/uss
BOTMAGNIFIER: Locating Spambots on the Internet.
Gianluca Stringhini
Thorsten Holz
Brett Stone-Gross
Christopher Kruegel
Giovanni Vigna
2011
conf/uss
JACKSTRAWS: Picking Command and Control Connections from Bot Traffic.
Grégoire Jacob
Ralf Hund
Christopher Kruegel
Thorsten Holz
2011
conf/sp
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices.
Michael Becher
Felix C. Freiling
Johannes Hoffmann
Thorsten Holz
Sebastian Uellenbeck
Christopher Wolf
2010
conf/sp
A Practical Attack to De-anonymize Social Network Users.
Gilbert Wondracek
Thorsten Holz
Engin Kirda
Christopher Kruegel
2010
conf/sp
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries.
Clemens Kolbitsch
Thorsten Holz
Christopher Kruegel
Engin Kirda
2009
conf/uss
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms.
Ralf Hund
Thorsten Holz
Felix C. Freiling
2009
conf/esorics
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones.
Thorsten Holz
Markus Engelberth
Felix C. Freiling
2009
conf/esorics
Automatically Generating Models for Botnet Detection.
Peter Wurzinger
Leyla Bilge
Thorsten Holz
Jan Goebel
Christopher Kruegel
Engin Kirda
2008
conf/ndss
Measuring and Detecting Fast-Flux Service Networks.
Thorsten Holz
Christian Gorecki
Konrad Rieck
Felix C. Freiling
2007
conf/icics
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.
Jianwei Zhuge
Thorsten Holz
Xinhui Han
Chengyu Song
Wei Zou
2005
conf/esorics
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks.
Felix C. Freiling
Thorsten Holz
Georg Wicherski
Coauthors
Adam Oest
(2)
Addison Crump
(2)
Ahmad-Reza Sadeghi
(6)
Alexandra Dmitrienko
(2)
Ali Abbasi
(13)
Amit Vasudevan
(1)
Andre Pawlowski
(5)
Andrea Jemmett
(1)
Andreas Fobian
(1)
Andreas Wendler
(1)
Andreas Zeller
(1)
Antonio Emanuele Cinà
(2)
Antonis Papadogiannakis
(1)
Apostolis Zarras
(2)
Arash Ale Ebrahim
(1)
Asja Fischer
(1)
Behrad Garmany
(6)
Benedikt Driessen
(1)
Benjamin Kollenda
(7)
Bhupendra Acharya
(3)
Bjorn De Sutter
(1)
Björn Mathis
(1)
Brett Stone-Gross
(1)
Carsten Willems
(5)
Cemal Kaygusuz
(1)
Chengyu Song
(1)
Chris Ouwehand
(1)
Christian Böttger
(1)
Christian Dresen
(1)
Christian Gorecki
(1)
Christian Kison
(2)
Christian Mainka
(1)
Christian Rossow
(3)
Christina Pöpper
(8)
Christine Utz
(3)
Christof Paar
(3)
Christoph Bader
(1)
Christoph Endres
(1)
Christopher Kruegel
(7)
Christopher Lentzsch
(1)
Christopher Liebchen
(2)
Christopher Wolf
(3)
Claudia Eckert
(1)
Clemens Kolbitsch
(1)
Cornelius Aschermann
(12)
Cristiano Giuffrida
(6)
Damian Poddebniak
(1)
Daniel Klischies
(2)
Daniel Teuchert
(1)
Dario Lazzaro
(1)
David Klein
(1)
David Paaßen
(1)
David Rupprecht
(8)
Davide Maiorca
(1)
Dennis Andriesse
(1)
Dennis Felsch
(1)
Dennis Tatang
(6)
Doreen Riepel
(1)
Dorothea Kolossa
(5)
Efrén López-Morales
(1)
Elia Geretto
(1)
Elias Athanasopoulos
(2)
Emmanuele Zambon
(1)
Emre Güler
(4)
Enes Göktas
(3)
Engin Kirda
(4)
Eric Gustafson
(1)
Erik Bosman
(1)
Erik van der Kouwe
(1)
Erwin Quiring
(1)
Evangelos P. Markatos
(1)
Fabian Hemmer
(1)
Fabian Ising
(1)
Felix Buchmann
(3)
Felix C. Freiling
(6)
Felix Domke
(2)
Felix Schuster
(5)
Florian Bauckholt
(1)
Florian Bergsma
(1)
Florian Quinkert
(2)
Florian Schaub
(3)
Franziska Herbert
(1)
Georg Wicherski
(1)
Georgios Portokalidis
(1)
Ghassan Karame
(1)
Gianluca Stringhini
(2)
Gilbert Wondracek
(1)
Giorgio Giacinto
(1)
Giovanni Vigna
(3)
Grégoire Jacob
(1)
Hendrik Meutzner
(1)
Henry Hosseini
(1)
Herbert Bos
(6)
Hoang Dai Nguyen
(1)
Jan Goebel
(1)
Jan Hörnemann
(1)
Jannik Pewny
(7)
Janosch Kopper
(1)
Jianqiang Wang
(2)
Jianwei Zhuge
(1)
Jim Blythe
(1)
Jo Van Bulck
(1)
Joel Frank
(4)
Johannes Dahse
(3)
Johannes Hoffmann
(1)
Johannes Willbold
(4)
Jonas Möller
(1)
Jonas Pfoh
(1)
Jonas Ricker
(1)
Jörg Schwenk
(2)
Jos Wetzels
(1)
Joschua Schilling
(1)
Julius Basler
(2)
Kai Greshake
(1)
Kai Jansen
(1)
Katharina Kohls
(7)
Katharina Krombholz
(1)
Keno Hassler
(2)
Kirill Levchenko
(1)
Konrad Rieck
(2)
Lars Speckemeier
(1)
Lea Schönherr
(7)
Leon Trampert
(1)
Leyla Bilge
(1)
Li Shi
(2)
Lucas Davi
(10)
Lukas Bernhard
(8)
Lukas Gerlach
(1)
Malte Wessels
(1)
Manuel Egele
(3)
Manuel Vögele
(1)
Marc Fyrbiak
(2)
Marc Kührer
(2)
Marcus Niemietz
(1)
Mario Fritz
(1)
Mario Heiderich
(2)
Marius Muench
(3)
Markus Dürmuth
(2)
Markus Engelberth
(1)
Martin Degeling
(7)
Martin Johns
(2)
Martin Stoffel
(2)
Martin Strohmeier
(1)
Mathy Vanhoef
(1)
Matteo Cagnazzo
(1)
Matteo Große-Kampmann
(2)
Matteo Leonelli
(1)
Maximilian Gerhardt
(1)
Meiko Jensen
(1)
Meng Wang
(2)
Merlin Chlosta
(4)
Michael Backes
(1)
Michael Becher
(1)
Michael Franz
(1)
Michael Rodler
(2)
Michael Schwarz
(1)
Michalis Polychronakis
(1)
Moritz Bley
(1)
Moritz Contag
(5)
Moritz Schloegel
(16)
Moritz Schlögel
(2)
Muhammad Saad
(2)
Nico Schiller
(5)
Nicolai Bissantz
(1)
Nicolai Davidsson
(1)
Nikolai Krein
(1)
Nils Bars
(9)
Nils Langius
(1)
Nils Ole Tippenhauer
(1)
Norbert Pohlmann
(7)
Nurullah Demir
(1)
Panagiotis Papadopoulos
(1)
Patrick Jauernig
(1)
Patrick Wollgast
(1)
Per Larsen
(1)
Peter Wurzinger
(1)
Phani Vadrevu
(1)
Philipp Görz
(4)
Philipp Koppe
(9)
Qinying Wang
(2)
Radhesh Krishnan Konoth
(1)
Rahul Gopinath
(1)
Ralf Hund
(9)
Robert Gawlik
(11)
Robin Bisping
(1)
Sabrina Amft
(1)
Sahar Abdelnabi
(1)
Samuel Groß
(1)
Sandro Etalle
(2)
Sanjay Rawat
(1)
Sascha Fahl
(2)
Sebastian Österlund
(1)
Sebastian Schinzel
(2)
Sebastian Uellenbeck
(3)
Sebastian Vogl
(1)
Sergej Schumilo
(7)
Shailesh Mishra
(1)
Simeon Hoffmann
(1)
Simon Koch
(2)
Simon Wörner
(8)
Stefan Nürnberger
(3)
Stefan Savage
(1)
Steffen Zeiler
(2)
Stephen J. Crane
(1)
Stijn Volckaert
(1)
Teemu Rytilahti
(2)
Thomas Fischer
(2)
Thomas Hupperich
(4)
Thomas Kittel
(1)
Thomas Tendyck
(1)
Thorsten Eisenhofer
(5)
Thorsten Holz
(130)
Tilman Frosch
(2)
Tim Blazytko
(9)
Tim Suurland
(1)
Tim Werthmann
(1)
Tobias Cloosters
(2)
Tobias Kappert
(1)
Tobias Lauinger
(1)
Tobias Scharnowski
(8)
Tobias Urban
(6)
Tommaso Frassetto
(1)
Vector Guo Li
(1)
Victor van der Veen
(3)
Viet-Hung Nguyen
(1)
Vincent Lenders
(1)
Wei Zou
(1)
Wenting Li
(1)
William K. Robertson
(1)
Xi Chen
(1)
Xinhui Han
(1)
Xinyi Xu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to