


Остановите войну!
for scientists:


default search action
Thorsten Holz
Person information

- affiliation: CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
- affiliation (former): Ruhr University Bochum, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j23]Christine Utz, Sabrina Amft, Martin Degeling, Thorsten Holz, Sascha Fahl, Florian Schaub:
Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites. Proc. Priv. Enhancing Technol. 2023(1): 5-28 (2023) - [c192]Michael Rodler, David Paaßen, Wenting Li, Lukas Bernhard, Thorsten Holz, Ghassan Karame, Lucas Davi:
EF↯CF: High Performance Smart Contract Fuzzing for Exploit Generation. EuroS&P 2023: 449-471 - [c191]Nico Schiller, Xinyi Xu, Lukas Bernhard, Nils Bars, Moritz Schloegel, Thorsten Holz:
Novelty Not Found: Adaptive Fuzzer Restarts to Improve Input Space Coverage (Registered Report). FUZZING 2023: 12-20 - [c190]Addison Crump, Dongjia Zhang, Syeda Mahnur Asif, Dominik Christian Maier, Andrea Fioraldi, Thorsten Holz, Davide Balzarotti:
CrabSandwich: Fuzzing Rust with Rust (Registered Report). FUZZING 2023: 39-46 - [c189]Samuel Groß, Simon Koch, Lukas Bernhard, Thorsten Holz, Martin Johns:
FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities. NDSS 2023 - [c188]Nico Schiller, Merlin Chlosta, Moritz Schloegel, Nils Bars, Thorsten Eisenhofer, Tobias Scharnowski, Felix Domke, Lea Schönherr, Thorsten Holz:
Drone Security and the Mysterious Case of DJI's DroneID. NDSS 2023 - [c187]Johannes Willbold, Moritz Schloegel, Manuel Vögele, Maximilian Gerhardt, Thorsten Holz, Ali Abbasi:
Space Odyssey: An Experimental Software Security Analysis of Satellites. SP 2023: 1-19 - [c186]Nils Bars, Moritz Schloegel, Tobias Scharnowski, Nico Schiller, Thorsten Holz:
Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge. USENIX Security Symposium 2023 - [c185]Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck:
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning. USENIX Security Symposium 2023 - [c184]Philipp Görz, Björn Mathis, Keno Hassler, Emre Güler, Thorsten Holz, Andreas Zeller, Rahul Gopinath:
Systematic Assessment of Fuzzers using Mutation Analysis. USENIX Security Symposium 2023 - [c183]Tobias Scharnowski, Simon Wörner, Felix Buchmann, Nils Bars, Moritz Schloegel, Thorsten Holz:
Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs. USENIX Security Symposium 2023 - [i42]Hossein Hajipour, Thorsten Holz, Lea Schönherr, Mario Fritz:
Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models. CoRR abs/2302.04012 (2023) - [i41]Kai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, Mario Fritz:
More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models. CoRR abs/2302.12173 (2023) - [i40]Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck:
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning. CoRR abs/2303.14443 (2023) - [i39]Michael Rodler, David Paaßen, Wenting Li, Lukas Bernhard, Thorsten Holz, Ghassan Karame, Lucas Davi:
EF/CF: High Performance Smart Contract Fuzzing for Exploit Generation. CoRR abs/2304.06341 (2023) - 2022
- [j22]Lea Schönherr
, Maximilian Golla
, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, Thorsten Holz
:
Exploring accidental triggers of smart speakers. Comput. Speech Lang. 73: 101328 (2022) - [j21]Terry Benzel, Thorsten Holz:
Selected Papers From the 2021 IEEE Symposium on Security and Privacy. IEEE Secur. Priv. 20(2): 8-9 (2022) - [c182]Lukas Bernhard, Tobias Scharnowski, Moritz Schloegel, Tim Blazytko, Thorsten Holz:
JIT-Picking: Differential Fuzzing of JavaScript Engines. CCS 2022: 351-364 - [c181]Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi:
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64. EuroS&P 2022: 502-519 - [c180]Sergej Schumilo, Cornelius Aschermann, Andrea Jemmett
, Ali Abbasi
, Thorsten Holz:
Nyx-net: network fuzzing with incremental snapshots. EuroSys 2022: 166-180 - [c179]Tobias Scharnowski, Nils Bars, Moritz Schloegel, Eric Gustafson, Marius Muench, Giovanni Vigna, Christopher Kruegel, Thorsten Holz, Ali Abbasi:
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing. USENIX Security Symposium 2022: 1239-1256 - [c178]Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi:
Loki: Hardening Code Obfuscation Against Automated Attacks. USENIX Security Symposium 2022: 3055-3073 - [c177]Tobias Cloosters, Johannes Willbold, Thorsten Holz, Lucas Davi:
SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing. USENIX Security Symposium 2022: 3147-3164 - [c176]Nurullah Demir, Matteo Große-Kampmann
, Tobias Urban, Christian Wressnegger, Thorsten Holz, Norbert Pohlmann:
Reproducibility and Replicability of Web Measurement Studies. WWW 2022: 533-544 - [i38]Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi:
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64. CoRR abs/2203.04117 (2022) - [i37]Christine Utz
, Sabrina Amft, Martin Degeling, Thorsten Holz, Sascha Fahl, Florian Schaub:
Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites. CoRR abs/2203.11387 (2022) - [i36]Jonas Ricker, Simon Damm, Thorsten Holz, Asja Fischer:
Towards the Detection of Diffusion Model Deepfakes. CoRR abs/2210.14571 (2022) - [i35]Philipp Görz, Björn Mathis, Keno Hassler, Emre Güler, Thorsten Holz, Andreas Zeller, Rahul Gopinath:
How to Compare Fuzzers. CoRR abs/2212.03075 (2022) - 2021
- [c175]Florian Quinkert, Dennis Tatang, Thorsten Holz:
Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy. DIMVA 2021: 68-87 - [c174]Florian Quinkert, Martin Degeling
, Thorsten Holz:
Spotlight on Phishing: A Longitudinal Study on Phishing Awareness Trainings. DIMVA 2021: 341-360 - [c173]Dennis Tatang, Robin Flume, Thorsten Holz:
Extended Abstract: A First Large-Scale Analysis on Usage of MTA-STS. DIMVA 2021: 361-370 - [c172]Moritz Schloegel, Tim Blazytko, Julius Basler, Fabian Hemmer, Thorsten Holz:
Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains. ESORICS (1) 2021: 218-239 - [c171]Sebastian Österlund
, Elia Geretto
, Andrea Jemmett
, Emre Güler, Philipp Görz, Thorsten Holz, Cristiano Giuffrida
, Herbert Bos
:
CollabFuzz: A Framework for Collaborative Fuzzing. EuroSec@EuroSys 2021: 1-7 - [c170]Dennis Tatang, Philip Kreißel, Michael Sehring, Florian Quinkert, Martin Degeling
, Thorsten Holz:
Likes are not Likes A Crowdworking Platform Analysis. ICWSM Workshops 2021 - [c169]Dennis Tatang, Florian Zettl, Thorsten Holz:
The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding Flaws. RAID 2021: 354-369 - [c168]Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz:
Dompteur: Taming Audio Adversarial Examples. USENIX Security Symposium 2021: 2309-2326 - [c167]Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Wörner, Thorsten Holz:
Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types. USENIX Security Symposium 2021: 2597-2614 - [c166]Merlin Chlosta, David Rupprecht, Thorsten Holz:
On the challenges of automata reconstruction in LTE networks. WISEC 2021: 164-174 - [c165]Merlin Chlosta, David Rupprecht, Christina Pöpper
, Thorsten Holz:
5G SUCI-catchers: still catching them all? WISEC 2021: 359-364 - [i34]Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz:
Dompteur: Taming Audio Adversarial Examples. CoRR abs/2102.05431 (2021) - [i33]Joel Frank, Thorsten Holz:
[RE] CNN-generated images are surprisingly easy to spot...for now. CoRR abs/2104.02984 (2021) - [i32]Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi:
Loki: Hardening Code Obfuscation Against Automated Attacks. CoRR abs/2106.08913 (2021) - [i31]Sergej Schumilo, Cornelius Aschermann, Andrea Jemmett, Ali Abbasi, Thorsten Holz:
Nyx-Net: Network Fuzzing with Incremental Snapshots. CoRR abs/2111.03013 (2021) - 2020
- [c164]Emre Güler, Philipp Görz, Elia Geretto
, Andrea Jemmett
, Sebastian Österlund
, Herbert Bos
, Cristiano Giuffrida
, Thorsten Holz:
Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing. ACSAC 2020: 360-372 - [c163]Lea Schönherr
, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa
:
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems. ACSAC 2020: 843-855 - [c162]Tobias Urban
, Dennis Tatang, Martin Degeling
, Thorsten Holz, Norbert Pohlmann:
Measuring the Impact of the GDPR on Data Sharing in Ad Networks. AsiaCCS 2020: 222-235 - [c161]Florian Quinkert, Martin Degeling
, Jim Blythe, Thorsten Holz:
Be the Phisher - Understanding Users' Perception of Malicious Domains. AsiaCCS 2020: 263-276 - [c160]Christian Dresen
, Fabian Ising, Damian Poddebniak, Tobias Kappert, Thorsten Holz, Sebastian Schinzel:
CORSICA: Cross-Origin Web Service Identification. AsiaCCS 2020: 409-419 - [c159]Tobias Urban
, Matteo Große-Kampmann
, Dennis Tatang, Thorsten Holz, Norbert Pohlmann:
Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces. ESORICS (2) 2020: 272-291 - [c158]Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, Thorsten Holz:
Leveraging Frequency Analysis for Deep Fake Image Recognition. ICML 2020: 3247-3258 - [c157]David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper:
IMP4GT: IMPersonation Attacks in 4G NeTworks. NDSS 2020 - [c156]Teemu Rytilahti, Thorsten Holz:
On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways. NDSS 2020 - [c155]Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Wörner, Thorsten Holz:
HYPER-CUBE: High-Dimensional Hypervisor Fuzzing. NDSS 2020 - [c154]Cornelius Aschermann, Sergej Schumilo, Ali Abbasi
, Thorsten Holz:
Ijon: Exploring Deep State Spaces via Fuzzing. SP 2020: 1597-1612 - [c153]David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper:
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE. USENIX Security Symposium 2020: 73-88 - [c152]Tim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz:
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation. USENIX Security Symposium 2020: 235-252 - [c151]Joel Frank, Cornelius Aschermann, Thorsten Holz:
ETHBMC: A Bounded Model Checker for Smart Contracts. USENIX Security Symposium 2020: 2757-2774 - [c150]Tobias Urban
, Martin Degeling
, Thorsten Holz, Norbert Pohlmann:
Beyond the Front Page: Measuring Third Party Dynamics in the Field. WWW 2020: 1275-1286 - [i30]Tobias Urban, Martin Degeling, Thorsten Holz, Norbert Pohlmann:
Beyond the Front Page: Measuring Third Party Dynamics in the Field. CoRR abs/2001.10248 (2020) - [i29]Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, Thorsten Holz:
Leveraging Frequency Analysis for Deep Fake Image Recognition. CoRR abs/2003.08685 (2020) - [i28]Christian Dresen, Fabian Ising, Damian Poddebniak, Tobias Kappert, Thorsten Holz, Sebastian Schinzel:
CORSICA: Cross-Origin Web Service Identification. CoRR abs/2004.00939 (2020) - [i27]Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle:
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems. CoRR abs/2007.02307 (2020) - [i26]Jannik Pewny, Philipp Koppe, Thorsten Holz:
Steroids for DOPed Applications: A Compiler for Automated Data-Oriented Programming. CoRR abs/2007.02308 (2020) - [i25]Behrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz:
Static Detection of Uninitialized Stack Variables in Binary Code. CoRR abs/2007.02314 (2020) - [i24]Jannik Pewny, Thorsten Holz:
EvilCoder: Automated Bug Insertion. CoRR abs/2007.02326 (2020) - [i23]Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos:
VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching. CoRR abs/2007.03302 (2020) - [i22]Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz:
Breaking and Fixing Destructive Code Read Defenses. CoRR abs/2007.03548 (2020) - [i21]Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz:
An Exploratory Analysis of Microcode as a Building Block for System Defenses. CoRR abs/2007.03549 (2020) - [i20]Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz:
Detile: Fine-Grained Information Leak Detection in Script Engines. CoRR abs/2007.03550 (2020) - [i19]Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin Kollenda, Thorsten Holz:
Automated Multi-Architectural Discovery of CFI-Resistant Code Gadgets. CoRR abs/2007.04116 (2020) - [i18]Lea Schönherr, Maximilian Golla, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, Thorsten Holz:
Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers. CoRR abs/2008.00508 (2020) - [i17]Hojjat Aghakhani, Thorsten Eisenhofer, Lea Schönherr, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:
VENOMAVE: Clean-Label Poisoning Against Speech Recognition. CoRR abs/2010.10682 (2020)
2010 – 2019
- 2019
- [j20]Christine Utz
, Stephan Koloßa
, Thorsten Holz, Pierre Thielbörger:
Die DSGVO als internationales Vorbild? Datenschutz und Datensicherheit 43(11): 700-705 (2019) - [j19]Martin Degeling, Christine Utz
, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten Holz:
We Value Your Privacy ... Now Take Some Cookies - Measuring the GDPR's Impact on Web Privacy. Inform. Spektrum 42(5): 345-346 (2019) - [j18]Tobias Urban
, Dennis Tatang, Thorsten Holz, Norbert Pohlmann:
Analyzing leakage of personal information by malware. J. Comput. Secur. 27(4): 459-481 (2019) - [c149]Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida
, Herbert Bos
:
VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching. ACSAC 2019: 97-112 - [c148]Tobias Urban
, Martin Degeling
, Thorsten Holz, Norbert Pohlmann:
"Your hashed IP address: Ubuntu.": perspectives on transparency tools for online advertising. ACSAC 2019: 702-717 - [c147]Christine Utz
, Martin Degeling
, Sascha Fahl, Florian Schaub, Thorsten Holz:
(Un)informed Consent: Studying GDPR Consent Notices in the Field. CCS 2019: 973-990 - [c146]Florian Quinkert, Tobias Lauinger, William K. Robertson, Engin Kirda, Thorsten Holz:
It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains. CNS 2019: 259-267 - [c145]Dennis Tatang, Carl Richard Theodor Schneider
, Thorsten Holz:
Large-Scale Analysis of Infrastructure-Leaking DNS Servers. DIMVA 2019: 353-373 - [c144]Dennis Tatang, Florian Quinkert, Thorsten Holz:
Below the Radar: Spotting DNS Tunnels in Newly Observed Hostnames in the Wild. eCrime 2019: 1-15 - [c143]Andrew Paverd, Marcus Völp
, Ferdinand Brasser, Matthias Schunter, N. Asokan
, Ahmad-Reza Sadeghi, Paulo Jorge Esteves Veríssimo, Andreas Steininger
, Thorsten Holz:
Sustainable Security & Safety: Challenges and Opportunities. CERTS 2019: 4:1-4:13 - [c142]Tobias Urban
, Dennis Tatang, Martin Degeling
, Thorsten Holz, Norbert Pohlmann:
A Study on Subject Data Access in Online Advertising After the GDPR. DPM/CBT@ESORICS 2019: 61-79 - [c141]Behrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz:
Static Detection of Uninitialized Stack Variables in Binary Code. ESORICS (2) 2019: 68-87 - [c140]Nicolai Davidsson, Andre Pawlowski, Thorsten Holz:
Towards Automated Application-Specific Software Stacks. ESORICS (2) 2019: 88-109 - [c139]Matteo Cagnazzo
, Thorsten Holz, Norbert Pohlmann:
GDPiRated - Stealing Personal Information On- and Offline. ESORICS (2) 2019: 367-386 - [c138]Dennis Tatang, Tim Suurland, Thorsten Holz:
Study of DNS Rebinding Attacks on Smart Home Devices. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 391-401 - [c137]Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle:
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems. EuroS&P 2019: 31-46 - [c136]Jannik Pewny, Philipp Koppe, Thorsten Holz:
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming. EuroS&P 2019: 111-126 - [c135]Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, Daniel Teuchert:
NAUTILUS: Fishing for Deep Bugs with Grammars. NDSS 2019 - [c134]Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz:
REDQUEEN: Fuzzing with Input-to-State Correspondence. NDSS 2019 - [c133]Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten Holz:
We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy. NDSS 2019 - [c132]Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Pöpper:
On the Challenges of Geographical Avoidance for Tor. NDSS 2019 - [c131]Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. NDSS 2019 - [c130]David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
:
Breaking LTE on Layer Two. IEEE Symposium on Security and Privacy 2019: 1121-1136 - [c129]Emre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz:
AntiFuzz: Impeding Fuzzing Audits of Binary Executables. USENIX Security Symposium 2019: 1931-1947 - [c128]Tim Blazytko, Cornelius Aschermann, Moritz Schlögel, Ali Abbasi, Sergej Schumilo, Simon Wörner, Thorsten Holz:
GRIMOIRE: Synthesizing Structure while Fuzzing. USENIX Security Symposium 2019: 1985-2002 - [c127]Katharina Kohls, David Rupprecht, Thorsten Holz, Christina Pöpper
:
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two. WiSec 2019: 249-260 - [c126]Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper
:
LTE security disabled: misconfiguration in commercial networks. WiSec 2019: 261-266 - [e7]Lorenzo Cavallaro, Johannes Kinder, Thorsten Holz:
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019. ACM 2019, ISBN 978-1-4503-6831-5 [contents] - [i16]Dennis Tatang, Florian Quinkert, Nico Dolecki, Thorsten Holz:
A Study of Newly Observed Hostnames and DNS Tunneling in the Wild. CoRR abs/1902.08454 (2019) - [i15]Nicolai Davidsson, Andre Pawlowski, Thorsten Holz:
Towards Automated Application-Specific Software Stacks. CoRR abs/1907.01933 (2019) - [i14]Lea Schönherr, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Robust Over-the-Air Adversarial Examples Against Automatic Speech Recognition Systems. CoRR abs/1908.01551 (2019) - [i13]Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, Thorsten Holz:
(Un)informed Consent: Studying GDPR Consent Notices in the Field. CoRR abs/1909.02638 (2019) - [i12]Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz:
Reverse Engineering x86 Processor Microcode. CoRR abs/1910.00948 (2019) - 2018
- [j17]David Rupprecht
, Adrian Dabrowski
, Thorsten Holz
, Edgar R. Weippl, Christina Pöpper
:
On Security Research Towards Future Mobile Network Generations. IEEE Commun. Surv. Tutorials 20(3): 2518-2542 (2018) - [c125]Behrad Garmany, Martin Stoffel, Robert Gawlik, Philipp Koppe, Tim Blazytko, Thorsten Holz
:
Towards Automated Generation of Exploitation Primitives for Web Browsers. ACSAC 2018: 300-312 - [c124]Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
:
An Exploratory Analysis of Microcode as a Building Block for System Defenses. CCS 2018: 1649-1666 - [c123]Thomas Hupperich
, Dennis Tatang, Nicolai Wilkop, Thorsten Holz
:
An Empirical Study on Online Price Differentiation. CODASPY 2018: 76-83 - [c122]Moritz Contag, Robert Gawlik, Andre Pawlowski, Thorsten Holz
:
On the Weaknesses of Function Table Randomization. DIMVA 2018: 185-207 - [c121]Tobias Urban
, Dennis Tatang, Thorsten Holz
, Norbert Pohlmann:
Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs. ESORICS (1) 2018: 449-469 - [c120]Teemu Rytilahti, Dennis Tatang, Janosch Kopper, Thorsten Holz
:
Masters of Time: An Overview of the NTP Ecosystem. EuroS&P 2018: 122-136 - [c119]Enes Göktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz
, Herbert Bos
, Cristiano Giuffrida
:
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. EuroS&P 2018: 227-242 - [c118]Christian Röpke, Thorsten Holz
:
Preventing Malicious SDN Applications From Hiding Adverse Network Manipulations. SecSoN@SIGCOMM 2018: 40-45 - [c117]Matteo Cagnazzo
, Markus Hertlein, Thorsten Holz, Norbert Pohlmann:
Threat modeling for mobile health systems. WCNC Workshops 2018: 314-319 - [c116]Robert Gawlik, Thorsten Holz:
SoK: Make JIT-Spray Great Again. WOOT @ USENIX Security Symposium 2018 - [p3]