


Остановите войну!
for scientists:
Thorsten Holz
Person information

- affiliation: Ruhr University Bochum, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j22]Lea Schönherr
, Maximilian Golla
, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, Thorsten Holz
:
Exploring accidental triggers of smart speakers. Comput. Speech Lang. 73: 101328 (2022) - [j21]Terry Benzel, Thorsten Holz:
Selected Papers From the 2021 IEEE Symposium on Security and Privacy. IEEE Secur. Priv. 20(2): 8-9 (2022) - [c176]Sergej Schumilo, Cornelius Aschermann, Andrea Jemmett, Ali Abbasi, Thorsten Holz:
Nyx-net: network fuzzing with incremental snapshots. EuroSys 2022: 166-180 - [c175]Nurullah Demir, Matteo Große-Kampmann, Tobias Urban, Christian Wressnegger, Thorsten Holz, Norbert Pohlmann:
Reproducibility and Replicability of Web Measurement Studies. WWW 2022: 533-544 - [i36]Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi:
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64. CoRR abs/2203.04117 (2022) - [i35]Christine Utz, Sabrina Amft, Martin Degeling, Thorsten Holz, Sascha Fahl, Florian Schaub:
Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites. CoRR abs/2203.11387 (2022) - 2021
- [c174]Florian Quinkert, Dennis Tatang, Thorsten Holz:
Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy. DIMVA 2021: 68-87 - [c173]Florian Quinkert, Martin Degeling, Thorsten Holz:
Spotlight on Phishing: A Longitudinal Study on Phishing Awareness Trainings. DIMVA 2021: 341-360 - [c172]Dennis Tatang, Robin Flume, Thorsten Holz:
Extended Abstract: A First Large-Scale Analysis on Usage of MTA-STS. DIMVA 2021: 361-370 - [c171]Moritz Schlögel, Tim Blazytko, Julius Basler, Fabian Hemmer, Thorsten Holz:
Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains. ESORICS (1) 2021: 218-239 - [c170]Sebastian Österlund
, Elia Geretto
, Andrea Jemmett, Emre Güler, Philipp Görz, Thorsten Holz, Cristiano Giuffrida
, Herbert Bos
:
CollabFuzz: A Framework for Collaborative Fuzzing. EuroSec@EuroSys 2021: 1-7 - [c169]Dennis Tatang, Florian Zettl, Thorsten Holz:
The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding Flaws. RAID 2021: 354-369 - [c168]Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz:
Dompteur: Taming Audio Adversarial Examples. USENIX Security Symposium 2021: 2309-2326 - [c167]Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Wörner, Thorsten Holz:
Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types. USENIX Security Symposium 2021: 2597-2614 - [c166]Merlin Chlosta, David Rupprecht, Thorsten Holz:
On the challenges of automata reconstruction in LTE networks. WISEC 2021: 164-174 - [c165]Merlin Chlosta, David Rupprecht, Christina Pöpper, Thorsten Holz:
5G SUCI-catchers: still catching them all? WISEC 2021: 359-364 - [i34]Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz:
Dompteur: Taming Audio Adversarial Examples. CoRR abs/2102.05431 (2021) - [i33]Joel Frank, Thorsten Holz:
[RE] CNN-generated images are surprisingly easy to spot...for now. CoRR abs/2104.02984 (2021) - [i32]Moritz Schlögel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi:
Loki: Hardening Code Obfuscation Against Automated Attacks. CoRR abs/2106.08913 (2021) - [i31]Sergej Schumilo, Cornelius Aschermann, Andrea Jemmett, Ali Abbasi, Thorsten Holz:
Nyx-Net: Network Fuzzing with Incremental Snapshots. CoRR abs/2111.03013 (2021) - 2020
- [c164]Emre Güler, Philipp Görz, Elia Geretto
, Andrea Jemmett, Sebastian Österlund
, Herbert Bos
, Cristiano Giuffrida
, Thorsten Holz:
Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing. ACSAC 2020: 360-372 - [c163]Lea Schönherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems. ACSAC 2020: 843-855 - [c162]Tobias Urban
, Dennis Tatang, Martin Degeling
, Thorsten Holz, Norbert Pohlmann:
Measuring the Impact of the GDPR on Data Sharing in Ad Networks. AsiaCCS 2020: 222-235 - [c161]Florian Quinkert, Martin Degeling
, Jim Blythe, Thorsten Holz:
Be the Phisher - Understanding Users' Perception of Malicious Domains. AsiaCCS 2020: 263-276 - [c160]Christian Dresen
, Fabian Ising, Damian Poddebniak, Tobias Kappert, Thorsten Holz, Sebastian Schinzel:
CORSICA: Cross-Origin Web Service Identification. AsiaCCS 2020: 409-419 - [c159]Tobias Urban
, Matteo Große-Kampmann, Dennis Tatang, Thorsten Holz, Norbert Pohlmann:
Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces. ESORICS (2) 2020: 272-291 - [c158]Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, Thorsten Holz:
Leveraging Frequency Analysis for Deep Fake Image Recognition. ICML 2020: 3247-3258 - [c157]David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper:
IMP4GT: IMPersonation Attacks in 4G NeTworks. NDSS 2020 - [c156]Teemu Rytilahti, Thorsten Holz:
On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways. NDSS 2020 - [c155]Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Wörner, Thorsten Holz:
HYPER-CUBE: High-Dimensional Hypervisor Fuzzing. NDSS 2020 - [c154]Cornelius Aschermann, Sergej Schumilo, Ali Abbasi, Thorsten Holz:
Ijon: Exploring Deep State Spaces via Fuzzing. IEEE Symposium on Security and Privacy 2020: 1597-1612 - [c153]David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper:
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE. USENIX Security Symposium 2020: 73-88 - [c152]Tim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz:
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation. USENIX Security Symposium 2020: 235-252 - [c151]Joel Frank, Cornelius Aschermann, Thorsten Holz:
ETHBMC: A Bounded Model Checker for Smart Contracts. USENIX Security Symposium 2020: 2757-2774 - [c150]Tobias Urban
, Martin Degeling
, Thorsten Holz, Norbert Pohlmann:
Beyond the Front Page: Measuring Third Party Dynamics in the Field. WWW 2020: 1275-1286 - [i30]Tobias Urban, Martin Degeling, Thorsten Holz, Norbert Pohlmann:
Beyond the Front Page: Measuring Third Party Dynamics in the Field. CoRR abs/2001.10248 (2020) - [i29]Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, Thorsten Holz:
Leveraging Frequency Analysis for Deep Fake Image Recognition. CoRR abs/2003.08685 (2020) - [i28]Christian Dresen, Fabian Ising, Damian Poddebniak, Tobias Kappert, Thorsten Holz, Sebastian Schinzel:
CORSICA: Cross-Origin Web Service Identification. CoRR abs/2004.00939 (2020) - [i27]Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle:
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems. CoRR abs/2007.02307 (2020) - [i26]Jannik Pewny, Philipp Koppe, Thorsten Holz:
Steroids for DOPed Applications: A Compiler for Automated Data-Oriented Programming. CoRR abs/2007.02308 (2020) - [i25]Behrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz:
Static Detection of Uninitialized Stack Variables in Binary Code. CoRR abs/2007.02314 (2020) - [i24]Jannik Pewny, Thorsten Holz:
EvilCoder: Automated Bug Insertion. CoRR abs/2007.02326 (2020) - [i23]Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos:
VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching. CoRR abs/2007.03302 (2020) - [i22]Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz:
Breaking and Fixing Destructive Code Read Defenses. CoRR abs/2007.03548 (2020) - [i21]Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz:
An Exploratory Analysis of Microcode as a Building Block for System Defenses. CoRR abs/2007.03549 (2020) - [i20]Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz:
Detile: Fine-Grained Information Leak Detection in Script Engines. CoRR abs/2007.03550 (2020) - [i19]Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin Kollenda, Thorsten Holz:
Automated Multi-Architectural Discovery of CFI-Resistant Code Gadgets. CoRR abs/2007.04116 (2020) - [i18]Lea Schönherr, Maximilian Golla, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, Thorsten Holz:
Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers. CoRR abs/2008.00508 (2020) - [i17]Hojjat Aghakhani, Thorsten Eisenhofer, Lea Schönherr, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:
VENOMAVE: Clean-Label Poisoning Against Speech Recognition. CoRR abs/2010.10682 (2020)
2010 – 2019
- 2019
- [j20]Christine Utz
, Stephan Koloßa
, Thorsten Holz, Pierre Thielbörger:
Die DSGVO als internationales Vorbild? Datenschutz und Datensicherheit 43(11): 700-705 (2019) - [j19]Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten Holz:
We Value Your Privacy ... Now Take Some Cookies - Measuring the GDPR's Impact on Web Privacy. Inform. Spektrum 42(5): 345-346 (2019) - [j18]Tobias Urban
, Dennis Tatang, Thorsten Holz, Norbert Pohlmann:
Analyzing leakage of personal information by malware. J. Comput. Secur. 27(4): 459-481 (2019) - [c149]Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida
, Herbert Bos
:
VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching. ACSAC 2019: 97-112 - [c148]Tobias Urban
, Martin Degeling, Thorsten Holz, Norbert Pohlmann:
"Your hashed IP address: Ubuntu.": perspectives on transparency tools for online advertising. ACSAC 2019: 702-717 - [c147]Christine Utz
, Martin Degeling
, Sascha Fahl, Florian Schaub, Thorsten Holz:
(Un)informed Consent: Studying GDPR Consent Notices in the Field. CCS 2019: 973-990 - [c146]Florian Quinkert, Tobias Lauinger, William K. Robertson, Engin Kirda, Thorsten Holz:
It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains. CNS 2019: 259-267 - [c145]Dennis Tatang, Carl Schneider, Thorsten Holz:
Large-Scale Analysis of Infrastructure-Leaking DNS Servers. DIMVA 2019: 353-373 - [c144]Dennis Tatang, Florian Quinkert, Thorsten Holz:
Below the Radar: Spotting DNS Tunnels in Newly Observed Hostnames in the Wild. eCrime 2019: 1-15 - [c143]Andrew Paverd, Marcus Völp
, Ferdinand Brasser, Matthias Schunter, N. Asokan
, Ahmad-Reza Sadeghi, Paulo Jorge Esteves Veríssimo, Andreas Steininger, Thorsten Holz:
Sustainable Security & Safety: Challenges and Opportunities. CERTS 2019: 4:1-4:13 - [c142]Tobias Urban
, Dennis Tatang, Martin Degeling
, Thorsten Holz, Norbert Pohlmann:
A Study on Subject Data Access in Online Advertising After the GDPR. DPM/CBT@ESORICS 2019: 61-79 - [c141]Behrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz:
Static Detection of Uninitialized Stack Variables in Binary Code. ESORICS (2) 2019: 68-87 - [c140]Nicolai Davidsson, Andre Pawlowski, Thorsten Holz:
Towards Automated Application-Specific Software Stacks. ESORICS (2) 2019: 88-109 - [c139]Matteo Cagnazzo, Thorsten Holz, Norbert Pohlmann:
GDPiRated - Stealing Personal Information On- and Offline. ESORICS (2) 2019: 367-386 - [c138]Dennis Tatang, Tim Suurland, Thorsten Holz:
Study of DNS Rebinding Attacks on Smart Home Devices. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 391-401 - [c137]Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle:
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems. EuroS&P 2019: 31-46 - [c136]Jannik Pewny, Philipp Koppe, Thorsten Holz:
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming. EuroS&P 2019: 111-126 - [c135]Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, Daniel Teuchert:
NAUTILUS: Fishing for Deep Bugs with Grammars. NDSS 2019 - [c134]Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz:
REDQUEEN: Fuzzing with Input-to-State Correspondence. NDSS 2019 - [c133]Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten Holz:
We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy. NDSS 2019 - [c132]Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Pöpper:
On the Challenges of Geographical Avoidance for Tor. NDSS 2019 - [c131]Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. NDSS 2019 - [c130]David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
:
Breaking LTE on Layer Two. IEEE Symposium on Security and Privacy 2019: 1121-1136 - [c129]Emre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz:
AntiFuzz: Impeding Fuzzing Audits of Binary Executables. USENIX Security Symposium 2019: 1931-1947 - [c128]Tim Blazytko, Cornelius Aschermann, Moritz Schlögel, Ali Abbasi, Sergej Schumilo, Simon Wörner, Thorsten Holz:
GRIMOIRE: Synthesizing Structure while Fuzzing. USENIX Security Symposium 2019: 1985-2002 - [c127]Katharina Kohls, David Rupprecht, Thorsten Holz, Christina Pöpper
:
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two. WiSec 2019: 249-260 - [c126]Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper
:
LTE security disabled: misconfiguration in commercial networks. WiSec 2019: 261-266 - [e7]Lorenzo Cavallaro, Johannes Kinder, Thorsten Holz:
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019. ACM 2019, ISBN 978-1-4503-6831-5 [contents] - [i16]Dennis Tatang, Florian Quinkert, Nico Dolecki, Thorsten Holz:
A Study of Newly Observed Hostnames and DNS Tunneling in the Wild. CoRR abs/1902.08454 (2019) - [i15]Nicolai Davidsson, Andre Pawlowski, Thorsten Holz:
Towards Automated Application-Specific Software Stacks. CoRR abs/1907.01933 (2019) - [i14]Lea Schönherr, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Robust Over-the-Air Adversarial Examples Against Automatic Speech Recognition Systems. CoRR abs/1908.01551 (2019) - [i13]Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, Thorsten Holz:
(Un)informed Consent: Studying GDPR Consent Notices in the Field. CoRR abs/1909.02638 (2019) - [i12]Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz:
Reverse Engineering x86 Processor Microcode. CoRR abs/1910.00948 (2019) - 2018
- [j17]David Rupprecht
, Adrian Dabrowski
, Thorsten Holz
, Edgar R. Weippl, Christina Pöpper
:
On Security Research Towards Future Mobile Network Generations. IEEE Commun. Surv. Tutorials 20(3): 2518-2542 (2018) - [c125]Behrad Garmany, Martin Stoffel, Robert Gawlik, Philipp Koppe, Tim Blazytko, Thorsten Holz
:
Towards Automated Generation of Exploitation Primitives for Web Browsers. ACSAC 2018: 300-312 - [c124]Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
:
An Exploratory Analysis of Microcode as a Building Block for System Defenses. CCS 2018: 1649-1666 - [c123]Thomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz
:
An Empirical Study on Online Price Differentiation. CODASPY 2018: 76-83 - [c122]Moritz Contag, Robert Gawlik, Andre Pawlowski, Thorsten Holz
:
On the Weaknesses of Function Table Randomization. DIMVA 2018: 185-207 - [c121]Tobias Urban
, Dennis Tatang, Thorsten Holz
, Norbert Pohlmann:
Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs. ESORICS (1) 2018: 449-469 - [c120]Teemu Rytilahti, Dennis Tatang, Janosch Kopper, Thorsten Holz
:
Masters of Time: An Overview of the NTP Ecosystem. EuroS&P 2018: 122-136 - [c119]Enes Göktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz
, Herbert Bos
, Cristiano Giuffrida
:
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. EuroS&P 2018: 227-242 - [c118]Christian Röpke, Thorsten Holz
:
Preventing Malicious SDN Applications From Hiding Adverse Network Manipulations. SecSoN@SIGCOMM 2018: 40-45 - [c117]Matteo Cagnazzo, Markus Hertlein, Thorsten Holz, Norbert Pohlmann:
Threat modeling for mobile health systems. WCNC Workshops 2018: 314-319 - [c116]Robert Gawlik, Thorsten Holz:
SoK: Make JIT-Spray Great Again. WOOT @ USENIX Security Symposium 2018 - [p3]Felix Schuster, Thorsten Holz:
Attacking dynamic code. The Continuing Arms Race 2018: 139-180 - [e6]Michael Bailey, Thorsten Holz
, Manolis Stamatogiannakis, Sotiris Ioannidis:
Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings. Lecture Notes in Computer Science 11050, Springer 2018, ISBN 978-3-030-00469-9 [contents] - [i11]Florian Quinkert, Thorsten Holz, K. S. M. Tozammel Hossain, Emilio Ferrara, Kristina Lerman:
RAPTOR: Ransomware Attack PredicTOR. CoRR abs/1803.01598 (2018) - [i10]Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten Holz:
We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy. CoRR abs/1808.05096 (2018) - [i9]Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. CoRR abs/1808.05665 (2018) - [i8]Tobias Urban, Dennis Tatang, Martin Degeling, Thorsten Holz, Norbert Pohlmann:
The Unwanted Sharing Economy: An Analysis of Cookie Syncing and User Transparency under GDPR. CoRR abs/1811.08660 (2018) - 2017
- [j16]Katharina Krombholz, Thomas Hupperich, Thorsten Holz
:
May the Force Be with You: The Future of Force-Sensitive Authentication. IEEE Internet Comput. 21(3): 64-69 (2017) - [j15]Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz:
Cross-architecture bug search in binary executables. it Inf. Technol. 59(2): 83 (2017) - [j14]Hendrik Meutzner
, Santosh Gupta, Viet-Hung Nguyen, Thorsten Holz
, Dorothea Kolossa
:
Toward Improved Audio CAPTCHAs Based on Auditory Perception and Language Understanding. ACM Trans. Priv. Secur. 19(4): 10:1-10:31 (2017) - [c115]Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz
:
Breaking and Fixing Destructive Code Read Defenses. ACSAC 2017: 55-67 - [c114]Ali Abbasi, Thorsten Holz
, Emmanuele Zambon, Sandro Etalle:
ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. ACSAC 2017: 437-448 - [c113]Benjamin Kollenda, Enes Göktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, Radhesh Krishnan Konoth, Cristiano Giuffrida
, Herbert Bos
, Thorsten Holz
:
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables. DSN 2017: 189-200 - [c112]Andre Pawlowski, Moritz Contag, Victor van der Veen, Chris Ouwehand, Thorsten Holz, Herbert Bos, Elias Athanasopoulos, Cristiano Giuffrida:
MARX: Uncovering Class Hierarchies in C++ Programs. NDSS 2017 - [c111]Dennis Tatang, Florian Quinkert, Joel Frank, Christian Röpke, Thorsten Holz
:
SDN-Guard: Protecting SDN controllers against SDN rootkits. NFV-SDN 2017: 297-302 - [c110]Moritz Contag, Vector Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz
, Stefan Savage:
How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles. IEEE Symposium on Security and Privacy 2017: 231-250 - [c109]Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, Thorsten Holz:
kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels. USENIX Security Symposium 2017: 167-182 - [c108]Tim Blazytko, Moritz Contag, Cornelius Aschermann, Thorsten Holz:
Syntia: Synthesizing the Semantics of Obfuscated Code. USENIX Security Symposium 2017: 643-659 - [c107]Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz:
Reverse Engineering x86 Processor Microcode. USENIX Security Symposium 2017: 1163-1180 - [i7]David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar R. Weippl, Christina Pöpper:
On Security Research towards Future Mobile Network Generations. CoRR abs/1710.08932 (2017) - [i6]Thomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz:
An Empirical Study on Price Differentiation Based on System Fingerprints. CoRR abs/1712.03031 (2017) - 2016
- [j13]Christian Röpke, Thorsten Holz
:
On network operating system security. Int. J. Netw. Manag. 26(1): 6-24 (2016) - [c106]Jannik Pewny, Thorsten Holz:
EvilCoder: automated bug insertion. ACSAC 2016: 214-225 - [c105]Katharina Kohls, Thorsten Holz
, Dorothea Kolossa
, Christina Pöpper
:
SkypeLine: Robust Hidden Data Transmission for VoIP. AsiaCCS 2016: 877-888 - [c104]Johannes Hoffmann, Teemu Rytilahti, Davide Maiorca
, Marcel Winandy, Giorgio Giacinto
, Thorsten Holz
:
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation. CODASPY 2016: 139-141 - [c103]Andre Pawlowski, Moritz Contag, Thorsten Holz
:
Probfuscation: An Obfuscation Approach Using Probabilistic Control Flows. DIMVA 2016: 165-185 - [c102]Robert Gawlik, Philipp Koppe, Benjamin Kollenda,