Items where Author is "Holz, Thorsten"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 26.

Conference or Workshop Item (A Paper)

Bars, Nils and Schloegel, Moritz and Scharnowski, Tobias and Schiller, Nico and Holz, Thorsten
(2023) Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Willbold, Johannes and Schloegel, Moritz and Vögele, Manuel and Gerhardt, Maximilian and Holz, Thorsten and Abbasi, Ali
(2023) Space Odyssey: An Experimental Software Security Analysis of Satellites.
In: IEEE Symposium on Security and Privacy, San Francisco, USA.
Conference: UNSPECIFIED

Schiller, Nico and Chlosta, Merlin and Schloegel, Moritz and Bars, Nils and Eisenhofer, Thorsten and Scharnowski, Tobias and Domke, Felix and Schönherr, Lea and Holz, Thorsten
(2023) Drone Security and the Mysterious Case of DJI's DroneID.
In: NDSS.
Conference: NDSS Network and Distributed System Security Symposium

Aghakhani, Hojjat and Schönherr, Lea and Eisenhofer, Thorsten and Kolossa, Dorothea and Holz, Thorsten and Kruegel, Christopher and Vigna, Giovanni
(2023) VENOMAVE: Targeted Poisoning Against Speech Recognition.
In: IEEE SaTML.
Conference: UNSPECIFIED

Utz, Christine and Amft, Sabrina and Degeling, Martin and Holz, Thorsten and Fahl, Sascha and Schaub, Florian
(2023) Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites.
In: PETS 2023.
Conference: PETS Privacy Enhancing Technologies Symposium (was International Workshop of Privacy Enhancing Technologies)

Bernhard, Lukas and Scharnowski, Tobias and Schloegel, Moritz and Blazytko, Tim and Holz, Thorsten
(2022) Jit-Picking: Differential Fuzzing of JavaScript Engines.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Schloegel, Moritz and Blazytko, Tim and Contag, Moritz and Aschermann, Cornelius and Basler, Julius and Holz, Thorsten and Abbasi, Ali
(2022) Loki: Hardening Code Obfuscation Against Automated Attacks.
In: USENIX Security Symposium (USENIX Security), 2022..
Conference: USENIX-Security Usenix Security Symposium

Cloosters, Tobias and Willbold, Johannes and Holz, Thorsten and Davi, Lucas
(2022) SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.
In: USENIX Security Symposium (USENIX Security), 2022..
Conference: USENIX-Security Usenix Security Symposium

Scharnowski, Tobias and Bars, Nils and Schloegel, Moritz and Gustafson, Eric and Muench, Marius and Vigna, Giovanni and Kruegel, Christopher and Holz, Thorsten and Abbasi, Ali
(2022) Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing.
In: 31st USENIX Security Symposium (USENIX Security 22).
Conference: USENIX-Security Usenix Security Symposium

Bernhard, Lukas and Rodler, Michael and Holz, Thorsten and Davi, Lucas
(2022) xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64.
In: IEEE EuroS&P 2022, June 6-10, 2022, Genoa, Italy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Demir, Nurullah and Große-Kampmann, Matteo and Urban, Tobias and Wresnegger, Christian and Holz, Thorsten and Pohlmann, Norbert
(2022) Reproducibility and Replicability of Web Measurement Studies.
In: TheWebConf 2022.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Schumilo, Sergej and Aschermann, Cornelius and Jemmett, Andrea and Abbasi, Ali and Holz, Thorsten
(2022) Nyx-Net: Network Fuzzing with Incremental Snapshots.
In: EuroSys 2022, April 5-8, 2022, Rennes, France.
Conference: EuroSys Eurosys Conference

Backes, Michael and Holz, Thorsten and Rossow, Christian and Rytilahti, Teemu and Simeonovski, Milivoj and Stock, Ben
(2016) On the Feasibility of TTL-based Filtering for DRDoS Mitigation.
In: RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Krombholz, Katharina and Hupperich, Thomas and Holz, Thorsten
(2016) Use the Force: Evaluating Force-sensitive Authentication for Mobile Devices.
In: Symposium on Usable Privacy and Security (SOUPS) 2016.

Pewny, Jannik and Garmany, Behrad and Gawlik, Robert and Rossow, Christian and Holz, Thorsten
(2015) Cross-Architecture Bug Search in Binary Executables.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Kührer, Marc and Hupperich, Thomas and Bushart, Jonas and Rossow, Christian and Holz, Thorsten
(2015) Going Wild: Large-Scale Classification of Open DNS Resolvers.
In: Proc. of the 2015 Internet Measurement Conference (IMC'15).
Conference: IMC Internet Measurement Conference

Backes, Michael and Holz, Thorsten and Kollenda, Benjamin and Koppe, Philipp and Nürnberger, Stefan and Pewny, Jannik
(2014) You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
In: Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014) Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014) Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks.
In: Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT ’14).

Pewny, Jannik and Schuster, Felix and Bernhard, Lukas and Holz, Thorsten and Rossow, Christian
(2014) Leveraging semantic signatures for bug search in binary programs.
In: Proc. of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC Annual Computer Security Applications Conference

Kührer, Marc and Rossow, Christian and Holz, Thorsten
(2014) Paint it Black: Evaluating the Effectiveness of Malware Blacklists.
In: Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses.

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2012) MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS '12).
Conference: NDSS Network and Distributed System Security Symposium

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011) Poster: Control-flow Integrity for Smartphones.
In: 18th ACM conference on Computer and communications security (ACM CCS 2012).
Conference: CCS ACM Conference on Computer and Communications Security

Stock, Ben and Goebel, Jan and Engelberth, Markus and Freiling, Felix C. and Holz, Thorsten
(2009) Walowdac-analysis of a peer-to-peer botnet.
In: Computer Network Defense (EC2ND), 2009 European Conference on.

Article

Schönherr, Lea and Golla, Maximilian and Eisenhofer, Thorsten and Wiele, Jan and Kolossa, Dorothea and Holz, Thorsten
(2022) Exploring accidental triggers of smart speakers.
Computer Speech & Language. ISSN 0885-2308
(In Press)

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011) CFI Goes Mobile: Control-Flow Integrity for Smartphones.
International Workshop on Trustworthy Embedded Devices (TrustED).

This list was generated on Mon Apr 15 08:02:54 2024 CEST.