Number of items: 19.
Conference or Workshop Item (A Paper)
Schlögel, Moritz and Blazytko, Tim and Contag, Moritz and Aschermann, Cornelius and Basler, Julius and Holz, Thorsten and Abbasi, Ali
(2022)
Loki: Hardening Code Obfuscation Against Automated Attacks.
Cloosters, Tobias and Willbold, Johannes and Holz, Thorsten and Davi, Lucas
(2022)
SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.
Bernhard, Lukas and Rodler, Michael and Holz, Thorsten and Davi, Lucas
(2022)
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64.
Demir, Nurullah and Große-Kampmann, Matteo and Urban, Tobias and Wresnegger, Christian and Holz, Thorsten and Pohlmann, Norbert
(2022)
Reproducibility and Replicability of Web Measurement Studies.
Schumilo, Sergej and Aschermann, Cornelius and Jemmett, Andrea and Abbasia, Ali and Holz, Thorsten
(2022)
Nyx-Net: Network Fuzzing with Incremental Snapshots.
Backes, Michael and Holz, Thorsten and Rossow, Christian and Rytilahti, Teemu and Simeonovski, Milivoj and Stock, Ben
(2016)
On the Feasibility of TTL-based Filtering for DRDoS Mitigation.
Krombholz, Katharina and Hupperich, Thomas and Holz, Thorsten
(2016)
Use the Force: Evaluating Force-sensitive Authentication for Mobile Devices.
Pewny, Jannik and Garmany, Behrad and Gawlik, Robert and Rossow, Christian and Holz, Thorsten
(2015)
Cross-Architecture Bug Search in Binary Executables.
Kührer, Marc and Hupperich, Thomas and Bushart, Jonas and Rossow, Christian and Holz, Thorsten
(2015)
Going Wild: Large-Scale Classification of Open DNS Resolvers.
Backes, Michael and Holz, Thorsten and Kollenda, Benjamin and Koppe, Philipp and Nürnberger, Stefan and Pewny, Jannik
(2014)
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014)
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014)
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks.
Pewny, Jannik and Schuster, Felix and Bernhard, Lukas and Holz, Thorsten and Rossow, Christian
(2014)
Leveraging semantic signatures for bug search in binary programs.
Kührer, Marc and Rossow, Christian and Holz, Thorsten
(2014)
Paint it Black: Evaluating the Effectiveness of Malware Blacklists.
Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2012)
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011)
Poster: Control-flow Integrity for Smartphones.
Stock, Ben and Goebel, Jan and Engelberth, Markus and Freiling, Felix C. and Holz, Thorsten
(2009)
Walowdac-analysis of a peer-to-peer botnet.
Article
Schönherr, Lea and Golla, Maximilian and Eisenhofer, Thorsten and Wiele, Jan and Kolossa, Dorothea and Holz, Thorsten
(2021)
Exploring accidental triggers of smart speakers.
Computer Speech & Language.
ISSN 0885-2308
(In Press)
Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011)
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
International Workshop on Trustworthy Embedded Devices (TrustED).
This list was generated on Wed Aug 10 00:03:56 2022 CEST.