Items where Author is "Holz, Thorsten"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 19.

Conference or Workshop Item (A Paper)

Schlögel, Moritz and Blazytko, Tim and Contag, Moritz and Aschermann, Cornelius and Basler, Julius and Holz, Thorsten and Abbasi, Ali
(2022) Loki: Hardening Code Obfuscation Against Automated Attacks.
In: USENIX Security Symposium (USENIX Security), 2022..
Conference: USENIX-Security Usenix Security Symposium

Cloosters, Tobias and Willbold, Johannes and Holz, Thorsten and Davi, Lucas
(2022) SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.
In: USENIX Security Symposium (USENIX Security), 2022..
Conference: USENIX-Security Usenix Security Symposium

Bernhard, Lukas and Rodler, Michael and Holz, Thorsten and Davi, Lucas
(2022) xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64.
In: IEEE EuroS&P 2022, June 6-10, 2022, Genoa, Italy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Demir, Nurullah and Große-Kampmann, Matteo and Urban, Tobias and Wresnegger, Christian and Holz, Thorsten and Pohlmann, Norbert
(2022) Reproducibility and Replicability of Web Measurement Studies.
In: TheWebConf 2022.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Schumilo, Sergej and Aschermann, Cornelius and Jemmett, Andrea and Abbasia, Ali and Holz, Thorsten
(2022) Nyx-Net: Network Fuzzing with Incremental Snapshots.
In: EuroSys 2022, April 5-8, 2022, Rennes, France.
Conference: EuroSys Eurosys Conference

Backes, Michael and Holz, Thorsten and Rossow, Christian and Rytilahti, Teemu and Simeonovski, Milivoj and Stock, Ben
(2016) On the Feasibility of TTL-based Filtering for DRDoS Mitigation.
In: RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Krombholz, Katharina and Hupperich, Thomas and Holz, Thorsten
(2016) Use the Force: Evaluating Force-sensitive Authentication for Mobile Devices.
In: Symposium on Usable Privacy and Security (SOUPS) 2016.

Pewny, Jannik and Garmany, Behrad and Gawlik, Robert and Rossow, Christian and Holz, Thorsten
(2015) Cross-Architecture Bug Search in Binary Executables.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Kührer, Marc and Hupperich, Thomas and Bushart, Jonas and Rossow, Christian and Holz, Thorsten
(2015) Going Wild: Large-Scale Classification of Open DNS Resolvers.
In: Proc. of the 2015 Internet Measurement Conference (IMC'15).
Conference: IMC Internet Measurement Conference

Backes, Michael and Holz, Thorsten and Kollenda, Benjamin and Koppe, Philipp and Nürnberger, Stefan and Pewny, Jannik
(2014) You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
In: Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014) Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014) Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks.
In: Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT ’14).

Pewny, Jannik and Schuster, Felix and Bernhard, Lukas and Holz, Thorsten and Rossow, Christian
(2014) Leveraging semantic signatures for bug search in binary programs.
In: Proc. of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC Annual Computer Security Applications Conference

Kührer, Marc and Rossow, Christian and Holz, Thorsten
(2014) Paint it Black: Evaluating the Effectiveness of Malware Blacklists.
In: Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses.

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2012) MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS '12).
Conference: NDSS Network and Distributed System Security Symposium

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011) Poster: Control-flow Integrity for Smartphones.
In: 18th ACM conference on Computer and communications security (ACM CCS 2012).
Conference: CCS ACM Conference on Computer and Communications Security

Stock, Ben and Goebel, Jan and Engelberth, Markus and Freiling, Felix C. and Holz, Thorsten
(2009) Walowdac-analysis of a peer-to-peer botnet.
In: Computer Network Defense (EC2ND), 2009 European Conference on.

Article

Schönherr, Lea and Golla, Maximilian and Eisenhofer, Thorsten and Wiele, Jan and Kolossa, Dorothea and Holz, Thorsten
(2021) Exploring accidental triggers of smart speakers.
Computer Speech & Language. ISSN 0885-2308
(In Press)

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011) CFI Goes Mobile: Control-Flow Integrity for Smartphones.
International Workshop on Trustworthy Embedded Devices (TrustED).

This list was generated on Wed Aug 10 00:03:56 2022 CEST.