Dr.-Ing. Ralf Hund

  • Ehemalige/r Mitarbeiter/in - Lehrstuhl Systemsicherheit
  • Mitglied - Institut Horst Görtz Institut für IT-Sicherheit
Hund, Ralf

Adresse

Ruhr-Uni­ver­si­tät Bo­chum
Lehrstuhl für Systemsicherheit
Uni­ver­si­täts­stras­se 150
44780 Bo­chum

E-Mail:
ralf.hund@rub.de

Forschung

I am generally interested in research areas revolving around malware, reverse-engineerung and low-level system security, with a certain focus on the offensive point of view. My past work includes evaluation the security of satphone standards, ASLR effectiveness, iOS Security, botnet detection, and return-oriented programming.

Veröffentlichungen

2013
An Experimental Security Analysis of Two Satphone Standards

Benedikt Driessen, Ralf Hund, Carsten Willems, Chris­tof Paar, Thorsten Holz - ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 3, Article 10, Publication date: November 2013

Practical Timing Side Channel Attacks Against Kernel Space ASLR

Ralf Hund, Carsten Willems, Thorsten Holz - IEEE Symposium on Security and Privacy ("Oakland"), San Francisco, CA, May 2013

PSiOS: Bring Your Own Privacy & Security to iOS Devices

Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz - ACM Symposium on Information, Computer and Communications Security (ASIACCS), Hangzhou, China, May 2013 - **Distinguished Paper Award**

2012
Down to the Bare Metal: Using Processor Features for Binary Analysis

Carsten Willems, Ralf Hund, Amit Vasudevan, Andreas Fobian, Dennis Felsch, Thorsten Holz - Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2012

CXPInspector: Hypervisor-Based, Hardware-Assisted System Monitoring

Carsten Willems, Ralf Hund, Thorsten Holz - TR-HGI-2012-002, Ruhr-Uni­ver­si­tät Bo­chum, Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), November 2012

Down to the Bare Metal: Using Processor Features for Binary Analysis

Carsten Willems, Ralf Hund, Dennis Felsch, Andreas Fobian, Thorsten Holz - TR-HGI-2012-001, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), November 2012

Don’t Trust Satellite Phones: A Security Analysis of Two Satphone Standards

Benedikt Driessen, Ralf Hund, Carsten Willems, Chris­tof Paar, Thorsten Holz - IEEE Symposium on Security and Privacy ("Oakland"), San Francisco, CA, May 2012 - **Best Paper Award**

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones

Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi - Annual Network & Distributed System Security Symposium (NDSS), San Diego, February 2012

2011
POSTER: Control-Flow Integrity for Smartphones.

Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Fischer - 18th ACM Conference on Computer and Communications Security (CCS'11)

Jackstraws: Picking Command and Control Connections from Bot Traffic

Gregoire Jacob, Ralf Hund, Christopher Kruegel, Thorsten Holz - USENIX Security Symposium, San Francisco, CA, August 2011

Das Internet-Malware-Analyse-System (InMAS)

Markus Engelberth, Felix C. Freiling, Jan Goebel, Christian Gorecki, Thorsten Holz, Ralf Hund, Philipp Trinius, Carsten Willems - Datenschutz und Datensicherheit (DuD), Volume 35, Number 4, pp. 247-252

2009
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms

Ralf Hund, Thorsten Holz, Felix Freiling - USENIX Security Symposium, Montreal, Canada, August 2009

2008
Towards Next-Generation Botnets

Ralf Hund, Matthias Hamann, Thorsten Holz - European Conference on Computer Network Defense (EC2ND), Dublin, Ireland, December 2008

Analyzing Mobile Malware

Michael Becher, Ralf Hund - Chapter 8 in "Mobile Malware Attacks and Defense", Syngress Media, October 2008

Kernel-Level Interception and Applications on Mobile Devices

Michael Becher, Ralf Hund - Technical Report TR-2008-003, Universität Mannheim, May 2008