Veröffentlichungen

Dynamic Integrity Measurement and Attestation: Towards Defense Against Return-Oriented Programming Attacks.

2009 - Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy

STC'09: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, p. 49-54, ACM, 2009. [pdf]

TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.

2009 - Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy

STC'09: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, p. 19-28, ACM, 2009. [pdf]

Software distribution as a malware infection vector

2009 - Felix Gröbert, Ahmad-Reza Sadeghi, Marcel Winandy

International Conference for Internet Technology and Secured Transactions (ICITST 2009) [Bibtex]

Walowdac - Analysis of a Peer-to-Peer Botnet

2009 - Ben Stock, Jan Göbel, Markus Engelberth, Felix Freiling, Thorsten Holz

European Conference on Computer Network Defense (EC2ND), Milan, Italy, November 2009 [pdf]

Transparent Mobile Storage Protection in Trusted Virtual Domains

2009 - Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy

23rd Large Installation System Administration Conference (LISA '09), p. 159--172, USENIX Association, 2009. [pdf]

Visual Analysis of Malware Behavior (Short paper)

2009 - Philipp Trinius, Thorsten Holz, Jan Göbel, Felix Freiling

Workshop on Visualization for Cyber Security (VizSec), Atlantic City, NJ, USA, October 2009 [pdf]

Automatically Generating Models for Botnet Detection

2009 - Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Göbel, Christopher Kruegel, Engin Kirda

Eu­ropean Sym­po­si­um on Re­se­arch in Com­pu­ter Se­cu­ri­ty (ESO­RICS), Saint Malo, France, September 2009 [pdf]

Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones

2009 - Thorsten Holz, Markus Engelberth, Felix Freiling

Eu­ropean Sym­po­si­um on Re­se­arch in Com­pu­ter Se­cu­ri­ty (ESO­RICS), Saint Malo, France, September 2009 [pdf]

A Pattern for Secure Graphical User Interface Systems.

2009 - Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy

3rd International Workshop on Secure systems methodologies using patterns (SPattern 2009), in DEXA '09: Proceedings of the 20th International Workshop on Database and Expert Systems Application, p.186-190, IEEE Computer Society, 2009. [pdf] [bibtex]

Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms

2009 - Ralf Hund, Thorsten Holz, Felix Freiling

USENIX Security Symposium, Montreal, Canada, August 2009 [PDF]
Seite: