Veröffentlichungen

Towards Proactive Spam Filtering (Extended Abstract)

2009 - Jan Göbel, Thorsten Holz, Philipp Trinius

Con­fe­rence on De­tec­tion of In­tru­si­ons and Mal­wa­re & Vul­nerabi­li­ty As­sess­ment (DIMVA), Milan, Italy, July 2009 [pdf]

Einsatz von Sicherheitskernen und Trusted Computing.

2009 - Ahmad-Reza Sadeghi, Marcel Winandy,

D-A-CH Security 2009, Bochum, Germany. [pdf]

Frühe Warnung durch Beobachten und Verfolgen von bösartiger Software im Deutschen Internet: Das Internet-Malware-Analyse System (InMAS)

2009 - Markus Engelberth, Felix Freiling, Jan Goebel, Christian Gorecki, Thorsten Holz, Philipp Trinius, Carsten Willems

11. Deutscher IT-Sicherheitskongress des Bundesamtes für Sicherheit in der Informationstechnik (BSI), Bonn, May 2009 [PDF]

Tracking and Mitigation of Malicious Remote Control Networks

2009 - Thorsten Holz

Universität Mannheim, pages 1-138, URN urn:nbn:de:bsz:180-madoc-23306, April 2009 [MADOC Link] [Persistent ID]

Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.

2009 - Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy

TRUST 2009: Proceedings of the 2nd International Conference on Trusted Computing, LNCS 5471, p. 45-62 Springer, 2009. [pdf]

Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.

2009 - Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy

Proceedings of 5th Information Security Practice and Experience Conference (ISPEC'09), LNCS 5451, p. 396-407, Springer, 2009. [pdf]

MalOffice - Detecting malicious documents with combined static and dynamic analysis

2009 - Markus Engelberth, Carsten Willems, Thorsten Holz

Virus Bulletin Conference, Geneva, Switzerland, September 2009 [Presentation]

Sichere Webanwendungen

2008 - Mario Heiderich, Christian Matthies, Johannes Dahse, fukami

GALILEO PRESS, Auflage 1, ISBN-10: 3836211947, ISBN-13: 978-3836211949

Towards Next-Generation Botnets

2008 - Ralf Hund, Matthias Hamann, Thorsten Holz

European Conference on Computer Network Defense (EC2ND), Dublin, Ireland, December 2008 [PDF]

Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains

2008 - Ahmad-Reza Sadeghi, Marcel Winandy, Christian Stüble, Rani Husseiki, Yacine Gasmi, Patrick Stewin, Martin Unger

STC '08: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, p. 71-80, ACM, 2008. [pdf]
Seite: