Veröffentlichungen

Mobile-Sandbox: Looking Deeper into Android Applications

2013 - Michael Spreitzenbarth, Florian Echtler, Thomas Schreck, Felix C. Freiling, Johannes Hoffmann

28th In­ter­na­tio­nal ACM Sym­po­si­um on Ap­p­lied Com­pu­ting (SAC), Coimbra, Portugal, March 2013 [pdf]

Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis

2012 - Carsten Willems, Felix C. Freiling, Thorsten Holz

Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2012 [pdf]

Analyse und Vergleich von BckR2D2-I und II

2012 - Andreas Dewald, Felix Freiling, Thomas Schreck, Michael Spreitzenbarth, Johannes Stüttgen, Stefan Vömel, Carsten Willems

GI Si­cher­heit - Schutz und Zu­ver­läs­sig­keit, Jah­res­ta­gung des Fach­be­reichs Si­cher­heit der Ge­sell­schaft für In­for­ma­tik, Darmstadt, Ger­ma­ny, März 2012 [Technical Report]

Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis

2012 - Carsten Willems, Felix, Freiling

Technical Reports CS-2012,1 University of Erlangen, Department Informatik, February 2012 [OPUS Link]

Automated Identification of Cryptographic Primitives in Binary Programs

2011 - Felix Gröbert, Carsten Willems, Thorsten Holz

14th International Symposium on Recent Advances in Intrusion Detection (RAID), Menlo Park, CA, September 2011 [PDF]

Proceedings of 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)

2011 - Thorsten Holz, Herbert Bos

8th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), Amsterdam, Netherlands, July 2011 [SpringerLink]

Automatic Analysis of Malware Behavior using Machine Learning

2011 - Konrad Rieck, Philipp Trinius, Carsten Willems, Thorsten Holz

Journal of Computer Security, Vol. 19, No. 4, pages 639-668, 2011 [JCS] [PDF]

Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis

2011 - Carsten Willems, Felix Freiling

Technical Report TR-2011-002, University of Mannheim, Department of Computer Science, May 2011 [MADOC Link]

Internals of Windows Memory Management (not only) for Malware Analysis

2011 - Carsten Willems

Technical Report TR-2011-001, University of Mannheim, Department of Computer Science, April 2011 [MADOC Link]

Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries

2010 - Clemens Kolbitsch, Thorsten Holz, Christopher Kruegel, Engin Kirda

IEEE Symposium on Security and Privacy ("Oakland"), Berkeley, CA, May 2010 [PDF]
Seite: