Publications

Vulnerability Report: Attacks bypassing confidentiality in encrypted PDF

2019 - Jens Müller, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel, Jörg Schwenk

[html] [pdf]

A Study of Newly Observed Hostnames and DNS Tunneling in the Wild

2019 - Dennis Tatang, Florian Quinkert, Nico Dolecki, Thorsten Holz

Technical Report, arXiv:1902.08454, February 2019 [arXiv] [PDF]

Vulnerability Report: Attacks bypassing the signature validation in PDF

2019 - Vladislav Mladenov, Christian Mainka, Karsten Meyer zu Selhausen, Martin Grothe, Jörg Schwenk

[pdf]

The Unwanted Sharing Economy: An Analysis of Cookie Syncing and User Transparency under GDPR

2018 - Tobias Urban, Dennis Tatang, Martin Degeling, Thorsten Holz, Norbert Pohlmann

Technical Report, arXiv:1811.08660, November 2018 [arXiv]

An Empirical Study on Price Differentiation Based on System Fingerprints

2017 - Thomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz

Technical Report, arXiv:1712.03031, December 2017 [arXiv] [PDF]

On Security Research towards Future Mobile Network Generations

2017 - David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper

arXiv:1710.08932, November 2017 [arXiv] [PDF]

A Resampling Method for Parallel Filter Architectures

2016 - Fynn Schwiegelshohn, Eugen Ossovski, Michael Hübner

Microprocessors and Microsystems, MICPRO2438, 10.1016/j.micpro.2016.07.017, August 2016

Technical Report: Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation

2016 - Johannes Hoffmann, Teemu Rytilahti, Marcel Winandy, Giorgio Giacinto, Thorsten Holz

TR-HGI-2016-003, Ruhr-Uni­ver­si­tät Bo­chum, Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), August 2016 [pdf]

Technical Report: Detile: Fine-Grained Information Leak Detection in Script Engines

2016 - Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz

TR-HGI-2016-004, Ruhr-Uni­ver­si­tät Bo­chum, Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), July 2016 [PDF]

Technical Report: Probfuscation: An Obfuscation Approach using Probabilistic Control Flows

2016 - Andre Pawlowski, Moritz Contag, Thorsten Holz

TR-HGI-2016-002, Ruhr-Uni­ver­si­tät Bo­chum, Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), July 2016 [PDF]

Technical Report: SkypeLine Robust Hidden Data Transmission for VoIP

2016 - Katharina Kohls, Thorsten Holz, Do­ro­thea Kolossa, Christina Pöpper

TR-HGI-2016-001, Ruhr-Uni­ver­si­tät Bo­chum, Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), February 2016 [PDF]

Technical Report: On the Effectiveness of Fingerprinting Mobile Devices

2015 - Thomas Hupperich, Marc Kührer, Thorsten Holz, Giorgio Giacinto

TR-HGI-2015-002, Ruhr-Uni­ver­si­tät Bo­chum, Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), December 2015 [PDF]

Technical Report: Towards Automated Integrity Protection of C++ Virtual Function Tables in Binary Programs

2014 - Robert Gawlik, Thorsten Holz

TR-HGI-2014-004, Ruhr-Uni­ver­si­tät Bo­chum, Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), December 2014 [PDF]

How Secure is TextSecure?

2014 - Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jörg Schwenk, Thorsten Holz

Cryptology ePrint Archive, Report 2014/904, 31 Oct 2014 [pdf]

Tac­tile One-Ti­me Pad. Smart­pho­ne Au­then­ti­fi­ca­ti­on. Resi­li­ent Against Shoul­der Sur­fing

2014 - Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, Thorsten Holz

TR-HGI-2014-003, Ruhr-Uni­ver­si­tät Bo­chum, Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), September 2014 [PDF]

Technical Report: Paint it Black: Evaluating the Effectiveness of Malware Blacklists

2014 - Marc Kührer, Christian Rossow, Thorsten Holz

TR-HGI-2014-002, Ruhr-Uni­ver­si­tät Bo­chum, Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), June 2014 [PDF]

Technical Report: Evaluating the Effectiveness of Current Anti-ROP Defenses

2014 - Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz

TR-HGI-2014-001, Ruhr-Uni­ver­si­tät Bo­chum, Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), May 2014 [PDF]

Im­pro­ving Lo­ca­ti­on Pri­va­cy for the Elec­tric Ve­hi­cle Mas­ses

2013 - Tilman Frosch, Sven Schäge, Martin Goll, Thorsten Holz

TR-HGI-2013-001, Ruhr-Uni­ver­si­tät Bo­chum, Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), June 2013 [pdf]

Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms

2013 - Markus Dürmuth, Tim Güneysu, Markus Kasper, Chris­tof Paar, Tolga Yalcin, Ralf Zimmermann

Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 [DOI] [BibTeX] [pdf] [bib]

CXPInspector: Hypervisor-Based, Hardware-Assisted System Monitoring

2012 - Carsten Willems, Ralf Hund, Thorsten Holz

TR-HGI-2012-002, Ruhr-Uni­ver­si­tät Bo­chum, Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), November 2012 [pdf]

Down to the Bare Metal: Using Processor Features for Binary Analysis

2012 - Carsten Willems, Ralf Hund, Dennis Felsch, Andreas Fobian, Thorsten Holz

TR-HGI-2012-001, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), November 2012 [pdf]

Lightweight Remote Attestation using Physical Functions (Extended Version)

2011 - Ünal Koçabas, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann

TU Darmstadt, TR-2011-06-01

Trusted embedded System Operating System (TeSOS) - Study and Design

2011 - Ahmad-Reza Sadeghi, Steffen Schulz, Alexandra Dmitrienko, Christian Stüble, Dennis Gessner, Markus Ullmann

Study and evaluation of security in sensor systems, System Security Lab, Sirrix AG, Federal Office for Information Security [project page] [pdf]

XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.

2011 - Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi

Technical Report: TUD-CS-2011-0127 [PDF]

Return-Oriented Programming without Returns on ARM

2010 - Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy

Tech­ni­cal Re­port HGI-TR-2010-002 [PDF]

From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design

2010 - Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider

Cryptology ePrint Archive: Report 2010/079 [PDF]

Schutz­recht "Die­lek­tri­sche An­ten­ne"

2010 - Michael Gerding, Thomas Musch, Nils Pohl

DE102008020036B4 , Micha­el Ger­ding, Tho­mas Musch, Nils Pohl (Er­fin­der), Kroh­ne Meß­tech­nik (An­mel­der), Patent erteilt 01.04.2010

ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks

2010 - Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy

Technical Report HGI-TR-2010-001 [PDF]

A Malware Instruction Set for Behavior-Based Analysis

2009 - Philipp Trinius, Carsten Willems, Thorsten Holz, Konrad Rieck

Technical Report TR-2009-007, University of Mannheim, December 2009 [MADOC Link] [PDF]

Automatic Analysis of Malware Behavior using Machine Learning

2009 - Philipp Trinius, Carsten Willems, Thorsten Holz, Konrad Rieck

Berlin Institute of Technology, Technical Report 18-2009 [PDF]

Schutzrecht "Dielektrische Hornantenne"

2009 - Nils Pohl, Gunnar Armbrecht, Burkhard Schiek

Patentnummer DE102008015409A1, Nils Pohl, Gunnar Armbrecht, Burkhard Schiek (Erfinder), Krohne Meßtechnik (Anmelder), Offenlegung 24.09.2009

Schutzrecht "Dielektrische Antenne"

2009 - Nils Pohl

Patentnummer DE102008008715A1, Nils Pohl (Erfinder), Krohne Meßtechnik (Anmelder), Offenlegung 13.08.2009

Protecting Multiple Cores in a Single FPGA Design 8/2008

2008 - Saar Drimer, Tim Güneysu, Markus G. Kuhn, Chris­tof Paar

Technical Report/Draft, written 5/2008, available on-line. [web]

Property-Based TPM Virtualization

2008 - Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy

Technical Report HGI-TR-2008-001, Horst Görtz Institute for IT-Security, Ruhr-University Bochum, 2008. [PDF]

Compartmented Security for Browsers

2007 - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy

Technical Report HGI-TR-2007-001, Horst Görtz Institute for IT Security, Ruhr-University Bochum, 2007. [pdf]

A Compact Implementation of Edon80

2006 - Markus Kasper, Sandeep Kumar, Kerstin Lemke-Rust, Chris­tof Paar

The eSTREAM Project - eSTREAM Phase 3 [pdf] [bib]

A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption

2006 - Ahmad-Reza Sadeghi, Ulrich Huber,

Technical Report detailing the ISC 2006 paper below. A preliminary version is available from the authors:

Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages

2006 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Technical Report detailing the ACISP 2006 paper below. A preliminary version is available from the authors:

Generalizations of the Karatsuba Algorithm for Efficient Implementations

2006 - André Weimerskirch, Chris­tof Paar

Cryptology ePrint Archive: Report 2006/224. [pdf]

Browser Model for Security Analysis of Browser-Based Protocols

2005 - Ahmad-Reza Sadeghi, Thomas Groß, Birgit Pfitzmann

IBM Technical Report RZ3600, 2005.­ [IBM Link]

First Summary Report on Asymmetric Watermarking

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, P. Bas, S. Katzenbeisser (Eds.), M. Barni, A. De Rosa

ECRYPT, Network of Excellence in Cryptology, Project Deliverable (D.WVL.3), 2005. [pdf]

Property-Based Broadcast Encryption for Multi-level Security Policies

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber,

Technical Report detailing the ICISC 2005 paper below. A preliminary version is available from the authors

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Technical Report detailing the ISPEC 2005 conference paper below.

Towards multilaterally secure computing platforms - with open source and trusted computing

2005 - Ahmad-Reza Sadeghi, Christian Stüble,

Information Security Technical Report, Elesevier, Volume 10, Issue 2, 2005, Pages 83-95.

Bridging the Gap between TCPA/Palladium and Personal Security

2003 - Ahmad-Reza Sadeghi, Christian Stüble,

Technical Report, Saarland University, 2003. [pdf]

Final Report on Verification and Assessment

2002 - Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble,

MAFTIA Deliverable D22, Project IST-1999-11583, January 2002.

Numerical rates for nucleon-nucleon, axion bremsstrahlung

1988 - Ralf Peter Brinkmann, Michael S. Turner

APS » Journals » Phys. Rev. D » Volume 38 » Issue 8 Phys. Rev. D 38, 2338–2348 (1988) © 1988 The American Physical Society [URL] [DOI]
Page: