Publications
Vulnerability Report: Attacks bypassing confidentiality in encrypted PDF
2019 - Jens Müller, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel, Jörg Schwenk
[html] [pdf]A Study of Newly Observed Hostnames and DNS Tunneling in the Wild
2019 - Dennis Tatang, Florian Quinkert, Nico Dolecki, Thorsten Holz
Technical Report, arXiv:1902.08454, February 2019 [arXiv] [PDF]Vulnerability Report: Attacks bypassing the signature validation in PDF
2019 - Vladislav Mladenov, Christian Mainka, Karsten Meyer zu Selhausen, Martin Grothe, Jörg Schwenk
[pdf]The Unwanted Sharing Economy: An Analysis of Cookie Syncing and User Transparency under GDPR
2018 - Tobias Urban, Dennis Tatang, Martin Degeling, Thorsten Holz, Norbert Pohlmann
Technical Report, arXiv:1811.08660, November 2018 [arXiv]An Empirical Study on Price Differentiation Based on System Fingerprints
2017 - Thomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz
Technical Report, arXiv:1712.03031, December 2017 [arXiv] [PDF]On Security Research towards Future Mobile Network Generations
2017 - David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper
arXiv:1710.08932, November 2017 [arXiv] [PDF]A Resampling Method for Parallel Filter Architectures
2016 - Fynn Schwiegelshohn, Eugen Ossovski, Michael Hübner
Microprocessors and Microsystems, MICPRO2438, 10.1016/j.micpro.2016.07.017, August 2016Technical Report: Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation
2016 - Johannes Hoffmann, Teemu Rytilahti, Marcel Winandy, Giorgio Giacinto, Thorsten Holz
TR-HGI-2016-003, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), August 2016 [pdf]Technical Report: Detile: Fine-Grained Information Leak Detection in Script Engines
2016 - Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz
TR-HGI-2016-004, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), July 2016 [PDF]Technical Report: Probfuscation: An Obfuscation Approach using Probabilistic Control Flows
2016 - Andre Pawlowski, Moritz Contag, Thorsten Holz
TR-HGI-2016-002, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), July 2016 [PDF]