On the Weaknesses of Function Table Randomization

2018 - Moritz Contag, Robert Gawlik, Andre Pawlowski, Thorsten Holz

Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Paris, France, June 2018 [GitHub] [PDF]

Breaking and Fixing Destructive Code Read Defenses

2017 - Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz

Annual Computer Security Applications Conference (ACSAC), Puerto Rico, USA, December 2017 [PDF]

Tracking DDoS Attacks: Insights into the Business of Disrupting the Web

2012 - Armin Büscher, Thorsten Holz

5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Jose, CA, April 2012 [PDF]

Return-Oriented Programming without Returns

2010 - Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy

17th ACM Conference on Computer and Communications Security (CCS 2010) [PDF]

Analysis of Signature Wrapping Attacks and Countermeasures

2009 - Jörg Schwenk, Sebastian Gajek, Lijun Liao, Meiko Jensen,

Proceedings of the 7th IEEE International Conference on Web Services (ICWS), Los Angeles, USA, 2009.

New Threats and Attacks on the World Wide Web

2006 - Thorsten Holz, Simon Marechal, Frédéric Raynal

IEEE Security & Privacy Volume 4, Issue 2, Pages 72-75, March 2006 [pdf]

How Secure Are FPGAs in Cryptographic Applications? (Long Version)

2003 - Thomas Wollinger, Chris­tof Paar

IACR,, cryptology, ePrint archive: Report 2003/119, Juni 5, 2003. [web] [pdf] [gzipped postscript]