Thorsten Holz [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching ACSAC2019-2019 - San Juan, Puerto Rico
Your Hashed IP Address: Ubuntu - Perspectives on Transparency Tools for Online Advertising ACSAC2019-2019 - San Juan, Puerto Rico
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems IEEEEuroS&P-2019 - Stockholm, Sweden
Steroids for DOPed Applications: A Compiler for Automated Data-Oriented Programming IEEEEuroS&P-2019 - Stockholm, Sweden
Breaking LTE on Layer Two IEEESymposium-2019 - San Francisco, US
Masters of Time: An Overview of the NTP Ecosystem IEEEEuropeanSymposiumS&P-2018 - London, United Kingdom
Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure IEEEEuropeanSymposiumS&P-2018 - London, United Kingdom
kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels usenixsecurity-2017 - vancouver,canada
Syntia: Synthesizing the Semantics of Obfuscated Code usenixsecurity-2017 - vancouver,canada
Reverse Engineering x86 Processor Microcode usenixsecurity-2017 - vancouver,canada
MARX: Uncovering Class Hierarchies in C++ Programs NDSS-2017 - california,usa
Opening Remarks and Awards USENIX-2016 - austin,usa
Keynote Address USENIX-2016 - austin,usa
Probfuscation: An Obfuscation Approach using Probabilistic Control Flows Dimva-2016 - Donostia-San Sebastián, Spain
Detile: Fine-Grained Information Leak Detection in Script Engines Dimva-2016 - Donostia-San Sebastián, Spain
Leveraging Sensor Fingerprinting for Mobile Device Authentication Dimva-2016 - Donostia-San Sebastián, Spain
Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding NDSS-2016 - california,usa
On the Robustness of Mobile Device Fingerprinting ACSAC-2015 - los angeles,usa
Using Automatic Speech Recognition for Attacking Acoustic CAPTCHAs: The Trade-off between Usability and Security ACSAC-2014 - new orleans,usa
Towards Automated Integrity Protection of C++ Virtual Function Tables in Binary Programs ACSAC-2014 - new orleans,usa
Leveraging Semantic Signatures for Bug Search in Binary Programs ACSAC-2014 - new orleans,usa
Code Reuse Attacks in PHP: Automated POP Chain Generation CCS-2014 - Scottsdale,USA
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code CCS-2014 - Scottsdale,USA
Evaluating the Effectiveness of Current Anti-ROP Defenses Raid-2014 - gottenburg,sweden
Paint it Black: Evaluating the Effectiveness of Malware Blacklists Raid-2014 - gottenburg,sweden
Forensics usenix-2014 - san diego,usa
Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data usenix-2014 - san diego,usa
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks Woot-2014 - san diego,usa
Automated Generation of Models for Fast and Precise Detection of HTTP-Based Malware PST-2014 - Toronto,Canada
Simulation of Built-in PHP Features for Precise Static Code Analysis NDSS-2014 - San Diego,USA
k-subscription: Privacy-Preserving Microblogging Browsing Through Obfuscation ACSAC-2013 - New Orleans, USA
Control-Flow Restrictor: Compiler-based CFI for iOS ACSAC-2013 - New Orleans, USA
B@bel: Leveraging Email Delivery for Spam Mitigation USENIX-2012 - Washington, D.C.
Got Your Nose! How to Steal Your Precious Data Without Using Scripts CaroCon-2012 - Munich, Germany
Clickjacking Protection Under Non-trivial Circumstances CaroCon-2012 - Munich, Germany
Tracking DDoS Attacks: Insights into the Business of Disrupting the Web 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats-2012 - San Francisco, USA Botnets
Crouching Tiger - Hidden Payload: Security Risks of Scalable Vectors Graphics Confrence-on-computer-communications-security-2011 - Chicago, USA
Walowdac Analysis Of A Peer-To-Peer Botnet EC2ND-2009 - Germany Security
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms 18th USENIX Security Symposium-2009 - Montreal, Canada Security
Ethics In Botnet Research 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA Security
Malware Analysis Methodology 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA Security Analysis Malware
Banking Malware 101 Chaos Communication Congress-25 - Berlin, Germany Security Malware
Virtual Honeypots TROOPERS-2008 - Munich, German Security
Measurements And Mitigation Of Peer-To-Peer-Based Botnets: A Case Study On Storm Worm 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats-2008 - San Francisco, USA Security
Cybercrime 2.0 Chaos Communication Congress-24 - Berlin, Germany Security
Playing With Botnets For Fun And Profit HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Botnets
Towards Automated Botnet Detection And Mitigation SyScan-2006 - Singapore Security Botnets
Anti-Honeypot Technology Chaos Communication Congress-21 - Berlin, Germany Security
Nosebreak—Defeating Honeynets DEF CON-12 - Las Vegas, USA Security
Nosebreak - Defeating Honeynets Blackhat USA-2004 - Las Vegas, USA Security