Carsten Willems

According to our database1, Carsten Willems authored at least 15 papers between 2007 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Instrumenting existing system components for dynamic analysis of malicious software
PhD thesis, 2013

An experimental security analysis of two satphone standards.
ACM Trans. Inf. Syst. Secur., 2013

Practical Timing Side Channel Attacks against Kernel Space ASLR.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
Reverse Code Engineering - State of the Art and Countermeasures.
it Inf. Technol., 2012

Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Analyse und Vergleich von BckR2D2-I und II.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Down to the bare metal: using processor features for binary analysis.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

Using memory management to detect and extract illegitimate code for malware analysis.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Automatic analysis of malware behavior using machine learning.
J. Comput. Secur., 2011

Das Internet-Malware-Analyse-System (InMAS) - Ein System zur großflächigen Sammlung und Analyse von Schadsoftware im Internet.
Datenschutz und Datensicherheit, 2011

Automated Identification of Cryptographic Primitives in Binary Programs.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

2010
A Malware Instruction Set for Behavior-Based Analysis.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

2008
Learning and Classification of Malware Behavior.
Proceedings of the Detection of Intrusions and Malware, 2008

2007
Toward Automated Dynamic Malware Analysis Using CWSandbox.
IEEE Secur. Priv., 2007

Measurement and Analysis of Autonomous Spreading Malware in a University Environment.
Proceedings of the Detection of Intrusions and Malware, 2007


  Loading...