Thorsten Holz
Orcid: 0000-0002-2783-1264Affiliations:
- CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
- Ruhr University Bochum, Germany (former)
According to our database1,
Thorsten Holz
authored at least 254 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
Proceedings of the 19th International Joint Conference on Computer Vision, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
A Representative Study on Human Detection of Artificially Generated Media Across Countries.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models.
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2024
AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the 3rd ACM International Fuzzing Workshop, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites.
Proc. Priv. Enhancing Technol., January, 2023
More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models.
CoRR, 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023
Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Novelty Not Found: Adaptive Fuzzer Restarts to Improve Input Space Coverage (Registered Report).
Proceedings of the 2nd International Fuzzing Workshop, 2023
Proceedings of the 2nd International Fuzzing Workshop, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Not What You've Signed Up For: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
2022
IEEE Secur. Priv., 2022
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding Flaws.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the Workshop Proceedings of the 15th International AAAI Conference on Web and Social Media, 2021
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021
2020
CoRR, 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 37th International Conference on Machine Learning, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
We Value Your Privacy ... Now Take Some Cookies - Measuring the GDPR's Impact on Web Privacy.
Inform. Spektrum, 2019
Robust Over-the-Air Adversarial Examples Against Automatic Speech Recognition Systems.
CoRR, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, 2019
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
"<i>Your hashed IP address: Ubuntu.</i>": perspectives on transparency tools for online advertising.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
The Unwanted Sharing Economy: An Analysis of Cookie Syncing and User Transparency under GDPR.
CoRR, 2018
IEEE Commun. Surv. Tutorials, 2018
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference Workshops, 2018
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs.
Proceedings of the Computer Security, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
2017
Toward Improved Audio CAPTCHAs Based on Auditory Perception and Language Understanding.
ACM Trans. Priv. Secur., 2017
IEEE Internet Comput., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the 2016 USENIX Annual Technical Conference, 2016
Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness.
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015
Proceedings of the 2015 ACM Internet Measurement Conference, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
J. Comput. Secur., 2014
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2014
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Using automatic speech recognition for attacking acoustic CAPTCHAs: the trade-off between usability and security.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Towards automated integrity protection of C++ virtual function tables in binary programs.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
ACM Trans. Inf. Syst. Secur., 2013
IEEE Embed. Syst. Lett., 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Preventing Backdoors in Server Applications with a Separated Software Architecture - (Short Paper).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Quantifying the security of graphical passwords: the case of android unlock patterns.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
Using memory management to detect and extract illegitimate code for malware analysis.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
J. Comput. Secur., 2011
Das Internet-Malware-Analyse-System (InMAS) - Ein System zur großflächigen Sammlung und Analyse von Schadsoftware im Internet.
Datenschutz und Datensicherheit, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011
Proceedings of the First SysSec Workshop 2011, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Sicherheit 2010: Sicherheit, 2010
Proceedings of the Sicherheit 2010: Sicherheit, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the ISSE 2010, 2010
2009
Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
Proceedings of the Ausgezeichnete Informatikdissertationen 2009, 2009
Proceedings of the Computer Security, 2009
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones.
Proceedings of the Computer Security, 2009
Proceedings of the Detection of Intrusions and Malware, 2009
Proceedings of the Managing Information Risk and the Economics of Security, 2009
2008
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008
Proceedings of the Sicherheit 2008: Sicherheit, 2008
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008
Proceedings of the IT-Incidents Management & IT-Forensics, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
Virtual Honeypots - From Botnet Tracking to Intrusion Detection.
Addison-Wesley, ISBN: 978-0-321-33632-3, 2008
2007
Proceedings of the First Workshop on Hot Topics in Understanding Botnets, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Measurement and Analysis of Autonomous Spreading Malware in a University Environment.
Proceedings of the Detection of Intrusions and Malware, 2007
2006
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006
Proceedings of the Sicherheit 2006: Sicherheit, 2006
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
Proceedings of the IT-Incidents Management & IT-Forensics, 2006
Proceedings of the ARCS 2006, 2006
2005
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks.
Proceedings of the Computer Security, 2005
Proceedings of the Detection of Intrusions and Malware, 2005
Proceedings of the "Heute schon das Morgen sehen", 2005
Proceedings of the Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30, 2005
2004
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004