Publications

Filter by type:

. Hiding in Plain Sight -- Advances in Malware Covert Communication Channels: Stegoloader and PlugX. Blackhat Europe. Amsterdam, The Netherlands, 2015.

PDF Slides

. PROVEX: Detecting Botnets with Encrypted Command and Control Channels. In 10th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, DIMVA. Berlin, Germany, 2013.

PDF

. P2PWNED: Modeling and Evaluating the Resilience of Peer-to-Peer Botnets. In 34th IEEE Symposium on Security and Privacy, S&P 2013. San Francisco, USA, 2013.

PDF

. Identification and Recognition of Remote-Controlled Malware. Inauguraldissertation, PhD Thesis, Universit├Ąt Mannheim, Germany, 2013.

PDF

. Exploiting Visual Appearance to Cluster and Detect Rogue Software. ACM’s 28th Symposium On Applied Computing (SAC), Coimbra, Portugal, 2013.

PDF

. CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels Using Traffic Analysis. A Special Issue of The Computer Networks Journal On Botnet Activity: Analysis, Detection and Shutdown, Elsevier 2012, Journal publication, 2012.

Preprint

. Manufacturing Compromise: The Emergence of Exploit-as-a-Service. 19th ACM Conference on Computer and Communications Security, CCS 2012, Raleigh, NC, USA, 2012.

PDF

. Large Scale Analysis of Malware Downloaders. 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment DIMVA 2012, Heraklion, Greece, 2012.

PDF

. Prudent Practices for Designing Malware Experiments Status Quo and Outlook. 33rd IEEE Symposium on Security and Privacy (S&P) 2012, San Francisco, CA, USA, 2012.

PDF

. eID Online Authentication: Network Threat Model Attacks and Implications. 19 DFN Workshop 2012, Hamburg, Germany, 2012.

PDF Slides

. On Botnets That Use DNS for Command and Control (C2). European Conference on Computer Network Defense, EC2ND 2011. Gothenburg, Sweden, 2011.

PDF

. Sandnet: Network Traffic Analysis of Malicious Software. Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2011, 2011.

PDF

. Detecting Gray in Black and White. MIT Spam Conference 2010, Boston, USA. Best Student Paper Award, 2010.

PDF

. Empirical Research on IP Blacklisting. Fifth Conference on Email and Anti-Spam, CEAS 2008, Mountain View, CA, USA, 2008.

PDF

. Web-Authentisierung mit dem elektronischen Personalausweis (ePA). Master Thesis, 2008.

PDF