
Thorsten Holz
Institution: CISPA / CASA
Research Hub(s):
Hub B: Eingebettete Sicherheit
Hub C: Sichere Systeme
Hub D: Benutzerfreundlichkeit
E-Mail: Thorsten.Holz@rub.de
Website: https://informatik.rub.de/syssec/
Twitter: @thorstenholz
Publikationen:
AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images 5G SUCI-catchers: still catching them all? Dompteur: Taming Audio Adversarial Examples On the challenges of automata reconstruction in LTE networks SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains Efficient Calculation of Adversarial Examples for Bayesian Neural Networks Plenty of Phish in the Sea: Analyzing Potential Pre-Attack Surfaces NYX: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding Flaws Reproducibility and Replicability of Web Measurement Studies xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities Towards the Detection of Diffusion Model Deepfakes A Representative Study on Human Detection of Artificially Generated Media Across Countries No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning EF/CF: A High Performance Fuzzer for Ethereum Smart Contracts Loki: Hardening Code Obfuscation Against Automated Attacks Jit-Picking: Differential Fuzzing of JavaScript Engines Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing Static Detection of Uninitialized Stack Variables in Binary Code Towards Automated Application-Specific Software Stacks IJON: Exploring Deep State Spaces via Fuzzing HYPER-CUBE: High-Dimensional Hypervisor Fuzzing IMP4GT: IMPersonation Attacks in 4G NeTworks VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding GRIMOIRE: Synthesizing Structure while Fuzzing ANTIFUZZ: Impeding Fuzzing Audits of Binary Executables (Un)informed Consent: Studying GDPR Consent Notices in the Field On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways CORSICA: Cross-Origin Web Service Identification Be the Phisher – Understanding Users’ Perception of Malicious Domains Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems Leveraging Frequency Analysis for Deep Fake Image Recognition Measuring the Impact of the GDPR on Data Sharing in Ad Networks Call Me Maybe: Eavesdropping Encrypted LTE Calls With REVOLTE AURORA: Statistical Crash Analysis for Automated Root Cause Explanation ETHBMC: A Bounded Model Checker for Smart Contracts