Biblio

Export 33 results:
Filters: Author is Thorsten Holz  [Clear All Filters]
2014
Dahse J, Holz T.  2014.  Static Detection of Second-Order Vulnerabilities in Web Applications. 23rd USENIX Security Symposium (USENIX Security 14). :989--1003.
2012
Stringhini G, Egele M, Zarras A, Holz T, Kruegel C, Vigna G.  2012.  B@bel: Leveraging Email Delivery for Spam Mitigation. 21st USENIX Security Symposium (USENIX Security 12). :16--32.
Büscher A, Holz T.  2012.  Tracking DDoS Attacks: Insights into the Business of Disrupting the Web. 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12).
2008
Holz T, Steiner M, Dahl F, Biersack E, Freiling F.  2008.  Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
2007
Goebel J, Holz T.  2007.  Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation. First Workshop on Hot Topics in Understanding Botnets (HotBots 07).

Pages