• Seitzer, Maximilian; Gruhn, Michael; Müller, Tilo;
    A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory
  • Stüttgen, Johannes; Vömel, Stefan; Denzel, Michael;
    Acquisition and Analysis of Compromised Firmware Using Memory Forensics
  • Maier, Dominik; Protsenko, Mykolai; Müller, Tilo;
    A Game of Droid and Mouse: The Threat of Split-Personality Malware on Android
  • Zhuang, Yan; Freiling, Felix;
    Approximating Optimal Software Obfuscation for Android Applications
  • Busch, Marcel; Protsenko, Mykolai; Müller, Tilo;
    Automated Malware Analysis for Android: A Comparative Evaluation
  • Dewald, Andreas;
    Characteristic Evidence, Counter Evidence and Reconstruction Problems in Forensic Computing
  • Dewald, Andreas;
    Characteristic evidence, counter evidence and reconstruction problems in forensic computing
  • Johns, Martin; Lekies, Sebastian; Stock, Ben;
    Client-side protection against DOM-based XSS done right (tm)
  • Stock, Ben; Lekies, Sebastian; Johns, Martin;
    Client-side protection against DOM-based XSS done right
  • Brodowski, Dominik; Freiling, Felix;
    Cyberkriminalität - Erscheinungsformen, Entwicklungslinien, Herausforderungen
  • Eßer, Hans-Georg;
    Design, Implementation and Evaluation of the ULIX Teaching Operating System
  • Morgner, Philipp; Benenson, Zinaida; Müller, Christian; Armknecht, Frederik;
    Design Space of Smart Home Networks from a Security Perspective
  • Protsenko, Mykolai; Kreuter, Sebastien; Müller, Tilo;
    Dynamic Self-Protection and Tamperproofing for Android Apps using Native Code
  • Dewald, Andreas; Freiling, Felix;
    Forensische Informatik
  • Stock, Ben; Kaiser, Bernd; Pfistner, Stephan; Lekies, Sebastian; Johns, Martin;
    From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting
  • Naumann, Jennifer; Protsenko, Mykolai; Müller, Tilo;
    Google Verify Apps: The Illusion of Security?
  • Benenson, Zinaida;
    Master's Degree Course: Human Factors in Security and Privacy
  • Thurner, Simon; Grün, Marcel; Schmitt, Sven; Baier, Harald;
    Improving the Detection of Encrypted Data on Storage Devices
  • Benenson, Zinaida; Lenzini, Gabriele; Oliveira, Daniela; Parkin, Simon; Uebelacker, Sven;
    Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security
  • Reinfelder, Lena; Benenson, Zinaida;
    Mental Models of Android Permissions and their Connection to Users' Emotional Attitudes
  • Freiling, Felix;
    Offener und verdeckter Einsatz technischer Ermittlungswerkzeuge zwischen Theorie und Praxis
  • Fischer, Andreas; Kittel, Thomas; Kolosnjaji, Bojan; Lengyel, Tamas K.; Mandarawi, Waseem; Meer, Hermann; Müller, Tilo; Protsenko, Mykolai; Reiser, Hans P.; Taubmann, Benjamin; Weishäupl, Eva;
    CloudIDEA: A Malware Defense Architecture for Cloud Data Centers
  • Götzfried, Johannes; Hampel, Johannes; Müller, Tilo;
    Physically Secure Code and Data Storage in Autonomously Booting Systems (Short Paper)
  • Wächter, Philipp ; Gruhn, Michael;
    Practicability Study of Android Volatile Memory Forensic Research
  • Armknecht, Frederik; Dewald, Andreas;
    Privacy-Preserving Email Forensics
  • Armknecht, Frederik; Dewald, Andreas;
    Privacy-Preserving Email Forensics
  • Krontiris, Ioannis; Benenson, Zinaida; Gerard, Anna; Sabouri, Ahmad; Rannenberg, Kai; Schoo, Peter;
    Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers
  • Protsenko, Mykolai; Müller, Tilo;
    Protecting Android Apps against Reverse Engineering by the Use of the Native Code
  • Bauer, Johannes; Freiling, Felix;
    Schutz eingebetteter Systeme gegen physische Angriffe
  • Anikeev, Maxim; Freiling, Felix; Götzfried, Johannes; Müller, Tilo;
    Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM
  • Kugler, Christopher; Müller, Tilo;
    Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits
  • Maene, Pieter ; Verbauwhede, Ingrid ;
    Single-cycle implementations of block ciphers
  • Götzfried, Johannes; Müller, Tilo; de Clercq, Ruan; Maene, Pieter; Freiling, Felix; Verbauwhede, Ingrid;
    Soteria: Offline Software Protection within Low-cost Embedded Devices
  • Freiling, Felix;
    Staatliche Spähsoftware zur Strafverfolgung
  • Lekies, Sebastian; Stock, Ben; Wentzel, Martin; Johns, Martin;
    The Unexpected Dangers of Dynamic JavaScript
  • Brodowski, Dominik; Freiling, Felix;
    Transnationale Cyberkriminalität vs. nationale Strafverfolgung: Mögliche Auswege aus einem grundsätzlichen Dilemma
  • Haupert, Vincent;
    (Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking
  • Benenson, Zinaida; Girard, Anna; Krontiris, Ioannis;
    User acceptance factors for anonymous credentials: An empirical investigation
  • Pugliese, Gaston;
    Web tracking: Overview and applicability in digital investigations
  • Freiling, Felix; Gruhn, Michael;
    What is essential data in digital forensic analysis?
  • Freiling, Felix; Schuhr, Jan; Gruhn, Michael;
    What is essential data in digital forensic analysis?
  • Gruhn, Michael;
    Windows NT pagefile.sys Virtual Memory Analysis
  • Stock, Ben; Johns, Martin; Lekies, Sebastian;
    Your Scripts in My Page - What Could Possibly Go Wrong?






  • Dewald, Andreas; Holz, Thorsten; Freiling, Felix;
    ADSandbox: Sandboxing JavaScript to fight Malicious Websites
  • Müller, Tilo; Dewald, Andreas; Freiling, Felix;
    AESSE: A Cold-boot Resistant Implementation of AES
  • Trinius, Phillip; Willems, Carsten; Holz, Thorsten; Rieck, Konrad;
    A Malware Instruction Set for Behavior-Based Analysis
  • Goebel, Jan;
    Amun: Automatic Capturing of Malicious Software
  • Benenson, Zinaida ; Freiling, Felix; Blaß, Erik-Oliver ;
    Attacker models for wireless sensor networks
  • Trinius, Philipp; Willems, Carsten; Holz, Thorsten; Rieck, Konrad;
    Automatic Analysis of Malware Behavior using Machine Learning
  • Göbel, Jan Gerrit; Dewald, Andreas;
    Client-Honeypots, Exploring Malicious Websites
  • Müller, Tilo;
    Cold-Boot Resistant Implementation of AES in the Linux Kernel
  • Rieck, Konrad; Krüger, Tammo; Dewald, Andreas;
    Cujo: Efficient Detection and Prevention of Drive-by-Download Attacks
  • Vömel, Stefan; Holz, Thorsten; Freiling, Felix;
    I'd Like to Pay with Your Visa Card : An Illustration of Illicit Online Trading Activity in the Underground Economy
  • Catrina, Octavian; de Hoogh, Sebastiaan;
    Improved Primitives for Secure Multiparty Integer Computation
  • Benenson, Zinaida; Freiling, Felix; Bestehorn, Markus; Böhm, Klemens; Buchmann, Erik; Jawurek, Marek;
    Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption
  • Catrina, Octavian; de Hoogh, Sebastiaan;
    Secure Multiparty Linear Programming Using Fixed-Point Arithmetic
  • Bäcker, Matthias; Freiling, Felix; Schmitt, Sven;
    Selektion vor der Sicherung
  • Spreitzenbarth, Michael; Holz, Thorsten;
    Towards Secure Deletion on Smartphones.
  • Goebel, Jan; Trinius, Philipp;
    Towards Optimal Sensor Placement Strategies for Early Warning Systems


  • Freiling, Felix; Wilke, Joachim; Blaß, Erik-Oliver; Zitterbart, Martina;
    A framework for probabilistic, authentic aggregation in wireless sensor networks
  • Wilke, Joachim; Zitterbart, Martina; Benenson, Zinaida; Freiling, Felix;
    Authentic Query Dissemination and Data Aggregation in Wireless Sensor Networks
  • Benenson, Zinaida; Krontiris, Ioannis; Freiling, Felix; Giannetsos, Thanassis; Dimitriou, Tassos;
    Cooperative Intrusion Detection in Wireless Sensor Networks
  • Mink, Martin; Freiling, Felix; Liegl, Marion;
    Datenschutz in digital-forensischen Lehrveranstaltungen
  • Freiling, Felix; Eusgeld, Irene; Reussner, Ralf;
    Dependability Metrics Research Workshop Proceedings
  • Werner, Frank; Benenson, Zinaida;
    Formally Verified Authenticated Query Dissemination in Sensor Networks
  • Engelberth, Markus; Freiling, Felix; Goebel, Jan; Gorecki, Christian; Holz, Thorsten; Trinius, Philipp; Willems, Carsten;
    Frühe Warnung durch Beobachten und Verfolgen von bösartiger Software im Deutschen Internet: Das Internet-Malware-Analyse System (InMAS)
  • Holz, Thorsten; Engelberth, Markus; Freiling, Felix;
    Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones
  • Freiling, Felix; Delporte-Gallet, Carole; Fauconnier, Hugues; Tielmann, Andreas; Kilic, Mahir;
    Message-efficient omission-tolerant consensus with limited synchrony
  • Freiling, Felix; Lambertz, Christian; Majster-Cederbaum, Mila;
    Modular Consensus Algorithms for the Crash-Recovery Model
  • Freiling, Felix; Böhme, Rainer; Gloe, Thomas; Kirchner, Matthias;
    Multimedia-Forensik als Teildisziplin der digitalen Forensik
  • Freiling, Felix; Böhme, Rainer; Gloe, Thomas; Kirchner, Matthias;
    Multimedia Forensics is not Computer Forensics
  • Benenson, Zinaida; Dewald, Andreas; Freiling, Felix;
    Presence, Intervention, Insertion: Unifying Attack and Failure Models in Wireless Sensor Networks
  • Freiling, Felix; Heinson, Dennis;
    Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung
  • Hund, Ralf; Holz, Thorsten; Freiling, Felix;
    Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms
  • Freiling, Felix; Mittal, Neeraj; Phaneesh, Kuppahalli L.;
    Safe termination detection in an asynchronous distributed system when processes may crash and recover
  • Freiling, Felix; Moch, Christian;
    The Forensic Image Generator Generator
  • Trinius, Philipp; Holz, Thorsten; Goebel, Jan; Freiling, Felix;
    Visual Analysis of Malware Behavior (Short paper)
  • Freiling, Felix;
    Vom Wert offensiver Methoden. Ein Blick auf IT-Sicherheit aus Angreiferperspektive
  • Stock, Ben; Goebel, Jan; Engelberth, Markus; Freiling, Felix; Thorsten Holz;
    Walowdac - Analysis of a Peer-to-Peer Botnet
  • Freiling, Felix;
    Zur Nutzung von Verkehrsdaten im Rahmen der Vorratsdatenspeicherung


  • Benenson, Zinaida;
    Access control in wireless sensor networks
  • Müller, Tilo; Babska, Ewa; Software-Wydawnictwo Sp. z o.o.;
    Address Space Layout Randomization: Exploit-Techniken zur Umgehung des ASLR-Schutzes
  • Müller, Tilo; Pimenidis, Lexi ;
    ASLR Smack & Laugh Reference
  • Bauer, Johannes;
    Entwicklung einer OSEK/VDX-kompatiblen Systemschnittstelle für Linux
  • Benenson, Zinaida; Bestehorn, Markus; Buchmann, Erik; Freiling, Felix; Jawurek, Marek;
    Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks
  • Benenson, Zinaida; Cholewinski, Peter M.; Freiling, Felix;
    Vulnerabilities and attacks in wireless sensor networks



  • Benenson, Zinaida; Freiling, Felix; Hammerschmidt, Ernest; Lucks, Stefan; Pimenidis, Lexi;
    Authenticated Query Flooding in Sensor Networks
  • Achtzehn, Andreas; Benenson, Zinaida; Rohner, Christian;
    Implementing Agreement Protocols in Sensor Networks
  • Benenson, Zinaida; Freiling, Felix; Holz, Thortsten; Kesdogan, Dogan; Draque Penso, Lucia;
    Safety, Liveness, and Information Flow: Dependability Revisited
  • Becher, Alexander; Benenson, Zinaida; Dornseif, Maximillian;
    Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks
  • Fort, Milan; Freiling, Felix; Draque Penso, Lucia; Benenson, Zinaida; Kesdogan, Dogan;
    TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
  • Benenson, Zinaida; Freiling, Felix; Pfitzmann, Birgit; Rohner, Christian; Waidner, Michael;
    Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks



  • Benenson, Zinaida; Gärtner, Felix C.; Kesdogan, Dogan;
    User Authentication in Sensor Networks