Skip to main content

Showing 1–43 of 43 results for author: Holz, T

Searching in archive cs. Search in all archives.
.
  1. SoK: Prudent Evaluation Practices for Fuzzing

    Authors: Moritz Schloegel, Nils Bars, Nico Schiller, Lukas Bernhard, Tobias Scharnowski, Addison Crump, Arash Ale Ebrahim, Nicolai Bissantz, Marius Muench, Thorsten Holz

    Abstract: Fuzzing has proven to be a highly effective approach to uncover software bugs over the past decade. After AFL popularized the groundbreaking concept of lightweight coverage feedback, the field of fuzzing has seen a vast amount of scientific work proposing new techniques, improving methodological aspects of existing strategies, or porting existing methods to new domains. All such work must demonstr… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

  2. arXiv:2404.14244  [pdf, other

    cs.CR cs.AI cs.CY cs.LG cs.SI

    AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images

    Authors: Jonas Ricker, Dennis Assenmacher, Thorsten Holz, Asja Fischer, Erwin Quiring

    Abstract: Recent advances in the field of generative artificial intelligence (AI) have blurred the lines between authentic and machine-generated content, making it almost impossible for humans to distinguish between such media. One notable consequence is the use of AI-generated images for fake profiles on social media. While several types of disinformation campaigns and similar incidents have been reported… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  3. arXiv:2401.09824  [pdf, other

    cs.CR

    Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams

    Authors: Bhupendra Acharya, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu, Thorsten Holz

    Abstract: The mainstream adoption of cryptocurrencies has led to a surge in wallet-related issues reported by ordinary users on social media platforms. In parallel, there is an increase in an emerging fraud trend called cryptocurrency-based technical support scam, in which fraudsters offer fake wallet recovery services and target users experiencing wallet-related issues. In this paper, we perform a compre… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  4. arXiv:2312.05976  [pdf, other

    cs.CR cs.AI cs.CY cs.LG

    A Representative Study on Human Detection of Artificially Generated Media Across Countries

    Authors: Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, Thorsten Holz

    Abstract: AI-generated media has become a threat to our digital society as we know it. These forgeries can be created automatically and on a large scale based on publicly available technology. Recognizing this challenge, academics and practitioners have proposed a multitude of automatic detection strategies to detect such artificial media. However, in contrast to these technical advances, the human percepti… ▽ More

    Submitted 10 December, 2023; originally announced December 2023.

    Comments: Security and Privacy 2024 (S&P 24)

  5. arXiv:2304.06341  [pdf, other

    cs.CR

    EF/CF: High Performance Smart Contract Fuzzing for Exploit Generation

    Authors: Michael Rodler, David Paaßen, Wenting Li, Lukas Bernhard, Thorsten Holz, Ghassan Karame, Lucas Davi

    Abstract: Smart contracts are increasingly being used to manage large numbers of high-value cryptocurrency accounts. There is a strong demand for automated, efficient, and comprehensive methods to detect security vulnerabilities in a given contract. While the literature features a plethora of analysis methods for smart contracts, the existing proposals do not address the increasing complexity of contracts.… ▽ More

    Submitted 13 April, 2023; originally announced April 2023.

    Comments: To be published at Euro S&P 2023

  6. arXiv:2303.14443  [pdf, other

    cs.CR cs.LG

    No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning

    Authors: Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck

    Abstract: The number of papers submitted to academic conferences is steadily rising in many scientific disciplines. To handle this growth, systems for automatic paper-reviewer assignments are increasingly used during the reviewing process. These systems use statistical topic models to characterize the content of submissions and automate the assignment to reviewers. In this paper, we show that this automatio… ▽ More

    Submitted 25 March, 2023; originally announced March 2023.

    Comments: Accepted at USENIX Security Symposium 2023

  7. arXiv:2302.12173  [pdf, other

    cs.CR cs.AI cs.CL cs.CY

    Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection

    Authors: Kai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, Mario Fritz

    Abstract: Large Language Models (LLMs) are increasingly being integrated into various applications. The functionalities of recent LLMs can be flexibly modulated via natural language prompts. This renders them susceptible to targeted adversarial prompting, e.g., Prompt Injection (PI) attacks enable attackers to override original instructions and employed controls. So far, it was assumed that the user is dire… ▽ More

    Submitted 5 May, 2023; v1 submitted 23 February, 2023; originally announced February 2023.

  8. arXiv:2302.04012  [pdf, other

    cs.CR cs.AI cs.CL cs.LG cs.SE

    CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models

    Authors: Hossein Hajipour, Keno Hassler, Thorsten Holz, Lea Schönherr, Mario Fritz

    Abstract: Large language models (LLMs) for automatic code generation have achieved breakthroughs in several programming tasks. Their advances in competition-level programming problems have made them an essential pillar of AI-assisted pair programming, and tools such as GitHub Copilot have emerged as part of the daily programming workflow used by millions of developers. The training data for these models is… ▽ More

    Submitted 23 October, 2023; v1 submitted 8 February, 2023; originally announced February 2023.

    Comments: 23 pages, 9 figures

  9. arXiv:2212.03075  [pdf, other

    cs.SE cs.CR

    Systematic Assessment of Fuzzers using Mutation Analysis

    Authors: Philipp Görz, Björn Mathis, Keno Hassler, Emre Güler, Thorsten Holz, Andreas Zeller, Rahul Gopinath

    Abstract: Fuzzing is an important method to discover vulnerabilities in programs. Despite considerable progress in this area in the past years, measuring and comparing the effectiveness of fuzzers is still an open research question. In software testing, the gold standard for evaluating test quality is mutation analysis, which evaluates a test's ability to detect synthetic bugs: If a set of tests fails to de… ▽ More

    Submitted 25 July, 2023; v1 submitted 6 December, 2022; originally announced December 2022.

    Comments: 13 pages, 4 figures

    ACM Class: D.2.5; D.4.6

  10. arXiv:2210.14571  [pdf, other

    cs.CV

    Towards the Detection of Diffusion Model Deepfakes

    Authors: Jonas Ricker, Simon Damm, Thorsten Holz, Asja Fischer

    Abstract: In the course of the past few years, diffusion models (DMs) have reached an unprecedented level of visual quality. However, relatively little attention has been paid to the detection of DM-generated images, which is critical to prevent adverse impacts on our society. In contrast, generative adversarial networks (GANs), have been extensively studied from a forensic perspective. In this work, we the… ▽ More

    Submitted 22 January, 2024; v1 submitted 26 October, 2022; originally announced October 2022.

    Comments: Accepted at VISAPP 2024. This is the extended version with additional experiments and supplemental material. Code and data: https://github.com/jonasricker/diffusion-model-deepfake-detection

  11. arXiv:2203.11387  [pdf, other

    cs.HC

    Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites

    Authors: Christine Utz, Sabrina Amft, Martin Degeling, Thorsten Holz, Sascha Fahl, Florian Schaub

    Abstract: Modern websites frequently use and embed third-party services to facilitate web development, connect to social media, or for monetization. This often introduces privacy issues as the inclusion of third-party services on a website can allow the third party to collect personal data about the website's visitors. While the prevalence and mechanisms of third-party web tracking have been widely studied,… ▽ More

    Submitted 4 October, 2022; v1 submitted 21 March, 2022; originally announced March 2022.

    Comments: 25 pages, 8 figures, 7 tables

  12. arXiv:2203.04117  [pdf, other

    cs.CR

    xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64

    Authors: Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi

    Abstract: Memory safety in complex applications implemented in unsafe programming languages such as C/C++ is still an unresolved problem in practice. Many different types of defenses have been proposed in the past to mitigate this problem. The most promising next step is a tighter integration of the hardware and software level: modern mitigation techniques are either accelerated using hardware extensions or… ▽ More

    Submitted 8 March, 2022; originally announced March 2022.

  13. Nyx-Net: Network Fuzzing with Incremental Snapshots

    Authors: Sergej Schumilo, Cornelius Aschermann, Andrea Jemmett, Ali Abbasi, Thorsten Holz

    Abstract: Coverage-guided fuzz testing ("fuzzing") has become mainstream and we have observed lots of progress in this research area recently. However, it is still challenging to efficiently test network services with existing coverage-guided fuzzing methods. In this paper, we introduce the design and implementation of Nyx-Net, a novel snapshot-based fuzzing approach that can successfully fuzz a wide range… ▽ More

    Submitted 4 November, 2021; originally announced November 2021.

    Journal ref: EuroSys '22, Proceedings of the Seventeenth European Conference on Computer Systems, March 2022, Pages 166-180

  14. arXiv:2106.08913  [pdf, other

    cs.CR

    Technical Report: Hardening Code Obfuscation Against Automated Attacks

    Authors: Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi

    Abstract: Software obfuscation is a crucial technology to protect intellectual property and manage digital rights within our society. Despite its huge practical importance, both commercial and academic state-of-the-art obfuscation methods are vulnerable to a plethora of automated deobfuscation attacks, such as symbolic execution, taint analysis, or program synthesis. While several enhanced obfuscation techn… ▽ More

    Submitted 17 June, 2022; v1 submitted 16 June, 2021; originally announced June 2021.

  15. arXiv:2104.02984  [pdf, other

    cs.CV

    [RE] CNN-generated images are surprisingly easy to spot...for now

    Authors: Joel Frank, Thorsten Holz

    Abstract: This work evaluates the reproducibility of the paper "CNN-generated images are surprisingly easy to spot... for now" by Wang et al. published at CVPR 2020. The paper addresses the challenge of detecting CNN-generated imagery, which has reached the potential to even fool humans. The authors propose two methods which help an image classifier to generalize from being trained on one specific CNN to de… ▽ More

    Submitted 7 April, 2021; originally announced April 2021.

    Comments: Code available: https://github.com/Joool/ReproducabilityCNNEasyToSpot

  16. arXiv:2102.05431  [pdf, other

    cs.CR cs.LG cs.SD

    Dompteur: Taming Audio Adversarial Examples

    Authors: Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz

    Abstract: Adversarial examples seem to be inevitable. These specifically crafted inputs allow attackers to arbitrarily manipulate machine learning systems. Even worse, they often seem harmless to human observers. In our digital society, this poses a significant threat. For example, Automatic Speech Recognition (ASR) systems, which serve as hands-free interfaces to many kinds of systems, can be attacked with… ▽ More

    Submitted 3 June, 2021; v1 submitted 10 February, 2021; originally announced February 2021.

    Comments: Accepted at USENIX Security Symposium 2021

  17. arXiv:2010.10682  [pdf, other

    cs.SD cs.CR cs.LG eess.AS

    VenoMave: Targeted Poisoning Against Speech Recognition

    Authors: Hojjat Aghakhani, Lea Schönherr, Thorsten Eisenhofer, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna

    Abstract: Despite remarkable improvements, automatic speech recognition is susceptible to adversarial perturbations. Compared to standard machine learning architectures, these attacks are significantly more challenging, especially since the inputs to a speech recognition system are time series that contain both acoustic and linguistic properties of speech. Extracting all recognition-relevant information req… ▽ More

    Submitted 20 April, 2023; v1 submitted 20 October, 2020; originally announced October 2020.

  18. arXiv:2008.00508  [pdf, other

    cs.CR

    Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers

    Authors: Lea Schönherr, Maximilian Golla, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, Thorsten Holz

    Abstract: Voice assistants like Amazon's Alexa, Google's Assistant, or Apple's Siri, have become the primary (voice) interface in smart speakers that can be found in millions of households. For privacy reasons, these speakers analyze every sound in their environment for their respective wake word like ''Alexa'' or ''Hey Siri,'' before uploading the audio stream to the cloud for further processing. Previous… ▽ More

    Submitted 2 August, 2020; originally announced August 2020.

  19. arXiv:2007.04116  [pdf, other

    cs.CR

    Automated Multi-Architectural Discovery of CFI-Resistant Code Gadgets

    Authors: Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin Kollenda, Thorsten Holz

    Abstract: Memory corruption vulnerabilities are still a severe threat for software systems. To thwart the exploitation of such vulnerabilities, many different kinds of defenses have been proposed in the past. Most prominently, Control-Flow Integrity (CFI) has received a lot of attention recently. Several proposals were published that apply coarse-grained policies with a low performance overhead. However, th… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

    Comments: Published in 21st European Symposium on Research in Computer Security (ESORICS'16)

  20. arXiv:2007.03550  [pdf, ps, other

    cs.CR

    Detile: Fine-Grained Information Leak Detection in Script Engines

    Authors: Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz

    Abstract: Memory disclosure attacks play an important role in the exploitation of memory corruption vulnerabilities. By analyzing recent research, we observe that bypasses of defensive solutions that enforce control-flow integrity or attempt to detect return-oriented programming require memory disclosure attacks as a fundamental first step. However, research lags behind in detecting such information leaks.… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

  21. arXiv:2007.03549  [pdf, other

    cs.CR

    An Exploratory Analysis of Microcode as a Building Block for System Defenses

    Authors: Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz

    Abstract: Microcode is an abstraction layer used by modern x86 processors that interprets user-visible CISC instructions to hardware-internal RISC instructions. The capability to update x86 microcode enables a vendor to modify CPU behavior in-field, and thus patch erroneous microarchitectural processes or even implement new features. Most prominently, the recent Spectre and Meltdown vulnerabilities were mit… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

    Comments: Published in ACM SIGSAC Conference on Computer and Communications Security (CCS'18)

  22. arXiv:2007.03548  [pdf, other

    cs.CR

    Breaking and Fixing Destructive Code Read Defenses

    Authors: Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz

    Abstract: Just-in-time return-oriented programming (JIT-ROP) is a powerful memory corruption attack that bypasses various forms of code randomization. Execute-only memory (XOM) can potentially prevent these attacks, but requires source code. In contrast, destructive code reads (DCR) provide a trade-off between security and legacy compatibility. The common belief is that DCR provides strong protection if com… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

    Comments: Published in 33rd Annual Computer Security Applications Conference (ACSAC'17)

  23. arXiv:2007.03302  [pdf, ps, other

    cs.CR

    VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching

    Authors: Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos

    Abstract: Polymorphism and inheritance make C++ suitable for writing complex software, but significantly increase the attack surface because the implementation relies on virtual function tables (vtables). These vtables contain function pointers that attackers can potentially hijack and in practice, vtable hijacking is one of the most important attack vector for C++ binaries. In this paper, we present VTab… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

    Comments: Published in Annual Computer Security Applications Conference (ACSAC'19)

  24. arXiv:2007.02326  [pdf, other

    cs.CR

    EvilCoder: Automated Bug Insertion

    Authors: Jannik Pewny, Thorsten Holz

    Abstract: The art of finding software vulnerabilities has been covered extensively in the literature and there is a huge body of work on this topic. In contrast, the intentional insertion of exploitable, security-critical bugs has received little (public) attention yet. Wanting more bugs seems to be counterproductive at first sight, but the comprehensive evaluation of bug-finding techniques suffers from a l… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

    Comments: Published in 32nd Annual Conference on Computer Security Applications (ACSAC'16)

  25. arXiv:2007.02314  [pdf, other

    cs.CR

    Static Detection of Uninitialized Stack Variables in Binary Code

    Authors: Behrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz

    Abstract: More than two decades after the first stack smashing attacks, memory corruption vulnerabilities utilizing stack anomalies are still prevalent and play an important role in practice. Among such vulnerabilities, uninitialized variables play an exceptional role due to their unpleasant property of unpredictability: as compilers are tailored to operate fast, costly interprocedural analysis procedures a… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

    Comments: Published in 2019 European Symposium on Research in Computer Security (ESORICS'19)

  26. arXiv:2007.02308  [pdf, other

    cs.CR

    Steroids for DOPed Applications: A Compiler for Automated Data-Oriented Programming

    Authors: Jannik Pewny, Philipp Koppe, Thorsten Holz

    Abstract: The wide-spread adoption of system defenses such as the randomization of code, stack, and heap raises the bar for code-reuse attacks. Thus, attackers utilize a scripting engine in target programs like a web browser to prepare the code-reuse chain, e.g., relocate gadget addresses or perform a just-in-time gadget search. However, many types of programs do not provide such an execution context that a… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

    Comments: Published in 4th IEEE European Symposium on Security and Privacy (EuroS&P'19)

  27. arXiv:2007.02307  [pdf, ps, other

    cs.CR

    Challenges in Designing Exploit Mitigations for Deeply Embedded Systems

    Authors: Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle

    Abstract: Memory corruption vulnerabilities have been around for decades and rank among the most prevalent vulnerabilities in embedded systems. Yet this constrained environment poses unique design and implementation challenges that significantly complicate the adoption of common hardening techniques. Combined with the irregular and involved nature of embedded patch management, this results in prolonged vuln… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

    Comments: Published in 4th IEEE European Symposium on Security and Privacy (EuroS&P'19)

  28. arXiv:2004.00939  [pdf, other

    cs.CR

    CORSICA: Cross-Origin Web Service Identification

    Authors: Christian Dresen, Fabian Ising, Damian Poddebniak, Tobias Kappert, Thorsten Holz, Sebastian Schinzel

    Abstract: Vulnerabilities in private networks are difficult to detect for attackers outside of the network. While there are known methods for port scanning internal hosts that work by luring unwitting internal users to an external web page that hosts malicious JavaScript code, no such method for detailed and precise service identification is known. The reason is that the Same Origin Policy (SOP) prevents ac… ▽ More

    Submitted 2 April, 2020; originally announced April 2020.

    Comments: Accepted to ASIACCS2020

  29. arXiv:2003.08685  [pdf, other

    cs.CV eess.IV

    Leveraging Frequency Analysis for Deep Fake Image Recognition

    Authors: Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, Thorsten Holz

    Abstract: Deep neural networks can generate images that are astonishingly realistic, so much so that it is often hard for humans to distinguish them from actual photos. These achievements have been largely made possible by Generative Adversarial Networks (GANs). While deep fake images have been thoroughly investigated in the image domain - a classical approach from the area of image forensics - an analysis… ▽ More

    Submitted 26 June, 2020; v1 submitted 19 March, 2020; originally announced March 2020.

    Comments: Accepted to ICML 2020. New experiments, updated several sections, code: https://github.com/RUB-SysSec/GANDCTAnalysis

  30. Beyond the Front Page: Measuring Third Party Dynamics in the Field

    Authors: Tobias Urban, Martin Degeling, Thorsten Holz, Norbert Pohlmann

    Abstract: In the modern Web, service providers often rely heavily on third parties to run their services. For example, they make use of ad networks to finance their services, externally hosted libraries to develop features quickly, and analytics providers to gain insights into visitor behavior. For security and privacy, website owners need to be aware of the content they provide their users. However, in r… ▽ More

    Submitted 3 February, 2020; v1 submitted 28 January, 2020; originally announced January 2020.

  31. arXiv:1910.00948  [pdf, other

    cs.CR

    Reverse Engineering x86 Processor Microcode

    Authors: Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz

    Abstract: Microcode is an abstraction layer on top of the physical components of a CPU and present in most general-purpose CPUs today. In addition to facilitate complex and vast instruction sets, it also provides an update mechanism that allows CPUs to be patched in-place without requiring any special hardware. While it is well-known that CPUs are regularly updated with this mechanism, very little is known… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: SEC 2017 Proceedings of the 26th USENIX Conference on Security Symposium Pages 1163-1180

  32. (Un)informed Consent: Studying GDPR Consent Notices in the Field

    Authors: Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, Thorsten Holz

    Abstract: Since the adoption of the General Data Protection Regulation (GDPR) in May 2018 more than 60 % of popular websites in Europe display cookie consent notices to their visitors. This has quickly led to users becoming fatigued with privacy notifications and contributed to the rise of both browser extensions that block these banners and demands for a solution that bundles consent across multiple websit… ▽ More

    Submitted 22 October, 2019; v1 submitted 5 September, 2019; originally announced September 2019.

    Comments: 18 pages, 6 figures, 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19), November 11-15, 2019, London, United Kingdom

  33. arXiv:1908.01551  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems

    Authors: Lea Schönherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa

    Abstract: Automatic speech recognition (ASR) systems can be fooled via targeted adversarial examples, which induce the ASR to produce arbitrary transcriptions in response to altered audio signals. However, state-of-the-art adversarial examples typically have to be fed into the ASR system directly, and are not successful when played in a room. The few published over-the-air adversarial examples fall into one… ▽ More

    Submitted 24 November, 2020; v1 submitted 5 August, 2019; originally announced August 2019.

  34. arXiv:1907.01933  [pdf, other

    cs.CR

    Towards Automated Application-Specific Software Stacks

    Authors: Nicolai Davidsson, Andre Pawlowski, Thorsten Holz

    Abstract: Software complexity has increased over the years. One common way to tackle this complexity during development is to encapsulate features into a shared library. This allows developers to reuse already implemented features instead of reimplementing them over and over again. However, not all features provided by a shared library are actually used by an application. As a result, an application using s… ▽ More

    Submitted 16 September, 2019; v1 submitted 3 July, 2019; originally announced July 2019.

  35. arXiv:1902.08454  [pdf, other

    cs.CR

    A Study of Newly Observed Hostnames and DNS Tunneling in the Wild

    Authors: Dennis Tatang, Florian Quinkert, Nico Dolecki, Thorsten Holz

    Abstract: The domain name system (DNS) is a crucial backbone of the Internet and millions of new domains are created on a daily basis. While the vast majority of these domains are legitimate, adversaries also register new hostnames to carry out nefarious purposes, such as scams, phishing, or other types of attacks. In this paper, we present insights on the global utilization of DNS through a measurement stu… ▽ More

    Submitted 22 February, 2019; originally announced February 2019.

  36. The Unwanted Sharing Economy: An Analysis of Cookie Syncing and User Transparency under GDPR

    Authors: Tobias Urban, Dennis Tatang, Martin Degeling, Thorsten Holz, Norbert Pohlmann

    Abstract: The European General Data Protection Regulation (GDPR), which went into effect in May 2018, leads to important changes in this area: companies are now required to ask for users' consent before collecting and sharing personal data and by law users now have the right to gain access to the personal information collected about them. In this paper, we study and evaluate the effect of the GDPR on the… ▽ More

    Submitted 21 November, 2018; originally announced November 2018.

  37. arXiv:1808.05665  [pdf, other

    cs.CR cs.SD eess.AS

    Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding

    Authors: Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa

    Abstract: Voice interfaces are becoming accepted widely as input methods for a diverse set of devices. This development is driven by rapid improvements in automatic speech recognition (ASR), which now performs on par with human listening in many tasks. These improvements base on an ongoing evolution of DNNs as the computational core of ASR. However, recent research results show that DNNs are vulnerable to a… ▽ More

    Submitted 30 October, 2018; v1 submitted 16 August, 2018; originally announced August 2018.

  38. We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy

    Authors: Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten Holz

    Abstract: The European Union's General Data Protection Regulation (GDPR) went into effect on May 25, 2018. Its privacy regulations apply to any service and company collecting or processing personal data in Europe. Many companies had to adjust their data handling processes, consent forms, and privacy policies to comply with the GDPR's transparency requirements. We monitored this rare event by analyzing the G… ▽ More

    Submitted 25 June, 2019; v1 submitted 15 August, 2018; originally announced August 2018.

    Comments: Published at NDSS 2019

  39. arXiv:1803.01598  [pdf, other

    cs.CR

    RAPTOR: Ransomware Attack PredicTOR

    Authors: Florian Quinkert, Thorsten Holz, KSM Tozammel Hossain, Emilio Ferrara, Kristina Lerman

    Abstract: Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifical… ▽ More

    Submitted 5 March, 2018; originally announced March 2018.

    Comments: 20 pages

  40. arXiv:1712.03031  [pdf, other

    cs.CR

    An Empirical Study on Price Differentiation Based on System Fingerprints

    Authors: Thomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz

    Abstract: Price differentiation describes a marketing strategy to determine the price of goods on the basis of a potential customer's attributes like location, financial status, possessions, or behavior. Several cases of online price differentiation have been revealed in recent years. For example, different pricing based on a user's location was discovered for online office supply chain stores and there wer… ▽ More

    Submitted 8 December, 2017; originally announced December 2017.

  41. arXiv:1710.08932  [pdf, other

    cs.CR

    On Security Research Towards Future Mobile Network Generations

    Authors: David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper

    Abstract: Over the last decades, numerous security and privacy issues in all three active mobile network generations have been revealed that threaten users as well as network providers. In view of the newest generation (5G) currently under development, we now have the unique opportunity to identify research directions for the next generation based on existing security and privacy issues as well as already p… ▽ More

    Submitted 6 March, 2018; v1 submitted 24 October, 2017; originally announced October 2017.

    Comments: Survey: 198 citations, 25 pages, 4 tables, 3 figures

  42. arXiv:cs/0406059  [pdf, ps, other

    cs.CR

    Ermittlung von Verwundbarkeiten mit elektronischen Koedern

    Authors: Maximillian Dornseif, Felix C. Gaertner, Thorsten Holz

    Abstract: Electronic bait (honeypots) are network resources whose value consists of being attacked and compromised. These are often computers which do not have a task in the network, but are otherwise indestinguishable from regular computers. Such bait systems could be interconnected (honeynets). These honeynets are equipped with special software, facilitating forensic anylisis of incidents. Taking averag… ▽ More

    Submitted 29 June, 2004; originally announced June 2004.

    Comments: Presented at Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2004), in German

    ACM Class: K.4.0; K.4.1; K.5.9; K.7.4

  43. NoSEBrEaK - Attacking Honeynets

    Authors: Maximillian Dornseif, Thorsten Holz, Christian N. Klein

    Abstract: It is usually assumed that Honeynets are hard to detect and that attempts to detect or disable them can be unconditionally monitored. We scrutinize this assumption and demonstrate a method how a host in a honeynet can be completely controlled by an attacker without any substantial logging taking place.

    Submitted 28 June, 2004; originally announced June 2004.

    ACM Class: K.6.5; K.5.m

    Journal ref: Proceedings from the fifth IEEE Systems, Man and Cybernetics Information Assurance Workshop, Westpoint, 2004; Pages 123-129