Publikationen

2018

  1. IT Security Incident Response: Current State, Emerging Problems, and New Approaches
    Schreck, Thomas
    2018

2017

  1. Mining Attributed Graphs for Threat Intelligence
    Gascon, Hugo, Grobauer, Bernd, Schreck, Thomas, Rist, Lukas, Arp, Daniel, and Rieck, Konrad
    In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017 2017

2016

  1. MalFlow: identification of C&C servers through host-based data flow profiling
    Wüchner, Tobias, Ochoa, Martı́n, Golagha, Mojdeh, Srivastava, Gaurav, Schreck, Thomas, and Pretschner, Alexander
    In Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016 2016

2015

  1. Klassifikation von IT-Sicherheitsvorfällen
    Grobauer, Bernd, Kossakowski, Klaus-Peter, and Schreck, Thomas
    Datenschutz und Datensicherheit 2015

2014

  1. Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques
    Spreitzenbarth, Michael, Schreck, Thomas, Echtler, Florian, Arp, Daniel, and Hoffmann, Johannes
    International Journal of Information Security 2014

2013

  1. MobileSandbox: Ein Analyseframework für Android Applikationen
    Spreitzenbarth, Michael, Echtler, Florian, Schreck, Thomas, Hoffmann, Johannes, and Lemoine, Hanno
    In Proceedings of the 13th Deutscher IT-Sicherheitskongress (13. Deutscher IT-Sicherheitskongress Bonn) 2013
  2. Mobile-sandbox: having a deeper look into android applications
    Spreitzenbarth, Michael, Freiling, Felix, Echtler, Florian, Schreck, Thomas, and Hoffmann, Johannes
    In Proceedings of the 28th Annual ACM Symposium on Applied Computing 2013
  3. BISSAM: Automatic Vulnerability Identification of Office Documents
    Schreck, Thomas, Berger, Stefan, and Göbel, Jan
    In Detection of Intrusions and Malware, and Vulnerability Assessment 2013

2012

  1. Linux Speicheranalyse Grundlagen und neue Techniken
    Schreck, Thomas, Schulik, Peter, and Göbel, Jan
    2012
  2. Analyse und Vergleich von BckR2D2-I und II
    Dewald, Andreas, Freiling, Felix, Schreck, Thomas, Spreitzenbarth, Michael, Stüttgen, Johannes, Vömel, Stefan, and Willems, Carsten
    In Proceedings of GI Sicherheit 2012 2012

2011

  1. Analyse und Vergleich von BckR2D2-I und II
    Dewald, Andreas, Freiling, Felix, Schreck, Thomas, Spreitzenbarth, Michael, Stüttgen, Johannes, Vömel, Stefan, and Willems, Carsten
    2011

2010

  1. Towards incident handling in the cloud: challenges and approaches
    Grobauer, Bernd, and Schreck, Thomas
    In Proceedings of the 2010 ACM workshop on Cloud computing security workshop 2010

2007

  1. An NSIS-based approach for firewall traversal in mobile IPv6 networks
    Steinleitner, Niklas, Fu, Xiaoming, Hogrefe, Dieter, Schreck, Thomas, and Tschofenig, Hannes
    In Proceedings of the 3rd international conference on Wireless internet 2007
  2. Diploma Thesis: Analysis of Firewall Solutions in Mobile IPv6
    Schreck, Thomas
    2007