Carsten Willems
Carsten Willems
Ph.d. Student, Ruhr-University Bochum
Verified email at rub.de
Title
Cited by
Cited by
Year
Toward automated dynamic malware analysis using cwsandbox
C Willems, T Holz, F Freiling
IEEE Security & Privacy 5 (2), 32-39, 2007
9492007
Automatic analysis of malware behavior using machine learning
K Rieck, P Trinius, C Willems, T Holz
Journal of Computer Security 19 (4), 639-668, 2011
6752011
Learning and classification of malware behavior
K Rieck, T Holz, C Willems, P Düssel, P Laskov
International Conference on Detection of Intrusions and Malware, and …, 2008
6662008
Practical timing side channel attacks against kernel space ASLR
R Hund, C Willems, T Holz
2013 IEEE Symposium on Security and Privacy, 191-205, 2013
3542013
Automated identification of cryptographic primitives in binary programs
F Gröbert, C Willems, T Holz
International Workshop on Recent Advances in Intrusion Detection, 41-60, 2011
1072011
A malware instruction set for behavior-based analysis
P Trinius, C Willems, T Holz, K Rieck
822009
Down to the bare metal: Using processor features for binary analysis
C Willems, R Hund, A Fobian, D Felsch, T Holz, A Vasudevan
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
532012
Measurement and analysis of autonomous spreading malware in a university environment
J Goebel, T Holz, C Willems
International Conference on Detection of Intrusions and Malware, and …, 2007
472007
Don't trust satellite phones: A security analysis of two satphone standards
B Driessen, R Hund, C Willems, C Paar, T Holz
2012 IEEE Symposium on Security and Privacy, 128-142, 2012
442012
Cxpinspector: Hypervisor-based, hardware-assisted system monitoring
C Willems, R Hund, T Holz
Ruhr-Universitat Bochum, Tech. Rep, 12, 2013
252013
Reverse code engineering—state of the art and countermeasures
C Willems, FC Freiling
IT-Information Technology Methoden und innovative Anwendungen der Informatik …, 2012
222012
CWSandbox: Automatic behaviour analysis of malware
C Willems, T Holz
212006
Detecting malicious documents with combined static and dynamic analysis
M Engleberth, C Willems, T Holz
Virus Bulletin, 2009
202009
Using memory management to detect and extract illegitimate code for malware analysis
C Willems, FC Freiling, T Holz
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
152012
The inmas approach
M Engelberth, FC Freiling, J Göbel, C Gorecki, T Holz, R Hund, P Trinius, ...
1st European Workshop on Internet Early Warning and Network Intelligence, 2010
152010
Cwsandbox
C Willems, T Holz
92007
An experimental security analysis of two satphone standards
B Driessen, R Hund, C Willems, C Paar, T Holz
ACM Transactions on Information and System Security (TISSEC) 16 (3), 1-30, 2013
52013
Countering innovative sandbox evasion techniques used by malware
F Besler, C Willems, R Hund
29th Annual FIRST Conference, 2017
42017
Das Internet-Malware-Analyse-System (InMAS)
M Engelberth, FC Freiling, J Göbel, C Gorecki, T Holz, R Hund, P Trinius, ...
Datenschutz und Datensicherheit-DuD 35 (4), 247, 2011
42011
Frühe Warnung durch Beobachten und Verfolgen von bösartiger Software im Deutschen Internet: Das Internet-Malware-Analyse-System (IAS)
M Engelberth, F Freiling, J Göbel, C Gorecki, T Holz, P Trinius, C Willems
Sichere Wege in der vernetzten Welt–Tagungsband zum 11, 353-367, 2009
42009
The system can't perform the operation now. Try again later.
Articles 1–20