Follow
Thomas Barabosch
Thomas Barabosch
FKIE Fraunhofer/University of Bonn
Verified email at fkie.fraunhofer.de - Homepage
Title
Cited by
Cited by
Year
Automatic extraction of domain name generation algorithms from current malware
T Barabosch, A Wichmann, F Leder, E Gerhards-Padilla
Proc. NATO Symposium IST-111 on Information Assurance and Cyber Defense …, 2012
402012
Bee master: Detecting host-based code injection attacks
T Barabosch, S Eschweiler, E Gerhards-Padilla
Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014
252014
Quincy: Detecting host-based code injection attacks in memory dumps
T Barabosch, N Bergmann, A Dombeck, E Padilla
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
202017
Host-based code injection attacks: A popular technique used by malware
T Barabosch, E Gerhards-Padilla
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
162014
BotWatcher: Transparent and Generic Botnet Tracking
T Barabosch, A Dombeck, K Yakdan, E Gerhards-Padilla
International Workshop on Recent Advances in Intrusion Detection, 565-587, 2015
42015
Kleak: Practical kernel memory disclosure detection
T Barabosch, M Villard
22018
Formalization and Detection of Host-Based Code Injection Attacks in the Context of Malware
TF Barabosch
Universitäts-und Landesbibliothek Bonn, 2018
12018
List of malicious samples used in bee master: Detecting host-based code injection attacks
T Barabosch, S Eschweiler, E Gerhards-Padilla
12017
Behavior-Driven Development in Malware Analysis
T Barabosch, E Gerhards-Padilla
1*
The system can't perform the operation now. Try again later.
Articles 1–9