Thomas Barabosch
Thomas Barabosch
FKIE Fraunhofer/University of Bonn
Verified email at fkie.fraunhofer.de - Homepage
Title
Cited by
Cited by
Year
Automatic extraction of domain name generation algorithms from current malware
T Barabosch, A Wichmann, F Leder, E Gerhards-Padilla
Proc. NATO Symposium IST-111 on Information Assurance and Cyber Defense …, 2012
332012
Bee master: Detecting host-based code injection attacks
T Barabosch, S Eschweiler, E Gerhards-Padilla
International conference on detection of intrusions and malware, and …, 2014
222014
Quincy: Detecting host-based code injection attacks in memory dumps
T Barabosch, N Bergmann, A Dombeck, E Padilla
International Conference on Detection of Intrusions and Malware, and …, 2017
142017
Host-based code injection attacks: A popular technique used by malware
T Barabosch, E Gerhards-Padilla
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
102014
BotWatcher: Transparent and Generic Botnet Tracking
T Barabosch, A Dombeck, K Yakdan, E Gerhards-Padilla
International Workshop on Recent Advances in Intrusion Detection, 565-587, 2015
4*2015
List of malicious samples used in bee master: Detecting host-based code injection attacks
T Barabosch, S Eschweiler, E Gerhards-Padilla
12017
KLEAK: Practical Kernel Memory Disclosure Detection
T Barabosch, M Villard
2018
Formalization and Detection of Host-Based Code Injection Attacks in the Context of Malware
TF Barabosch
Universitäts-und Landesbibliothek Bonn, 2018
2018
Behavior-Driven Development in Malware Analysis
T Barabosch, E Gerhards-Padilla
The system can't perform the operation now. Try again later.
Articles 1–9