VAMOS

Efficient Analysis and Detection of Modern Malware

Publications


2019

False Sense of Security: A Study on the Effectivity of Jailbreak Detection in Banking Apps.
Ansgar Kellner, Micha Horlboge, Konrad Rieck and Christian Wressnegger. Proc. of 4th IEEE European Symposium on Security and Privacy (EuroS&P), June 2019. → PDF

TypeMiner: Recovering Types in Binary Programs using Machine Learning.
Alwin Maier, Hugo Gascon, Christian Wressnegger and Konrad Rieck. Proc. of 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), June 2019. → PDF

New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild.
Marius Musch, Christian Wressnegger, Martin Johns and Konrad Rieck. Proc. of 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), June 2019. → PDF

Security Analysis of Devolo HomePlug Devices.
Rouven Scholz and Christian Wressnegger. Proc. of 12th ACM European Workshop on Systems Security (EuroSec), March 2019. → PDF


2018

Reading Between The Lines: Content-Agnostic Detection of Spear-Phishing Emails
Hugo Gascon, Steffen Ulrich, Benjamin Stritter, and Konrad Rieck. Proc. of International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018), September 2018. → PDF

Web-based Cryptojacking in the Wild
Marius Musch, Christian Wressnegger, Martin Johns, and Konrad Rieck. Technical report, arXiv:1808.09474 , August 2018. → PDF


2017

Privacy Threats through Ultrasonic Side Channels on Mobile Devices.
Daniel Arp, Erwin Quiring, Christian Wressnegger, and Konrad Rieck. Proc. of IEEE European Symposium on Security and Privacy (EuroS&P), April 2017. → PDF

Looking Back on Three Years of Flash-based Malware.
Christian Wressnegger and Konrad Rieck. Proc. of ACM European Workshop on Systems Security (EuroSec), April 2017. → PDF

Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks.
Christian Wressnegger, Kevin Freeman, Fabian Yamaguchi, and Konrad Rieck. Proc. of ACM Asia Conference on Computer Computer and Communications Security (ASIACCS), April 2017. → PDF

Mining Attributed Graphs for Threat Intelligence.
Hugo Gascon, Bernd Grobauer, Thomas Schreck, Lukas Rist, Daniel Arp, and Konrad Rieck. Proc. of 8th ACM Conference on Data and Applications Security and Privacy (CODASPY), March 2017. → PDF