Measuring the impact of the GDPR on data sharing in ad networks T Urban, D Tatang, M Degeling, T Holz, N Pohlmann Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 82 | 2020 |
A study on subject data access in online advertising after the GDPR T Urban, D Tatang, M Degeling, T Holz, N Pohlmann Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2019 | 79 | 2019 |
SDN-GUARD: Protecting SDN Controllers Against SDN Rootkits D Tatang, F Quinkert, J Frank, C Röpke, T Holz IEEE Conference on Network Function Virtualization and Software Defined …, 2017 | 57 | 2017 |
An empirical study on online price differentiation T Hupperich, D Tatang, N Wilkop, T Holz Proceedings of the eighth ACM conference on data and application security …, 2018 | 52 | 2018 |
The unwanted sharing economy: An analysis of cookie syncing and user transparency under GDPR T Urban, D Tatang, M Degeling, T Holz, N Pohlmann arXiv preprint arXiv:1811.08660, 2018 | 35 | 2018 |
Reining in the web's inconsistencies with site policy S Calzavara, T Urban, D Tatang, M Steffens, B Stock Proceedings of the Network and Distributed System Security Symposium 2021, 2021 | 30 | 2021 |
Towards understanding privacy implications of adware and potentially unwanted programs T Urban, D Tatang, T Holz, N Pohlmann Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 23 | 2018 |
The evolution of dns-based email authentication: Measuring adoption and finding flaws D Tatang, F Zettl, T Holz Proceedings of the 24th International Symposium on Research in Attacks …, 2021 | 22 | 2021 |
Masters of time: An overview of the NTP ecosystem T Rytilahti, D Tatang, J Köpper, T Holz 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 122-136, 2018 | 21 | 2018 |
A study of newly observed hostnames and DNS tunneling in the wild D Tatang, F Quinkert, N Dolecki, T Holz arXiv preprint arXiv:1902.08454, 2019 | 15 | 2019 |
Large-scale Analysis of Infrastructure-leaking DNS Servers D Tatang, C Schneider, T Holz Conference on Detection of Intrusions and Malware & Vulnerability Assessment …, 2019 | 13 | 2019 |
A first large-scale analysis on usage of mta-sts D Tatang, R Flume, T Holz Detection of Intrusions and Malware, and Vulnerability Assessment: 18th …, 2021 | 12 | 2021 |
Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces T Urban, M Große-Kampmann, D Tatang, T Holz, N Pohlmann Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 11 | 2020 |
Measuring the Impact of the GDPR on Data Sharing T Urban, D Tatang, M Degeling, T Holz, N Pohlmann ACM Asia Conference on Computer and Communications Security (AsiaCCS). https …, 2020 | 7 | 2020 |
Below the radar: spotting DNS tunnels in newly observed hostnames in the wild D Tatang, F Quinkert, T Holz 2019 APWG Symposium on Electronic Crime Research (eCrime), 1-15, 2019 | 7 | 2019 |
Study of DNS rebinding attacks on smart home devices D Tatang, T Suurland, T Holz Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE …, 2020 | 6 | 2020 |
Cybersecurity research: Challenges and course of action J Müller-Quade, M Backes, P Buxmann, C Eckert, T Holz Tech. Rep, 2019 | 5 | 2019 |
Analyzing leakage of personal information by malware T Urban, D Tatang, T Holz, N Pohlmann Journal of Computer Security 27 (4), 459-481, 2019 | 3 | 2019 |
An Empirical Study on Price Differentiation Based on System Fingerprints T Hupperich, D Tatang, N Wilkop, T Holz arXiv preprint arXiv:1712.03031, 2017 | 3 | 2017 |
Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy F Quinkert, D Tatang, T Holz Detection of Intrusions and Malware, and Vulnerability Assessment: 18th …, 2021 | 2 | 2021 |