publications.bib

@phdthesis{Schreck2018,
  author = {Thomas Schreck},
  title = {IT Security Incident Response: Current State, Emerging Problems, and New Approaches},
  type = {{Doctoral Thesis}},
  school = {Friedrich-Alexander-Universit{\"a}t Erlangen-N{\"u}rnberg (FAU)},
  year = {2018}
}
@inproceedings{DBLP:conf/codaspy/GasconGSRAR17,
  author = {Hugo Gascon and
               Bernd Grobauer and
               Thomas Schreck and
               Lukas Rist and
               Daniel Arp and
               Konrad Rieck},
  title = {Mining Attributed Graphs for Threat Intelligence},
  booktitle = {Proceedings of the Seventh {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
               2017},
  pages = {15--22},
  year = {2017},
  url = {http://doi.acm.org/10.1145/3029806.3029811},
  doi = {10.1145/3029806.3029811}
}
@inproceedings{DBLP:conf/sac/WuchnerOGSSP16,
  author = {Tobias W{\"{u}}chner and
               Mart{\'{\i}}n Ochoa and
               Mojdeh Golagha and
               Gaurav Srivastava and
               Thomas Schreck and
               Alexander Pretschner},
  title = {MalFlow: identification of C{\&}C servers through host-based data
               flow profiling},
  booktitle = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing,
               Pisa, Italy, April 4-8, 2016},
  pages = {2087--2094},
  year = {2016},
  url = {http://doi.acm.org/10.1145/2851613.2851802},
  doi = {10.1145/2851613.2851802},
  timestamp = {Mon, 06 Jun 2016 18:51:39 +0200},
  biburl = {http://dblp.uni-trier.de/rec/bib/conf/sac/WuchnerOGSSP16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dud/GrobauerKS15,
  author = {Bernd Grobauer and
               Klaus{-}Peter Kossakowski and
               Thomas Schreck},
  title = {Klassifikation von IT-Sicherheitsvorf{\"{a}}llen},
  journal = {Datenschutz und Datensicherheit},
  volume = {40},
  number = {1},
  pages = {17--21},
  year = {2015},
  url = {http://dx.doi.org/10.1007/s11623-016-0536-7},
  doi = {10.1007/s11623-016-0536-7},
  timestamp = {Tue, 02 Feb 2016 15:31:13 +0100},
  biburl = {http://dblp.uni-trier.de/rec/bib/journals/dud/GrobauerKS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{spreitzenbarth2014mobile,
  title = {Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques},
  author = {Spreitzenbarth, Michael and Schreck, Thomas and Echtler, Florian and Arp, Daniel and Hoffmann, Johannes},
  journal = {International Journal of Information Security},
  pages = {1--13},
  year = {2014},
  publisher = {Springer}
}
@inproceedings{spreitzenbarth2013mobilebsi,
  title = {MobileSandbox: Ein Analyseframework f{\"u}r Android Applikationen},
  author = {Spreitzenbarth, Michael and Echtler, Florian and Schreck, Thomas and Hoffmann, Johannes and Lemoine, Hanno},
  booktitle = {Proceedings of the 13th Deutscher IT-Sicherheitskongress (13. Deutscher IT-Sicherheitskongress Bonn)},
  year = {2013},
  organization = {BSI}
}
@inproceedings{spreitzenbarth2013mobile,
  title = {Mobile-sandbox: having a deeper look into android applications},
  author = {Spreitzenbarth, Michael and Freiling, Felix and Echtler, Florian and Schreck, Thomas and Hoffmann, Johannes},
  booktitle = {Proceedings of the 28th Annual ACM Symposium on Applied Computing},
  pages = {1808--1815},
  year = {2013},
  organization = {ACM}
}
@incollection{schreck2013bissam,
  title = {BISSAM: Automatic vulnerability identification of office documents},
  author = {Schreck, Thomas and Berger, Stefan and G{\"o}bel, Jan},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment},
  pages = {204--213},
  year = {2013},
  publisher = {Springer}
}
@incollection{schreck2012linuxspeicheranalyse,
  title = {Linux Speicheranalyse Grundlagen und neue Techniken},
  author = {Schreck, Thomas and Schulik, Peter and G{\"o}bel, Jan},
  booktitle = {19. DFN Workshop IT-Sicherheit in vernetzten Systemen},
  year = {2012},
  publisher = {DFN-CERT}
}
@inproceedings{univis91275270,
  author = {Andreas Dewald and Felix Freiling and Thomas Schreck and Michael Spreitzenbarth and Johannes St{\"u}ttgen and Stefan V{\"o}mel and Carsten Willems},
  editor = {GI},
  location = {Darmstadt, Germany},
  booktitle = {{Proceedings of GI Sicherheit 2012}},
  title = {{Analyse und Vergleich von BckR2D2-I und II}},
  pages = {0--0},
  year = {2012},
  bibsource = {UnivIS, http://univis.uni-erlangen.de/prg?search=publications&id=91275270&show=elong}
}
@techreport{univis91127431,
  location = {Erlangen},
  author = {Andreas Dewald and Felix Freiling and Thomas Schreck and Michael Spreitzenbarth and Johannes St{\"u}ttgen and Stefan V{\"o}mel and Carsten Willems},
  keywords = {Backdoor, Trojan, Analysis, Malware, Trojaner, R2D2, Schadsoftware, Analyse},
  url = {http://www.opus.ub.uni-erlangen.de/opus/volltexte/2012/3036/},
  school = {University of Erlangen-Nuremberg},
  title = {{Analyse und Vergleich von BckR2D2-I und II}},
  year = {2011},
  bibsource = {UnivIS, http://univis.uni-erlangen.de/prg?search=publications&id=91127431&show=elong}
}
@inproceedings{grobauer2010towards,
  title = {Towards incident handling in the cloud: challenges and approaches},
  author = {Grobauer, Bernd and Schreck, Thomas},
  booktitle = {Proceedings of the 2010 ACM workshop on Cloud computing security workshop},
  pages = {77--86},
  year = {2010},
  organization = {ACM}
}
@inproceedings{steinleitner2007nsis,
  title = {An NSIS-based approach for firewall traversal in mobile IPv6 networks},
  author = {Steinleitner, Niklas and Fu, Xiaoming and Hogrefe, Dieter and Schreck, Thomas and Tschofenig, Hannes},
  booktitle = {Proceedings of the 3rd international conference on Wireless internet},
  pages = {15},
  year = {2007},
  organization = {ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)}
}
@techreport{schreck2007diplomathesis,
  author = {Thomas Schreck},
  school = {Applied University of Landshut},
  title = {{Diploma Thesis: Analysis of Firewall Solutions in Mobile IPv6}},
  year = {2007}
}