Dipl.-Inform. Thomas Barabosch

Researcher at Fraunhofer FKIE

Contact
Phone: +49 228 50212-601
Fax: +49 228 73-4571
Email: barabosc@REMOVETHISPART.cs.uni-bonn.de
Public key: 0xD6C5FBB2
   
Address
  Institute of Computer Science 4
Friedrich-Ebert-Allee 144
53113 Bonn
Germany
Room: Zanderstr. 5, 2.26
 

Research Interests


  • Malware analysis
  • Reverse engineering automation
  • Digital forensics
  • Botnet mitigation
  • Network security

Publications


Thomas Barabosch, Niklas Bergmann, Adrian Dombeck, Elmar Padilla
Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps
DIMVA, Bonn, Germany, July 2017
pdf
proceedings @ Springer
code
complementary material

Thomas Barabosch and Elmar Gerhards-Padilla
Behavior-Driven Development in Malware Analysis
Botconf 2015, Paris, France, December 2015
proceedings
slides
complementary material

Thomas Barabosch, Adrian Dombeck, Khaled Yakdan, Elmar Gerhards-Padilla
BotWatcher: Transparent and Generic Botnet Tracking
RAID 2015, Kyoto, Japan, November 2015
proceedings
slides
complementary material

Thomas Barabosch, Adrian Dombeck, Elmar Gerhards-Padilla
ParasiteEx: Disinfecting Parasitic Malware Platform-Independently
10th Future Security, Berlin, Germany, September 2015
slides

Thomas Barabosch and Elmar Gerhards-Padilla
Host-Based Code Injection Attacks: A Popular Technique Used By Malware
9th International Conference on Malicious and Unwanted Software (MALCON), Fajardo, Puerto Rico, October 2014
pdf
proceedings @ IEEE Xplore

Thomas Barabosch, Sebastian Eschweiler and Elmar Gerhards-Padilla
Bee Master: Detecting Host-Based Code Injection Attacks
DIMVA, Egham, UK, July 2014
sample list
pdf
proceedings @ Springer

Thomas Barabosch, Andre Wichmann, Felix Leder and Elmar Gerhards-Padilla
Automatic Extraction of Domain Name Generation Algorithms from Current Malware
NATO Symposium IST-111 on Information Assurance and Cyber Defence, Koblenz, Germany, September 2012
pdf



Presentations


Thomas Barabosch
Operation Avalanche: Not your average botnet take down
Dagstuhl Seminar 17281, Schloss Dagstuhl, Germany, July 2017
seminar

Thomas Barabosch
Behavior-Driven Development in Malware Analysis: Can it Improve the Malware Analysis Process?
SPRING 10, Neubiberg, Germany, July 2015
proceedings
slides

Thomas Barabosch
Detecting Host-Based Code Injection Attacks
SPRING 9, Bochum, Germany, July 2014
proceedings
slides

Thomas Barabosch, Sebastian Eschweiler, Mohammad Qasem, Daniel Panteleit, Daniel Plohmann and Elmar Gerhards-Padilla
A General-purpose Laboratory for Large-scale Botnet Experiments
Botconf 2013, Nantes, France, December 2013
slides



Public Service




Teaching


  • Summer Term 2017
    • Project Group (Bachelor/Master): Malware Boot Camp
  • Winter Term 2015/2016
    • Master Thesis Advisor: Clustering malware based on header data and statistical features
  • Winter Term 2014/2015
    • Seminar (Master): Selected Topics in IT Security
    • Lab (Master): Malware Analysis
  • Summer Term 2014
    • Tutor/Assistant Lecture (Master): Network Security
    • Bachelor Thesis Advisor: Live-Beobachtung von Botnetzen mittels Memorydump-Analyse
    • Bachelor Thesis Advisor: Platformübergreifende Erkennung von Kernel-Rootkits in Memorydumps
  • Winter Term 2013/2014
    • Bachelor Thesis Advisor: Heuristische Detektion von Code-Injektionen in Speicherabbildern
    • Bachelor Thesis Advisor: Erkennung von Code-Injektions-Angrifen durch Differenzierung von Speicherabbildern
  • Summer Term 2013
    • Seminar (Master): Selected Topics in Communication Management
    • Project Group (Bachelor/Master): Malware Boot Camp
  • Winter Term 2012/2013
    • Seminar (Master): Selected Topics in Communication Management