Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Philipp Trinius is active.

Publication


Featured researches published by Philipp Trinius.


Journal of Computer Security | 2011

Automatic analysis of malware behavior using machine learning

Konrad Rieck; Philipp Trinius; Carsten Willems; Thorsten Holz_aff n

Malicious software - so called malware - poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffective, such that millions of hosts in the Internet are infected with malware in the form of computer viruses, Internet worms and Trojan horses. While obfuscation and polymorphism employed by malware largely impede detection at file level, the dynamic analysis of malware binaries during run-time provides an instrument for characterizing and defending against the threat of malicious software. In this article, we propose a framework for the automatic analysis of malware behavior using machine learning. The framework allows for automatically identifying novel classes of malware with similar behavior (clustering) and assigning unknown malware to these discovered classes (classification). Based on both, clustering and classification, we propose an incremental approach for behavior-based analysis, capable of processing the behavior of thousands of malware binaries on a daily basis. The incremental analysis significantly reduces the run-time overhead of current analysis methods, while providing accurate discovery and discrimination of novel malware variants.


visualization for computer security | 2009

Visual analysis of malware behavior using treemaps and thread graphs

Philipp Trinius; Thorsten Holz; Jan Göbel; Felix C. Freiling

We study techniques to visualize the behavior of malicious software (malware). Our aim is to help human analysts to quickly assess and classify the nature of a new malware sample. Our techniques are based on a parametrized abstraction of detailed behavioral reports automatically generated by sandbox environments. We then explore two visualization techniques: treemaps and thread graphs. We argue that both techniques can effectively support a human analyst (a) in detecting maliciousness of software, and (b) in classifying malicious behavior.


Archive | 2010

The InMAS Approach

Markus Engelberth; Felix C. Freiling; Jan Göbel; Christian Gorecki; Thorsten Holz; Ralf Hund; Philipp Trinius; Carsten Willems

The Internet Malware Analysis System (InMAS) is a modular platform for distributed, large-scale monitoring of malware on the Internet. InMAS integrates diverse tools for malware collection (using honeypots) and malware analysis (mainly using dynamic analysis). All collected information is aggregated and accessible through an intuitive and easy-to-use web interface. In this paper, we provide an overview of the structure of InMAS and the various tools it integrates. We also introduce the web frontend that displays all information on dierent levels of abstraction, from a coarse-grained overview down to highly detailed information on demand.


international conference on detection of intrusions and malware and vulnerability assessment | 2009

Towards Proactive Spam Filtering (Extended Abstract)

Jan Göbel; Thorsten Holz; Philipp Trinius

With increasing security measures in network services, remote exploitation is getting harder. As a result, attackers concentrate on more reliable attack vectors like email: victims are infected using either malicious attachments or links leading to malicious websites. Therefore efficient filtering and blocking methods for spam messages are needed. Unfortunately, most spam filtering solutions proposed so far are reactive , they require a large amount of both ham and spam messages to efficiently generate rules to differentiate between both. In this paper, we introduce a more proactive approach that allows us to directly collect spam message by interacting with the spam botnet controllers. We are able to observe current spam runs and obtain a copy of latest spam messages in a fast and efficient way. Based on the collected information we are able to generate templates that represent a concise summary of a spam run. The collected data can then be used to improve current spam filtering techniques and develop new venues to efficiently filter mails.


2009 20th International Workshop on Database and Expert Systems Application | 2009

Mail-Shake

Markus Engelberth; Jan Göbel; Christian Gorecki; Philipp Trinius

Many different methods to mitigate spam in the internet have been proposed. However, the most promising ones require fundamental changes to mail protocol itself. Other methods are based on filtering, but still require the end-user to verify the results. We propose a different approach, that requires email senders to traverse a kind of handshake before sending an initial email to a new contact.Our method, called Mail-Shake, is based on two facts. First,spammers need valid email addresses to deliver their spam to.Second, spammers do not require real inboxes for their sender addresses, as replies are not expected. This allows complete automation of the spamming process, sending email at almost no cost. If we can decrease the number of valid email addresses a spammer can collect and increase the cost of sending email,spamming becomes uninteresting as the effort is too high in contrast to the win.


Datenschutz Und Datensicherheit - Dud | 2011

Das Internet-Malware-Analyse-System (InMAS)

Markus Engelberth; Felix C. Freiling; Jan Göbel; Christian Gorecki; Thorsten Holz; Ralf Hund; Philipp Trinius; Carsten Willems

ZusammenfassungDas Ziel eines Frühwarnsystems besteht im Wesentlichen aus dem frühzeitigen Erkennen und Einschätzen von Bedrohungen aus dem Internet. Ein wichtiger Aspekt hierbei ist die Beobachtung und Verfolgung bösartiger Software. Mit dem Internet-Malware-Analyse-System (InMAS), das zwischen 2007 und 2009 an der Universität Mannheim entstand, lässt sich Schadsoftware automatisiert erkennen und analysieren. Die so gewonnenen Informationen liefern ein Lagebild des aktuellen Gefährdungsgrads der beobachteten Internet-Infrastruktur und können einen wichtigen Beitrag für ein nationales Frühwarnsystem leisten. Das Projekt wurde durch das Bundesamt für Sicherheit in der Informationstechnik (BSI) gefördert.


Sicherheit | 2009

A Malware Instruction Set for Behavior-Based Analysis

Philipp Trinius; Carsten Willems; Thorsten Holz; Konrad Rieck


Archive | 2009

Towards Proactive SPAM Filtering

Jan Göbel; Thorsten Holz; Philipp Trinius


Sicherheit | 2010

Towards Optimal Sensor Placement Strategies for Early Warning Systems

Jan Göbel; Philipp Trinius


Sicherheit | 2012

Filtern von Spam-Nachrichten mit kontextfreien Grammatiken.

Philipp Trinius; Felix C. Freiling

Collaboration


Dive into the Philipp Trinius's collaboration.

Top Co-Authors

Avatar

Jan Göbel

University of Mannheim

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Felix C. Freiling

University of Erlangen-Nuremberg

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Konrad Rieck

Braunschweig University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ralf Hund

Ruhr University Bochum

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Thorsten Holz_aff n

Vienna University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge