Christian Rossow
Christian Rossow
Professor of Computer Science, CISPA, Saarland Informatics Campus
Bestätigte E-Mail-Adresse bei mmci.uni-saarland.de - Startseite
TitelZitiert vonJahr
Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
C Rossow
Network and Distributed System Security Symposium (NDSS 2014), 2014
2122014
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1982012
SoK: PWPWNED -- Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
Security and Privacy (SP), 2013 IEEE Symposium on, 97-111, 2013
1472013
Prudent practices for designing malware experiments: Status quo and outlook
C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ...
2012 IEEE Symposium on Security and Privacy, 65-79, 2012
1332012
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks
M Kührer, T Hupperich, C Rossow, T Holz
23rd USENIX Security Symposium (USENIX Security 14), 111-125, 2014
112*2014
IoTPOT: Analysing the Rise of IoT Compromises
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow
USENIX Workshop on Offensive Technologies, 2015
1042015
Sandnet: Network traffic analysis of malicious software
C Rossow, CJ Dietrich, H Bos, L Cavallaro, M Van Steen, FC Freiling, ...
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
902011
Highly resilient peer-to-peer botnets are here: An analysis of gameover zeus
D Andriesse, C Rossow, B Stone-Gross, D Plohmann, H Bos
2013 8th International Conference on Malicious and Unwanted Software:, 116-123, 2013
862013
On Botnets that use DNS for Command and Control
CJ Dietrich, C Rossow, FC Freiling, H Bos, M Steen, N Pohlmann
Computer Network Defense (EC2ND), 2011 Seventh European Conference on, 9-16, 2011
822011
Cross-Architecture Bug Search in Binary Executables
J Pewny, B Garmany, R Gawlik, C Rossow, T Holz
Security and Privacy (SP), 2015 IEEE Symposium on, 709-724, 2015
742015
Paint it Black: Evaluating the Effectiveness of Malware Blacklists
M Kührer, C Rossow, T Holz
Research in Attacks, Intrusions and Defenses, 1-21, 2014
682014
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis
CJ Dietrich, C Rossow, N Pohlmann
Computer Networks 57 (2), 475-486, 2013
632013
Provex: Detecting botnets with encrypted command and control channels
C Rossow, CJ Dietrich
International Conference on Detection of Intrusions and Malware, and …, 2013
502013
Large-scale analysis of malware downloaders
C Rossow, C Dietrich, H Bos
International Conference on Detection of Intrusions and Malware, and …, 2012
492012
Hell of a handshake: Abusing TCP for reflective amplification DDoS attacks
M Kührer, T Hupperich, C Rossow, T Holz
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
462014
Going Wild: Large-Scale Classification of Open DNS Resolvers
M Kührer, T Hupperich, J Bushart, C Rossow, T Holz
Proceedings of the 2015 ACM Conference on Internet Measurement Conference …, 2015
412015
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks
L Krämer, J Krupp, D Makita, T Nishizoe, T Koide, K Yoshioka, C Rossow
Research in Attacks, Intrusions, and Defenses, 615-636, 2015
382015
On the (in) security of mobile two-factor authentication
A Dmitrienko, C Liebchen, C Rossow, AR Sadeghi
International Conference on Financial Cryptography and Data Security, 365-383, 2014
382014
Empirical research on IP blacklisting.
CJ Dietrich, C Rossow
CEAS, 2008
36*2008
Leveraging semantic signatures for bug search in binary programs
J Pewny, F Schuster, L Bernhard, T Holz, C Rossow
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
322014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20