Folgen
Christian Rossow
Christian Rossow
CISPA – Helmholtz Center for Information Security
Bestätigte E-Mail-Adresse bei cispa.saarland - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
C Rossow
Network and Distributed System Security Symposium (NDSS 2014), 2014
4572014
IoTPOT: Analysing the Rise of IoT Compromises
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow
USENIX Workshop on Offensive Technologies, 2015
3312015
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2732012
Cross-Architecture Bug Search in Binary Executables
J Pewny, B Garmany, R Gawlik, C Rossow, T Holz
Security and Privacy (SP), 2015 IEEE Symposium on, 709-724, 2015
2582015
Prudent practices for designing malware experiments: Status quo and outlook
C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ...
2012 IEEE Symposium on Security and Privacy, 65-79, 2012
2452012
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks
M Kührer, T Hupperich, C Rossow, T Holz
23rd USENIX Security Symposium (USENIX Security 14), 111-125, 2014
2202014
SoK: PWPWNED -- Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
Security and Privacy (SP), 2013 IEEE Symposium on, 97-111, 2013
2192013
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow
Journal of Information Processing 24 (3), 522-533, 2016
2092016
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
J Krupp, C Rossow
27th USENIX Security Symposium (USENIX Security 18), 1317-1333, 2018
1942018
Paint it Black: Evaluating the Effectiveness of Malware Blacklists
M Kührer, C Rossow, T Holz
Research in Attacks, Intrusions and Defenses, 1-21, 2014
1702014
ret2spec: Speculative execution using return stack buffers
G Maisuradze, C Rossow
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1622018
On Botnets that use DNS for Command and Control
CJ Dietrich, C Rossow, FC Freiling, H Bos, M Steen, N Pohlmann
Computer Network Defense (EC2ND), 2011 Seventh European Conference on, 9-16, 2011
1482011
Highly resilient peer-to-peer botnets are here: An analysis of gameover zeus
D Andriesse, C Rossow, B Stone-Gross, D Plohmann, H Bos
2013 8th International Conference on Malicious and Unwanted Software:" The …, 2013
1382013
Sandnet: Network traffic analysis of malicious software
C Rossow, CJ Dietrich, H Bos, L Cavallaro, M Van Steen, FC Freiling, ...
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
1312011
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis
CJ Dietrich, C Rossow, N Pohlmann
Computer Networks 57 (2), 475-486, 2013
1222013
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks
L Krämer, J Krupp, D Makita, T Nishizoe, T Koide, K Yoshioka, C Rossow
Research in Attacks, Intrusions, and Defenses, 615-636, 2015
1212015
Going Wild: Large-Scale Classification of Open DNS Resolvers
M Kührer, T Hupperich, J Bushart, C Rossow, T Holz
Proceedings of the 2015 ACM Conference on Internet Measurement Conference …, 2015
1152015
Leveraging semantic signatures for bug search in binary programs
J Pewny, F Schuster, L Bernhard, T Holz, C Rossow
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
1052014
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem
M Jonker, A King, J Krupp, C Rossow, A Sperotto, A Dainotti
Proceedings of the 2017 Internet Measurement Conference, 100-113, 2017
1042017
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
B Stock, G Pellegrino, C Rossow, M Johns, M Backes
USENIX Security Symposium, 1015-1032, 2016
862016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20