Follow
Felix Freiling
Title
Cited by
Cited by
Year
Toward automated dynamic malware analysis using cwsandbox
C Willems, T Holz, F Freiling
IEEE Security & Privacy 5 (2), 32-39, 2007
11362007
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm.
T Holz, M Steiner, F Dahl, EW Biersack, FC Freiling
Leet 8 (1), 1-9, 2008
6272008
Measuring and detecting fast-flux service networks.
T Holz, C Gorecki, K Rieck, FC Freiling
Ndss, 2008
5382008
The nepenthes platform: An efficient approach to collect malware
P Baecher, M Koetter, T Holz, M Dornseif, F Freiling
Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006
5312006
Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
FC Freiling, T Holz, G Wicherski
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
4912005
Mobile-sandbox: having a deeper look into android applications
M Spreitzenbarth, F Freiling, F Echtler, T Schreck, J Hoffmann
Proceedings of the 28th annual ACM symposium on applied computing, 1808-1815, 2013
4502013
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
R Hund, T Holz, FC Freiling
USENIX security symposium, 383-398, 2009
3742009
Learning more about the underground economy: A case-study of keyloggers and dropzones
T Holz, M Engelberth, F Freiling
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
3432009
Mobile security catching up? revealing the nuts and bolts of the security of mobile devices
M Becher, FC Freiling, J Hoffmann, T Holz, S Uellenbeck, C Wolf
2011 IEEE Symposium on Security and Privacy, 96-111, 2011
3342011
A structured approach to anomaly detection for in-vehicle networks
M Müter, A Groll, FC Freiling
2010 Sixth International Conference on Information Assurance and Security, 92-98, 2010
2982010
{TRESOR} Runs Encryption Securely Outside {RAM}
T Müller, FC Freiling, A Dewald
20th USENIX Security Symposium (USENIX Security 11), 2011
2362011
Hardware-based trusted computing architectures for isolation and attestation
P Maene, J Götzfried, R De Clercq, T Müller, F Freiling, I Verbauwhede
IEEE Transactions on Computers 67 (3), 361-374, 2017
2242017
Towards intrusion detection in wireless sensor networks
K Ioannis, T Dimitriou, FC Freiling
Proc. of the 13th European Wireless Conference, 1-10, 2007
2082007
On botnets that use DNS for command and control
CJ Dietrich, C Rossow, FC Freiling, H Bos, M Van Steen, N Pohlmann
2011 seventh european conference on computer network defense, 9-16, 2011
1952011
Sancus 2.0: A low-cost security architecture for iot devices
J Noorman, JV Bulck, JT Mühlberg, F Piessens, P Maene, B Preneel, ...
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-33, 2017
1792017
Towards intrusion detection in wireless sensor networks
I Krontiris, T Dimitriou, FC Freiling
proceedings of the 13th European Wireless Conference, 1-4, 2007
1762007
A common process model for incident response and computer forensics
FC Freiling, B Schwittay
Gesellschaft für Informatik e. V., 2007
1522007
Cooperative intrusion detection in wireless sensor networks
I Krontiris, Z Benenson, T Giannetsos, FC Freiling, T Dimitriou
Wireless Sensor Networks: 6th European Conference, EWSN 2009, Cork, Ireland …, 2009
1502009
Visual analysis of malware behavior using treemaps and thread graphs
P Trinius, T Holz, J Göbel, FC Freiling
2009 6th International Workshop on Visualization for Cyber Security, 33-38, 2009
1422009
Sandnet: Network traffic analysis of malicious software
C Rossow, CJ Dietrich, H Bos, L Cavallaro, M Van Steen, FC Freiling, ...
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
1372011
The system can't perform the operation now. Try again later.
Articles 1–20