A comprehensive measurement study of domain generating malware D Plohmann, K Yakdan, M Klatt, J Bader, E Gerhards-Padilla 25th USENIX Security Symposium (USENIX Security 16), 263-278, 2016 | 336 | 2016 |
Sok: P2pwned-modeling and evaluating the resilience of peer-to-peer botnets C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ... 2013 IEEE symposium on security and privacy, 97-111, 2013 | 244 | 2013 |
Highly resilient peer-to-peer botnets are here: An analysis of gameover zeus D Andriesse, C Rossow, B Stone-Gross, D Plohmann, H Bos 2013 8th International Conference on Malicious and Unwanted Software:" The …, 2013 | 169 | 2013 |
Case study of the miner botnet D Plohmann, E Gerhards-Padilla 2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-16, 2012 | 108 | 2012 |
" If you want, I can store the encrypted password" A Password-Storage Field Study with Freelance Developers A Naiakshina, A Danilova, E Gerlitz, E Von Zezschwitz, M Smith Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 102 | 2019 |
Botnets: Detection, measurement, disinfection & defence D Plohmann, E Gerhards-Padilla, F Leder European Network and Information Security Agency (ENISA) 1 (1), 1-153, 2011 | 62 | 2011 |
Malpedia: a collaborative effort to inventorize the malware landscape D Plohmann, M Clauss, S Enders, E Padilla The Journal on Cybercrime and Digital Investigations 3 (1), 1-19, 2017 | 58 | 2017 |
Botnets: Detection, measurement, disinfection and defence G Hogben, D Plohmann, E Gerhards-Padilla, F Leder European Network and Information Security Agency, 2011 | 34 | 2011 |
DGArchive D Plohmann Fraunhofer FKIE.[Online]. Available: https://dgarchive. caad. fkie …, 2018 | 24 | 2018 |
Extending The Sleuth Kit and its underlying model for pooled storage file system forensic analysis JN Hilgert, M Lambertz, D Plohmann Digital Investigation 22, S76-S85, 2017 | 21 | 2017 |
Botnets: measurement, detection, disinfection and defence D Plohmann, E Gerhards-Padilla, F Leder ENISA workshop on, 2011 | 12 | 2011 |
Android security-common attack vectors P Schulz, D Plohmann Rheinische Friedrich-Wilhelms-Universitat Bönn, Germany, Tech. Rep, 2012 | 11 | 2012 |
YARA-Signator: Automated Generation of Code-based YARA Rules F Bilstein, D Plohmann The Journal on Cybercrime & Digital Investigations 5 (1), 1-13, 2019 | 9 | 2019 |
DGAArchive–A deep dive into domain generating malware D Plohmann Dec-2015, 2015 | 8 | 2015 |
Patterns of a cooperative malware analysis workflow D Plohmann, S Eschweiler, E Gerhards-Padilla 2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-18, 2013 | 7 | 2013 |
ApiScout: robust windows API usage recovery for malware characterization and similarity analysis D Plohmann, S Enders, E Padilla The Journal on Cybercrime and Digital Investigations 4 (1), 1-16, 2018 | 5 | 2018 |
RoAMer: the robust automated malware unpacker T Jenke, D Plohmann, E Padilla 14th International Conference on Malicious and Unwanted Software (MALWARE …, 2019 | 4 | 2019 |
Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281) S Zennou, SK Debray, T Dullien, A Lakhothia Dagstuhl Reports 7 (7), 2018 | 3 | 2018 |
simpliFiRE. IDAscope D Plohmann, A Hanel Hacklu Briefings, 2012 | 3 | 2012 |
Patchwork: Stitching against malware families with IDA Pro D Plohmann 9. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 7, 2014 | 2 | 2014 |