Follow
Christian Rossow
Christian Rossow
CISPA – Helmholtz Center for Information Security
Verified email at cispa.saarland - Homepage
Title
Cited by
Cited by
Year
Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
C Rossow
Network and Distributed System Security Symposium (NDSS 2014), 2014
5132014
IoTPOT: Analysing the Rise of IoT Compromises
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow
USENIX Workshop on Offensive Technologies, 2015
3902015
Cross-Architecture Bug Search in Binary Executables
J Pewny, B Garmany, R Gawlik, C Rossow, T Holz
Security and Privacy (SP), 2015 IEEE Symposium on, 709-724, 2015
3332015
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2902012
Prudent practices for designing malware experiments: Status quo and outlook
C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ...
2012 IEEE Symposium on Security and Privacy, 65-79, 2012
2702012
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
J Krupp, C Rossow
27th USENIX Security Symposium (USENIX Security 18), 1317-1333, 2018
2632018
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks
M Kührer, T Hupperich, C Rossow, T Holz
23rd USENIX Security Symposium (USENIX Security 14), 111-125, 2014
2572014
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow
Journal of Information Processing 24 (3), 522-533, 2016
2512016
SoK: PWPWNED -- Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
Security and Privacy (SP), 2013 IEEE Symposium on, 97-111, 2013
2362013
ret2spec: Speculative execution using return stack buffers
G Maisuradze, C Rossow
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2152018
Paint it Black: Evaluating the Effectiveness of Malware Blacklists
M Kührer, C Rossow, T Holz
Research in Attacks, Intrusions and Defenses, 1-21, 2014
1892014
On Botnets that use DNS for Command and Control
CJ Dietrich, C Rossow, FC Freiling, H Bos, M Steen, N Pohlmann
Computer Network Defense (EC2ND), 2011 Seventh European Conference on, 9-16, 2011
1702011
Highly resilient peer-to-peer botnets are here: An analysis of gameover zeus
D Andriesse, C Rossow, B Stone-Gross, D Plohmann, H Bos
2013 8th International Conference on Malicious and Unwanted Software:" The …, 2013
1512013
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks
L Krämer, J Krupp, D Makita, T Nishizoe, T Koide, K Yoshioka, C Rossow
Research in Attacks, Intrusions, and Defenses, 615-636, 2015
1402015
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem
M Jonker, A King, J Krupp, C Rossow, A Sperotto, A Dainotti
Proceedings of the 2017 Internet Measurement Conference, 100-113, 2017
1392017
Going Wild: Large-Scale Classification of Open DNS Resolvers
M Kührer, T Hupperich, J Bushart, C Rossow, T Holz
Proceedings of the 2015 ACM Conference on Internet Measurement Conference …, 2015
1382015
Leveraging semantic signatures for bug search in binary programs
J Pewny, F Schuster, L Bernhard, T Holz, C Rossow
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
1382014
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis
CJ Dietrich, C Rossow, N Pohlmann
Computer Networks 57 (2), 475-486, 2013
1342013
Sandnet: Network traffic analysis of malicious software
C Rossow, CJ Dietrich, H Bos, L Cavallaro, M Van Steen, FC Freiling, ...
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
1302011
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion
A Yokoyama, K Ishii, R Tanabe, Y Papa, K Yoshioka, T Matsumoto, ...
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
1032016
The system can't perform the operation now. Try again later.
Articles 1–20