Christian Rossow
Christian Rossow
CISPA – Helmholtz Center for Information Security
Verified email at cispa.saarland - Homepage
Title
Cited by
Cited by
Year
Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
C Rossow
Network and Distributed System Security Symposium (NDSS 2014), 2014
3522014
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2532012
IoTPOT: Analysing the Rise of IoT Compromises
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow
USENIX Workshop on Offensive Technologies, 2015
2302015
Prudent practices for designing malware experiments: Status quo and outlook
C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ...
2012 IEEE Symposium on Security and Privacy, 65-79, 2012
2022012
SoK: PWPWNED -- Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
Security and Privacy (SP), 2013 IEEE Symposium on, 97-111, 2013
1852013
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks
M Kührer, T Hupperich, C Rossow, T Holz
23rd USENIX Security Symposium (USENIX Security 14), 111-125, 2014
1682014
Cross-Architecture Bug Search in Binary Executables
J Pewny, B Garmany, R Gawlik, C Rossow, T Holz
Security and Privacy (SP), 2015 IEEE Symposium on, 709-724, 2015
1472015
Paint it Black: Evaluating the Effectiveness of Malware Blacklists
M Kührer, C Rossow, T Holz
Research in Attacks, Intrusions and Defenses, 1-21, 2014
1312014
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow
Journal of Information Processing 24 (3), 522-533, 2016
1242016
On Botnets that use DNS for Command and Control
CJ Dietrich, C Rossow, FC Freiling, H Bos, M Steen, N Pohlmann
Computer Network Defense (EC2ND), 2011 Seventh European Conference on, 9-16, 2011
1232011
Highly resilient peer-to-peer botnets are here: An analysis of gameover zeus
D Andriesse, C Rossow, B Stone-Gross, D Plohmann, H Bos
2013 8th International Conference on Malicious and Unwanted Software:" The …, 2013
1182013
Sandnet: Network traffic analysis of malicious software
C Rossow, CJ Dietrich, H Bos, L Cavallaro, M Van Steen, FC Freiling, ...
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
1102011
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis
CJ Dietrich, C Rossow, N Pohlmann
Computer Networks 57 (2), 475-486, 2013
972013
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
J Krupp, C Rossow
27th {USENIX} Security Symposium ({USENIX} Security 18), 1317-1333, 2018
962018
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks
L Krämer, J Krupp, D Makita, T Nishizoe, T Koide, K Yoshioka, C Rossow
Research in Attacks, Intrusions, and Defenses, 615-636, 2015
892015
ret2spec: Speculative execution using return stack buffers
G Maisuradze, C Rossow
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
852018
Going Wild: Large-Scale Classification of Open DNS Resolvers
M Kührer, T Hupperich, J Bushart, C Rossow, T Holz
Proceedings of the 2015 ACM Conference on Internet Measurement Conference …, 2015
742015
On the (in) security of mobile two-factor authentication
A Dmitrienko, C Liebchen, C Rossow, AR Sadeghi
International Conference on Financial Cryptography and Data Security, 365-383, 2014
662014
Leveraging semantic signatures for bug search in binary programs
J Pewny, F Schuster, L Bernhard, T Holz, C Rossow
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
642014
Provex: Detecting botnets with encrypted command and control channels
C Rossow, CJ Dietrich
International Conference on Detection of Intrusions and Malware, and …, 2013
622013
The system can't perform the operation now. Try again later.
Articles 1–20