Daniel Plohmann
Daniel Plohmann
Verified email at fkie.fraunhofer.de - Homepage
Title
Cited by
Cited by
Year
Sok: P2pwned-modeling and evaluating the resilience of peer-to-peer botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
2013 IEEE Symposium on Security and Privacy, 97-111, 2013
1832013
A comprehensive measurement study of domain generating malware
D Plohmann, K Yakdan, M Klatt, J Bader, E Gerhards-Padilla
25th {USENIX} Security Symposium ({USENIX} Security 16), 263-278, 2016
1172016
Highly resilient peer-to-peer botnets are here: An analysis of gameover zeus
D Andriesse, C Rossow, B Stone-Gross, D Plohmann, H Bos
2013 8th International Conference on Malicious and Unwanted Software:" The …, 2013
1122013
Case study of the miner botnet
D Plohmann, E Gerhards-Padilla
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-16, 2012
662012
Botnets: Detection, measurement, disinfection & defence
D Plohmann, E Gerhards-Padilla, F Leder
European Network and Information Security Agency (ENISA) 1 (1), 1-153, 2011
472011
Botnets: Detection, measurement, disinfection and defence
G Hogben, D Plohmann, E Gerhards-Padilla, F Leder
European Network and Information Security Agency, 2011
302011
Botnets: measurement, detection, disinfection and defence
D Plohmann, E Gerhards-Padilla, F Leder
ENISA workshop on, 2011
122011
Malpedia: a collaborative effort to inventorize the malware landscape
D Plohmann, M Clauss, S Enders, E Padilla
Proceedings of the Botconf, 2017
102017
Android security-common attack vectors
P Schulz, D Plohmann
Rheinische Friedrich-Wilhelms-Universitat Bönn, Germany, Tech. Rep, 2012
102012
" If you want, I can store the encrypted password" A Password-Storage Field Study with Freelance Developers
A Naiakshina, A Danilova, E Gerlitz, E von Zezschwitz, M Smith
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
92019
DGArchive
D Plohmann
72018
Extending The Sleuth Kit and its underlying model for pooled storage file system forensic analysis
JN Hilgert, M Lambertz, D Plohmann
Digital Investigation 22, S76-S85, 2017
52017
Patterns of a cooperative malware analysis workflow
D Plohmann, S Eschweiler, E Gerhards-Padilla
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-18, 2013
32013
simpliFiRE. IDAscope
D Plohmann, A Hanel
Hacklu, 2012
22012
Malware and botnet analysis methodology
D Plohmann, E Gerhards-Padilla
Cybercrime, 22, 2012
22012
Case study of the miner botnet
E Gerhards-Padilla, D Plohmann
12012
PyBox-A Python approach to sandboxing
F Leder, D Plohmann
5. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 4, 2010
12010
RoAMer: Robust Automated Malware Unpacker
T Jenke, D Plohmann, E Padilla
2019
AntiRE-An Executable Collection of Anti-Reversing Techniques
D Plohmann, C Kannen
7. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 23, 2012
2012
PyBox
F Leder, D Plohmann
SPRING-SIDAR Graduierten-Workshop über Reaktive Sicherheit, 7. Juli 2010 …, 2010
2010
The system can't perform the operation now. Try again later.
Articles 1–20