Follow
Christian Rossow
Christian Rossow
CISPA – Helmholtz Center for Information Security
Verified email at cispa.saarland - Homepage
Title
Cited by
Cited by
Year
Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
C Rossow
Network and Distributed System Security Symposium (NDSS 2014), 2014
5862014
IoTPOT: Analysing the Rise of IoT Compromises
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow
USENIX Workshop on Offensive Technologies, 2015
5052015
Cross-Architecture Bug Search in Binary Executables
J Pewny, B Garmany, R Gawlik, C Rossow, T Holz
Security and Privacy (SP), 2015 IEEE Symposium on, 709-724, 2015
4082015
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
J Krupp, C Rossow
27th USENIX Security Symposium (USENIX Security 18), 1317-1333, 2018
3892018
Prudent practices for designing malware experiments: Status quo and outlook
C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ...
2012 IEEE Symposium on Security and Privacy, 65-79, 2012
3252012
ret2spec: Speculative execution using return stack buffers
G Maisuradze, C Rossow
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
3162018
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow
Journal of Information Processing 24 (3), 522-533, 2016
3122016
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3112012
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks
M Kührer, T Hupperich, C Rossow, T Holz
23rd USENIX Security Symposium (USENIX Security 14), 111-125, 2014
2932014
SoK: PWPWNED -- Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
Security and Privacy (SP), 2013 IEEE Symposium on, 97-111, 2013
2432013
Paint it Black: Evaluating the Effectiveness of Malware Blacklists
M Kührer, C Rossow, T Holz
Research in Attacks, Intrusions and Defenses, 1-21, 2014
2242014
On Botnets that use DNS for Command and Control
CJ Dietrich, C Rossow, FC Freiling, H Bos, M Steen, N Pohlmann
Computer Network Defense (EC2ND), 2011 Seventh European Conference on, 9-16, 2011
1922011
Leveraging semantic signatures for bug search in binary programs
J Pewny, F Schuster, L Bernhard, T Holz, C Rossow
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
1832014
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem
M Jonker, A King, J Krupp, C Rossow, A Sperotto, A Dainotti
Proceedings of the 2017 Internet Measurement Conference, 100-113, 2017
1792017
Going Wild: Large-Scale Classification of Open DNS Resolvers
M Kührer, T Hupperich, J Bushart, C Rossow, T Holz
Proceedings of the 2015 ACM Conference on Internet Measurement Conference …, 2015
1702015
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks
L Krämer, J Krupp, D Makita, T Nishizoe, T Koide, K Yoshioka, C Rossow
Research in Attacks, Intrusions, and Defenses, 615-636, 2015
1702015
Highly resilient peer-to-peer botnets are here: An analysis of gameover zeus
D Andriesse, C Rossow, B Stone-Gross, D Plohmann, H Bos
2013 8th International Conference on Malicious and Unwanted Software:" The …, 2013
1682013
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
B Stock, G Pellegrino, C Rossow, M Johns, M Backes
USENIX Security Symposium, 1015-1032, 2016
1382016
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis
CJ Dietrich, C Rossow, N Pohlmann
Computer Networks 57 (2), 475-486, 2013
1382013
Sandnet: Network traffic analysis of malicious software
C Rossow, CJ Dietrich, H Bos, L Cavallaro, M Van Steen, FC Freiling, ...
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
1372011
The system can't perform the operation now. Try again later.
Articles 1–20