Items where Author is "Dietrich, Christian J."

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 6.

Conference or Workshop Item (A Paper)

Dietrich, Christian J. and Rossow, Christian and Pohlmann, Norbert
(2013) Exploiting visual appearance to cluster and detect rogue software.
In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, Coimbra, Portugal, March 18-22, 2013.

Rossow, Christian and Andriesse, Dennis and Werner, Tillmann and Stone-Gross, Brett and Plohmann, Daniel and Dietrich, Christian J. and Bos, Herbert
(2013) SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets.
In: 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013.
Conference: SP IEEE Symposium on Security and Privacy

Grier, Chris and Ballard, Lucas and Caballero, Juan and Chachra, Neha and Dietrich, Christian J. and Levchenko, Kirill and Mavrommatis, Panayiotis and McCoy, Damon and Nappa, Antonio and Pitsillidis, Andreas and Provos, Niels and Rafique, M. Zubair and Rajab, Moheeb Abu and Rossow, Christian and Thomas, Kurt and Paxson, Vern and Savage, Stefan and Voelker, Geoffrey M.
(2012) Manufacturing compromise: the emergence of exploit-as-a-service.
In: the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012.
Conference: CCS ACM Conference on Computer and Communications Security

Rossow, Christian and Dietrich, Christian J. and Grier, Chris and Kreibich, Christian and Paxson, Vern and Pohlmann, Norbert and Bos, Herbert and van Steen, Maarten
(2012) Prudent Practices for Designing Malware Experiments: Status Quo and Outlook.
In: IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA.
Conference: SP IEEE Symposium on Security and Privacy

Dietrich, Christian J. and Rossow, Christian and Freiling, Felix C. and Bos, Herbert and van Steen, Maarten and Pohlmann, Norbert
(2011) On Botnets That Use DNS for Command and Control.
In: Seventh European Conference on Computer Network Defense, EC2ND 2011, Gothenburg, Sweden, September 6-7, 2011.

Article

Dietrich, Christian J. and Rossow, Christian and Pohlmann, Norbert
(2013) CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis.
Computer Networks, 57 (2). 475–486.

This list was generated on Sun Dec 22 02:57:44 2024 CET.