Items where Author is "Rossow, Christian"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 73.

Conference or Workshop Item (A Paper)

Bushart, Jonas and Rossow, Christian
(2023) ResolFuzz: Differential Fuzzing of DNS Resolvers.
In: ESORICS.
Conference: ESORICS European Symposium On Research In Computer Security

Bushart, Jonas and Rossow, Christian
(2023) Anomaly-based Filtering of Application-Layer DDoS Against DNS Authoritatives.
In: 8th IEEE European Symposium on Security and Privacy, 2023-07-03/2023-07-07, Delft.
Conference: EuroS&P IEEE European Symposium on Security and Privacy
(Submitted)

Schlüter, Till and Choudhari, Amit and Hetterich, Lorenz and Trampert, Leon and Nemati, Hamed and Ibrahim, Ahmad and Schwarz, Michael and Rossow, Christian and Tippenhauer, Nils Ole
(2023) FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers.
In: CCS 2023, 26-30 Nov 2023, Copenhagen, Denmark.
Conference: CCS ACM Conference on Computer and Communications Security

Bauer, Markus and Grishchenko, Ilya and Rossow, Christian
(2022) TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation.
In: Annual Computer Security Applications Conference (ACSAC 2022), December 5-9, 2022, Austin, Texas, USA.
Conference: ACSAC Annual Computer Security Applications Conference
(In Press)

Schwarz, Fabian and Do, Khue and Heide, Gunnar and Hanzlik, Lucjan and Rossow, Christian
(2022) FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs.
In: 29th ACM Conference on Computer and Communications Security (CCS), 7-11 Nov 2022, Los Angeles, U.S.A..
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Trampert, Leon and Rossow, Christian and Schwarz, Michael
(2022) Browser-based CPU Fingerprinting.
In: 27th European Symposium on Research in Computer Security (ESORICS) 2022, 26-30 Sep 2022, Copenhagen, Denmark.
Conference: ESORICS European Symposium On Research In Computer Security
(In Press)

Krupp, Johannes and Grishchenko, Ilya and Rossow, Christian
(2022) AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities.
In: USENIX Security Symposium (USENIX Security), 2022..
Conference: USENIX-Security Usenix Security Symposium

Ibrahim, Ahmad and Nemati, Hamed and Schlüter, Till and Tippenhauer, Nils Ole and Rossow, Christian
(2022) Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels.
In: CCS 2022, 7-11 Nov 2022, Los Angeles, CA, USA.
Conference: CCS ACM Conference on Computer and Communications Security

van der Toorn, Olivier and Krupp, Johannes and Jonker, Mattijs and van Rijswijk-Deij, Roland and Rossow, Christian and Sperotto, Anna
(2021) ANYway: Measuring the Amplification DDoS Potential of Domains.
In: 17th International Conference on Network and Service Management.
Conference: CNSM International Conference on Network and Service Management (amalgamation of DSOM and related workshops from 2010)

Krupp, Johannes and Rossow, Christian
(2021) BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks.
In: 6th IEEE European Symposium on Security and Privacy, September 7-11, 2021, Vienna, Austria.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Brengel, Michael and Rossow, Christian
(2021) YarIx: Scalable YARA-based Malware Intelligence.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Weber, Daniel and Ibrahim, Ahmad and Nemati, Hamed and Schwarz, Michael and Rossow, Christian
(2021) Osiris: Automated Discovery of Microarchitectural Side Channels.
In: 30th USENIX Security Symposium (USENIX Security '21), 11-13 August, 2021.
Conference: USENIX-Security Usenix Security Symposium
(In Press)

Bauer, Markus and Rossow, Christian
(2021) Cali: Compiler Assisted Library Isolation.
In: AsiaCCS 2021, 7-11 Jun 2021, Hong Kong, Hong Kong.
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security
(In Press)

Bauer, Markus and Rossow, Christian
(2021) NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable Hijacking.
In: 6th IEEE European Symposium on Security and Privacy, September 7-11, 2021, Vienna, Austria.
Conference: EuroS&P IEEE European Symposium on Security and Privacy
(In Press)

Reen, Gaganjeet Singh and Rossow, Christian
(2020) DPIFuzz: A Differential Fuzzing Frameworkto Detect DPI Elusion Strategies for QUIC.
In: Annual Computer Security Applications Conference (ACSAC 2020).
Conference: ACSAC Annual Computer Security Applications Conference

Brengel, Michael and Rossow, Christian
(2020) xOSSig: Leveraging OS Diversity to Automatically Extract Malware Code Signatures.
In: Botconf, Dec 1-4, 2020, (online).
Conference: UNSPECIFIED

Wan, Gerry and Izhikevich, Liz and Adrian, David and Yoshioka, Katsunari and Holz, Ralph and Rossow, Christian and Durumeric, Zakir
(2020) On the Origin of Scanning: The Impact of Location on Internet-Wide Scans.
In: 2020 ACM SIGCOMM Internet Measurement Conference, October 27-29, 2020, Virtual Event.
Conference: IMC Internet Measurement Conference

Bushart, Jonas and Rossow, Christian
(2020) Padding Ain’t Enough: Assessing the Privacy Guarantees of Encrypted DNS.
In: 10th USENIX Workshop on Free and Open Communications on the Internet, 2020-08-11.
Conference: FOCI USENIX Workshop on Free and Open Communications on the Internet

Schwarz, Fabian and Rossow, Christian
(2020) SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients.
In: 29th USENIX Security Symposium (USENIX Security 20).
Conference: USENIX-Security Usenix Security Symposium

Birtel, Benedikt and Rossow, Christian
(2020) Slitheen++: Stealth TLS-based Decoy Routing.
In: FOCI'20, August 2020.
Conference: FOCI USENIX Workshop on Free and Open Communications on the Internet

Steffens, Marius and Rossow, Christian and Johns, Martin and Stock, Ben
(2019) Don’t Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
In: NDSS Symposium 2019.
Conference: NDSS Network and Distributed System Security Symposium

Walla, Sebastian and Rossow, Christian
(2019) MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware.
In: 4th IEEE European Symposium on Security and Privacy, 17-19 June 2019, Stockholm, Sweden.
Conference: EuroS&P IEEE European Symposium on Security and Privacy
(In Press)

Krupp, Johannes and Rossow, Christian
(2018) teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts.
In: 27th USENIX Security Symposium (USENIX Security 18), 15-17 Aug 2018, Baltimore MD.
Conference: USENIX-Security Usenix Security Symposium

Maisuradze, Giorgi and Rossow, Christian
(2018) Ret2Spec: Speculative Execution Using Return Stack Buffers.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 15-19 Oct 2018, Toronto, Canada.
Conference: CCS ACM Conference on Computer and Communications Security

Tanabe, Rui and Ueno, Wataru and Ishii, Kou and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Rossow, Christian
(2018) Evasive Malware via Identifier Implanting.
In: 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 28-29 June 2018, Paris-Saclay.
Conference: DIMVA GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Bushart, Jonas and Rossow, Christian
(2018) DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives.
In: Proceedings of the 21th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Stock, Ben and Pellegrino, Giancarlo and Li, Frank and Backes, Michael and Rossow, Christian
(2018) Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications.
In: Proceedings of the 25th Annual Symposium on Network and Distributed System Security (NDSS '18)..
Conference: NDSS Network and Distributed System Security Symposium

Brengel, Michael and Rossow, Christian
(2018) Identifying Key Leakage of Bitcoin Users.
In: Proceedings of the Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)
(In Press)

Brengel, Michael and Rossow, Christian
(2018) MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps.
In: Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA).
Conference: DIMVA GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Oltrogge, Marten and Derr, Erik and Stransky, Christian and Acar, Yasemin and Fahl, Sascha and Rossow, Christian and Pellegrino, Giancarlo and Bugiel, Sven and Backes, Michael
(2018) The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
In: 39th IEEE Symposium on Security and Privacy (SP '18).
Conference: SP IEEE Symposium on Security and Privacy

Krupp, Johannes and Karami, Mohammad and Rossow, Christian and McCoy, Damon and Backes, Michael
(2017) Linking Amplification DDoS Attacks to Booter Services.
In: International Symposium on Research in Attacks, Intrusions, and Defenses, September 18-20, 2017, Atlanta, GA, USA.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Simeonovski, Milivoj and Pellegrino, Giancarlo and Rossow, Christian and Backes, Michael
(2017) Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals.
In: Proc. of the 26rd International Conference on World Wide Web (WWW 2017).
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2017) Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS Network and Distributed System Security Symposium

Pellegrino, Giancarlo and Johns, Martin and Koch, Simon and Backes, Michael and Rossow, Christian
(2017) Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
In: Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17).
Conference: CCS ACM Conference on Computer and Communications Security

Jonker, Mattijs and King, Alistair and Krupp, Johannes and Rossow, Christian and Sperotto, Anna and Dainotti, Alberto
(2017) Millions of Targets Under Attack: A Macroscopic Characterization of the DoS Ecosystem.
In: Proceedings of the 2017 Internet Measurement Conference.
Conference: IMC Internet Measurement Conference

Krupp, Johannes and Backes, Michael and Rossow, Christian
(2016) Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Holz, Thorsten and Rossow, Christian and Rytilahti, Teemu and Simeonovski, Milivoj and Stock, Ben
(2016) On the Feasibility of TTL-based Filtering for DRDoS Mitigation.
In: RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016) Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2016) What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Nürnberger, Stefan and Rossow, Christian
(2016) VatiCAN - Vetted, Authenticated CAN Bus.
In: . Conference on Cryptographic Hardware and Embedded Systems (CHES).
Conference: CHES Workshop on Cryptographic Hardware and Embedded Systems

Brengel, Michael and Backes, Michael and Rossow, Christian
(2016) Detecting Hardware-Assisted Virtualization.
In: Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings.

Yokoyama, Akira and Ishii, Kou and Tanabe, Rui and Papa, Yinmin and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Brengel, Michael and Backes, Michael and Rossow, Christian
(2016) SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
In: Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Pellegrino, Giancarlo and Catakoglu, Onur and Balzarotti, Davide and Rossow, Christian
(2016) Uses and Abuses of Server-Side Requests.
In: Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2016.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016) POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications.
In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016.
Conference: CCS ACM Conference on Computer and Communications Security

Krämer, Lukas and Krupp, Johannes and Makita, Daisuke and Nishizoe, Tomomi and Koide, Takashi and Yoshioka, Katsunari and Rossow, Christian
(2015) AmpPot: Monitoring and Defending Against Amplification DDoS Attacks.
In: Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Rossow, Christian and Mohammadi, Esfandiar and Backes, Michael and Meiser, Sebastian and Koch, Simon
(2015) POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
In: Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15).
Conference: CCS ACM Conference on Computer and Communications Security

Pewny, Jannik and Garmany, Behrad and Gawlik, Robert and Rossow, Christian and Holz, Thorsten
(2015) Cross-Architecture Bug Search in Binary Executables.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Pellegrino, Giancarlo and Rossow, Christian and Ryba, Fabrice J. and Schmidt, Thomas C. and Wählisch, Matthias
(2015) Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics.
In: 9th USENIX Workshop on Offensive Technologies (WOOT 15).

Kührer, Marc and Hupperich, Thomas and Bushart, Jonas and Rossow, Christian and Holz, Thorsten
(2015) Going Wild: Large-Scale Classification of Open DNS Resolvers.
In: Proc. of the 2015 Internet Measurement Conference (IMC'15).
Conference: IMC Internet Measurement Conference

Pa, Yin Minn Pa and Suzuki, Shogo and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Rossow, Christian
(2015) IoTPOT: Analysing the Rise of IoT Compromises.
In: 9th USENIX Workshop on Offensive Technologies (WOOT 15).

Andriesse, Dennis and Rossow, Christian and Bos, Herbert
(2015) Reliable Recon in Adversarial Peer-to-Peer Botnets.
In: Proc. of the 2015 Internet Measurement Conference (IMC'15).
Conference: IMC Internet Measurement Conference

Karuppayah, Shankar and Roos, Stefanie and Rossow, Christian and Mühlhäuser, Max and Fischer, Mathias
(2015) Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
In: Proc. of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS'15).
Conference: ICDCS International Conference on Distributed Computing Systems

Pellegrino, Giancarlo and Tschürtz, Constantin and Bodden, Eric and Rossow, Christian
(2015) jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
In: Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014) Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Rossow, Christian
(2014) Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
In: Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS '14).
Conference: NDSS Network and Distributed System Security Symposium

Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014) Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks.
In: Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT ’14).

Pewny, Jannik and Schuster, Felix and Bernhard, Lukas and Holz, Thorsten and Rossow, Christian
(2014) Leveraging semantic signatures for bug search in binary programs.
In: Proc. of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC Annual Computer Security Applications Conference

Karuppayah, Shankar and Fischer, Mathias and Rossow, Christian and Mühlhäuser, Max
(2014) On Advanced Monitoring in Resilient and Unstructured P2P Botnets.
In: Proceedings of the 2014 IEEE International Conference on Communications (ICC 2014).

Welzel, Arne and Rossow, Christian and Bos, Herbert
(2014) On Measuring the Impact of DDoS Botnets.
In: Proceedings of the Seventh European Workshop on System Security (EuroSec '14).

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza
(2014) On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers.

Kührer, Marc and Rossow, Christian and Holz, Thorsten
(2014) Paint it Black: Evaluating the Effectiveness of Malware Blacklists.
In: Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses.

Dietrich, Christian J. and Rossow, Christian and Pohlmann, Norbert
(2013) Exploiting visual appearance to cluster and detect rogue software.
In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, Coimbra, Portugal, March 18-22, 2013.

Andriesse, Dennis and Rossow, Christian and Stone-Gross, Brett and Plohmann, Daniel and Bos, Herbert
(2013) Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus.
In: 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013.

Rossow, Christian and Andriesse, Dennis and Werner, Tillmann and Stone-Gross, Brett and Plohmann, Daniel and Dietrich, Christian J. and Bos, Herbert
(2013) SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets.
In: 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013.
Conference: SP IEEE Symposium on Security and Privacy

Grier, Chris and Ballard, Lucas and Caballero, Juan and Chachra, Neha and Dietrich, Christian J. and Levchenko, Kirill and Mavrommatis, Panayiotis and McCoy, Damon and Nappa, Antonio and Pitsillidis, Andreas and Provos, Niels and Rafique, M. Zubair and Rajab, Moheeb Abu and Rossow, Christian and Thomas, Kurt and Paxson, Vern and Savage, Stefan and Voelker, Geoffrey M.
(2012) Manufacturing compromise: the emergence of exploit-as-a-service.
In: the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012.
Conference: CCS ACM Conference on Computer and Communications Security

Rossow, Christian and Dietrich, Christian J. and Grier, Chris and Kreibich, Christian and Paxson, Vern and Pohlmann, Norbert and Bos, Herbert and van Steen, Maarten
(2012) Prudent Practices for Designing Malware Experiments: Status Quo and Outlook.
In: IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA.
Conference: SP IEEE Symposium on Security and Privacy

Dietrich, Christian J. and Rossow, Christian and Freiling, Felix C. and Bos, Herbert and van Steen, Maarten and Pohlmann, Norbert
(2011) On Botnets That Use DNS for Command and Control.
In: Seventh European Conference on Computer Network Defense, EC2ND 2011, Gothenburg, Sweden, September 6-7, 2011.

Article

Maisuradze, Giorgi and Rossow, Christian
(2018) Speculose: Analyzing the Security Implications of Speculative Execution in CPUs.
CoRR, abs/18.

Gerling, Sebastian and Rossow, Christian
(2016) Angreiferjagd im "Internet der Dinge".
Datenschutz und Datensicherheit, 40 (8). pp. 507-510.

Pa, Yin Minn Pa and Suzuki, Shogo and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Rossow, Christian
(2016) IoTPOT: A Novel Honeypot for Revealing Current IoT Threats.
JIP, 24 (3). 522–533.

Ryba, Fabrice J. and Orlinski, Matthew and Wählisch, Matthias and Rossow, Christian and Schmidt, Thomas C.
(2015) Amplification and DRDoS Attack Defense - A Survey and New Perspectives.
CoRR, abs/15.

Dietrich, Christian J. and Rossow, Christian and Pohlmann, Norbert
(2013) CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis.
Computer Networks, 57 (2). 475–486.

Monograph

Schwarz, Fabian and Do, Khue and Heide, Gunnar and Hanzlik, Lucjan and Rossow, Christian
(2023) FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs (Extended Version).
Technical Report. UNSPECIFIED.

This list was generated on Fri Apr 26 20:05:36 2024 CEST.