Number of items: 73.
Conference or Workshop Item (A Paper)
Bushart, Jonas and Rossow, Christian
(2023)
ResolFuzz: Differential Fuzzing of DNS Resolvers.
Bushart, Jonas and Rossow, Christian
(2023)
Anomaly-based Filtering of Application-Layer DDoS Against DNS Authoritatives.
(Submitted)
Schlüter, Till and Choudhari, Amit and Hetterich, Lorenz and Trampert, Leon and Nemati, Hamed and Ibrahim, Ahmad and Schwarz, Michael and Rossow, Christian and Tippenhauer, Nils Ole
(2023)
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers.
Bauer, Markus and Grishchenko, Ilya and Rossow, Christian
(2022)
TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation.
(In Press)
Schwarz, Fabian and Do, Khue and Heide, Gunnar and Hanzlik, Lucjan and Rossow, Christian
(2022)
FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs.
(In Press)
Trampert, Leon and Rossow, Christian and Schwarz, Michael
(2022)
Browser-based CPU Fingerprinting.
(In Press)
Krupp, Johannes and Grishchenko, Ilya and Rossow, Christian
(2022)
AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities.
Ibrahim, Ahmad and Nemati, Hamed and Schlüter, Till and Tippenhauer, Nils Ole and Rossow, Christian
(2022)
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels.
van der Toorn, Olivier and Krupp, Johannes and Jonker, Mattijs and van Rijswijk-Deij, Roland and Rossow, Christian and Sperotto, Anna
(2021)
ANYway: Measuring the Amplification DDoS Potential of Domains.
Krupp, Johannes and Rossow, Christian
(2021)
BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks.
Brengel, Michael and Rossow, Christian
(2021)
YarIx: Scalable YARA-based Malware Intelligence.
Weber, Daniel and Ibrahim, Ahmad and Nemati, Hamed and Schwarz, Michael and Rossow, Christian
(2021)
Osiris: Automated Discovery of Microarchitectural Side Channels.
(In Press)
Bauer, Markus and Rossow, Christian
(2021)
Cali: Compiler Assisted Library Isolation.
(In Press)
Bauer, Markus and Rossow, Christian
(2021)
NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable Hijacking.
(In Press)
Reen, Gaganjeet Singh and Rossow, Christian
(2020)
DPIFuzz: A Differential Fuzzing Frameworkto Detect DPI Elusion Strategies for QUIC.
Brengel, Michael and Rossow, Christian
(2020)
xOSSig: Leveraging OS Diversity to Automatically Extract Malware Code Signatures.
Wan, Gerry and Izhikevich, Liz and Adrian, David and Yoshioka, Katsunari and Holz, Ralph and Rossow, Christian and Durumeric, Zakir
(2020)
On the Origin of Scanning: The Impact of Location on Internet-Wide Scans.
Bushart, Jonas and Rossow, Christian
(2020)
Padding Ain’t Enough: Assessing the Privacy Guarantees of Encrypted DNS.
Schwarz, Fabian and Rossow, Christian
(2020)
SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients.
Birtel, Benedikt and Rossow, Christian
(2020)
Slitheen++: Stealth TLS-based Decoy Routing.
Steffens, Marius and Rossow, Christian and Johns, Martin and Stock, Ben
(2019)
Don’t Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
Walla, Sebastian and Rossow, Christian
(2019)
MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware.
(In Press)
Krupp, Johannes and Rossow, Christian
(2018)
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts.
Maisuradze, Giorgi and Rossow, Christian
(2018)
Ret2Spec: Speculative Execution Using Return Stack Buffers.
Tanabe, Rui and Ueno, Wataru and Ishii, Kou and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Rossow, Christian
(2018)
Evasive Malware via Identifier Implanting.
Bushart, Jonas and Rossow, Christian
(2018)
DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives.
Stock, Ben and Pellegrino, Giancarlo and Li, Frank and Backes, Michael and Rossow, Christian
(2018)
Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications.
Brengel, Michael and Rossow, Christian
(2018)
Identifying Key Leakage of Bitcoin Users.
(In Press)
Brengel, Michael and Rossow, Christian
(2018)
MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps.
Oltrogge, Marten and Derr, Erik and Stransky, Christian and Acar, Yasemin and Fahl, Sascha and Rossow, Christian and Pellegrino, Giancarlo and Bugiel, Sven and Backes, Michael
(2018)
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
Krupp, Johannes and Karami, Mohammad and Rossow, Christian and McCoy, Damon and Backes, Michael
(2017)
Linking Amplification DDoS Attacks to Booter Services.
Simeonovski, Milivoj and Pellegrino, Giancarlo and Rossow, Christian and Backes, Michael
(2017)
Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals.
Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2017)
Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.
Pellegrino, Giancarlo and Johns, Martin and Koch, Simon and Backes, Michael and Rossow, Christian
(2017)
Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
Jonker, Mattijs and King, Alistair and Krupp, Johannes and Rossow, Christian and Sperotto, Anna and Dainotti, Alberto
(2017)
Millions of Targets Under Attack: A Macroscopic Characterization of the DoS Ecosystem.
Krupp, Johannes and Backes, Michael and Rossow, Christian
(2016)
Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks.
Backes, Michael and Holz, Thorsten and Rossow, Christian and Rytilahti, Teemu and Simeonovski, Milivoj and Stock, Ben
(2016)
On the Feasibility of TTL-based Filtering for DRDoS Mitigation.
Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016)
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2016)
What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
Nürnberger, Stefan and Rossow, Christian
(2016)
VatiCAN - Vetted, Authenticated CAN Bus.
Brengel, Michael and Backes, Michael and Rossow, Christian
(2016)
Detecting Hardware-Assisted Virtualization.
Yokoyama, Akira and Ishii, Kou and Tanabe, Rui and Papa, Yinmin and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Brengel, Michael and Backes, Michael and Rossow, Christian
(2016)
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Pellegrino, Giancarlo and Catakoglu, Onur and Balzarotti, Davide and Rossow, Christian
(2016)
Uses and Abuses of Server-Side Requests.
Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016)
POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications.
Krämer, Lukas and Krupp, Johannes and Makita, Daisuke and Nishizoe, Tomomi and Koide, Takashi and Yoshioka, Katsunari and Rossow, Christian
(2015)
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks.
Rossow, Christian and Mohammadi, Esfandiar and Backes, Michael and Meiser, Sebastian and Koch, Simon
(2015)
POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
Pewny, Jannik and Garmany, Behrad and Gawlik, Robert and Rossow, Christian and Holz, Thorsten
(2015)
Cross-Architecture Bug Search in Binary Executables.
Pellegrino, Giancarlo and Rossow, Christian and Ryba, Fabrice J. and Schmidt, Thomas C. and Wählisch, Matthias
(2015)
Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics.
Kührer, Marc and Hupperich, Thomas and Bushart, Jonas and Rossow, Christian and Holz, Thorsten
(2015)
Going Wild: Large-Scale Classification of Open DNS Resolvers.
Pa, Yin Minn Pa and Suzuki, Shogo and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Rossow, Christian
(2015)
IoTPOT: Analysing the Rise of IoT Compromises.
Andriesse, Dennis and Rossow, Christian and Bos, Herbert
(2015)
Reliable Recon in Adversarial Peer-to-Peer Botnets.
Karuppayah, Shankar and Roos, Stefanie and Rossow, Christian and Mühlhäuser, Max and Fischer, Mathias
(2015)
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
Pellegrino, Giancarlo and Tschürtz, Constantin and Bodden, Eric and Rossow, Christian
(2015)
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014)
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
Rossow, Christian
(2014)
Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014)
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks.
Pewny, Jannik and Schuster, Felix and Bernhard, Lukas and Holz, Thorsten and Rossow, Christian
(2014)
Leveraging semantic signatures for bug search in binary programs.
Karuppayah, Shankar and Fischer, Mathias and Rossow, Christian and Mühlhäuser, Max
(2014)
On Advanced Monitoring in Resilient and Unstructured P2P Botnets.
Welzel, Arne and Rossow, Christian and Bos, Herbert
(2014)
On Measuring the Impact of DDoS Botnets.
Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza
(2014)
On the (In)Security of Mobile Two-Factor Authentication.
Kührer, Marc and Rossow, Christian and Holz, Thorsten
(2014)
Paint it Black: Evaluating the Effectiveness of Malware Blacklists.
Dietrich, Christian J. and Rossow, Christian and Pohlmann, Norbert
(2013)
Exploiting visual appearance to cluster and detect rogue software.
Andriesse, Dennis and Rossow, Christian and Stone-Gross, Brett and Plohmann, Daniel and Bos, Herbert
(2013)
Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus.
Rossow, Christian and Andriesse, Dennis and Werner, Tillmann and Stone-Gross, Brett and Plohmann, Daniel and Dietrich, Christian J. and Bos, Herbert
(2013)
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets.
Grier, Chris and Ballard, Lucas and Caballero, Juan and Chachra, Neha and Dietrich, Christian J. and Levchenko, Kirill and Mavrommatis, Panayiotis and McCoy, Damon and Nappa, Antonio and Pitsillidis, Andreas and Provos, Niels and Rafique, M. Zubair and Rajab, Moheeb Abu and Rossow, Christian and Thomas, Kurt and Paxson, Vern and Savage, Stefan and Voelker, Geoffrey M.
(2012)
Manufacturing compromise: the emergence of exploit-as-a-service.
Rossow, Christian and Dietrich, Christian J. and Grier, Chris and Kreibich, Christian and Paxson, Vern and Pohlmann, Norbert and Bos, Herbert and van Steen, Maarten
(2012)
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook.
Dietrich, Christian J. and Rossow, Christian and Freiling, Felix C. and Bos, Herbert and van Steen, Maarten and Pohlmann, Norbert
(2011)
On Botnets That Use DNS for Command and Control.
Article
Maisuradze, Giorgi and Rossow, Christian
(2018)
Speculose: Analyzing the Security Implications of Speculative Execution in CPUs.
CoRR, abs/18.
Gerling, Sebastian and Rossow, Christian
(2016)
Angreiferjagd im "Internet der Dinge".
Datenschutz und Datensicherheit, 40 (8).
pp. 507-510.
Pa, Yin Minn Pa and Suzuki, Shogo and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Rossow, Christian
(2016)
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats.
JIP, 24 (3).
522–533.
Ryba, Fabrice J. and Orlinski, Matthew and Wählisch, Matthias and Rossow, Christian and Schmidt, Thomas C.
(2015)
Amplification and DRDoS Attack Defense - A Survey and New Perspectives.
CoRR, abs/15.
Dietrich, Christian J. and Rossow, Christian and Pohlmann, Norbert
(2013)
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis.
Computer Networks, 57 (2).
475–486.
Monograph
Schwarz, Fabian and Do, Khue and Heide, Gunnar and Hanzlik, Lucjan and Rossow, Christian
(2023)
FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs (Extended Version).
Technical Report.
UNSPECIFIED.
This list was generated on Sun Dec 22 02:57:28 2024 CET.