Number of items: 11.
Brengel, Michael and Rossow, Christian
(2018)
Identifying Key Leakage of Bitcoin Users.
(In Press)
Brengel, Michael and Rossow, Christian
(2018)
MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps.
Bushart, Jonas
(2018)
Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers.
Bushart, Jonas and Rossow, Christian
(2018)
DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives.
Krupp, Johannes and Rossow, Christian
(2018)
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts.
Maisuradze, Giorgi and Rossow, Christian
(2018)
Ret2Spec: Speculative Execution Using Return Stack Buffers.
Oltrogge, Marten and Derr, Erik and Stransky, Christian and Acar, Yasemin and Fahl, Sascha and Rossow, Christian and Pellegrino, Giancarlo and Bugiel, Sven and Backes, Michael
(2018)
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018)
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure.
Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018)
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (full version).
Stock, Ben and Pellegrino, Giancarlo and Li, Frank and Backes, Michael and Rossow, Christian
(2018)
Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications.
Tanabe, Rui and Ueno, Wataru and Ishii, Kou and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Rossow, Christian
(2018)
Evasive Malware via Identifier Implanting.
This list was generated on Thu Nov 21 08:20:15 2024 CET.