Name
Affiliation
Papers
CHRISTIAN ROSSOW
Institute for Internet Security, University of Applied Sciences Gelsenkirchen, Neidenburger Str. 43, 45877 Gelsenkirchen, Germany and VU University Amsterdam, The Network Institute, The Netherland ...
64
Collaborators
Citations 
PageRank 
131
786
49.71
Referers 
Referees 
References 
1820
1268
709
Search Limit
1001000
Title
Citations
PageRank
Year
FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs00.342022
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels00.342022
AMPFUZZ: Fuzzing for Amplification DDoS Vulnerabilities00.342022
YARIX: Scalable YARA-based Malware Intelligence00.342021
Osiris: Automated Discovery of Microarchitectural Side Channels00.342021
Cali: Compiler-Assisted Library Isolation20.402021
NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable Hijacking00.342021
BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks00.342021
ANYway: Measuring the Amplification DDoS Potential of Domains00.342021
On the Origin of Scanning: The Impact of Location on Internet-Wide Scans10.372020
Slitheen++: Stealth TLS-based Decoy Routing.00.342020
Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNS00.342020
DPIFuzz - A Differential Fuzzing Framework to Detect DPI Elusion Strategies for QUIC.10.362020
MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware00.342019
Don't Trust The Locals - Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.00.342019
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators50.462018
ret2spec: Speculative Execution Using Return Stack Buffers.200.762018
Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications.20.382018
Evasive Malware Via Identifier Implanting00.342018
Speculose: Analyzing the Security Implications of Speculative Execution in CPUs.20.412018
Memscrimper: Time- And Space-Efficient Storage Of Malware Sandbox Memory Dumps10.392018
Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.20.372017
Who Controls the Internet?: Analyzing Global Threats using Property Graph Traversals.90.602017
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem.110.592017
Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.20.382017
POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications.10.372016
What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions Of Jit-Rop Defenses70.462016
Hey, You Have A Problem: On The Feasibility Of Large-Scale Web Vulnerability Notification90.592016
Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks.101.872016
Angreiferjagd im "Internet der Dinge".00.342016
Detecting Hardware-Assisted Virtualization.40.432016
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats.60.452016
Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics.00.342015
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks.221.192015
Reliable Recon in Adversarial Peer-to-Peer Botnets70.532015
IoTPOT: analysing the rise of IoT compromises291.722015
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor10.342015
Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics50.552015
IoTPOT: Analysing the Rise of IoT Compromises.00.342015
Amplification and DRDoS Attack Defense -- A Survey and New Perspectives30.472015
Going Wild: Large-Scale Classification of Open DNS Resolvers251.002015
Cross-Architecture Bug Search In Binary Executables280.752015
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.70.462015
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism30.482015
On advanced monitoring in resilient and unstructured P2P botnets40.512014
Hell of a handshake: abusing TCP for reflective amplification DDoS attacks120.842014
Paint It Black: Evaluating the Effectiveness of Malware Blacklists.351.102014
On measuring the impact of DDoS botnets130.702014
Amplification Hell: Revisiting Network Protocols for DDoS Abuse.833.972014
Leveraging semantic signatures for bug search in binary programs.170.692014
  • 1
  • 2