default search action
Christian Rossow
Person information
- affiliation: CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
- affiliation: Saarland University, Department of Computer Science
- affiliation: Ruhr University Bochum, Horst Görtz Institute for IT-Security
- affiliation: Gelsenkirchen University of Applied Sciences, Institute for Internet Security
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c79]Lorenz Hetterich, Markus Bauer, Michael Schwarz, Christian Rossow:
Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8. AsiaCCS 2024 - [c78]Raphael Hiesgen, Marcin Nawrocki, Marinho P. Barcellos, Daniel Kopp, Oliver Hohlfeld, Echo Chan, Roland Dobbins, Christian Doerr, Christian Rossow, Daniel R. Thomas, Mattijs Jonker, Ricky K. P. Mok, Xiapu Luo, John Kristoff, Thomas C. Schmidt, Matthias Wählisch, kc claffy:
The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments. IMC 2024: 259-279 - [c77]Bogdan Cebere, Christian Rossow:
Understanding Web Fingerprinting with a Protocol-Centric Approach. RAID 2024: 17-34 - [c76]Bogdan-Constantin Cebere, Jonathan Lasse Bennet Flueren, Silvia Sebastián, Daniel Plohmann, Christian Rossow:
Down to earth! Guidelines for DGA-based Malware Detection. RAID 2024: 147-165 - [c75]Yepeng Pan, Christian Rossow:
TCP Spoofing: Reliable Payload Transmission Past the Spoofed TCP Handshake. SP 2024: 4497-4515 - [c74]Yepeng Pan, Anna Ascheman, Christian Rossow:
Loopy Hell(ow): Infinite Traffic Loops at the Application Layer. USENIX Security Symposium 2024 - [c73]Fabian Schwarz, Christian Rossow:
00SEVen - Re-enabling Virtual Machine Forensics: Introspecting Confidential VMs Using Privileged in-VM Agents. USENIX Security Symposium 2024 - [i9]Fabian Schwarz, Jan Philipp Thoma, Christian Rossow, Tim Güneysu:
KeyVisor - A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies. CoRR abs/2410.01777 (2024) - 2023
- [c72]Till Schlüter, Amit Choudhari, Lorenz Hetterich, Leon Trampert, Hamed Nemati, Ahmad Ibrahim, Michael Schwarz, Christian Rossow, Nils Ole Tippenhauer:
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers. CCS 2023: 975-989 - [c71]Jonas Bushart, Christian Rossow:
ResolFuzz: Differential Fuzzing of DNS Resolvers. ESORICS (2) 2023: 62-80 - [c70]Jonas Bushart, Christian Rossow:
Anomaly-based Filtering of Application-Layer DDoS Against DNS Authoritatives. EuroS&P 2023: 558-575 - 2022
- [c69]Markus Bauer, Ilya Grishchenko, Christian Rossow:
TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation. ACSAC 2022: 346-360 - [c68]Ahmad Ibrahim, Hamed Nemati, Till Schlüter, Nils Ole Tippenhauer, Christian Rossow:
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels. CCS 2022: 1489-1503 - [c67]Fabian Schwarz, Khue Do, Gunnar Heide, Lucjan Hanzlik, Christian Rossow:
FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs. CCS 2022: 2581-2594 - [c66]Leon Trampert, Christian Rossow, Michael Schwarz:
Browser-Based CPU Fingerprinting. ESORICS (3) 2022: 87-105 - [c65]Johannes Krupp, Ilya Grishchenko, Christian Rossow:
AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities. USENIX Security Symposium 2022: 1043-1060 - [i8]Ahmad Ibrahim, Hamed Nemati, Till Schlüter, Nils Ole Tippenhauer, Christian Rossow:
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels. CoRR abs/2211.13958 (2022) - 2021
- [c64]Markus Bauer, Christian Rossow:
Cali: Compiler-Assisted Library Isolation. AsiaCCS 2021: 550-564 - [c63]Olivier van der Toorn, Johannes Krupp, Mattijs Jonker, Roland van Rijswijk-Deij, Christian Rossow, Anna Sperotto:
ANYway: Measuring the Amplification DDoS Potential of Domains. CNSM 2021: 500-508 - [c62]Johannes Krupp, Christian Rossow:
BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks. EuroS&P 2021: 423-439 - [c61]Markus Bauer, Christian Rossow:
NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable Hijacking. EuroS&P 2021: 650-666 - [c60]Daniel Weber, Ahmad Ibrahim, Hamed Nemati, Michael Schwarz, Christian Rossow:
Osiris: Automated Discovery of Microarchitectural Side Channels. USENIX Security Symposium 2021: 1415-1432 - [c59]Michael Brengel, Christian Rossow:
YARIX: Scalable YARA-based Malware Intelligence. USENIX Security Symposium 2021: 3541-3558 - [i7]Johannes Krupp, Christian Rossow:
BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks. CoRR abs/2103.08440 (2021) - [i6]Daniel Weber, Ahmad Ibrahim, Hamed Nemati, Michael Schwarz, Christian Rossow:
Osiris: Automated Discovery of Microarchitectural Side Channels. CoRR abs/2106.03470 (2021) - 2020
- [c58]Gaganjeet Singh Reen, Christian Rossow:
DPIFuzz: A Differential Fuzzing Framework to Detect DPI Elusion Strategies for QUIC. ACSAC 2020: 332-344 - [c57]Gerry Wan, Liz Izhikevich, David Adrian, Katsunari Yoshioka, Ralph Holz, Christian Rossow, Zakir Durumeric:
On the Origin of Scanning: The Impact of Location on Internet-Wide Scans. Internet Measurement Conference 2020: 662-679 - [c56]Benedikt Birtel, Christian Rossow:
Slitheen++: Stealth TLS-based Decoy Routing. FOCI @ USENIX Security Symposium 2020 - [c55]Jonas Bushart, Christian Rossow:
Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNS. FOCI @ USENIX Security Symposium 2020 - [c54]Fabian Schwarz, Christian Rossow:
SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients. USENIX Security Symposium 2020: 753-770
2010 – 2019
- 2019
- [c53]Walla Sebastian, Christian Rossow:
MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware. EuroS&P 2019: 590-605 - [c52]Marius Steffens, Christian Rossow, Martin Johns, Ben Stock:
Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild. NDSS 2019 - [i5]Jonas Bushart, Christian Rossow:
Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNS. CoRR abs/1907.01317 (2019) - 2018
- [c51]Giorgi Maisuradze, Christian Rossow:
ret2spec: Speculative Execution Using Return Stack Buffers. CCS 2018: 2109-2122 - [c50]Michael Brengel, Christian Rossow:
MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps. DIMVA 2018: 24-45 - [c49]Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow:
Evasive Malware via Identifier Implanting. DIMVA 2018: 162-184 - [c48]Ben Stock, Giancarlo Pellegrino, Frank Li, Michael Backes, Christian Rossow:
Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications. NDSS 2018 - [c47]Jonas Bushart, Christian Rossow:
DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives. RAID 2018: 139-160 - [c46]Michael Brengel, Christian Rossow:
Identifying Key Leakage of Bitcoin Users. RAID 2018: 623-643 - [c45]Marten Oltrogge, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, Michael Backes:
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. IEEE Symposium on Security and Privacy 2018: 634-647 - [c44]Johannes Krupp, Christian Rossow:
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts. USENIX Security Symposium 2018: 1317-1333 - [e1]Christian Rossow, Yves Younan:
12th USENIX Workshop on Offensive Technologies, WOOT 2018, Baltimore, MD, USA, August 13-14, 2018. USENIX Association 2018 [contents] - [i4]Giorgi Maisuradze, Christian Rossow:
Speculose: Analyzing the Security Implications of Speculative Execution in CPUs. CoRR abs/1801.04084 (2018) - [i3]Giorgi Maisuradze, Christian Rossow:
ret2spec: Speculative Execution Using Return Stack Buffers. CoRR abs/1807.10364 (2018) - 2017
- [j4]Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz:
Cross-architecture bug search in binary executables. it Inf. Technol. 59(2): 83 (2017) - [c43]Giancarlo Pellegrino, Martin Johns, Simon Koch, Michael Backes, Christian Rossow:
Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs. CCS 2017: 1757-1771 - [c42]Mattijs Jonker, Alistair King, Johannes Krupp, Christian Rossow, Anna Sperotto, Alberto Dainotti:
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem. Internet Measurement Conference 2017: 100-113 - [c41]Giorgi Maisuradze, Michael Backes, Christian Rossow:
Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code. NDSS 2017 - [c40]Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes:
Linking Amplification DDoS Attacks to Booter Services. RAID 2017: 427-449 - [c39]Milivoj Simeonovski, Giancarlo Pellegrino, Christian Rossow, Michael Backes:
Who Controls the Internet?: Analyzing Global Threats using Property Graph Traversals. WWW 2017: 647-656 - [i2]Giancarlo Pellegrino, Martin Johns, Simon Koch, Michael Backes, Christian Rossow:
Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs. CoRR abs/1708.08786 (2017) - 2016
- [j3]Sebastian Gerling, Christian Rossow:
Angreiferjagd im "Internet der Dinge". Datenschutz und Datensicherheit 40(8): 507-510 (2016) - [j2]Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow:
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats. J. Inf. Process. 24(3): 522-533 (2016) - [c38]Johannes Krupp, Michael Backes, Christian Rossow:
Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks. CCS 2016: 1426-1437 - [c37]Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes:
POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications. CCS 2016: 1787-1789 - [c36]Stefan Nürnberger, Christian Rossow:
- vatiCAN - Vetted, Authenticated CAN Bus. CHES 2016: 106-124 - [c35]Michael Brengel, Michael Backes, Christian Rossow:
Detecting Hardware-Assisted Virtualization. DIMVA 2016: 207-227 - [c34]Akira Yokoyama, Kou Ishii, Rui Tanabe, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Michael Brengel, Michael Backes, Christian Rossow:
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion. RAID 2016: 165-187 - [c33]Michael Backes, Thorsten Holz, Christian Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock:
On the Feasibility of TTL-Based Filtering for DRDoS Mitigation. RAID 2016: 303-322 - [c32]Giancarlo Pellegrino, Onur Catakoglu, Davide Balzarotti, Christian Rossow:
Uses and Abuses of Server-Side Requests. RAID 2016: 393-414 - [c31]Giorgi Maisuradze, Michael Backes, Christian Rossow:
What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses. USENIX Security Symposium 2016: 139-156 - [c30]Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes:
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification. USENIX Security Symposium 2016: 1015-1032 - 2015
- [c29]Michael Backes, Simon Koch, Sebastian Meiser, Esfandiar Mohammadi, Christian Rossow:
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor. CCS 2015: 1626-1628 - [c28]Shankar Karuppayah, Stefanie Roos, Christian Rossow, Max Mühlhäuser, Mathias Fischer:
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism. ICDCS 2015: 619-629 - [c27]Dennis Andriesse, Christian Rossow, Herbert Bos:
Reliable Recon in Adversarial Peer-to-Peer Botnets. Internet Measurement Conference 2015: 129-140 - [c26]Marc Kührer, Thomas Hupperich, Jonas Bushart, Christian Rossow, Thorsten Holz:
Going Wild: Large-Scale Classification of Open DNS Resolvers. Internet Measurement Conference 2015: 355-368 - [c25]Giancarlo Pellegrino, Constantin Tschürtz, Eric Bodden, Christian Rossow:
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications. RAID 2015: 295-316 - [c24]Lukas Krämer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, Christian Rossow:
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks. RAID 2015: 615-636 - [c23]Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz:
Cross-Architecture Bug Search in Binary Executables. IEEE Symposium on Security and Privacy 2015: 709-724 - [c22]Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow:
IoTPOT: Analysing the Rise of IoT Compromises. WOOT 2015 - [c21]Giancarlo Pellegrino, Christian Rossow, Fabrice J. Ryba, Thomas C. Schmidt, Matthias Wählisch:
Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics. WOOT 2015 - [i1]Fabrice J. Ryba, Matthew Orlinski, Matthias Wählisch, Christian Rossow, Thomas C. Schmidt:
Amplification and DRDoS Attack Defense - A Survey and New Perspectives. CoRR abs/1505.07892 (2015) - 2014
- [c20]Jannik Pewny, Felix Schuster, Lukas Bernhard, Thorsten Holz, Christian Rossow:
Leveraging semantic signatures for bug search in binary programs. ACSAC 2014: 406-415 - [c19]Arne Welzel, Christian Rossow, Herbert Bos:
On measuring the impact of DDoS botnets. EUROSEC 2014: 3:1-3:6 - [c18]Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, Ahmad-Reza Sadeghi:
On the (In)Security of Mobile Two-Factor Authentication. Financial Cryptography 2014: 365-383 - [c17]Shankar Karuppayah, Mathias Fischer, Christian Rossow, Max Mühlhäuser:
On advanced monitoring in resilient and unstructured P2P botnets. ICC 2014: 871-877 - [c16]Christian Rossow:
Amplification Hell: Revisiting Network Protocols for DDoS Abuse. NDSS 2014 - [c15]Marc Kührer, Christian Rossow, Thorsten Holz:
Paint It Black: Evaluating the Effectiveness of Malware Blacklists. RAID 2014: 1-21 - [c14]Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz:
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks. USENIX Security Symposium 2014: 111-125 - [c13]Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz:
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks. WOOT 2014 - 2013
- [j1]Christian J. Dietrich, Christian Rossow, Norbert Pohlmann:
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis. Comput. Networks 57(2): 475-486 (2013) - [c12]Christian Rossow, Christian J. Dietrich:
ProVeX: Detecting Botnets with Encrypted Command and Control Channels. DIMVA 2013: 21-40 - [c11]Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos:
Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus. MALWARE 2013: 116-123 - [c10]Christian J. Dietrich, Christian Rossow, Norbert Pohlmann:
Exploiting visual appearance to cluster and detect rogue software. SAC 2013: 1776-1783 - [c9]Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, Herbert Bos:
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets. IEEE Symposium on Security and Privacy 2013: 97-111 - 2012
- [c8]Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Manufacturing compromise: the emergence of exploit-as-a-service. CCS 2012: 821-832 - [c7]Christian Rossow, Christian J. Dietrich, Herbert Bos:
Large-Scale Analysis of Malware Downloaders. DIMVA 2012: 42-61 - [c6]Christian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, Maarten van Steen:
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. IEEE Symposium on Security and Privacy 2012: 65-79 - 2011
- [c5]Christian Rossow, Christian J. Dietrich, Herbert Bos, Lorenzo Cavallaro, Maarten van Steen, Felix C. Freiling, Norbert Pohlmann:
Sandnet: network traffic analysis of malicious software. BADGERS@EuroSys 2011: 78-88 - [c4]Christian J. Dietrich, Christian Rossow, Felix C. Freiling, Herbert Bos, Maarten van Steen, Norbert Pohlmann:
On Botnets That Use DNS for Command and Control. EC2ND 2011: 9-16
2000 – 2009
- 2008
- [c3]Christian J. Dietrich, Christian Rossow:
Empirical research on IP blacklisting. CEAS 2008 - [c2]Christian Dietrich, Christian Rossow:
Empirical research of IP blacklists. ISSE 2008: 163-171 - [c1]Christian J. Dietrich, Christian Rossow:
Empirische Untersuchung von IP-Blacklists. Sicherheit 2008: 545-549
Coauthor Index
aka: Christian J. Dietrich
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint