Prudent practices for designing malware experiments: Status quo and outlook C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ... 2012 IEEE Symposium on Security and Privacy, 65-79, 2012 | 315 | 2012 |
Manufacturing Compromise: The Emergence of Exploit-as-a-Service C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ... | 304 | 2012 |
Sok: P2Pwned - modeling and evaluating the resilience of peer-to-peer botnets C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ... Security and Privacy (SP), 2013 IEEE Symposium on, 97-111, 2013 | 242 | 2013 |
P2PWNED: Modeling and Evaluating the Resilience of Peer-to-Peer Botnets C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ... | 242* | |
On Botnets that use DNS for Command and Control CJ Dietrich, C Rossow, FC Freiling, H Bos, M Van Steen, N Pohlmann 2011 seventh european conference on computer network defense, 9-16, 2011 | 189 | 2011 |
CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis CJ Dietrich, C Rossow, N Pohlmann Computer Networks, 2012 | 138 | 2012 |
Sandnet: Network traffic analysis of malicious software C Rossow, CJ Dietrich, H Bos, L Cavallaro, M van Steen, FC Freiling, ... Proceedings of the First Workshop on Building Analysis Datasets and …, 2011 | 135 | 2011 |
Large Scale Analysis of Malware Downloaders C Rossow, C Dietrich, H Bos 7. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 12, 2012 | 89 | 2012 |
Provex: Detecting botnets with encrypted command and control channels C Rossow, CJ Dietrich International Conference on Detection of Intrusions and Malware, and …, 2013 | 78 | 2013 |
Empirical research of IP blacklists CJ Dietrich, C Rossow ISSE 2008 Securing Electronic Business Processes, 163-171, 2009 | 55 | 2009 |
Empirical research on IP blacklisting C Dietrich, C Rossow CEAS’08: Proceedings of the Fifth Conference on Email and Anti-Spam, 2008 | 55* | 2008 |
Exploiting visual appearance to cluster and detect rogue software CJ Dietrich, C Rossow, N Pohlmann Proceedings of the 28th annual ACM symposium on applied computing, 1776-1783, 2013 | 23 | 2013 |
Hiding in Plain Sight PM Bureau, C Dietrich Black Hat, 2015 | 10 | 2015 |
Detecting Gray in Black and White C Rossow, T Czerwinski, CJ Dietrich, N Pohlmann MIT Spam Conference, 2010 | 8 | 2010 |
eID online authentication network threat model, attacks and implications CJ Dietrich, C Rossow, N Pohlmann 19th DFN Workshop 2012, 2012 | 7 | 2012 |
Network Traffic Analysis of Malicious Software C Rossow, C Dietrich, HJ Bos, L Cavallaro, MR van Steen, F Freiling, ... Eurosys Workshops, 2011 | 1 | 2011 |
Detecting malicious bot-induced network traffic using machine learning CJ Dietrich SPRING-SIDAR Graduierten-Workshop über Reaktive Sicherheit, 7. Juli 2010 …, 2010 | | 2010 |
Extended Access Control–neuer Zugriffsmechanismus für elektronische Ausweisdokumente CJ Dietrich, N Pohlmann, FH Gelsenkirchen Tagungsband zum 9. Kryptotag, 8, 2008 | | 2008 |
Evaluation of the Possible Utilization of anti-spam Mechanisms Against spit C Dietrich, M Hesse ISSE/SECURE 2007: securing electronic business processes: highlights of the …, 2007 | | 2007 |
E-Mail-Verlässlichkeit: Auswertung der Umfrage Ende 2004 C Dietrich, N Pohlmann | | |