Rossow

Results: 72



#Item
11

Leveraging Semantic Signatures for Bug Search in Binary Programs Jannik Pewny† , Felix Schuster† , Christian Rossow‡ , Lukas Bernhard† , Thorsten Holz† † Horst Görtz Institute for IT-Security (HGI)

Add to Reading List

Source URL: www.ei.rub.de

- Date: 2014-10-22 03:57:33
    12

    Distributed Crawler Detection in Peer-to-Peer Botnets (Technical Report IR-CS-77) Dennis Andriesse Christian Rossow

    Add to Reading List

    Source URL: www.few.vu.nl

    - Date: 2015-08-26 07:28:21
      13

      Cross-Architecture Bug Search in Binary Executables Jannik Pewny∗ , Behrad Garmany∗ , Robert Gawlik∗ , Christian Rossow∗† , Thorsten Holz∗ ∗ Horst G¨ortz Institut (HGI)

      Add to Reading List

      Source URL: www.ei.rub.de

      - Date: 2015-03-28 07:57:47
        14Spamming / Spam filtering / Computing / Cyberspace / Email / Whitelist / DNSBL / The Spamhaus Project / Anti-spam techniques / Blacklist / Email spam / Open mail relay

        Detecting Gray in Black and White Christian Rossow, Thomas Czerwinski, Christian J. Dietrich, Norbert Pohlmann Institute for Internet security University of Applied Sciences Gelsenkirchen, Germany {rossow|czerwinski|diet

        Add to Reading List

        Source URL: norbert-pohlmann.com

        Language: English - Date: 2015-10-20 13:21:58
        15Malware / Cyberwarfare / Rogue software / Scareware / Social engineering / Ransomware / Rogue security software / Computer virus / Rootkit / Antivirus software / Winwebsec / Hierarchical clustering

        Exploiting Visual Appearance to Cluster and Detect Rogue Software Christian J. Dietrich1,3 , Christian Rossow1,2 , Norbert Pohlmann1 {dietrich|rossow|pohlmann}@internet-sicherheit.de 1

        Add to Reading List

        Source URL: norbert-pohlmann.com

        Language: English - Date: 2015-10-20 13:15:57
        16Spamming / Computer network security / Multi-agent systems / Domain name system / Botnets / Command and control / Rustock botnet / Name server / Email spam / OpenDNS / DNS sinkhole

        On Botnets that use DNS for Command and Control Christian J. Dietrich‡∗ , Christian Rossow†∗ , Felix C. Freiling‡ , Norbert Pohlmann∗ †Computer Systems Group, Vrije Universiteit Amsterdam ‡Department of C

        Add to Reading List

        Source URL: norbert-pohlmann.com

        Language: English - Date: 2015-10-20 13:20:24
        17

        Cashing out the Great Cannon? On Browser-Based DDoS Attacks and Economics Giancarlo Pellegrino Christian Rossow

        Add to Reading List

        Source URL: www.christian-rossow.de

        Language: English - Date: 2015-07-21 12:56:43
          18

          High-Resolution Satellite-Derived Dataset of the Surface Fluxes of Heat, Freshwater, and Momentum for the TOGA COARE IOP J. A. Curry,* C. A. Clayson,+ W. B. Rossow,# R. Reeder,* Y.-C. Zhang,@ P. J. Webster,* G. Liu,& and

          Add to Reading List

          Source URL: curry.eas.gatech.edu

          Language: English - Date: 2006-10-20 09:32:22
            19

            JOURNAL OF GEOPHYSICAL RESEARCH, VOL. 110, C02015, doi:2004JC002381, 2005 Comparison of surface radiative flux data sets over the Arctic Ocean Jiping Liu,1,2 Judith A. Curry,1 William B. Rossow,3 Jeffrey R. Key,

            Add to Reading List

            Source URL: curry.eas.gatech.edu

            Language: English - Date: 2006-10-20 09:33:09
              20

              On Botnets that use DNS for Command and Control Christian J. Dietrich†‡ , Christian Rossow∗‡ , Felix C. Freiling† , Herbert Bos∗ , Maarten van Steen∗ and Norbert Pohlmann‡ ∗

              Add to Reading List

              Source URL: www.cj2s.de

              Language: English - Date: 2011-08-22 11:42:14
                UPDATE