Quicklinks
Decorative photo of one of the top-corners of the CISPA building
Portrait of Person: Christian Rossow

Christian Rossow (Faculty)
 
 Campus E9 1 | 66123 Saarbrücken | 3.07

Publications:

Title Date Date Meta
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts 2018  2018   Johannes Krupp, Christian Rossow  27th USENIX Security Symposium (USENIX Security 18)
Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications 2018  2018   Ben Stock, Giancarlo Pellegrino, Frank Li, Michael Backes, Christian Rossow  Proceedings of the 25th Annual Symposium on Network and Distributed System Security (NDSS '18).
MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps 2018  2018   Michael Brengel, Christian Rossow  Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators 2018  2018   Marten Oltrogge, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, Michael Backes  39th IEEE Symposium on Security and Privacy (SP '18)
Linking Amplification DDoS Attacks to Booter Services 2017  2017   Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes  International Symposium on Research in Attacks, Intrusions, and Defenses
Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals 2017  2017   Milivoj Simeonovski, Giancarlo Pellegrino, Christian Rossow, Michael Backes  Proc. of the 26rd International Conference on World Wide Web (WWW 2017)
Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code 2017  2017   Giorgi Maisuradze, Michael Backes, Christian Rossow  Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17)
Millions of Targets Under Attack: A Macroscopic Characterization of the DoS Ecosystem 2017  2017   Mattijs Jonker, Alistair King, Johannes Krupp, Christian Rossow, Anna Sperotto, Alberto Dainotti  Proceedings of the 2017 Internet Measurement Conference
Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks 2016  2016   Johannes Krupp, Michael Backes, Christian Rossow  Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16)
On the Feasibility of TTL-based Filtering for DRDoS Mitigation 2016  2016   Michael Backes, Thorsten Holz, Christian Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock  RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses
What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses 2016  2016   Giorgi Maisuradze, Michael Backes, Christian Rossow  Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification 2016  2016   Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes  Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)
VatiCAN - Vetted, Authenticated CAN Bus 2016  2016   Stefan Nürnberger, Christian Rossow  . Conference on Cryptographic Hardware and Embedded Systems (CHES)
Detecting Hardware-Assisted Virtualization 2016  2016   Michael Brengel, Michael Backes, Christian Rossow  Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings
Angreiferjagd im Internet der Dinge 2016  2016   Sebastian Gerling, Christian Rossow
Uses and Abuses of Server-Side Requests 2016  2016   Giancarlo Pellegrino, Onur Catakoglu, Davide Balzarotti, Christian Rossow  Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2016
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion 2016  2016   Akira Yokoyama, Kou Ishii, Rui Tanabe, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Michael Brengel, Michael Backes, Christian Rossow  Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks 2015  2015   Lukas Krämer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, Christian Rossow  Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings
POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor 2015  2015   Christian Rossow, Esfandiar Mohammadi, Michael Backes, Sebastian Meiser, Simon Koch  Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15)
Cross-Architecture Bug Search in Binary Executables 2015  2015   Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz  Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P)
Reliable Recon in Adversarial Peer-to-Peer Botnets 2015  2015   Dennis Andriesse, Christian Rossow, Herbert Bos  Proc. of the 2015 Internet Measurement Conference (IMC'15)
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism 2015  2015   Shankar Karuppayah, Stefanie Roos, Christian Rossow, Max Mühlhäuser, Mathias Fischer  Proc. of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS'15)
Going Wild: Large-Scale Classification of Open DNS Resolvers 2015  2015   Marc Kührer, Thomas Hupperich, Jonas Bushart, Christian Rossow, Thorsten Holz  Proc. of the 2015 Internet Measurement Conference (IMC'15)
IoTPOT: Analysing the Rise of IoT Compromises 2015  2015   Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow  9th USENIX Workshop on Offensive Technologies (WOOT 15)
Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics 2015  2015   Giancarlo Pellegrino, Christian Rossow, Fabrice J. Ryba, Thomas C. Schmidt, Matthias Wählisch  9th USENIX Workshop on Offensive Technologies (WOOT 15)
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications 2015  2015   Giancarlo Pellegrino, Constantin Tschürtz, Eric Bodden, Christian Rossow  Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks 2014  2014   Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz  Proceedings of the 23rd USENIX Security Symposium (USENIX '14)
On the (In)Security of Mobile Two-Factor Authentication 2014  2014   Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, Ahmad-Reza Sadeghi  Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers
On Advanced Monitoring in Resilient and Unstructured P2P Botnets 2014  2014   Shankar Karuppayah, Mathias Fischer, Christian Rossow, Max Mühlhäuser  Proceedings of the 2014 IEEE International Conference on Communications (ICC 2014)
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks 2014  2014   Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz  Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT ’14)
Paint it Black: Evaluating the Effectiveness of Malware Blacklists 2014  2014   Marc Kührer, Christian Rossow, Thorsten Holz  Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses
Leveraging semantic signatures for bug search in binary programs 2014  2014   Jannik Pewny, Felix Schuster, Lukas Bernhard, Thorsten Holz, Christian Rossow  Proc. of the 30th Annual Computer Security Applications Conference (ACSAC'14)
Amplification Hell: Revisiting Network Protocols for DDoS Abuse 2014  2014   Christian Rossow  Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS '14)
On Measuring the Impact of DDoS Botnets 2014  2014   Arne Welzel, Christian Rossow, Herbert Bos  Proceedings of the Seventh European Workshop on System Security (EuroSec '14)