Christian Rossow mostly deals with Computer security, Malware, Denial-of-service attack, Botnet and Honeypot. His work in Computer security addresses subjects such as Server, which are connected to disciplines such as Handshake. His Malware research is multidisciplinary, relying on both Transparency, The Internet, Data science and Presentation.
As part of his studies on Denial-of-service attack, Christian Rossow often connects relevant subjects like Communications protocol. He combines subjects such as Peer-to-peer, Resilience, Network security, Node and Internet privacy with his study of Botnet. His Exploit study combines topics from a wide range of disciplines, such as World Wide Web and Bytecode.
His primary areas of investigation include Computer security, Malware, Computer network, Denial-of-service attack and Botnet. He has included themes like Android and Web application, The Internet, World Wide Web, Server in his Computer security study. His Malware research is multidisciplinary, incorporating elements of De facto standard, Sandbox and Scalability.
His work in the fields of Computer network, such as Traffic analysis and Network packet, overlaps with other areas such as Crawling and IP address spoofing. The Denial-of-service attack study combines topics in areas such as Great Cannon, Communications protocol, Spoofing attack and Honeypot. His Botnet research focuses on subjects like Peer-to-peer, which are linked to Resilience.
Christian Rossow focuses on Computer security, Computer network, Malware, Speculative execution and Traffic analysis. His Computer security research is multidisciplinary, relying on both Android and Mobile apps. His biological study spans a wide range of topics, including Denial-of-service attack, The Internet and Transient.
His research investigates the connection between Denial-of-service attack and topics such as Cache that intersect with problems in Server. His Malware research is multidisciplinary, incorporating perspectives in Variable, Identifier, De facto standard and Sandbox. He focuses mostly in the field of Speculative execution, narrowing it down to matters related to Branch predictor and, in some cases, Software and Cover.
Christian Rossow mostly deals with Computer security, Focus, Cryptocurrency, Mobile apps and Android. His study in Identification extends to Computer security with its themes. His Focus research includes elements of Social media, Vulnerability disclosure and Internet privacy.
His Cryptocurrency study integrates concerns from other disciplines, such as Exploit and Bytecode.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Amplification Hell: Revisiting Network Protocols for DDoS Abuse
Christian Rossow.
network and distributed system security symposium (2014)
IoTPOT: analysing the rise of IoT compromises
Yin Minn Pa Pa;Shogo Suzuki;Katsunari Yoshioka;Tsutomu Matsumoto.
WOOT'15 Proceedings of the 9th USENIX Conference on Offensive Technologies (2015)
On Botnets That Use DNS for Command and Control.
Christian J. Dietrich;Christian Rossow;Felix C. Freiling;Herbert Bos.
electronic commerce (2011)
Manufacturing compromise: the emergence of exploit-as-a-service
Chris Grier;Lucas Ballard;Juan Caballero;Neha Chachra.
computer and communications security (2012)
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook
C. Rossow;C. J. Dietrich;C. Grier;C. Kreibich.
ieee symposium on security and privacy (2012)
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
C. Rossow;D. Andriesse;T. Werner;B. Stone-Gross.
ieee symposium on security and privacy (2013)
Exit from hell? reducing the impact of amplification DDoS attacks
Marc Kührer;Thomas Hupperich;Christian Rossow;Thorsten Holz.
usenix security symposium (2014)
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats
Yin Minn Pa Pa;Shogo Suzuki;Katsunari Yoshioka;Tsutomu Matsumoto.
Journal of Information Processing (2016)
Paint It Black: Evaluating the Effectiveness of Malware Blacklists
Marc Kührer;Christian Rossow;Thorsten Holz.
recent advances in intrusion detection (2014)
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
Johannes Krupp;Christian Rossow.
usenix security symposium (2018)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Oxford
Vrije Universiteit Amsterdam
Ruhr University Bochum
University of Erlangen-Nuremberg
University of Twente
University of California, Berkeley
New York University
Technical University of Darmstadt
Technical University of Darmstadt
Lacework