Christian Rossow
Orcid: 0000-0003-2470-8444Affiliations:
- CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
- Saarland University, Department of Computer Science
- Ruhr University Bochum, Horst Görtz Institute for IT-Security
- Gelsenkirchen University of Applied Sciences, Institute for Internet Security
According to our database1,
Christian Rossow
authored at least 85 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on cispa.de
On csauthors.net:
Bibliography
2024
KeyVisor - A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies.
CoRR, 2024
00SEVen - Re-enabling Virtual Machine Forensics: Introspecting Confidential VMs Using Privileged in-VM Agents.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the 27th International Symposium on Research in Attacks, 2024
The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the 17th International Conference on Network and Service Management, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, 2020
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, 2020
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
2018
CoRR, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Who Controls the Internet?: Analyzing Global Threats using Property Graph Traversals.
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem.
Proceedings of the 2017 Internet Measurement Conference, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
Proceedings of the 25th USENIX Security Symposium, 2016
What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
Proceedings of the 25th USENIX Security Symposium, 2016
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the 2015 ACM Internet Measurement Conference, 2015
Proceedings of the 2015 ACM Internet Measurement Conference, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Seventh European Workshop on System Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis.
Comput. Networks, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013
2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Seventh European Conference on Computer Network Defense, 2011
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
2008
Proceedings of the Sicherheit 2008: Sicherheit, 2008