Sven Dietrich

According to our database1, Sven Dietrich authored at least 30 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431).
Dagstuhl Reports, 2023

ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol.
IEEE Access, 2023

Attacks on tomorrow's virtual world.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

2022
Riding the IoT Wave With VFuzz: Discovering Security Flaws in Smart Homes.
IEEE Access, 2022

2021
V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities.
Proceedings of the 30th USENIX Security Symposium, 2021

QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

2020
Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces.
Proceedings of the 13th International Conference on Systematic Approaches to Digital Forensic Engineering, 2020

2018
Fingerprinting Cryptographic Protocols with Key Exchange Using an Entropy Measure.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

2017
Detecting zero-day attacks using context-aware anomaly detection at the application-layer.
Int. J. Inf. Sec., 2017

Security Challenges and Opportunities of Software-Defined Networking.
IEEE Secur. Priv., 2017

Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure.
CoRR, 2017

Cybersecurity and the Future.
Computer, 2017

2016
Network Attack Detection and Defense (Dagstuhl Seminar 16361).
Dagstuhl Reports, 2016

Who Are You Now? Fading to Multiple Personas.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

2014
Ethics in Data Sharing: Developing a Model for Best Practice.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

2013
A Secure Submission System for Online Whistleblowing Platforms.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Experiments with P2P Botnet Detection.
it Inf. Technol., 2012

2011
Building an Active Computer Security Ethics Community.
IEEE Secur. Priv., 2011

SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

2010
WECSR Preface.
Proceedings of the Financial Cryptography and Data Security, 2010

Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2008
P2P as botnet command and control: A deeper insight.
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008

2007
Analysis of the Storm and Nugache Trojans: P2P Is Here.
login Usenix Mag., 2007

Command and Control Structures in Malware: From Handler/Agent to P2P.
login Usenix Mag., 2007

Secure Software Architecture, Design, Implementation and Assurance.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2002
Active Network Defense: Some Concepts and Techniques.
login Usenix Mag., 2002

2001
Survivability with a Twist.
login Usenix Mag., 2001

2000
Scalpel, Gauze, and Decompilers.
login Usenix Mag., 2000

Analyzing Distributed Denial of Service Tools: The Shaft Case.
Proceedings of the 14th Conference on Systems Administration (LISA 2000), 2000


  Loading...