scispace - formally typeset
C

Christian Rossow

Researcher at Saarland University

Publications -  86
Citations -  4670

Christian Rossow is an academic researcher from Saarland University. The author has contributed to research in topics: Malware & Botnet. The author has an hindex of 31, co-authored 79 publications receiving 3792 citations. Previous affiliations of Christian Rossow include Ruhr University Bochum & VU University Amsterdam.

Papers
More filters
Proceedings ArticleDOI

Amplification Hell: Revisiting Network Protocols for DDoS Abuse

TL;DR: This paper revisits popular UDP-based protocols of network services, online games, P2P filesharing networks and P1P botnets to assess their security against DRDoS abuse and finds that 14 protocols are susceptible to bandwidth amplification and multiply the traffic up to a factor 4670.

IoTPOT: analysing the rise of IoT compromises

TL;DR: An IoT honeypot and sandbox is proposed, which attracts and analyzes Telnet-based attacks against various IoT devices running on different CPU architectures such as ARM, MIPS, and PPC.
Proceedings ArticleDOI

Manufacturing compromise: the emergence of exploit-as-a-service

TL;DR: DNS traffic from real networks is used to provide a unique perspective on the popularity of malware families based on the frequency that their binaries are installed by drivebys, as well as the lifetime and popularity of domains funneling users to exploits.
Proceedings ArticleDOI

Cross-Architecture Bug Search in Binary Executables

TL;DR: This paper proposes a system to derive bug signatures for known bugs and uses these signatures to find bugs in binaries that have been deployed on different CPU architectures (e.g., x86 vs. MIPS) and can find vulnerabilities in buggy binary code for any of these architectures.
Proceedings Article

teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts

TL;DR: A generic definition of vulnerable contracts is developed and used to build TEE THER, a tool that allows creating an exploit for a contract given only its binary bytecode, and performs a large-scale analysis of all 38,757 unique Ethereum contracts.