C
Christian Rossow
Researcher at Saarland University
Publications - 86
Citations - 4670
Christian Rossow is an academic researcher from Saarland University. The author has contributed to research in topics: Malware & Botnet. The author has an hindex of 31, co-authored 79 publications receiving 3792 citations. Previous affiliations of Christian Rossow include Ruhr University Bochum & VU University Amsterdam.
Papers
More filters
Proceedings ArticleDOI
Amplification Hell: Revisiting Network Protocols for DDoS Abuse
TL;DR: This paper revisits popular UDP-based protocols of network services, online games, P2P filesharing networks and P1P botnets to assess their security against DRDoS abuse and finds that 14 protocols are susceptible to bandwidth amplification and multiply the traffic up to a factor 4670.
IoTPOT: analysing the rise of IoT compromises
Yin Minn Pa Pa,Shogo Suzuki,Katsunari Yoshioka,Tsutomu Matsumoto,Takahiro Kasama,Christian Rossow +5 more
TL;DR: An IoT honeypot and sandbox is proposed, which attracts and analyzes Telnet-based attacks against various IoT devices running on different CPU architectures such as ARM, MIPS, and PPC.
Proceedings ArticleDOI
Manufacturing compromise: the emergence of exploit-as-a-service
Chris Grier,Lucas Ballard,Juan Caballero,Neha Chachra,Christian J. Dietrich,Kirill Levchenko,Panayiotis Mavrommatis,Damon McCoy,Antonio Nappa,Andreas Pitsillidis,Niels Provos,M. Zubair Rafique,Moheeb Abu Rajab,Christian Rossow,Kurt Thomas,Vern Paxson,Stefan Savage,Geoffrey M. Voelker +17 more
TL;DR: DNS traffic from real networks is used to provide a unique perspective on the popularity of malware families based on the frequency that their binaries are installed by drivebys, as well as the lifetime and popularity of domains funneling users to exploits.
Proceedings ArticleDOI
Cross-Architecture Bug Search in Binary Executables
TL;DR: This paper proposes a system to derive bug signatures for known bugs and uses these signatures to find bugs in binaries that have been deployed on different CPU architectures (e.g., x86 vs. MIPS) and can find vulnerabilities in buggy binary code for any of these architectures.
Proceedings Article
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
Johannes Krupp,Christian Rossow +1 more
TL;DR: A generic definition of vulnerable contracts is developed and used to build TEE THER, a tool that allows creating an exploit for a contract given only its binary bytecode, and performs a large-scale analysis of all 38,757 unique Ethereum contracts.