What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Christian Rossow
Google Scholar
47
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
KeyVisor - A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies.
Fabian Schwarz
Jan Philipp Thoma
Christian Rossow
Tim Güneysu
2025
conf/ndss
Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting.
Leon Trampert
Daniel Weber
Lukas Gerlach
Christian Rossow
Michael Schwarz
2025
conf/esorics
NICraft: Malicious NIC Firmware-Based Cache Side-Channel Attack.
Amit Choudhari
Shorya Kumar
Christian Rossow
2025
conf/uss
Await() a Second: Evading Control Flow Integrity by Hijacking C++ Coroutines.
Marcos Bajo
Christian Rossow
2024
conf/uss
00SEVen - Re-enabling Virtual Machine Forensics: Introspecting Confidential VMs Using Privileged in-VM Agents.
Fabian Schwarz
Christian Rossow
2024
conf/uss
Loopy Hell(ow): Infinite Traffic Loops at the Application Layer.
Yepeng Pan
Anna Ascheman
Christian Rossow
2024
conf/sp
TCP Spoofing: Reliable Payload Transmission Past the Spoofed TCP Handshake.
Yepeng Pan
Christian Rossow
2024
conf/asiaccs
Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8.
Lorenz Hetterich
Markus Bauer
Michael Schwarz
Christian Rossow
2023
conf/ccs
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers.
Till Schlüter
Amit Choudhari
Lorenz Hetterich
Leon Trampert
Hamed Nemati
Ahmad Ibrahim
Michael Schwarz
Christian Rossow
Nils Ole Tippenhauer
2023
conf/eurosp
Anomaly-based Filtering of Application-Layer DDoS Against DNS Authoritatives.
Jonas Bushart
Christian Rossow
2023
conf/esorics
ResolFuzz: Differential Fuzzing of DNS Resolvers.
Jonas Bushart
Christian Rossow
2022
conf/ccs
FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs.
Fabian Schwarz
Khue Do
Gunnar Heide
Lucjan Hanzlik
Christian Rossow
2022
conf/ccs
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels.
Ahmad Ibrahim
Hamed Nemati
Till Schlüter
Nils Ole Tippenhauer
Christian Rossow
2022
conf/uss
AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities.
Johannes Krupp
Ilya Grishchenko
Christian Rossow
2022
conf/esorics
Browser-Based CPU Fingerprinting.
Leon Trampert
Christian Rossow
Michael Schwarz
2022
conf/acsac
TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation.
Markus Bauer
Ilya Grishchenko
Christian Rossow
2021
conf/uss
YARIX: Scalable YARA-based Malware Intelligence.
Michael Brengel
Christian Rossow
2021
conf/uss
Osiris: Automated Discovery of Microarchitectural Side Channels.
Daniel Weber
Ahmad Ibrahim
Hamed Nemati
Michael Schwarz
Christian Rossow
2021
conf/eurosp
BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks.
Johannes Krupp
Christian Rossow
2021
conf/eurosp
NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable Hijacking.
Markus Bauer
Christian Rossow
2021
conf/asiaccs
Cali: Compiler-Assisted Library Isolation.
Markus Bauer
Christian Rossow
2020
conf/uss
Slitheen++: Stealth TLS-based Decoy Routing.
Benedikt Birtel
Christian Rossow
2020
conf/uss
SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients.
Fabian Schwarz
Christian Rossow
2020
conf/uss
Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNS.
Jonas Bushart
Christian Rossow
2020
conf/acsac
DPIFuzz: A Differential Fuzzing Framework to Detect DPI Elusion Strategies for QUIC.
Gaganjeet Singh Reen
Christian Rossow
2019
conf/eurosp
MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware.
Walla Sebastian
Christian Rossow
2019
conf/ndss
Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
Marius Steffens
Christian Rossow
Martin Johns
Ben Stock
2018
conf/ccs
ret2spec: Speculative Execution Using Return Stack Buffers.
Giorgi Maisuradze
Christian Rossow
2018
conf/uss
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts.
Johannes Krupp
Christian Rossow
2018
conf/sp
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
Marten Oltrogge
Erik Derr
Christian Stransky
Yasemin Acar
Sascha Fahl
Christian Rossow
Giancarlo Pellegrino
Sven Bugiel
Michael Backes
2018
conf/ndss
Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications.
Ben Stock
Giancarlo Pellegrino
Frank Li
Michael Backes
Christian Rossow
2017
conf/ccs
Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
Giancarlo Pellegrino
Martin Johns
Simon Koch
Michael Backes
Christian Rossow
2017
conf/ndss
Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.
Giorgi Maisuradze
Michael Backes
Christian Rossow
2016
conf/ccs
Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks.
Johannes Krupp
Michael Backes
Christian Rossow
2016
conf/ccs
POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications.
Ben Stock
Giancarlo Pellegrino
Christian Rossow
Martin Johns
Michael Backes
2016
conf/uss
What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
Giorgi Maisuradze
Michael Backes
Christian Rossow
2016
conf/uss
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
Ben Stock
Giancarlo Pellegrino
Christian Rossow
Martin Johns
Michael Backes
2016
conf/ches
- vatiCAN - Vetted, Authenticated CAN Bus.
Stefan Nürnberger
Christian Rossow
2015
conf/ccs
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
Michael Backes
Simon Koch
Sebastian Meiser
Esfandiar Mohammadi
Christian Rossow
2015
conf/sp
Cross-Architecture Bug Search in Binary Executables.
Jannik Pewny
Behrad Garmany
Robert Gawlik
Christian Rossow
Thorsten Holz
2014
conf/uss
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
Marc Kührer
Thomas Hupperich
Christian Rossow
Thorsten Holz
2014
conf/fc
On the (In)Security of Mobile Two-Factor Authentication.
Alexandra Dmitrienko
Christopher Liebchen
Christian Rossow
Ahmad-Reza Sadeghi
2014
conf/ndss
Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
Christian Rossow
2014
conf/acsac
Leveraging semantic signatures for bug search in binary programs.
Jannik Pewny
Felix Schuster
Lukas Bernhard
Thorsten Holz
Christian Rossow
2013
conf/sp
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets.
Christian Rossow
Dennis Andriesse
Tillmann Werner
Brett Stone-Gross
Daniel Plohmann
Christian J. Dietrich
Herbert Bos
2012
conf/ccs
Manufacturing compromise: the emergence of exploit-as-a-service.
Chris Grier
Lucas Ballard
Juan Caballero
Neha Chachra
Christian J. Dietrich
Kirill Levchenko
Panayiotis Mavrommatis
Damon McCoy
Antonio Nappa
Andreas Pitsillidis
Niels Provos
M. Zubair Rafique
Moheeb Abu Rajab
Christian Rossow
Kurt Thomas
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
2012
conf/sp
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook.
Christian Rossow
Christian J. Dietrich
Chris Grier
Christian Kreibich
Vern Paxson
Norbert Pohlmann
Herbert Bos
Maarten van Steen
Coauthors
Ahmad Ibrahim
(3)
Ahmad-Reza Sadeghi
(1)
Alexandra Dmitrienko
(1)
Amit Choudhari
(2)
Andreas Pitsillidis
(1)
Anna Ascheman
(1)
Antonio Nappa
(1)
Behrad Garmany
(1)
Ben Stock
(4)
Benedikt Birtel
(1)
Brett Stone-Gross
(1)
Chris Grier
(2)
Christian J. Dietrich
(3)
Christian Kreibich
(1)
Christian Rossow
(47)
Christian Stransky
(1)
Christopher Liebchen
(1)
Damon McCoy
(1)
Daniel Plohmann
(1)
Daniel Weber
(2)
Dennis Andriesse
(1)
Erik Derr
(1)
Esfandiar Mohammadi
(1)
Fabian Schwarz
(4)
Felix Schuster
(1)
Frank Li
(1)
Gaganjeet Singh Reen
(1)
Geoffrey M. Voelker
(1)
Giancarlo Pellegrino
(5)
Giorgi Maisuradze
(3)
Gunnar Heide
(1)
Hamed Nemati
(3)
Herbert Bos
(2)
Ilya Grishchenko
(2)
Jan Philipp Thoma
(1)
Jannik Pewny
(2)
Johannes Krupp
(4)
Jonas Bushart
(3)
Juan Caballero
(1)
Khue Do
(1)
Kirill Levchenko
(1)
Kurt Thomas
(1)
Leon Trampert
(3)
Lorenz Hetterich
(2)
Lucas Ballard
(1)
Lucjan Hanzlik
(1)
Lukas Bernhard
(1)
Lukas Gerlach
(1)
M. Zubair Rafique
(1)
Maarten van Steen
(1)
Marc Kührer
(1)
Marcos Bajo
(1)
Marius Steffens
(1)
Markus Bauer
(4)
Marten Oltrogge
(1)
Martin Johns
(4)
Michael Backes
(9)
Michael Brengel
(1)
Michael Schwarz
(5)
Moheeb Abu Rajab
(1)
Neha Chachra
(1)
Niels Provos
(1)
Nils Ole Tippenhauer
(2)
Norbert Pohlmann
(1)
Panayiotis Mavrommatis
(1)
Robert Gawlik
(1)
Sascha Fahl
(1)
Sebastian Meiser
(1)
Shorya Kumar
(1)
Simon Koch
(2)
Stefan Nürnberger
(1)
Stefan Savage
(1)
Sven Bugiel
(1)
Thomas Hupperich
(1)
Thorsten Holz
(3)
Till Schlüter
(2)
Tillmann Werner
(1)
Tim Güneysu
(1)
Vern Paxson
(2)
Walla Sebastian
(1)
Yasemin Acar
(1)
Yepeng Pan
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to