Christian Rossow

Google Scholar
47 publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting.
2025
conf/uss
Await() a Second: Evading Control Flow Integrity by Hijacking C++ Coroutines.
Marcos Bajo Christian Rossow
2024
conf/uss
00SEVen - Re-enabling Virtual Machine Forensics: Introspecting Confidential VMs Using Privileged in-VM Agents.
Fabian Schwarz Christian Rossow
2024
conf/uss
Loopy Hell(ow): Infinite Traffic Loops at the Application Layer.
Yepeng Pan Anna Ascheman Christian Rossow
2022
conf/uss
AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities.
Johannes Krupp Ilya Grishchenko Christian Rossow
2021
conf/uss
YARIX: Scalable YARA-based Malware Intelligence.
Michael Brengel Christian Rossow
2021
conf/uss
Osiris: Automated Discovery of Microarchitectural Side Channels.
2021
conf/asiaccs
2020
conf/uss
Slitheen++: Stealth TLS-based Decoy Routing.
Benedikt Birtel Christian Rossow
2020
conf/uss
SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients.
Fabian Schwarz Christian Rossow
2020
conf/uss
Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNS.
Jonas Bushart Christian Rossow
2019
conf/ndss
Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
2018
conf/uss
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts.
Johannes Krupp Christian Rossow
2018
conf/ndss
Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications.
2017
conf/ndss
Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.
2016
conf/uss
What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
2016
conf/uss
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
2014
conf/uss
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
2014
conf/ndss
Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
Christian Rossow

Coauthors

Ahmad Ibrahim (3)
Ahmad-Reza Sadeghi (1)
Alexandra Dmitrienko (1)
Amit Choudhari (2)
Andreas Pitsillidis (1)
Anna Ascheman (1)
Antonio Nappa (1)
Behrad Garmany (1)
Ben Stock (4)
Benedikt Birtel (1)
Brett Stone-Gross (1)
Chris Grier (2)
Christian J. Dietrich (3)
Christian Kreibich (1)
Christian Rossow (47)
Christian Stransky (1)
Christopher Liebchen (1)
Damon McCoy (1)
Daniel Plohmann (1)
Daniel Weber (2)
Dennis Andriesse (1)
Erik Derr (1)
Esfandiar Mohammadi (1)
Fabian Schwarz (4)
Felix Schuster (1)
Frank Li (1)
Gaganjeet Singh Reen (1)
Geoffrey M. Voelker (1)
Giancarlo Pellegrino (5)
Giorgi Maisuradze (3)
Gunnar Heide (1)
Hamed Nemati (3)
Herbert Bos (2)
Ilya Grishchenko (2)
Jan Philipp Thoma (1)
Jannik Pewny (2)
Johannes Krupp (4)
Jonas Bushart (3)
Juan Caballero (1)
Khue Do (1)
Kirill Levchenko (1)
Kurt Thomas (1)
Leon Trampert (3)
Lorenz Hetterich (2)
Lucas Ballard (1)
Lucjan Hanzlik (1)
Lukas Bernhard (1)
Lukas Gerlach (1)
M. Zubair Rafique (1)
Maarten van Steen (1)
Marc Kührer (1)
Marcos Bajo (1)
Marius Steffens (1)
Markus Bauer (4)
Marten Oltrogge (1)
Martin Johns (4)
Michael Backes (9)
Michael Brengel (1)
Michael Schwarz (5)
Moheeb Abu Rajab (1)
Neha Chachra (1)
Niels Provos (1)
Nils Ole Tippenhauer (2)
Norbert Pohlmann (1)
Panayiotis Mavrommatis (1)
Robert Gawlik (1)
Sascha Fahl (1)
Sebastian Meiser (1)
Shorya Kumar (1)
Simon Koch (2)
Stefan Nürnberger (1)
Stefan Savage (1)
Sven Bugiel (1)
Thomas Hupperich (1)
Thorsten Holz (3)
Till Schlüter (2)
Tillmann Werner (1)
Tim Güneysu (1)
Vern Paxson (2)
Walla Sebastian (1)
Yasemin Acar (1)
Yepeng Pan (2)
Filters
Years:  to