Toward automated dynamic malware analysis using cwsandbox C Willems, T Holz, F Freiling IEEE Security & Privacy 5 (2), 32-39, 2007 | 1124 | 2007 |
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. T Holz, M Steiner, F Dahl, EW Biersack, FC Freiling Leet 8 (1), 1-9, 2008 | 627 | 2008 |
Measuring and detecting fast-flux service networks. T Holz, C Gorecki, K Rieck, FC Freiling Ndss, 2008 | 535 | 2008 |
The nepenthes platform: An efficient approach to collect malware P Baecher, M Koetter, T Holz, M Dornseif, F Freiling Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006 | 528 | 2006 |
Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks FC Freiling, T Holz, G Wicherski Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005 | 488 | 2005 |
Mobile-sandbox: having a deeper look into android applications M Spreitzenbarth, F Freiling, F Echtler, T Schreck, J Hoffmann Proceedings of the 28th annual ACM symposium on applied computing, 1808-1815, 2013 | 448 | 2013 |
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms R Hund, T Holz, FC Freiling USENIX security symposium, 383-398, 2009 | 373 | 2009 |
Learning more about the underground economy: A case-study of keyloggers and dropzones T Holz, M Engelberth, F Freiling Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 341 | 2009 |
Mobile security catching up? revealing the nuts and bolts of the security of mobile devices M Becher, FC Freiling, J Hoffmann, T Holz, S Uellenbeck, C Wolf 2011 IEEE Symposium on Security and Privacy, 96-111, 2011 | 333 | 2011 |
A structured approach to anomaly detection for in-vehicle networks M Müter, A Groll, FC Freiling 2010 Sixth International Conference on Information Assurance and Security, 92-98, 2010 | 293 | 2010 |
{TRESOR} Runs Encryption Securely Outside {RAM} T Müller, FC Freiling, A Dewald 20th USENIX Security Symposium (USENIX Security 11), 2011 | 234 | 2011 |
Hardware-based trusted computing architectures for isolation and attestation P Maene, J Götzfried, R De Clercq, T Müller, F Freiling, I Verbauwhede IEEE Transactions on Computers 67 (3), 361-374, 2017 | 221 | 2017 |
Towards intrusion detection in wireless sensor networks K Ioannis, T Dimitriou, FC Freiling Proc. of the 13th European Wireless Conference, 1-10, 2007 | 207 | 2007 |
On botnets that use DNS for command and control CJ Dietrich, C Rossow, FC Freiling, H Bos, M Van Steen, N Pohlmann 2011 seventh european conference on computer network defense, 9-16, 2011 | 190 | 2011 |
Towards intrusion detection in wireless sensor networks I Krontiris, T Dimitriou, FC Freiling proceedings of the 13th European Wireless Conference, 1-4, 2007 | 176 | 2007 |
Sancus 2.0: A low-cost security architecture for iot devices J Noorman, JV Bulck, JT Mühlberg, F Piessens, P Maene, B Preneel, ... ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-33, 2017 | 174 | 2017 |
Cooperative intrusion detection in wireless sensor networks I Krontiris, Z Benenson, T Giannetsos, FC Freiling, T Dimitriou Wireless Sensor Networks: 6th European Conference, EWSN 2009, Cork, Ireland …, 2009 | 150 | 2009 |
A common process model for incident response and computer forensics FC Freiling, B Schwittay Gesellschaft für Informatik e. V., 2007 | 149 | 2007 |
Visual analysis of malware behavior using treemaps and thread graphs P Trinius, T Holz, J Göbel, FC Freiling 2009 6th International Workshop on Visualization for Cyber Security, 33-38, 2009 | 141 | 2009 |
Sandnet: Network traffic analysis of malicious software C Rossow, CJ Dietrich, H Bos, L Cavallaro, M Van Steen, FC Freiling, ... Proceedings of the First Workshop on Building Analysis Datasets and …, 2011 | 137 | 2011 |