Cyber-Threat Intelligence from European-wide Sensor Network in SISSDEN
- Montes de Oca E., Armin J., Consoli A.
- Bernabe J. B., Skarmeta A.(eds) "Challenges in Cybersecurity and Privacy - the European Research Landscape", River Publishers, Gistrup, Denmark, 2019.
- Publisher: https://www.riverpublishers.com/research_details.php?book_id=711
MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware
- Walla S., Rossow Ch.
- 4th IEEE European Symposium on Security and Privacy, 2019.
- Open access: https://publications.cispa.saarland/2922/
Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild
- Steffens M., Rossow Ch., Johns M., Stock B.
- Proceedings 2019 Network and Distributed System Security Symposium, 2019.
- Publisher: https://www.ndss-symposium.org/ndss-paper/dont-trust-the-locals-investigating-the-prevalence-of-persistent-client-side-cross-site-scripting-in-the-wild/
- Open access: https://publications.cispa.saarland/2744/
Świadomość sytuacyjna cyberzagrożeń (eng. Cyber-threat Situational Awareness)
- Kozakiewicz A.
- Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, vol. 8-9/2018, pp. 562-568, Sigma-NOT, Warsaw, Poland, 2018.
- Publisher: http://sigma-not.pl/publikacja-115483-%C5%9Bwiadomo%C5%9B%C4%87-sytuacyjna-cyberzagro%C5%BCe%C5%84-przeglad-telekomunikacyjny-2018-8-9.html
- Open access: https://zenodo.org/record/3379797
MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps
- Brengel M., Rossow Ch.
- Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2018). Lecture Notes in Computer Science, vol 10885, pp. 24-45, Springer, Cham, 2018.
- Publisher: https://link.springer.com/chapter/10.1007/978-3-319-93411-2_2
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
- Krupp J., Rossow Ch.
- 27th USENIX Security Symposium (USENIX Security 18).
- Publisher: https://www.usenix.org/conference/usenixsecurity18/presentation/krupp
- Open access: https://dl.acm.org/citation.cfm?id=3277303
Evasive Malware via Identifier Implanting
- Tanabe R., Ueno W., Ishii K., Yoshioka K., Matsumoto T., Kasama T., Inoue D., Rossow Ch.
- Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2018). Lecture Notes in Computer Science, vol 10885, pp. 162-184, Springer, Cham, 2018.
- Publisher: https://link.springer.com/chapter/10.1007%2F978-3-319-93411-2_8
- Open access: https://publications.cispa.saarland/2949/
Recurrent Neural Networks for Enhancement of Signature-based Network Intrusion Detection Systems
- Sohi, S. M., Ganji, F., Seifert, J.-P.
- arXiv.org
- Open access: http://arxiv.org/abs/1807.03212
Millions of targets under attack - a macroscopic characterization of the DoS ecosystem
- Jonker M., King A., Krupp J., Rossow Ch., Sperotto A., Dainotti A.
- Proceedings of the 2017 Internet Measurement Conference IMC '17.
- Open access: https://publications.cispa.saarland/1429/
Linking Amplification DDoS Attacks to Booter Services
- Krupp J., Karami M., Rossow C., McCoy D., Backes M.
- Dacier M., Bailey M., Polychronakis M., Antonakakis M. (eds) Research in Attacks, Intrusions, and Defenses. RAID 2017. Lecture Notes in Computer Science, vol 10453. Springer, Cham, 2017.
- Publisher: http://link.springer.com/10.1007/978-3-319-66332-6_19
- Open access: https://publications.cispa.saarland/1156/
Botnet Fingerprinting: Anomaly Detection in SMTP Conversations
- Bazydło P., Lasota K., Kozakiewicz A.
- IEEE Security & Privacy, vol. 15, no. 6, pp. 25-32, 2017.
- Publisher: http://ieeexplore.ieee.org/document/8123472/
- Open access: https://arxiv.org/abs/1903.11400
All publications available in open access, either directly from publisher or via a separate repository - links provided.