Follow
Felix Freiling
Title
Cited by
Cited by
Year
Toward automated dynamic malware analysis using cwsandbox
C Willems, T Holz, F Freiling
IEEE Security & Privacy 5 (2), 32-39, 2007
11112007
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm.
T Holz, M Steiner, F Dahl, EW Biersack, FC Freiling
Leet 8 (1), 1-9, 2008
6252008
Measuring and detecting fast-flux service networks.
T Holz, C Gorecki, K Rieck, FC Freiling
Ndss, 2008
5302008
The nepenthes platform: An efficient approach to collect malware
P Baecher, M Koetter, T Holz, M Dornseif, F Freiling
Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006
5242006
Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
FC Freiling, T Holz, G Wicherski
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
4842005
Mobile-sandbox: having a deeper look into android applications
M Spreitzenbarth, F Freiling, F Echtler, T Schreck, J Hoffmann
Proceedings of the 28th annual ACM symposium on applied computing, 1808-1815, 2013
4412013
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
R Hund, T Holz, FC Freiling
USENIX security symposium, 383-398, 2009
3712009
Learning more about the underground economy: A case-study of keyloggers and dropzones
T Holz, M Engelberth, F Freiling
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
3362009
Mobile security catching up? revealing the nuts and bolts of the security of mobile devices
M Becher, FC Freiling, J Hoffmann, T Holz, S Uellenbeck, C Wolf
2011 IEEE Symposium on Security and Privacy, 96-111, 2011
3312011
A structured approach to anomaly detection for in-vehicle networks
M Müter, A Groll, FC Freiling
2010 Sixth International Conference on Information Assurance and Security, 92-98, 2010
2852010
{TRESOR} Runs Encryption Securely Outside {RAM}
T Müller, FC Freiling, A Dewald
20th USENIX Security Symposium (USENIX Security 11), 2011
2312011
Hardware-based trusted computing architectures for isolation and attestation
P Maene, J Götzfried, R De Clercq, T Müller, F Freiling, I Verbauwhede
IEEE Transactions on Computers 67 (3), 361-374, 2017
2122017
Towards intrusion detection in wireless sensor networks
K Ioannis, T Dimitriou, FC Freiling
Proc. of the 13th European Wireless Conference, 1-10, 2007
2062007
On botnets that use DNS for command and control
CJ Dietrich, C Rossow, FC Freiling, H Bos, M Van Steen, N Pohlmann
2011 seventh european conference on computer network defense, 9-16, 2011
1852011
Towards intrusion detection in wireless sensor networks
I Krontiris, T Dimitriou, FC Freiling
Proceedings of the 13th European Wireless Conference, 1-4, 2007
1722007
Sancus 2.0: A low-cost security architecture for iot devices
J Noorman, JV Bulck, JT Mühlberg, F Piessens, P Maene, B Preneel, ...
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-33, 2017
1642017
Cooperative intrusion detection in wireless sensor networks
I Krontiris, Z Benenson, T Giannetsos, FC Freiling, T Dimitriou
Wireless Sensor Networks: 6th European Conference, EWSN 2009, Cork, Ireland …, 2009
1492009
A common process model for incident response and computer forensics
FC Freiling, B Schwittay
Gesellschaft für Informatik e. V., 2007
1452007
Visual analysis of malware behavior using treemaps and thread graphs
P Trinius, T Holz, J Göbel, FC Freiling
2009 6th International Workshop on Visualization for Cyber Security, 33-38, 2009
1372009
Sandnet: Network traffic analysis of malicious software
C Rossow, CJ Dietrich, H Bos, L Cavallaro, M Van Steen, FC Freiling, ...
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
1332011
The system can't perform the operation now. Try again later.
Articles 1–20