Follow
Daniel Plohmann
Daniel Plohmann
Verified email at fkie.fraunhofer.de - Homepage
Title
Cited by
Cited by
Year
A Comprehensive Measurement Study of Domain Generating Malware.
D Plohmann, K Yakdan, M Klatt, J Bader, E Gerhards-Padilla
USENIX Security Symposium 10 (3241094.3241115), 2016
2512016
Sok: P2pwned-modeling and evaluating the resilience of peer-to-peer botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
2013 IEEE symposium on security and privacy, 97-111, 2013
2312013
Highly resilient peer-to-peer botnets are here: An analysis of gameover zeus
D Andriesse, C Rossow, B Stone-Gross, D Plohmann, H Bos
2013 8th International Conference on Malicious and Unwanted Software:" The …, 2013
1492013
Case study of the miner botnet
D Plohmann, E Gerhards-Padilla
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-16, 2012
992012
" If you want, I can store the encrypted password" A Password-Storage Field Study with Freelance Developers
A Naiakshina, A Danilova, E Gerlitz, E Von Zezschwitz, M Smith
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
622019
Botnets: Detection, measurement, disinfection & defence
D Plohmann, E Gerhards-Padilla, F Leder
European Network and Information Security Agency (ENISA) 1 (1), 1-153, 2011
602011
Malpedia: a collaborative effort to inventorize the malware landscape
D Plohmann, M Clauss, S Enders, E Padilla
Proceedings of the Botconf, 2017
402017
Botnets: Detection, measurement, disinfection and defence
G Hogben, D Plohmann, E Gerhards-Padilla, F Leder
European Network and Information Security Agency, 2011
332011
DGArchive
D Plohmann
Fraunhofer FKIE.[Online]. Available: https://dgarchive. caad. fkie …, 2018
182018
Extending The Sleuth Kit and its underlying model for pooled storage file system forensic analysis
JN Hilgert, M Lambertz, D Plohmann
Digital Investigation 22, S76-S85, 2017
132017
Botnets: measurement, detection, disinfection and defence
D Plohmann, E Gerhards-Padilla, F Leder
ENISA workshop on, 2011
132011
Android security-common attack vectors
P Schulz, D Plohmann
Rheinische Friedrich-Wilhelms-Universitat Bönn, Germany, Tech. Rep, 2012
112012
DGAArchive–A deep dive into domain generating malware
D Plohmann
Dec-2015, 2015
62015
Patterns of a cooperative malware analysis workflow
D Plohmann, S Eschweiler, E Gerhards-Padilla
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-18, 2013
62013
YARA-Signator: Automated Generation of Code-based YARA Rules
F Bilstein, D Plohmann
The Journal on Cybercrime & Digital Investigations 5 (1), 1-13, 2019
22019
Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281)
S Zennou, SK Debray, T Dullien, A Lakhothia
Dagstuhl Reports 7 (7), 2018
22018
Patchwork: Stitching against malware families with IDA Pro
D Plohmann
9. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 7, 2014
22014
Malware and botnet analysis methodology
D Plohmann, E Gerhards-Padilla
ERCIM News, 2012
22012
AntiRE-An Executable Collection of Anti-Reversing Techniques
D Plohmann, C Kannen
7. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 23, 2012
22012
simpliFiRE. IDAscope
D Plohmann, A Hanel
Hacklu, 2012
22012
The system can't perform the operation now. Try again later.
Articles 1–20