Follow
Daniel Plohmann
Daniel Plohmann
Verified email at fkie.fraunhofer.de - Homepage
Title
Cited by
Cited by
Year
A comprehensive measurement study of domain generating malware
D Plohmann, K Yakdan, M Klatt, J Bader, E Gerhards-Padilla
25th USENIX Security Symposium (USENIX Security 16), 263-278, 2016
3002016
Sok: P2pwned-modeling and evaluating the resilience of peer-to-peer botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
2013 IEEE symposium on security and privacy, 97-111, 2013
2392013
Highly resilient peer-to-peer botnets are here: An analysis of gameover zeus
D Andriesse, C Rossow, B Stone-Gross, D Plohmann, H Bos
2013 8th International Conference on Malicious and Unwanted Software:" The …, 2013
1592013
Case study of the miner botnet
D Plohmann, E Gerhards-Padilla
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-16, 2012
1052012
" If you want, I can store the encrypted password" A Password-Storage Field Study with Freelance Developers
A Naiakshina, A Danilova, E Gerlitz, E Von Zezschwitz, M Smith
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
932019
Botnets: Detection, measurement, disinfection & defence
D Plohmann, E Gerhards-Padilla, F Leder
European Network and Information Security Agency (ENISA) 1 (1), 1-153, 2011
612011
Malpedia: a collaborative effort to inventorize the malware landscape
D Plohmann, M Clauss, S Enders, E Padilla
Proceedings of the Botconf, 2017
512017
Botnets: Detection, measurement, disinfection and defence
G Hogben, D Plohmann, E Gerhards-Padilla, F Leder
European Network and Information Security Agency, 2011
342011
DGArchive
D Plohmann
Fraunhofer FKIE.[Online]. Available: https://dgarchive. caad. fkie …, 2018
212018
Extending The Sleuth Kit and its underlying model for pooled storage file system forensic analysis
JN Hilgert, M Lambertz, D Plohmann
Digital Investigation 22, S76-S85, 2017
162017
Botnets: measurement, detection, disinfection and defence
D Plohmann, E Gerhards-Padilla, F Leder
ENISA workshop on, 2011
122011
Android security-common attack vectors
P Schulz, D Plohmann
Rheinische Friedrich-Wilhelms-Universitat Bönn, Germany, Tech. Rep, 2012
112012
DGAArchive–A deep dive into domain generating malware
D Plohmann
Dec-2015, 2015
72015
YARA-Signator: Automated Generation of Code-based YARA Rules
F Bilstein, D Plohmann
The Journal on Cybercrime & Digital Investigations 5 (1), 1-13, 2019
62019
Patterns of a cooperative malware analysis workflow
D Plohmann, S Eschweiler, E Gerhards-Padilla
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-18, 2013
62013
ApiScout: Robust Windows API Usage Recovery for Malware Characterization and Similarity Analysis
D Plohmann, S Enders, E Padilla
The Journal on Cybercrime & Digital Investigations 4, 2018
42018
RoAMer: The Robust Automated Malware Unpacker
T Jenke, D Plohmann, E Padilla
Proceedings of 14th International Conference on Malicious and Unwanted …, 2019
32019
Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281)
S Zennou, SK Debray, T Dullien, A Lakhothia
Dagstuhl Reports 7 (7), 2018
32018
SimpliFiRE. IDAScope
D Plohmann, A Hanel
Hacklu Briefings, 2012
32012
Patchwork: Stitching against malware families with IDA Pro
D Plohmann
9. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 7, 2014
22014
The system can't perform the operation now. Try again later.
Articles 1–20