C. Dörr
71 records found
1
Authored
Clustering Payloads
Grouping Randomized Scan Probes Into Campaign Templates
Inside the Matrix
CTI Frameworks as Partial Abstractions of Complex Threats
Scan, Test, Execute
Adversarial Tactics in Amplification DDoS Attacks
Amplification attacks generate an enormous flood of unwanted traffic towards a victim and are generated with the help of open, unsecured services, to which an adversary sends spoofed service requests that trigger large answer volumes to a victim. However, the actual execution ...
Compare Before You Buy
Privacy-Preserving Selection of Threat Intelligence Providers
Cyber Security Threats to Bitcoin Exchanges
Adversary Exploitation and Laundering Techniques
Bitcoin is gaining traction as an alternative store of value. Its market capitalization transcends all other cryptocurrencies in the market. But its high monetary value also makes it an attractive target to cyber criminal actors. Hacking campaigns usually target an ecosystem's ...
From Hodl to Heist
Analysis of Cyber Security Threats to Bitcoin Exchanges
Bitcoin is gaining traction as an alternative store of value. Its market capitalization transcends all other cryptocurrencies in the market. But its high monetary value also makes it an attractive target to cyber criminal actors. Hacking campaigns usually target the weakest po ...
IMDfence
Architecting a Secure Protocol for Implantable Medical Devices
SoK
ATT&CK techniques and trends in windows malware
In an ever-changing landscape of adversary tactics, techniques and procedures (TTPs), malware remains the tool of choice for attackers to gain a foothold on target systems. The Mitre ATT&CK framework is a taxonomy of adversary TTPs. It is meant to advance cyber threat inte ...
Malware Coordination using the Blockchain
An Analysis of the Cerber Ransomware
How Media Reports Trigger Copycats
An Analysis of the Brewing of the Largest Packet Storm to Date
Contributed
Inadvertently Making Cybercriminals Rich
A Comprehensive Study of Cryptojacking Campaigns at Internet Scale
Opening Pandora’s Box
Charting the ecosystem of Command and Control infrastructures in a terabit-scale network
An Analysis of Deep Learning Based Profiled Side-channel Attacks
Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings
Clusus
A cyber range for network attack simulations
Android App Tracking
Investigating the feasibility of tracking user behavior on mobile phones by analyzing encrypted network traffic
Detecting BGP Origin Hijacks
Using a filter-based approach
Extending Honeytrap with Lua scripting
Honeytrap LUA implementation
Investigating current state Security of OpenFlow Networks
Focusing on the control-data plane communications
The decoupling of this data plane and control plane, there is need ...