default search action
Sven Dietrich
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Choongin Lee, Isa Jafarov, Sven Dietrich, Heejo Lee:
PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering. ESORICS (2) 2024: 3-23 - 2023
- [j12]Carlos Nkuba Kayembe, Seunghoon Woo, Heejo Lee, Sven Dietrich:
ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol. IEEE Access 11: 60562-60577 (2023) - [c14]Iliès Benhabbour, Yérom-David Bromberg, Marc Dacier, Sven Dietrich, Rodrigo Seromenho Miragaia Rodrigues, Paulo Esteves Veríssimo:
Attacks on tomorrow's virtual world. DSN-S 2023: 105-110 - [i4]Sven Dietrich, Frank Kargl, Hartmut König, Pavel Laskov, Artur Hermann:
Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431). Dagstuhl Reports 13(10): 90-129 (2023) - 2022
- [j11]Carlos Nkuba Kayembe, Seulbae Kim, Sven Dietrich, Heejo Lee:
Riding the IoT Wave With VFuzz: Discovering Security Flaws in Smart Homes. IEEE Access 10: 1775-1789 (2022) - [e6]Sven Dietrich, Omar Chowdhury, Daniel Takabi:
SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8 - 10, 2022. ACM 2022, ISBN 978-1-4503-9357-7 [contents] - 2021
- [c13]Hajin Jang, Kyeongseok Yang, Geonwoo Lee, Yoonjong Na, Jeremy D. Seideman, Shoufu Luo, Heejo Lee, Sven Dietrich:
QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection. SEC 2021: 66-82 - [c12]Seunghoon Woo, Dongwook Lee, Sunghan Park, Heejo Lee, Sven Dietrich:
V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities. USENIX Security Symposium 2021: 3041-3058 - 2020
- [c11]Patrick Düssel, Shoufu Luo, Ulrich Flegel, Sven Dietrich, Michael Meier:
Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces. SADFE 2020: 22-31
2010 – 2019
- 2018
- [c10]Shoufu Luo, Jeremy D. Seideman, Sven Dietrich:
Fingerprinting Cryptographic Protocols with Key Exchange Using an Entropy Measure. IEEE Symposium on Security and Privacy Workshops 2018: 170-179 - 2017
- [j10]Sven Dietrich:
Cybersecurity and the Future. Computer 50(4): 7 (2017) - [j9]Marc Dacier, Hartmut König, Radoslaw Cwalinski, Frank Kargl, Sven Dietrich:
Security Challenges and Opportunities of Software-Defined Networking. IEEE Secur. Priv. 15(2): 96-100 (2017) - [j8]Patrick Düssel, Christian Gehl, Ulrich Flegel, Sven Dietrich, Michael Meier:
Detecting zero-day attacks using context-aware anomaly detection at the application-layer. Int. J. Inf. Sec. 16(5): 475-490 (2017) - [i3]Shoufu Luo, Sven Dietrich:
Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure. CoRR abs/1712.05908 (2017) - 2016
- [c9]Sven Dietrich, Michael Brenner, Katharina Krombholz:
Who Are You Now? Fading to Multiple Personas. WAY@SOUPS 2016 - [i2]Marc Dacier, Sven Dietrich, Frank Kargl, Hartmut König:
Network Attack Detection and Defense (Dagstuhl Seminar 16361). Dagstuhl Reports 6(9): 1-28 (2016) - 2014
- [c8]Sven Dietrich, Jeroen van der Ham, Aiko Pras, Roland van Rijswijk-Deij, Darren Shou, Anna Sperotto, Aimee van Wynsberghe, Lenore D. Zuck:
Ethics in Data Sharing: Developing a Model for Best Practice. IEEE Symposium on Security and Privacy Workshops 2014: 5-9 - [e5]Sven Dietrich:
Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings. Lecture Notes in Computer Science 8550, Springer 2014, ISBN 978-3-319-08508-1 [contents] - 2013
- [c7]Volker Roth, Benjamin Güldenring, Eleanor Gilbert Rieffel, Sven Dietrich, Lars Ries:
A Secure Submission System for Online Whistleblowing Platforms. Financial Cryptography 2013: 354-361 - [i1]Volker Roth, Benjamin Güldenring, Eleanor Gilbert Rieffel, Sven Dietrich, Lars Ries:
A Secure Submission System for Online Whistleblowing Platforms. CoRR abs/1301.6263 (2013) - 2012
- [j7]Lionel Rivière, Sven Dietrich:
Experiments with P2P Botnet Detection. it Inf. Technol. 54(2): 90-95 (2012) - [e4]George Danezis, Sven Dietrich, Kazue Sako:
Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7126, Springer 2012, ISBN 978-3-642-29888-2 [contents] - [e3]Jim Blythe, Sven Dietrich, L. Jean Camp:
Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7398, Springer 2012, ISBN 978-3-642-34637-8 [contents] - 2011
- [j6]David Dittrich, Michael D. Bailey, Sven Dietrich:
Building an Active Computer Security Ethics Community. IEEE Secur. Priv. 9(4): 32-40 (2011) - [c6]Theodore Reed, Joseph Geis, Sven Dietrich:
SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster. WOOT 2011: 28-36 - 2010
- [c5]Baris Coskun, Sven Dietrich, Nasir D. Memon:
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. ACSAC 2010: 131-140 - [c4]Sven Dietrich:
WECSR Preface. Financial Cryptography Workshops 2010: 195 - [e2]Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé:
Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6054, Springer 2010, ISBN 978-3-642-14991-7 [contents]
2000 – 2009
- 2008
- [c3]David Dittrich, Sven Dietrich:
P2P as botnet command and control: A deeper insight. MALWARE 2008: 41-48 - [e1]Sven Dietrich, Rachna Dhamija:
Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers. Lecture Notes in Computer Science 4886, Springer 2008, ISBN 978-3-540-77365-8 [contents] - 2007
- [j5]David Dittrich, Sven Dietrich:
Command and Control Structures in Malware: From Handler/Agent to P2P. login Usenix Mag. 32(6) (2007) - [j4]Sam Stover, David Dittrich, John Hernandez, Sven Dietrich:
Analysis of the Storm and Nugache Trojans: P2P Is Here. login Usenix Mag. 32(6) (2007) - [c2]Robert C. Seacord, Sven Dietrich, Daniel Plakosh:
Secure Software Architecture, Design, Implementation and Assurance. HICSS 2007: 279 - 2002
- [j3]Sven Dietrich:
Active Network Defense: Some Concepts and Techniques. login Usenix Mag. 27(6) (2002) - 2001
- [j2]Sven Dietrich:
Survivability with a Twist. login Usenix Mag. 26(7) (2001) - 2000
- [j1]Sven Dietrich:
Scalpel, Gauze, and Decompilers. login Usenix Mag. 25(7) (2000) - [c1]Sven Dietrich, Neil Long, David Dittrich:
Analyzing Distributed Denial of Service Tools: The Shaft Case. LISA 2000: 329-339
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint