Elmar Gerhards-Padilla

Affiliations:
  • Hochschule Bonn-Rhein-Sieg, Sankt Augustin, Germany


According to our database1, Elmar Gerhards-Padilla authored at least 42 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms.
CoRR, 2023

Towards Generic Malware Unpacking: A Comprehensive Study on the Unpacking Behavior of Malicious Run-Time Packers.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

XLab-UUV - A Virtual Testbed for Extra-Large Uncrewed Underwater Vehicles.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

A Measurement Study on Interprocess Code Propagation of Malicious Software.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

Comprehensively Analyzing the Impact of Cyberattacks on Power Grids.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
dewolf: Improving Decompilation by leveraging User Surveys.
CoRR, 2022

Keeping the Baddies Out and the Bridge Calm: Embedded Authentication for Maritime Networks.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

2021
PIdARCI: Using Assembly Instruction Patterns to Identify, Annotate, and Revert Compiler Idioms.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

2017
Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
A Comprehensive Measurement Study of Domain Generating Malware.
Proceedings of the 25th USENIX Security Symposium, 2016

Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
BotWatcher - Transparent and Generic Botnet Tracking.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

Host-based code injection attacks: A popular technique used by malware.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

Bee Master: Detecting Host-Based Code Injection Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

2013
REcompile: A decompilation framework for static analysis of binaries.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

Resurrection: A Carver for Fragmented Files.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

Patterns of a cooperative malware analysis workflow.
Proceedings of the 5th International Conference on Cyber Conflict, 2013

Botnets.
Springer Briefs in Cybersecurity, Springer, ISBN: 978-1-4471-5216-3, 2013

2012
TOGBAD: ein Verfahren zur Erkennung von Routingangriffen in taktischen multi-hop Netzen.
PhD thesis, 2012

Current Botnet-Techniques and Countermeasures.
Prax. Inf.verarb. Kommun., 2012

Platform-Independent Recognition of Procedures in Binaries Based on Simple Characteristics.
it Inf. Technol., 2012

Malware and Botnet Analysis Methodology.
ERCIM News, 2012

A Scalable Approach for a Distributed Network of Attack Sensors.
ERCIM News, 2012

PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

CIS: The Crypto Intelligence System for automatic detection and localization of cryptographic functions in current malware.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012

Applicability of crypto-based security approaches in tactical wireless multi-hop networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Using Infection Markers as a Vaccine against Malware Attacks.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

Towards Sound Forensic Acquisition of Volatile Data.
Proceedings of the Future Security - 7th Security Research Conference, 2012

Case study of the Miner Botnet.
Proceedings of the 4th International Conference on Cyber Conflict, 2012

2011
TOGBAD - an approach to detect routing attacks in tactical environments.
Secur. Commun. Networks, 2011

Wormhole Detection using Topology Graph based Anomaly Detection (TOGBAD).
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2011

TOGBAD-LQ - Using Challenge-Response to Detect Fake Link Qualities.
Proceedings of the 17th GI/ITG Conference on Communication in Distributed Systems, 2011

2010
BonnMotion: a mobility scenario generation and analysis tool.
Proceedings of the 3rd International Conference on Simulation Tools and Techniques, 2010

Simulative Evaluation of Adaptive Jamming Detection in Wireless Multi-hop Networks.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

2009
Modeling mobility in disaster area scenarios.
Perform. Evaluation, 2009

Nebula - generating syntactical network intrusion signatures.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

2007
Methodologies and frameworks for testing ids in adhoc networks.
Proceedings of the Q2SWinet'07, 2007

Modelling mobility in disaster area scenarios.
Proceedings of the 10th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2007

Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007


  Loading...