default search action
Elmar Gerhards-Padilla
Person information
- affiliation: Hochschule Bonn-Rhein-Sieg, Sankt Augustin, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i6]René Helmke, Elmar Padilla, Nils Aschenbruck:
Corpus Christi: Establishing Replicability when Sharing the Bread is Not Allowed. CoRR abs/2404.11977 (2024) - 2023
- [c31]Lennart Bader, Martin Serror, Olav Lamberts, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, Martin Henze:
Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. EuroS&P 2023: 1065-1081 - [c30]Thorsten Jenke, Simon Liessem, Elmar Padilla, Lilli Bruckschen:
A Measurement Study on Interprocess Code Propagation of Malicious Software. ICDF2C (2) 2023: 264-282 - [c29]Konrad Wolsing, Antoine Saillard, Elmar Padilla, Jan Bauer:
XLab-UUV - A Virtual Testbed for Extra-Large Uncrewed Underwater Vehicles. LCN 2023: 1-6 - [c28]Thorsten Jenke, Elmar Padilla, Lilli Bruckschen:
Towards Generic Malware Unpacking: A Comprehensive Study on the Unpacking Behavior of Malicious Run-Time Packers. NordSec 2023: 245-262 - [i5]Nils Weissgerber, Thorsten Jenke, Elmar Padilla, Lilli Bruckschen:
Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms. CoRR abs/2301.05048 (2023) - [i4]Lennart Bader, Martin Serror, Olav Lamberts, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, Martin Henze:
Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. CoRR abs/2305.09390 (2023) - 2022
- [c27]Lucca Ruhland, Mari Schmidt, Jan Bauer, Elmar Padilla:
Keeping the Baddies Out and the Bridge Calm: Embedded Authentication for Maritime Networks. ISNCC 2022: 1-6 - [i3]Steffen Enders, Eva-Maria C. Behner, Niklas Bergmann, Mariia Rybalka, Elmar Padilla, Er Xue Hui, Henry Low, Nicholas Sim:
dewolf: Improving Decompilation by leveraging User Surveys. CoRR abs/2205.06719 (2022) - 2021
- [c26]Steffen Enders, Mariia Rybalka, Elmar Padilla:
PIdARCI: Using Assembly Instruction Patterns to Identify, Annotate, and Revert Compiler Idioms. PST 2021: 1-7
2010 – 2019
- 2017
- [c25]Thomas Barabosch, Niklas Bergmann, Adrian Dombeck, Elmar Padilla:
Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps. DIMVA 2017: 209-229 - 2016
- [c24]Sebastian Eschweiler, Khaled Yakdan, Elmar Gerhards-Padilla:
discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code. NDSS 2016 - [c23]Khaled Yakdan, Sergej Dechand, Elmar Gerhards-Padilla, Matthew Smith:
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study. IEEE Symposium on Security and Privacy 2016: 158-177 - [c22]Daniel Plohmann, Khaled Yakdan, Michael Klatt, Johannes Bader, Elmar Gerhards-Padilla:
A Comprehensive Measurement Study of Domain Generating Malware. USENIX Security Symposium 2016: 263-278 - 2015
- [c21]Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla, Matthew Smith:
No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations. NDSS 2015 - [c20]Thomas Barabosch, Adrian Dombeck, Khaled Yakdan, Elmar Gerhards-Padilla:
BotWatcher - Transparent and Generic Botnet Tracking. RAID 2015: 565-587 - 2014
- [c19]Thomas Barabosch, Sebastian Eschweiler, Elmar Gerhards-Padilla:
Bee Master: Detecting Host-Based Code Injection Attacks. DIMVA 2014: 235-254 - [c18]Thomas Barabosch, Elmar Gerhards-Padilla:
Host-based code injection attacks: A popular technique used by malware. MALWARE 2014: 8-17 - [c17]Viviane Zwanger, Elmar Gerhards-Padilla, Michael Meier:
Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files. MALWARE 2014: 118-127 - 2013
- [b2]Heli Tiirmaa-Klaar, Jan Gassen, Elmar Gerhards-Padilla, Peter Martini:
Botnets. Springer Briefs in Cybersecurity, Springer 2013, ISBN 978-1-4471-5215-6, pp. I-VIII, 1-97 - [c16]Daniel Plohmann, Sebastian Eschweiler, Elmar Gerhards-Padilla:
Patterns of a cooperative malware analysis workflow. CyCon 2013: 1-18 - [c15]Martin Lambertz, Rafael Uetz, Elmar Gerhards-Padilla:
Resurrection: A Carver for Fragmented Files. ICDF2C 2013: 51-66 - [c14]Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla:
REcompile: A decompilation framework for static analysis of binaries. MALWARE 2013: 95-102 - 2012
- [b1]Elmar Gerhards-Padilla:
TOGBAD: ein Verfahren zur Erkennung von Routingangriffen in taktischen multi-hop Netzen. University of Bonn, GCA-Verlag 2012, ISBN 978-3-89863-253-9, pp. 1-162 - [j5]Sebastian Eschweiler, Elmar Gerhards-Padilla:
Platform-Independent Recognition of Procedures in Binaries Based on Simple Characteristics. it Inf. Technol. 54(2): 64-70 (2012) - [j4]Jan Gassen, Elmar Gerhards-Padilla, Peter Martini:
Current Botnet-Techniques and Countermeasures. Prax. Inf.verarb. Kommun. 35(1): 3-10 (2012) - [c13]Daniel Plohmann, Elmar Gerhards-Padilla:
Case study of the Miner Botnet. CyCon 2012: 1-16 - [c12]Sebastian Eschweiler, Elmar Gerhards-Padilla:
Towards Sound Forensic Acquisition of Volatile Data. Future Security 2012: 289-298 - [c11]André Wichmann, Elmar Gerhards-Padilla:
Using Infection Markers as a Vaccine against Malware Attacks. GreenCom 2012: 737-742 - [c10]Nils Aschenbruck, Elmar Gerhards-Padilla, Martin Lambertz:
Applicability of crypto-based security approaches in tactical wireless multi-hop networks. LCN 2012: 102-110 - [c9]Felix Matenaar, André Wichmann, Felix Leder, Elmar Gerhards-Padilla:
CIS: The Crypto Intelligence System for automatic detection and localization of cryptographic functions in current malware. MALWARE 2012: 46-53 - [c8]Florian Schmitt, Jan Gassen, Elmar Gerhards-Padilla:
PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents. PST 2012: 104-111 - [i2]Jan Gassen, Elmar Gerhards-Padilla:
A Scalable Approach for a Distributed Network of Attack Sensors. ERCIM News 2012(90) (2012) - [i1]Daniel Plohmann, Elmar Gerhards-Padilla:
Malware and Botnet Analysis Methodology. ERCIM News 2012(90) (2012) - 2011
- [j3]Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini:
Wormhole Detection using Topology Graph based Anomaly Detection (TOGBAD). Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 37 (2011) - [j2]Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini:
TOGBAD - an approach to detect routing attacks in tactical environments. Secur. Commun. Networks 4(8): 793-806 (2011) - [c7]Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini:
TOGBAD-LQ - Using Challenge-Response to Detect Fake Link Qualities. KiVS 2011: 85-96 - 2010
- [c6]Nils Aschenbruck, Elmar Gerhards-Padilla, Peter Martini:
Simulative Evaluation of Adaptive Jamming Detection in Wireless Multi-hop Networks. ICDCS Workshops 2010: 213-220 - [c5]Nils Aschenbruck, Raphael Ernst, Elmar Gerhards-Padilla, Matthias Schwamborn:
BonnMotion: a mobility scenario generation and analysis tool. SimuTools 2010: 51
2000 – 2009
- 2009
- [j1]Nils Aschenbruck, Elmar Gerhards-Padilla, Peter Martini:
Modeling mobility in disaster area scenarios. Perform. Evaluation 66(12): 773-790 (2009) - [c4]Tillmann Werner, Christoph Fuchs, Elmar Gerhards-Padilla, Peter Martini:
Nebula - generating syntactical network intrusion signatures. MALWARE 2009: 31-38 - 2007
- [c3]Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini, Marko Jahnke, Jens Tölle:
Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs. LCN 2007: 1043-1052 - [c2]Nils Aschenbruck, Elmar Gerhards-Padilla, Michael Gerharz, Matthias Frank, Peter Martini:
Modelling mobility in disaster area scenarios. MSWiM 2007: 4-12 - [c1]Marko Jahnke, Jens Tölle, Alexander Finkenbrink, Alexander Wenzel, Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini:
Methodologies and frameworks for testing ids in adhoc networks. Q2SWinet 2007: 113-122
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint