Dr. rer. nat. Daniel Plohmann
Wissenschaftlicher Mitarbeiter bei Fraunhofer FKIE
  
  | 
  
     
   | |||||||||||||||||||
Research Interests
- Reverse Engineering
 - Malware Analysis
 - Advanced simulation methods and techniques
 
Publications
- 2023
- Daniel Plohmann, Manuel Blatt, Daniel Enders
MCRIT: The MinHash-based Code Relationship & Investigation Toolkit
In: The Journal on Cybercrime & Digital Investigations, [S.l.], v. 8, n. 1, p. 1-13, April 2023. ISSN 2494-2715. 
 - Daniel Plohmann, Manuel Blatt, Daniel Enders
 - 2022
- Daniel Plohmann
Classification, Characterization, and Contextualization of Windows Malware using Static Behavior and Similarity Analysis
Doctoral Thesis, University of Bonn, Germany, July 2022. 
 - Daniel Plohmann
 - 2019
- Felix Bilstein, Daniel Plohmann
YARA-Signator: Automated Generation of Code-based YARA Rules
In: The Journal on Cybercrime & Digital Investigations, [S.l.], v. 5, n. 1, p. 1-13, December 2019. ISSN 2494-2715. 
 - Felix Bilstein, Daniel Plohmann
 - 2018
- Daniel Plohmann, Steffen Enders, Elmar Padilla
ApiScout: Robust Windows API Usage Recovery for Malware Characterization and Similarity Analysis
In: The Journal on Cybercrime & Digital Investigations, [S.l.], v. 4, n. 1, p. 1-16, December 2018. ISSN 2494-2715. 
 - Daniel Plohmann, Steffen Enders, Elmar Padilla
 - 2017
- Daniel Plohmann, Martin Clauß, Steffen Enders, Elmar Padilla
Malpedia: A Collaborative Effort to Inventorize the Malware Landscape
In: The Journal on Cybercrime & Digital Investigations, v. 3, n. 1, p. 1-19, December 2017. ISSN 2494-2715. - Jan-Niclas Hilgert, Martin Lambertz, Daniel Plohmann
Extending The Sleuth Kit and its underlying model for pooled storage file system forensic analysis
Best Paper Award
In: Digital Investigation: The International Journal of Digital Forensics & Incident Response 22. (2017): p. 76-85. 
 - Daniel Plohmann, Martin Clauß, Steffen Enders, Elmar Padilla
 - 2016 
- Daniel Plohmann, Khaled Yakdan, Michael Klatt, Johannes Bader, Elmar Gerhards-Padilla
A Comprehensive Measurement Study of Domain Generating Malware
In: Proeceedings of the 25th USENIX Security Symposium, Austin TX, USA, August 2016.
 
 - Daniel Plohmann, Khaled Yakdan, Michael Klatt, Johannes Bader, Elmar Gerhards-Padilla
 - 2015 	 
- Daniel Plohmann
DGArchive: A deep dive into domain generation
Presentation at 3rd Botconf, Paris, France, December 2015. 
 - Daniel Plohmann
 - 2014 	
- Laura Guevara, Daniel Plohmann
Semantic Exploration of Binaries
In: Proceedings of 2nd Botconf, Nancy, France, December 2014. 
 - Laura Guevara, Daniel Plohmann
 - 2013 	
- Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus
In: Proceedings of the 8th International Conference on Malicious and Unwanted Software (Malware 2013), Fajardo, USA, October 2013. - Daniel Plohmann
http://www.isotf.org/isoi12.html#agendaPicking Stones from Castles - Citadel Data Mining
Presentation at ISOI 12, Copenhagen, Denmark, September 2013. - Daniel Plohmann, Sebastian Eschweiler, Elmar Gerhards-Padilla
Patterns of a Cooperative Malware Analysis Workflow
In: Proceedings of the 5th International Conference on Cyber Conflict (CyCon'2013), Tallinn, Estonia, June 2013. - Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, Herbert Bos
P2PWNED -- Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
In: Proceedings of the 34th IEEE Symposium on Security and Privacy (S&P 2013), San Francisco, USA, May 2013. 
 - Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos
 - 2012 	
- Daniel Plohmann and Christopher Kannen
AntiRE - An Executable Collection of Anti-Reversing Techniques
In: Collin Mulliner, Patrick Stewin, editors, Proceedings of the Seventh GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING). Technical Report SR-2012-01. GI FG SIGAR, Berlin, July 2012. - Daniel Plohmann, Elmar Gerhards-Padilla
Malware and Botnet Analysis Methodology
ERCIM-News, Vol. 2012, No. 90, July 2012, p. 22
ercim-news.ercim.eu/en90/special/malware-and-botnet-analysis-methodology - Daniel Plohmann, Elmar Gerhards-Padilla
A Case Study on the Miner Botnet
In: Proceedings of the 4th International Conference on Cyber Conflict (CyCon'2012), Tallinn, Estonia, June 2012. - Daniel Plohmann, Elmar Gerhards-Padilla
Aktuelles aus der Welt der Botnetze
IT-Report, Mittler Report Verlag GmbH, Bonn, Germany, Mai 2012 - Daniel Plohmann, Elmar Gerhards-Padilla
Das schwächste Glied - Wie sich Unternehmen und Behörden vor Cyber-Attacken schützen können
Sicherheitstechnischer Report, Vol. 2012, Mittler Report Verlag GmbH, Bonn, Germany, April 2012 
 - Daniel Plohmann and Christopher Kannen
 - 2011 	
- Daniel Plohmann, Elmar Gerhards-Padilla, Felix Leder, Jan Gassen, André Wichmann, Sebastian Eschweiler
Botnets: Detection, Measurement and Defense
In: Proceedings of the 6th Future Security, Security Research Conference, Berlin, Germany, September 2011. - Daniel Plohmann, Elmar Gerhards-Padilla, Felix Leder
Botnets: Detection, Measurement, Disinfection & Defence
Technical Report published by the European Network and Information Security Agency (ENISA). Editor: Giles Hogben. Heraklion, Greece, March 2011 - Daniel Plohmann, Elmar Gerhards-Padilla, Felix Leder
Botnets: 10 Tough Questions
Report published by the European Network and Information Security Agency (ENISA). Editor: Giles Hogben. Heraklion, Greece, March 2011 
 - Daniel Plohmann, Elmar Gerhards-Padilla, Felix Leder, Jan Gassen, André Wichmann, Sebastian Eschweiler
 - 2010 	
- Felix Leder and Daniel Plohmann
PyBox - A Python approach to sandboxing
In: Sebastian Schmerl, Simon Hunke, editors, Proceedings of the Fifth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING). Technical Report SR-2010-01, page 4. GI FG SIGAR, Bonn, July 2010. 
 - Felix Leder and Daniel Plohmann
 - 2009 	
- Daniel Plohmann
Parallele Simulation von drahtlosen Mesh-Netzen
Diploma Thesis, University of Bonn, October 2009 
 - Daniel Plohmann
 - Other 	
- Daniel Plohmann
x86 Opcode Structure and Instruction Overview - Felix Leder and Daniel Plohmann
PyBox - A user-level framework for rootkit-like monitoring of processes 
 - Daniel Plohmann
 
Teaching
 	
 	Lectures, Labs, and Seminars 
- WS 2015  	
- Seminar: Seminar Selected Topics in Malware Analysis and Computer/Network Security
 - Lab: Malware Analysis
 
 - SS 2015  	
- Project Group: "Malware Bootcamp"
 
 - SS 2014  	
- Lab: Malware Analysis
 
 - SS 2012  	
- Exercises to "Network Security" (lecture by Prof. Dr. Peter Martini, Dr. Jens Tölle and Wolfgang Moll)
 - Project Group: "Malware Bootcamp"
 - Seminar: Seminar Selected Topics in Malware Analysis and Computer/Network Security
 - Lab: Communication and Communicating Devices
 
 - WS 2011/12  	
- Project Group: "Malware Bootcamp"
 - Seminar: Seminar Selected Topics in Malware Analysis and Computer/Network Security
 
 - SS 2011  	
- Guest lecture with topic: "Malware Analysis and Reverse Engineering" as part of "Systemnahe Informatik" (lecture by Prof. Dr. Peter Martini)
 - Exercises to "Network Security" (lecture by Prof. Dr. Peter Martini, Dr. Jens Tölle and Wolfgang Moll)
 - Project Group: "Malware Bootcamp"
 
 - WS 2010/11
 - Project Group: "Malware Bootcamp"
 - SS 2010  	
- Exercises to "Systemnahe Informatik" (lecture by Prof. Dr. Peter Martini)
 - Exercises to "Network Security" (lecture by Prof. Dr. Peter Martini, Dr. Jens Tölle and Wolfgang Moll)
 - Project Group: "Malware Bootcamp"
 
 
Supervised Work
- "Study of how Malware has Evolved in recent Years from a forensics Perspective and how to keep Pace with this Trends". Störmer, Ronny; Master Thesis, 2023.
 - "Dynamic Malware Analysis using the .NET Profiling API". Khouei, Sina; Lab Report, 2023.
 - "Analysis of Statically-Linked Code in Malware using Methods of Code Similarity". Enders, Daniel; Master Thesis, 2022.
 - "Verfahren zur automatisierten Identifikation bekannter Funktionen in Disassemblern". Wüstenberg, Thilo; Bachelor Thesis, 2021.
 - "Capability Analysis on Malicious Software". Bilstein, Felix; Master Thesis, 2021.
 - "Analysis of Code Reuse and Obfuscation in .NET Malware". Blatt, Manuel; Master Thesis, 2021.
 - "An Overview of .NET Bytecode and (De-)Obfuscation". Blatt, Manuel; Seminar Report, 2020.
 - "Konsistenz- und Ähnlichkeitsanalyse von Rich Headern in Malware". Enders, Daniel; Bachelor Thesis, 2020.
 - "Automation Convenience through Shellcode Injection in Hypervisor-based Malware Analysis". Blatt, Manuel; Lab Report, 2020.
 - "Prototyping a recursive ARM Disassembler for Memory Dumps". Bilstein, Felix; Lab Report, 2019.
 - "Challenges of Recovering Binary Disassembly". Bilstein, Felix; Seminar Report, 2019.
 - "Authorship Attribution on Executable x86/x64 Binary Code". Enders, Steffen; Master Thesis, 2019.
 - "Improving YARA-Signator for effective Generation of code-based YARA-Signatures". Bilstein, Felix; Lab Report, 2019.
 - "Qualitative analysis of YARA pattern-matching". Hofstetter, Max; Lab Report, 2018.
 - "Automatic Generation of code-based YARA-Signatures". Bilstein, Felix; Bachelor Thesis, 2018.
 - "Compiler-Fingerprinting on x86/x64 Binaries". Enders, Steffen; Bachelor Thesis, 2017.
 - "Memory visualization and diffing". Denno, Mohamad and Ali; Lab Report, 2017.
 - "Robust Malware Unpacking". Jenke, Thorsten; Master Thesis, 2016.
 - "A Malware Classification System Based On Structural Static Analysis". Hordiienko, Paul; Master Thesis, 2016.
 - "Command & Control Server Mimicry through Analysis and Replay of Network Capture Data". Buhl, Lennart; Bachelor Thesis, 2016.
 - "A survey of executables matching techniques". Hordiienko, Paul; Seminar Report, 2016.
 - "Flow-based Network Intrusion Detection". Herzog, Marco; Seminar Report, 2015.
 - "Malware Classification". Jenke, Thorsten; Seminar Report, 2015.
 - "Domain Generation Algorithm Recognition". Fischer, Sören; Lab Report, 2015.
 - "Ein rekursiver Disassembler". Heiler, Lorenz; Lab Report, 2015.
 - "Deobfuscation of Andromeda API Calls". Frieß, Jens; Lab Report, 2015.
 - "Dumping Malware for Fun and Profit". Bilstein, Felix; Lab Report, 2015.
 - "The many Faces of Malware - Clustering Icons from Malware". Buhl, Lennart; Lab Report, 2014.
 - "Semantic Exploration of Binaries". Guevara, Laura; Master Thesis, 2014.
 - "Clustering von Citadel Packer". Jenke, Thorsten; Bachelor Thesis, 2014.
 - "Asynchronous Tracking of Peer-to-Peer Botnets". Dammann, Julian; Diploma Thesis, 2012.
 - "Code Protection in Android". Schulz, Patrick; Lab Report, 2012.
 - "What the Fuzz?! Fuzzing - Automated software vulnerability discovery". Koch, Jonathan; Seminar Report, 2011.
 - "Heuristiken in Unpacking-Frameworks". Schulz, Patrick; Bachelor Thesis, 2011.
 
