What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Juan Caballero
Google Scholar
42
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
Web of shadows: Investigating malware abuse of internet services.
Mauro Allegretta
Giuseppe Siracusano
Roberto Gonzalez
Marco Gramaglia
Juan Caballero
2025
conf/ndss
Ctrl+Alt+Deceive: Quantifying User Exposure to Online Scams.
Platon Kotzias
Michalis Pachilakis
Javier Aldana-Iuit
Juan Caballero
Iskander Sánchez-Rola
Leyla Bilge
2025
conf/ndss
All your (data)base are belong to us: Characterizing Database Ransom(ware) Attacks.
Kevin van Liebergen
Gibran Gómez
Srdjan Matic
Juan Caballero
2025
conf/esorics
The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families.
Antonino Vitale
Simone Aonzo
Savino Dambra
Nanda Rani
Lorenzo Ippolito
Platon Kotzias
Juan Caballero
Davide Balzarotti
2023
conf/ccs
Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage.
Gibran Gómez
Kevin van Liebergen
Juan Caballero
2023
conf/ccs
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance.
Savino Dambra
Yufei Han
Simone Aonzo
Platon Kotzias
Antonino Vitale
Juan Caballero
Davide Balzarotti
Leyla Bilge
2023
conf/uss
One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles.
Savino Dambra
Leyla Bilge
Platon Kotzias
Yun Shen
Juan Caballero
2023
conf/acsac
Domain and Website Attribution beyond WHOIS.
Silvia Sebastián
Raluca-Georgia Diugan
Juan Caballero
Iskander Sánchez-Rola
Leyla Bilge
2022
conf/ccs
Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration.
Gibran Gómez
Pedro Moreno-Sanchez
Juan Caballero
2021
conf/sp
How Did That Get In My Phone? Unwanted App Distribution on Android Devices.
Platon Kotzias
Juan Caballero
Leyla Bilge
2020
conf/ccs
Towards Attribution in Mobile Markets: Identifying Developer Account Polymorphism.
Silvia Sebastián
Juan Caballero
2020
conf/ndss
Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks.
Avinash Sudhodanan
Soheil Khodayari
Juan Caballero
2020
conf/acsac
AVclass2: Massive Malware Tag Extraction from AV Labels.
Silvia Sebastián
Juan Caballero
2019
journals/tifs
The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development.
Alejandro Calleja
Juan Tapiador
Juan Caballero
2019
conf/ndss
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises.
Platon Kotzias
Leyla Bilge
Pierre-Antoine Vervier
Juan Caballero
2018
journals/compsec
Malware lineage in the wild.
Irfan Ul Haq
Sergio Chica
Juan Caballero
Somesh Jha
2018
conf/ccs
BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering.
Vishal Karande
Swarup Chandra
Zhiqiang Lin
Juan Caballero
Latifur Khan
Kevin W. Hamlen
2018
conf/ccs
K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces.
Juanru Li
Zhiqiang Lin
Juan Caballero
Yuanyuan Zhang
Dawu Gu
2017
conf/sp
A Lustrum of Malware Network Communication: Evolution and Insights.
Chaz Lever
Platon Kotzias
Davide Balzarotti
Juan Caballero
Manos Antonakakis
2017
conf/ndss
Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures.
Srdjan Matic
Carmela Troncoso
Juan Caballero
2016
conf/uss
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.
Platon Kotzias
Leyla Bilge
Juan Caballero
2016
conf/acsac
RevProbe: detecting silent reverse proxies in malicious server infrastructures.
Antonio Nappa
Rana Faisal Munir
Irfan Khan Tanoli
Christian Kreibich
Juan Caballero
2015
conf/ccs
Certified PUP: Abuse in Authenticode Code Signing.
Platon Kotzias
Srdjan Matic
Richard Rivera
Juan Caballero
2015
conf/ccs
CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services.
Srdjan Matic
Platon Kotzias
Juan Caballero
2015
conf/sp
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching.
Antonio Nappa
Richard Johnson
Leyla Bilge
Juan Caballero
Tudor Dumitras
2014
conf/ccs
AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis.
Zhaoyan Xu
Antonio Nappa
Robert Baykov
Guangliang Yang
Juan Caballero
Guofei Gu
2014
conf/esorics
SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification.
David I. Urbina
Yufei Gu
Juan Caballero
Zhiqiang Lin
2014
conf/ndss
CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers.
Antonio Nappa
Zhaoyan Xu
M. Zubair Rafique
Juan Caballero
Guofei Gu
2014
conf/acsac
Network dialog minimization and network dialog diffing: two novel primitives for network security applications.
M. Zubair Rafique
Juan Caballero
Christophe Huygens
Wouter Joosen
2013
conf/ccs
Cross-platform malware: write once, infect everywhere.
Martina Lindorfer
Matthias Neumayr
Juan Caballero
Christian Platzer
2012
conf/ccs
Manufacturing compromise: the emergence of exploit-as-a-service.
Chris Grier
Lucas Ballard
Juan Caballero
Neha Chachra
Christian J. Dietrich
Kirill Levchenko
Panayiotis Mavrommatis
Damon McCoy
Antonio Nappa
Andreas Pitsillidis
Niels Provos
M. Zubair Rafique
Moheeb Abu Rajab
Christian Rossow
Kurt Thomas
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
2011
conf/uss
Measuring Pay-per-Install: The Commoditization of Malware Distribution.
Juan Caballero
Chris Grier
Christian Kreibich
Vern Paxson
2011
conf/sp
Differential Slicing: Identifying Causal Execution Differences for Security Applications.
Noah M. Johnson
Juan Caballero
Kevin Zhijie Chen
Stephen McCamant
Pongsin Poosankam
Daniel Reynaud
Dawn Song
2010
conf/ccs
Input generation via decomposition and re-stitching: finding bugs in Malware.
Juan Caballero
Pongsin Poosankam
Stephen McCamant
Domagoj Babic
Dawn Song
2010
conf/ndss
Binary Code Extraction and Interface Identification for Security Applications.
Juan Caballero
Noah M. Johnson
Stephen McCamant
Dawn Song
2009
conf/ccs
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering.
Juan Caballero
Pongsin Poosankam
Christian Kreibich
Dawn Xiaodong Song
2009
conf/sp
Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves.
Adam Barth
Juan Caballero
Dawn Song
2008
conf/iciss
BitBlaze: A New Approach to Computer Security via Binary Analysis.
Dawn Xiaodong Song
David Brumley
Heng Yin
Juan Caballero
Ivan Jager
Min Gyung Kang
Zhenkai Liang
James Newsome
Pongsin Poosankam
Prateek Saxena
2008
conf/ndss
Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects?
Juan Caballero
Theocharis Kampouris
Dawn Song
Jia Wang
2007
conf/ccs
Polyglot: automatic extraction of protocol message format using dynamic binary analysis.
Juan Caballero
Heng Yin
Zhenkai Liang
Dawn Xiaodong Song
2007
conf/uss
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
David Brumley
Juan Caballero
Zhenkai Liang
James Newsome
2007
conf/ndss
Fig: Automatic Fingerprint Generation.
Shobha Venkataraman
Juan Caballero
Pongsin Poosankam
Min Gyung Kang
Dawn Xiaodong Song
Coauthors
Adam Barth
(1)
Alejandro Calleja
(1)
Andreas Pitsillidis
(1)
Antonino Vitale
(2)
Antonio Nappa
(5)
Avinash Sudhodanan
(1)
Carmela Troncoso
(1)
Chaz Lever
(1)
Chris Grier
(2)
Christian J. Dietrich
(1)
Christian Kreibich
(3)
Christian Platzer
(1)
Christian Rossow
(1)
Christophe Huygens
(1)
Damon McCoy
(1)
Daniel Reynaud
(1)
David Brumley
(2)
David I. Urbina
(1)
Davide Balzarotti
(3)
Dawn Song
(5)
Dawn Xiaodong Song
(4)
Dawu Gu
(1)
Domagoj Babic
(1)
Geoffrey M. Voelker
(1)
Gibran Gómez
(3)
Giuseppe Siracusano
(1)
Guangliang Yang
(1)
Guofei Gu
(2)
Heng Yin
(2)
Irfan Khan Tanoli
(1)
Irfan Ul Haq
(1)
Iskander Sánchez-Rola
(2)
Ivan Jager
(1)
James Newsome
(2)
Javier Aldana-Iuit
(1)
Jia Wang
(1)
Juan Caballero
(42)
Juan Tapiador
(1)
Juanru Li
(1)
Kevin van Liebergen
(2)
Kevin W. Hamlen
(1)
Kevin Zhijie Chen
(1)
Kirill Levchenko
(1)
Kurt Thomas
(1)
Latifur Khan
(1)
Leyla Bilge
(8)
Lorenzo Ippolito
(1)
Lucas Ballard
(1)
M. Zubair Rafique
(3)
Manos Antonakakis
(1)
Marco Gramaglia
(1)
Martina Lindorfer
(1)
Matthias Neumayr
(1)
Mauro Allegretta
(1)
Michalis Pachilakis
(1)
Min Gyung Kang
(2)
Moheeb Abu Rajab
(1)
Nanda Rani
(1)
Neha Chachra
(1)
Niels Provos
(1)
Noah M. Johnson
(2)
Panayiotis Mavrommatis
(1)
Pedro Moreno-Sanchez
(1)
Pierre-Antoine Vervier
(1)
Platon Kotzias
(10)
Pongsin Poosankam
(5)
Prateek Saxena
(1)
Raluca-Georgia Diugan
(1)
Rana Faisal Munir
(1)
Richard Johnson
(1)
Richard Rivera
(1)
Robert Baykov
(1)
Roberto Gonzalez
(1)
Savino Dambra
(3)
Sergio Chica
(1)
Shobha Venkataraman
(1)
Silvia Sebastián
(3)
Simone Aonzo
(2)
Soheil Khodayari
(1)
Somesh Jha
(1)
Srdjan Matic
(4)
Stefan Savage
(1)
Stephen McCamant
(3)
Swarup Chandra
(1)
Theocharis Kampouris
(1)
Tudor Dumitras
(1)
Vern Paxson
(2)
Vishal Karande
(1)
Wouter Joosen
(1)
Yuanyuan Zhang
(1)
Yufei Gu
(1)
Yufei Han
(1)
Yun Shen
(1)
Zhaoyan Xu
(2)
Zhenkai Liang
(3)
Zhiqiang Lin
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to