What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Michel van Eeten
Google Scholar
ORCID:
0000-0002-0338-2812
43
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Speedrunning the Maze: Meeting Regulatory Patching Deadlines in a Large Enterprise Environment.
Gerbrand ten Napel
Michel van Eeten
Simon Parkin
2025
conf/asiaccs
Bits and Pieces: Piecing Together Factors of IoT Vulnerability Exploitation.
Arwa Abdulkarim Al Alsadi
Mathew Vermeer
Takayuki Sasaki
Katsunari Yoshioka
Michel van Eeten
Carlos Gañán
2025
conf/uss
EvilEDR: Repurposing EDR as an Offensive Tool.
Kotaiba Alachkar
Dirk Gaastra
Eduardo Barbaro
Michel van Eeten
Yury Zhauniarovich
2025
conf/uss
Am I Infected? Lessons from Operating a Large-Scale IoT Security Diagnostic Service.
Takayuki Sasaki
Tomoya Inazawa
Youhei Yamaguchi
Simon Parkin
Michel van Eeten
Katsunari Yoshioka
Tsutomu Matsumoto
2025
conf/uss
Ghost Clusters: Evaluating Attribution of Illicit Services through Cryptocurrency Tracing.
Kelvin Lubbertsen
Michel van Eeten
Rolf van Wegberg
2025
conf/uss
Regulating Smart Device Support Periods: User Expectations and the European Cyber Resilience Act.
Lorenz Kustosch
Carlos Gañán
Mattis van 't Schip
Michel van Eeten
Simon Parkin
2025
conf/uss
Trust but Verify: An Assessment of Vulnerability Tagging Services.
Szu-Chun Huang
Harm Griffioen
Max van der Horst
Georgios Smaragdakis
Michel van Eeten
Yury Zhauniarovich
2025
conf/uss
Patching Up: Stakeholder Experiences of Security Updates for Connected Medical Devices.
Lorenz Kustosch
Carlos Gañán
Michel van Eeten
Simon Parkin
2025
conf/uss
High Stakes, Low Certainty: Evaluating the Efficacy of High-Level Indicators of Compromise in Ransomware Attribution.
Max van der Horst
Ricky Kho
Olga Gadyatskaya
Michel Mollema
Michel van Eeten
Yury Zhauniarovich
2024
conf/uss
The Unpatchables: Why Municipalities Persist in Running Vulnerable Hosts.
Aksel Ethembabaoglu
Rolf van Wegberg
Yury Zhauniarovich
Michel van Eeten
2024
conf/uss
IoT Market Dynamics: An Analysis of Device Sales, Security and Privacy Signals, and their Interactions.
Swaathi Vetrivel
Brennen Bouwmeester
Michel van Eeten
Carlos Hernandez Gañán
2024
conf/sp
Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network.
Takayuki Sasaki
Takaya Noma
Yudai Morii
Toshiya Shimura
Michel van Eeten
Katsunari Yoshioka
Tsutomu Matsumoto
2024
conf/sp
Patchy Performance? Uncovering the Vulnerability Management Practices of IoT-Centric Vendors.
Sandra Rivera Pérez
Michel van Eeten
Carlos Hernandez Gañán
2023
conf/ccs
Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules.
Mathew Vermeer
Natalia Kadenko
Michel van Eeten
Carlos Gañán
Simon Parkin
2023
conf/uss
Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible.
Lorenz Kustosch
Carlos Gañán
Mattis van 't Schip
Michel van Eeten
Simon Parkin
2023
conf/uss
Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices.
Swaathi Vetrivel
Veerle van Harten
Carlos Hernandez Gañán
Michel van Eeten
Simon Parkin
2023
conf/uss
Two Sides of the Shield: Understanding Protective DNS adoption factors.
Elsa Turcios Rodriguez
Radu Anghel
Simon Parkin
Michel van Eeten
Carlos Gañán
2023
conf/uss
An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing Malware.
Yin Minn Pa Pa
Shunsuke Tanizaki
Tetsui Kou
Michel van Eeten
Katsunari Yoshioka
Tsutomu Matsumoto
2023
conf/sp
No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information.
Stephanie de Smale
Rik van Dijk
Xander Bouwman
Jeroen van der Ham
Michel van Eeten
2022
conf/uss
Helping hands: Measuring the impact of a large threat intelligence sharing community.
Xander Bouwman
Victor Le Pochat
Pawel Foremski
Tom van Goethem
Carlos Hernandez Gañán
Giovane C. M. Moura
Samaneh Tajalizadehkhoob
Wouter Joosen
Michel van Eeten
2022
conf/sp
Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.
Takayuki Sasaki
Akira Fujita
Carlos Hernandez Gañán
Michel van Eeten
Katsunari Yoshioka
Tsutomu Matsumoto
2022
conf/sp
Deployment of Source Address Validation by Network Operators: A Randomized Control Trial.
Qasim Lone
Alisa Frik
Matthew Luckie
Maciej Korczynski
Michel van Eeten
Carlos Gañán
2022
conf/eurosp
Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware.
Elsa Turcios Rodriguez
Max Fukkink
Simon Parkin
Michel van Eeten
Carlos Gañán
2022
conf/asiaccs
Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection.
Mathew Vermeer
Michel van Eeten
Carlos Gañán
2022
conf/asiaccs
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis.
Arwa Abdulkarim Al Alsadi
Kaichi Sameshima
Jakob Bleier
Katsunari Yoshioka
Martina Lindorfer
Michel van Eeten
Carlos Hernandez Gañán
2021
conf/soups
"The Thing Doesn't Have a Name": Learning from Emergent Real-World Interventions in Smart Home Security.
Brennen Bouwmeester
Elsa Turcios Rodriguez
Carlos Gañán
Michel van Eeten
Simon Parkin
2021
conf/eurosp
Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts.
Arman Noroozian
Elsa Turcios Rodriguez
Elmer Lastdrager
Takahiro Kasama
Michel van Eeten
Carlos Gañán
2021
conf/eurosp
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations.
Mathew Vermeer
Jonathan West
Alejandro Cuevas
Shuonan Niu
Nicolas Christin
Michel van Eeten
Tobias Fiebig
Carlos Gañán
Tyler Moore
2020
conf/uss
A different cup of TI? The added value of commercial threat intelligence.
Xander Bouwman
Harm Griffioen
Jelle Egbers
Christian Doerr
Bram Klievink
Michel van Eeten
2019
conf/uss
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting.
Arman Noroozian
Jan Koenders
Eelco van Veldhuizen
Carlos Hernandez Gañán
Sumayah A. Alrwais
Damon McCoy
Michel van Eeten
2019
conf/eurosp
Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks.
Orçun Çetin
Carlos Gañán
Lisette Altena
Samaneh Tajalizadehkhoob
Michel van Eeten
2019
conf/ndss
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
Orçun Çetin
Carlos Gañán
Lisette Altena
Takahiro Kasama
Daisuke Inoue
Kazuki Tamiya
Ying Tie
Katsunari Yoshioka
Michel van Eeten
2018
conf/uss
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets.
Rolf van Wegberg
Samaneh Tajalizadehkhoob
Kyle Soska
Ugur Akyazi
Carlos Hernandez Gañán
Bram Klievink
Nicolas Christin
Michel van Eeten
2018
conf/soups
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens.
Orçun Çetin
Carlos Gañán
Lisette Altena
Samaneh Tajalizadehkhoob
Michel van Eeten
2017
conf/ccs
The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware.
Samaneh Tajalizadehkhoob
Carlos Gañán
Arman Noroozian
Michel van Eeten
2017
conf/ccs
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Samaneh Tajalizadehkhoob
Tom van Goethem
Maciej Korczynski
Arman Noroozian
Rainer Böhme
Tyler Moore
Wouter Joosen
Michel van Eeten
2017
conf/nspw
Beyond the pretty penny: the Economic Impact of Cybercrime.
Carlos Hernandez Gañán
Michael Ciere
Michel van Eeten
2017
conf/eurosp
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs.
Maciej Korczynski
Samaneh Tajalizadehkhoob
Arman Noroozian
Maarten Wullink
Cristian Hesselman
Michel van Eeten
2016
conf/uss
Evaluating Malware Mitigation by Android Market Operators.
Yosuke Kikuchi
Hiroshi Mori
Hiroki Nakano
Katsunari Yoshioka
Tsutomu Matsumoto
Michel van Eeten
2016
conf/cns
A time-dependent SIS-model for long-term computer worm evolution.
Marcus Märtens
Hadi Asghari
Michel van Eeten
Piet Van Mieghem
2015
conf/ccs
An Empirical Analysis of ZeuS C&C Lifetime.
Carlos Gañán
Orçun Çetin
Michel van Eeten
2015
conf/acsac
Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls.
Benjamin Edwards
Steven A. Hofmeyr
Stephanie Forrest
Michel van Eeten
2013
conf/uss
Internet Measurements and Public Policy: Mind the Gap.
Hadi Asghari
Michel van Eeten
Milton L. Mueller
Coauthors
Akira Fujita
(1)
Aksel Ethembabaoglu
(1)
Alejandro Cuevas
(1)
Alisa Frik
(1)
Arman Noroozian
(5)
Arwa Abdulkarim Al Alsadi
(2)
Benjamin Edwards
(1)
Bram Klievink
(2)
Brennen Bouwmeester
(2)
Carlos Gañán
(17)
Carlos Hernandez Gañán
(9)
Christian Doerr
(1)
Cristian Hesselman
(1)
Daisuke Inoue
(1)
Damon McCoy
(1)
Dirk Gaastra
(1)
Eduardo Barbaro
(1)
Eelco van Veldhuizen
(1)
Elmer Lastdrager
(1)
Elsa Turcios Rodriguez
(4)
Georgios Smaragdakis
(1)
Gerbrand ten Napel
(1)
Giovane C. M. Moura
(1)
Hadi Asghari
(2)
Harm Griffioen
(2)
Hiroki Nakano
(1)
Hiroshi Mori
(1)
Jakob Bleier
(1)
Jan Koenders
(1)
Jelle Egbers
(1)
Jeroen van der Ham
(1)
Jonathan West
(1)
Kaichi Sameshima
(1)
Katsunari Yoshioka
(8)
Kazuki Tamiya
(1)
Kelvin Lubbertsen
(1)
Kotaiba Alachkar
(1)
Kyle Soska
(1)
Lisette Altena
(3)
Lorenz Kustosch
(3)
Maarten Wullink
(1)
Maciej Korczynski
(3)
Marcus Märtens
(1)
Martina Lindorfer
(1)
Mathew Vermeer
(4)
Matthew Luckie
(1)
Mattis van 't Schip
(2)
Max Fukkink
(1)
Max van der Horst
(2)
Michael Ciere
(1)
Michel Mollema
(1)
Michel van Eeten
(43)
Milton L. Mueller
(1)
Natalia Kadenko
(1)
Nicolas Christin
(2)
Olga Gadyatskaya
(1)
Orçun Çetin
(4)
Pawel Foremski
(1)
Piet Van Mieghem
(1)
Qasim Lone
(1)
Radu Anghel
(1)
Rainer Böhme
(1)
Ricky Kho
(1)
Rik van Dijk
(1)
Rolf van Wegberg
(3)
Samaneh Tajalizadehkhoob
(7)
Sandra Rivera Pérez
(1)
Shunsuke Tanizaki
(1)
Shuonan Niu
(1)
Simon Parkin
(10)
Stephanie de Smale
(1)
Stephanie Forrest
(1)
Steven A. Hofmeyr
(1)
Sumayah A. Alrwais
(1)
Swaathi Vetrivel
(2)
Szu-Chun Huang
(1)
Takahiro Kasama
(2)
Takaya Noma
(1)
Takayuki Sasaki
(4)
Tetsui Kou
(1)
Tobias Fiebig
(1)
Tom van Goethem
(2)
Tomoya Inazawa
(1)
Toshiya Shimura
(1)
Tsutomu Matsumoto
(5)
Tyler Moore
(2)
Ugur Akyazi
(1)
Veerle van Harten
(1)
Victor Le Pochat
(1)
Wouter Joosen
(2)
Xander Bouwman
(3)
Yin Minn Pa Pa
(1)
Ying Tie
(1)
Yosuke Kikuchi
(1)
Youhei Yamaguchi
(1)
Yudai Morii
(1)
Yury Zhauniarovich
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to