If you made any changes in Pure these will be visible here soon.

Research Output

2020

Beyond Labeling: Using Clustering to Build Network Behavioral Profiles of Malware Families

Nadeem, A., Hammerschmidt, C. A., Hernandez Ganan, C. & Verwer, S. E., 10 Aug 2020, (Accepted/In press) Malware Analysis using Artificial Intelligence and Deep Learning. Springer

Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

Open Access
File
31 Downloads (Pure)

Disposable botnets: Examining the anatomy of IoT botnet infrastructure

Tanabe, R., Tamai, T., Fujita, A., Isawa, R., Yoshioka, K., Matsumoto, T., Gañán, C. & Van Eeten, M., 2020, Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020. Association for Computing Machinery (ACM), 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Pay the Piper: DDoS mitigation technique to deter financially-motivated attackers

Sasaki, T., Hernandez Gañán, C., Yoshioka, K., Van Eeten, M. & Matsumoto, T., 2020, In : IEICE Transactions on Communications. E103B, 4, p. 389-404 16 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
File
22 Downloads (Pure)
2019

Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai

Cetin, O., Hernandez Ganan, C., Altena, L., Kasama, T., Inoue, D., Tamiya, K., Tie, Y., Yoshioka, K. & van Eeten, M., 2019, Network and Distributed System Security Symposium (NDSS) 2019.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
500 Downloads (Pure)

Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots

Morishita, S., Hoizumi, T., Ueno, W., Tanabe, R., Hernandez Ganan, C., van Eeten, M., Yoshioka, K. & Matsumoto, T., 16 May 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019. IEEE, p. 134-143 10 p. 8717918

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
4 Citations (Scopus)
280 Downloads (Pure)

Measuring the Changing Cost of Cybercrime

Anderson, R., Barton, C., Böhme, R., Clayton, R., Hernandez Ganan, C., Grasso, T., Levi, M., Moore, T. & Vasek, M., 3 Jun 2019, The 2019 Workshop on the Economics of Information Security (WEIS 2019).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
139 Downloads (Pure)

Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting

Noroozian, A., Koenders, J., van Veldhuizen, E., Hernandez Ganan, C., Alrwais, S., McCoy, D. & van Eeten, M., 2019, 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, p. 1341--1356

Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

Open Access
File
89 Downloads (Pure)

Tell me you fixed it: Evaluating vulnerability notifications via quarantine networks

Cetin, O., Ganan, C., Altena, L., Tajalizadehkhoob, S. & Van Eeten, M., 1 Jun 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019. Institute of Electrical and Electronics Engineers (IEEE), p. 326-339 14 p. 8806733

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2018

Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens

Cetin, O., Altena, E. M., Hernandez Ganan, C. & van Eeten, M., 2018, Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, p. 251-263

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
2 Downloads (Pure)

Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets

van Wegberg, R., Tajalizadehkhoob, S., Soska, K., Akyazi, U., Hernandez Ganan, C., Klievink, B., Christin, N. & van Eeten, M., 15 Aug 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1009-1026 18 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access

Rotten apples or bad harvest? What we are measuring when we are measuring abuse

Tajalizadehkhoob, S., Böhme, R., Gañán, C., Korczyński, M. & Van Eeten, M., 1 Apr 2018, In : ACM Transactions on Internet Technology. 18, 4, 49.

Research output: Contribution to journalArticleScientificpeer-review

2 Citations (Scopus)
2017

Abuse reporting and the fight against cybercrime

Jhaveri, M. H., Cetin, F., Gañán, C., Moore, T. & Eeten, M. V., 2017, In : ACM Computing Surveys (CSUR). 49, 4, p. 1-27 27 p., 68.

Research output: Contribution to journalArticleScientificpeer-review

15 Citations (Scopus)

Beyond the pretty penny: the Economic Impact of Cybercrime

Gañán, C. H., Ciere, M. & van Eeten, M., 2017, Proceedings of the 2017 New Security Paradigms Workshop on ZZZ. Association for Computing Machinery (ACM), p. 35-45 11 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2 Citations (Scopus)

Make notifications great again: learning how to notify in the age of large-scale vulnerability scanning

Cetin, F. O., Ganán, C., Korczynski, M. & van Eeten, M., 2017, 16th Workshop on the Economics of Information Security (WEIS 2017). p. 1-23 23 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
21 Downloads (Pure)

Partial Device Fingerprints

Ciere, M., Gañán, C. & van Eeten, M., 2017, proceedings of Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, p. 222-237 16 p. (Lecture Notes in Computer Science; vol. 10535).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
1 Citation (Scopus)
15 Downloads (Pure)

The role of hosting providers in fighting command and control infrastructure of financial malware

Tajalizadehkhoob, S., Hernandez Ganan, C., Noroozian, A. & Van Eeten, M., 2 Apr 2017, Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security -ASIA CCS 2017. Association for Computing Machinery (ACM), p. 575-586 12 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
6 Citations (Scopus)
220 Downloads (Pure)
2016

Apples, oranges and hosting providers: Heterogeneity and security in the hosting market

Tajalizadehkhoob, S., Korczyński, M., Noroozian, A., Gañán, C. & Van Eeten, M., 30 Jun 2016, Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Institute of Electrical and Electronics Engineers (IEEE), p. 289-297 9 p. 7502824

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

12 Citations (Scopus)

Estimating the costs of consumer-facing cybercrime: A tailored instrument and representative data for six EU countries.

Riek, M., Boehme, R., Ciere, M., Hernandez Ganan, C. & van Eeten, M., 2016, Proceedings of Workshop of Economics of Information Security . p. 1-43

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
78 Downloads (Pure)

Risk Management for Third Party Payment Networks

van Driel, W., Hernandez Ganan, C., Lobbezoo, M. & van Eeten, M., 2016, Proceedings of Workshop of Economics of Information Security 2016. p. 1-10

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
173 Downloads (Pure)

Understanding the role of sender reputation in abuse reporting and cleanup

Cetin, F. O., Hanif Jhaveri, M., Gañán, C., van Eeten, M. & Moore, T., 2016, In : Journal of Cybersecurity. 2, 1, p. 83-98 16 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
File
8 Citations (Scopus)
18 Downloads (Pure)

Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service

Noroozian, A., Korczynski, M., Hernandez Ganan, C., Makita, D., Yoshioka, K. & van Eeten, M., 2016, Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016: Research in Attacks, Intrusions, and Defenses. Springer, (Lecture Notes in Computer Science; vol. 9854).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

15 Citations (Scopus)
2015

A model for revocation forecasting in public-key infrastructures

Gañán, C., Mata-Díaz, J., Muñoz, J. L., Esparza, O. & Alins, J., 2015, In : Knowledge and Information Systems. 43, 2, p. 311-331 21 p.

Research output: Contribution to journalArticleScientificpeer-review

1 Citation (Scopus)

An empirical analysis of ZeuS CC lifetime

Gañán, C., Cetin, F. O. & van Eeten, M., 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery (ACM), p. 97-108 12 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

EPA: an efficient and privacy-aware revocation mechanism for vehicular ad hoc networks

Ganan, C., Munoz, J. L., Esparza, O., Mata-Diaz, J. & Alins, J., 2015, In : Pervasive and Mobile Computing. 21, p. 75-91 17 p.

Research output: Contribution to journalArticleScientificpeer-review

22 Citations (Scopus)
2014

MHT-Based Mechanism for Certificate Revocation in VANETs

Muñoz, J. L., Esparza, O., Gañán, C., Mata-Diaz, J., Alins, J. & Ganchev, I., 2014, Wireless Networking for Moving Objects. Springer, p. 282-300 19 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

2 Citations (Scopus)

PPREM: privacy preserving REvocation mechanism for vehicular ad hoc networks

Gañán, C., Muñoz, J. L., Esparza, O., Mata-Diaz, J. & Alins, J., 2014, In : Computer Standards and Interfaces. 36, 3, p. 513-523 11 p.

Research output: Contribution to journalArticleScientificpeer-review

27 Citations (Scopus)

VESPA: Emulating infotainment applications in vehicular networks

Rene, S., Alins, J., Mata-Diaz, J., Ganan, C., Muñoz, J. L. & Esparza, O., 2014, In : IEEE Pervasive Computing. 13, 3, p. 58-66 9 p.

Research output: Contribution to journalArticleScientificpeer-review

4 Citations (Scopus)
2013

BECSI: Bandwidth efficient certificate status information distribution mechanism for VANETs

Gañán, C., Muñoz, J. L., Esparza, O., Loo, J., Mata-Diaz, J. & Alins, J., 2013, In : Mobile Information Systems. 9, 4, p. 347-370 24 p.

Research output: Contribution to journalArticleScientificpeer-review

5 Citations (Scopus)

Certificate revocation list distribution system for the KAD network

Caubet, J., Gañán, C., Esparza, O., Muñoz, J. L., Mata-Diaz, J. & Alins, J., 2013, In : The Computer Journal. 57, 2, p. 273-280 8 p.

Research output: Contribution to journalArticleScientificpeer-review

COACH: COllaborative certificate stAtus CHecking mechanism for VANETs

Gañán, C., Muñoz, J. L., Esparza, O., Mata-Diaz, J., Hernández-Serrano, J. & Alins, J., 2013, In : Journal of Network and Computer Applications. 36, 5, p. 1337-1351 15 p.

Research output: Contribution to journalArticleScientificpeer-review

14 Citations (Scopus)

Low-cost group rekeying for unattended wireless sensor networks

Hernández-Serrano, J., Vera-del-Campo, J., Pegueroles, J. & Gañán, C., 2013, In : Wireless networks. 19, 1, p. 47-67 21 p.

Research output: Contribution to journalArticleScientificpeer-review

6 Citations (Scopus)

Secure handoffs for V2I communications in 802.11 networks

Gañán, C. H., Reñé, S., Muñoz-Tapia, J. L., Esparza, O., Mata-Diaz, J. & Alins, J., 2013, Proceedings of the 10th ACM symposium on Performance evaluation of wireless ad hoc, sensor, ubiquitous networks. p. 49-56 8 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2 Citations (Scopus)
2012

A modeling of certificate revocation and its application to synthesis of revocation traces

Ganan, C., Mata-Diaz, J., Munoz, J. L., Hernandez-Serrano, J., Esparza, O. & Alins, J., 2012, In : IEEE Transactions on Information Forensics and Security. 7, 6, p. 1673-1686 14 p.

Research output: Contribution to journalArticleScientificpeer-review

7 Citations (Scopus)

Analysis of inter-RSU beaconing interference in VANETs

Gañán, C., Loo, J., Ghosh, A., Esparza, O., Reñé, S. & Muñoz, J. L., 2012, International Workshop on Multiple Access Communications. p. 49-59 11 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

8 Citations (Scopus)

Impact of the revocation service in PKI prices

Gañán, C., Muñoz, J. L., Esparza, O., Mata-Diaz, J. & Alins, J., 2012, International Conference on Information and Communications Security. p. 22-32 11 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)

On the self-similarity nature of the revocation data

Gañán, C., Mata-Diaz, J., Muñoz, J. L., Esparza, O. & Alins, J., 2012, International Conference on Information Security. p. 387-400 14 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

RAR: risk aware revocation mechanism for vehicular networks

Ganan, C., Munoz, J. L., Esparza, O., Mata-Diaz, J., Alins, J., Silva-Cardenas, C. & Bartra-Gardini, G., 2012, Vehicular Technology Conference (VTC Spring), 2012 IEEE 75th. p. 1-5 5 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

5 Citations (Scopus)

Risk-based decision making for public key infrastructures using fuzzy logic

Ganan, C., Munoz, J. L., Esparza, O., Mata-Diaz, J. & Alins, J., 2012, In : International Journal of Innovative Computing, Information and Control. 8, 11, p. 7925-7942 18 p.

Research output: Contribution to journalArticleScientificpeer-review

2 Citations (Scopus)

Toward revocation data handling efficiency in VANETs

Gañán, C., Muñoz, J. L., Esparza, O., Mata-Diaz, J. & Alins, J., 2012, International Workshop on Communication Technologies for Vehicles. p. 80-90 11 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

12 Citations (Scopus)
2011

Analysis of video streaming performance in vehicular networks

Rene, S., Ganan, C., Caubet, J., Alins, J., Mata, J. & Munoz, J. L., 2011, The First International Conference on Advanced Communications and Computation. Vol. 10. p. 2011 1 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2009

ARES project CONSOLIDER-INGENIO 2010 CSD2007-00004 Workpackage 2-Task 1 (WP2. T1) Completion of the design and implementation of new authentication/authorization schemes in

Munoz, J. L., Esparza, O., Ganán, C., Caubet, J., René, S., Forné, J., Hinarejos, M. F., Roman, R. & Rifa, H., 2009, In : IEEE Transactions on Haptics. 58, 4, p. 1876-1886 11 p.

Research output: Contribution to journalArticleScientificpeer-review

PKIX certificate status in hybrid MANETS

Munoz, J. L., Esparza, O., Ganán, C. & Parra-Arnau, J., 2009, IFIP International Workshop on Information Security Theory and Practices. p. 153-166 14 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

10 Citations (Scopus)